111 CVEs tracked today. 9 Critical, 43 High, 49 Medium, 3 Low.
-
CVE-2025-46558
CRITICAL
CVSS 9.0
XWiki Contrib's Syntax Markdown allows importing Markdown content into wiki pages and creating wiki content in Markdown. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.
XSS
Xwiki
-
CVE-2025-45018
CRITICAL
CVSS 9.8
A SQL Injection vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Park Ticketing Management System
-
CVE-2025-45017
CRITICAL
CVSS 9.8
A SQL injection vulnerability was discovered in edit-ticket.php of PHPGurukul Park Ticketing Management System v2.0. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
RCE
PHP
SQLi
Park Ticketing Management System
-
CVE-2025-44192
CRITICAL
CVSS 9.8
SourceCodester Simple Barangay Management System v1.0 has a SQL injection vulnerability in /barangay_management/admin/?page=view_clearance. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Simple Barangay Management System
-
CVE-2025-32974
CRITICAL
CVSS 9.0
XWiki is a generic wiki platform. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, low attack complexity.
Information Disclosure
Xwiki
-
CVE-2025-32973
CRITICAL
CVSS 9.0
XWiki is a generic wiki platform. Rated critical severity (CVSS 9.0), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.
Authentication Bypass
Xwiki
-
CVE-2025-32444
CRITICAL
CVSS 10.0
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Rated critical severity (CVSS 10.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
RCE
Deserialization
Vllm
Redhat
-
CVE-2025-30392
CRITICAL
CVSS 9.8
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Azure Ai Bot Service
-
CVE-2025-30390
CRITICAL
CVSS 9.9
Improper authorization in Azure allows an authorized attacker to elevate privileges over a network. Rated critical severity (CVSS 9.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Azure Machine Learning
-
CVE-2025-27134
HIGH
CVSS 8.8
Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and EPSS exploitation probability 13.4%.
Authentication Bypass
Privilege Escalation
Joplin
-
CVE-2025-46619
HIGH
CVSS 7.6
A security issue has been discovered in Couchbase Server before 7.6.4 and fixed in v.7.6.4 and v.7.2.7 for Windows that could allow unauthorized access to sensitive files. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Couchbase Server
Windows
-
CVE-2025-46557
HIGH
CVSS 8.4
XWiki is a generic wiki platform. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Missing Authorization vulnerability could allow attackers to access resources or perform actions without proper authorization checks.
Authentication Bypass
Xwiki
-
CVE-2025-46342
HIGH
CVSS 8.5
Kyverno is a policy engine designed for cloud native platform engineering teams. Rated high severity (CVSS 8.5), this vulnerability is remotely exploitable. Public exploit code available.
Kubernetes
Authentication Bypass
Kyverno
Suse
-
CVE-2025-45020
HIGH
CVSS 7.2
A SQL Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Park Ticketing Management System
-
CVE-2025-44194
HIGH
CVSS 7.3
SourceCodester Simple Barangay Management System v1.0 has a SQL injection vulnerability in /barangay_management/admin/?page=view_household. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Simple Barangay Management System
-
CVE-2025-44193
HIGH
CVSS 7.6
SourceCodester Simple Barangay Management System v1.0 has a SQL injection vulnerability in /barangay_management/admin/?page=view_complaint. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Simple Barangay Management System
-
CVE-2025-39413
HIGH
CVSS 8.8
Missing Authorization vulnerability in David Gwyer Simple Sitemap - Create a Responsive HTML Sitemap.5.14. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-33074
HIGH
CVSS 7.5
Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Microsoft
Jwt Attack
Information Disclosure
Azure Functions
-
CVE-2025-32777
HIGH
CVSS 8.2
Volcano is a Kubernetes-native batch scheduling system. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Kubernetes
Privilege Escalation
Elastic
Denial Of Service
Suse
-
CVE-2025-30391
HIGH
CVSS 8.1
Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Information Disclosure
Dynamics 365 Customer Service
-
CVE-2025-30389
HIGH
CVSS 8.7
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Authentication Bypass
Azure Ai Bot Service
-
CVE-2025-30202
HIGH
CVSS 7.5
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Information Disclosure
Denial Of Service
Vllm
Redhat
-
CVE-2025-27611
HIGH
CVSS 8.7
base-x is a base encoder and decoder of any given alphabet using bitcoin style leading zero compression. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Redhat
-
CVE-2025-27409
HIGH
CVSS 7.5
Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Path Traversal
Joplin
-
CVE-2025-24351
HIGH
CVSS 8.8
A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
-
CVE-2025-24350
HIGH
CVSS 7.1
A vulnerability in the “Certificates and Keys” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary certificates in arbitrary. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24349
HIGH
CVSS 7.1
A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to delete the configuration of physical network. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24346
HIGH
CVSS 7.5
A vulnerability in the “Proxy” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to manipulate the “/etc/environment” file via a crafted HTTP. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Information Disclosure
-
CVE-2025-24338
HIGH
CVSS 7.1
A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to execute arbitrary client-side code in the context. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable. No vendor patch available.
