174 CVEs tracked today. 21 Critical, 63 High, 72 Medium, 10 Low.
-
CVE-2025-45491
CRITICAL
CVSS 9.8
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the username parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 11.9%.
Command Injection
Linksys
E5600 Firmware
-
CVE-2025-47419
CRITICAL
CVSS 10.0
Cleartext Transmission of Sensitive Information vulnerability in Crestron Automate VX allows Sniffing Network Traffic. Rated critical severity (CVSS 10.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-46816
CRITICAL
CVSS 9.4
goshs is a SimpleHTTPServer written in Go. Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
Suse
-
CVE-2025-46572
CRITICAL
CVSS 9.3
passport-wsfed-saml2 provides passport strategy for both WS-fed and SAML2 protocol. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-45492
CRITICAL
CVSS 9.8
Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the Iface parameter in the action_wireless function. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