RCE
-
CVE-2025-22884
HIGH
CVSS 7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Ispsoft
-
CVE-2025-22883
HIGH
CVSS 7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Ispsoft
-
CVE-2025-22882
HIGH
CVSS 7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to leverage debugging logic to execute arbitrary code when parsing. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Ispsoft
-
CVE-2025-21416
HIGH
CVSS 8.5
Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network. Rated high severity (CVSS 8.5), this vulnerability is remotely exploitable. No vendor patch available.
Microsoft
Authentication Bypass
Azure Virtual Desktop
-
CVE-2025-4142
HIGH
CVSS 8.7
A vulnerability has been found in Netgear EX6200 1.0.3.94 and classified as critical. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Netgear
Buffer Overflow
Ex6200 Firmware
-
CVE-2025-4141
HIGH
CVSS 8.7
A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Netgear
Buffer Overflow
Ex6200 Firmware
-
CVE-2025-4140
HIGH
CVSS 8.7
A vulnerability, which was classified as critical, has been found in Netgear EX6120 1.0.3.94. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Netgear
Buffer Overflow
Ex6120 Firmware
-
CVE-2025-4139
HIGH
CVSS 8.7
A vulnerability classified as critical was found in Netgear EX6120 1.0.0.68. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Buffer Overflow
Ex6120 Firmware
-
CVE-2025-4125
HIGH
CVSS 7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Ispsoft
-
CVE-2025-4124
HIGH
CVSS 7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Ispsoft
-
CVE-2025-4120
HIGH
CVSS 8.7
A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Buffer Overflow
Jwnr2000V2 Firmware
-
CVE-2025-4116
HIGH
CVSS 8.7
A vulnerability, which was classified as critical, has been found in Netgear JWNR2000v2 1.0.0.11. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Buffer Overflow
Jwnr2000 Firmware
-
CVE-2025-4115
HIGH
CVSS 8.7
A vulnerability classified as critical was found in Netgear JWNR2000v2 1.0.0.11. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Buffer Overflow
Jwnr2000 Firmware
-
CVE-2025-4114
HIGH
CVSS 8.7
A vulnerability classified as critical has been found in Netgear JWNR2000v2 1.0.0.11. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Buffer Overflow
Jwnr2000 Firmware
-
CVE-2025-3395
HIGH
CVSS 8.4
Incorrect Permission Assignment for Critical Resource, Cleartext Storage of Sensitive Information vulnerability in ABB Automation Builder.8.0. Rated high severity (CVSS 8.4), this vulnerability is low attack complexity. No vendor patch available.
Abb
Information Disclosure
Automation Builder
-
CVE-2025-3394
HIGH
CVSS 8.5
Incorrect Permission Assignment for Critical Resource vulnerability in ABB Automation Builder.8.0. Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.
Abb
Information Disclosure
Automation Builder
-
CVE-2025-2170
HIGH
CVSS 7.2
A Server-side request forgery (SSRF) vulnerability has been identified in the SMA1000 Appliance Work Place interface, which in specific conditions could potentially enable a remote unauthenticated. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SSRF
Sma1000 Firmware
-
CVE-2025-2082
HIGH
CVSS 7.5
Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is no authentication required. No vendor patch available.
Integer Overflow
RCE
Model 3 Firmware
-
CVE-2024-13943
HIGH
CVSS 7.8
Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Model S Firmware
-
CVE-2024-9876
HIGH
CVSS 8.5
: Modification of Assumed-Immutable Data (MAID) vulnerability in ABB ANC, ABB ANC-L, ABB ANC-mini.1.4; ANC-L: through 1.1.4; ANC-mini: through 1.1.4. Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.
Abb
Information Disclosure
-
CVE-2024-6032
HIGH
CVSS 7.8
Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Command Injection
RCE
Model S Firmware
-
CVE-2024-6031
HIGH
CVSS 7.8
Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Model S Firmware
-
CVE-2024-6030
HIGH
CVSS 7.0
Tesla Model S oFono Unnecessary Privileges Sandbox Escape Vulnerability. Rated high severity (CVSS 7.0). No vendor patch available.
Privilege Escalation
Model S Firmware
-
CVE-2025-46560
MEDIUM
CVSS 6.5
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Denial Of Service
Vllm
Redhat
-
CVE-2025-46554
MEDIUM
CVSS 5.3
XWiki is a generic wiki platform. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Authentication Bypass
Xwiki
-
CVE-2025-46331
MEDIUM
CVSS 5.8
OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. Rated medium severity (CVSS 5.8), this vulnerability is remotely exploitable, low attack complexity.
Google
Authentication Bypass
Docker
Helm Charts
Openfga
-
CVE-2025-45021
MEDIUM
CVSS 5.3
A SQL Injection vulnerability was identified in the admin/edit-directory.php file of the PHPGurukul Directory Management System v2.0. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Directory Management System
-
CVE-2025-45019
MEDIUM
CVSS 5.4
A SQL injection vulnerability was discovered in /add-foreigners-ticket.php file of PHPGurukul Park Ticketing Management System v2.0. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
RCE
PHP
SQLi
Park Ticketing Management System
-
CVE-2025-45015
MEDIUM
CVSS 6.1
A Cross-Site Scripting (XSS) vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
XSS
Park Ticketing Management System
-
CVE-2025-45011
MEDIUM
CVSS 5.3
A HTML Injection vulnerability was discovered in the foreigner-search.php file of PHPGurukul Park Ticketing Management System v2.0. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
PHP
RCE
Park Ticketing Management System
-
CVE-2025-45010
MEDIUM
CVSS 5.3
A HTML Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
PHP
RCE
Park Ticketing Management System
-
CVE-2025-45009
MEDIUM
CVSS 5.3
A HTML Injection vulnerability was discovered in the normal-search.php file of PHPGurukul Park Ticketing Management System v2.0. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
PHP
RCE
Park Ticketing Management System
-
CVE-2025-45007
MEDIUM
CVSS 4.8
A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the profile.php file of PHPGurukul Timetable Generator System v1.0. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
XSS
Time Table Generator System
-
CVE-2025-32970
MEDIUM
CVSS 6.1
XWiki is a generic wiki platform. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Open Redirect
Xwiki
-
CVE-2025-32376
MEDIUM
CVSS 4.8
Discourse is an open-source discussion platform. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity.
Authentication Bypass
Discourse
-
CVE-2025-30422
MEDIUM
CVSS 6.5
A buffer overflow was addressed with improved input validation. Rated medium severity (CVSS 6.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
-
CVE-2025-27532
MEDIUM
CVSS 6.5
A vulnerability in the “Backup & Restore” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24887
MEDIUM
CVSS 6.3
OpenCTI is an open-source cyber threat intelligence platform. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
Opencti
-
CVE-2025-24348
MEDIUM
CVSS 5.4
A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the wireless network configuration. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24347
MEDIUM
CVSS 6.5
A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the network configuration file via a. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24345
MEDIUM
CVSS 6.3
A vulnerability in the “Hosts” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the “hosts” file in an unintended manner via a. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24344
MEDIUM
CVSS 6.3
A vulnerability in the error notification messages of the web application of ctrlX OS allows a remote unauthenticated attacker to inject arbitrary HTML tags and, possibly, execute arbitrary. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
RCE
-
CVE-2025-24343
MEDIUM
CVSS 5.4
A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24342
MEDIUM
CVSS 5.3
A vulnerability in the login functionality of the web application of ctrlX OS allows a remote unauthenticated attacker to guess valid usernames via multiple crafted HTTP requests. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24341
MEDIUM
CVSS 6.5
A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-24340
MEDIUM
CVSS 6.5
A vulnerability in the users configuration file of ctrlX OS may allow a remote authenticated (low-privileged) attacker to recover the plaintext passwords of other users. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24339
MEDIUM
CVSS 5.0
A vulnerability in the web application of ctrlX OS allows a remote unauthenticated attacker to conduct various attacks against users of the vulnerable system, including web cache poisoning or. Rated medium severity (CVSS 5.0), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
-
CVE-2025-24132
MEDIUM
CVSS 6.5
The issue was addressed with improved memory handling. Rated medium severity (CVSS 6.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
-
CVE-2025-24091
MEDIUM
CVSS 5.5
An app could impersonate system notifications. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Apple
Authentication Bypass
Ipados
Iphone Os
iOS
-
CVE-2025-4136
MEDIUM
CVSS 5.3
A vulnerability was found in Weitong Mall 1.0.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-4135
MEDIUM
CVSS 5.3
A vulnerability was found in Netgear WG302v2 up to 5.2.9 and classified as critical. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Command Injection
Wg302V2 Firmware
-
CVE-2025-4122
MEDIUM
CVSS 5.3
A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Command Injection
Jwnr2000V2 Firmware
-
CVE-2025-4121
MEDIUM
CVSS 5.3
A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Netgear
Command Injection
Jwnr2000V2 Firmware
-
CVE-2025-4119
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in Weitong Mall 1.0.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Mall
-
CVE-2025-4118
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in Weitong Mall 1.0.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Mall
-
CVE-2025-4117
MEDIUM
CVSS 5.1
A vulnerability, which was classified as critical, was found in Netgear JWNR2000v2 1.0.0.11. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Netgear
Buffer Overflow
Jwnr2000 Firmware
-
CVE-2025-4113
MEDIUM
CVSS 5.3
A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Curfew E Pass Management System
-
CVE-2025-4112
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Student Record System 3.20. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Student Record System
-
CVE-2025-4111
MEDIUM
CVSS 5.3
A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Pre School Enrollment System
-
CVE-2025-4110
MEDIUM
CVSS 5.3
A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Pre School Enrollment System
-
CVE-2025-4109
MEDIUM
CVSS 5.3
A vulnerability has been found in PHPGurukul Pre-School Enrollment System 1.0 and classified as critical. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Pre School Enrollment System
-
CVE-2025-4108
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in PHPGurukul Student Record System 3.20. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Student Record System
-
CVE-2025-3953
MEDIUM
CVSS 5.4
The WP Statistics - The Most Popular Privacy-Friendly Analytics Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'optionUpdater'. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
-
CVE-2025-3859
MEDIUM
CVSS 6.1
Websites directing users to long URLs that caused eliding to occur in the location view could leverage the truncating behavior to potentially trick users into thinking they were on a different. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Open Redirect
Firefox Focus
-
CVE-2025-3599
MEDIUM
CVSS 6.5
Symantec Endpoint Protection Windows Agent, running an ERASER Engine prior to 119.1.7.8, may be susceptible to an Elevation of Privilege vulnerability, which may allow an attacker to delete resources. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Symantec Eraser Engine
Windows
-
CVE-2025-3471
MEDIUM
CVSS 4.9
The SureForms WordPress plugin before 1.4.4 does not have proper authorisation check when updating its settings via the REST API, which could allow Contributor and above roles to perform such action. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
WordPress
Information Disclosure
Sureforms
PHP
-
CVE-2025-2890
MEDIUM
CVSS 6.5
The tagDiv Opt-In Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘subscriptionCouponId’ parameter in all versions up to, and including, 1.7 due to insufficient. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
SQLi
PHP
-
CVE-2024-30146
MEDIUM
CVSS 4.1
Improper access control of endpoint in HCL Domino Leap allows certain admin users to import applications from the server's filesystem. Rated medium severity (CVSS 4.1), this vulnerability is remotely exploitable. No vendor patch available.
Authentication Bypass
Domino Leap
-
CVE-2024-30145
MEDIUM
CVSS 6.5
Multiple vectors in HCL Domino Volt and Domino Leap allow client-side script injection in the authoring environment and deployed applications. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XSS
Domino Leap
-
CVE-2024-30115
MEDIUM
CVSS 6.3
Insufficient sanitization policy in HCL Leap allows client-side script injection in the deployed application through the HTML widget. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
Domino Leap
-
CVE-2024-9877
MEDIUM
CVSS 5.3
: Use of GET Request Method With Sensitive Query Strings vulnerability in ABB ANC, ABB ANC-L, ABB ANC-mini.1.4; ANC-L: through 1.1.4; ANC-mini: through 1.1.4. Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Abb
Information Disclosure
-
CVE-2024-6029
MEDIUM
CVSS 5.0
Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. Rated medium severity (CVSS 5.0), this vulnerability is no authentication required. No vendor patch available.
Authentication Bypass
Model S Firmware
-
CVE-2025-46782
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-46781
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-46780
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-46779
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-46778
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-32972
LOW
CVSS 2.7
XWiki is a generic wiki platform. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, low attack complexity.
Authentication Bypass
Xwiki
-
CVE-2025-32971
LOW
CVSS 3.8
XWiki is a generic wiki platform. Rated low severity (CVSS 3.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.
Authentication Bypass
Xwiki
-
CVE-2025-3269
None
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. No vendor patch available.
Redhat
Information Disclosure
-
CVE-2025-2156
None
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed. No vendor patch available.
Redhat
Information Disclosure
-
CVE-2024-47784
LOW
CVSS 2.1
Unverified Password Change for ANC software that allows an authenticated attacker to bypass the old Password check in the password change form via a web HMI1.4 and earlier. Rated low severity (CVSS 2.1). No vendor patch available.
Authentication Bypass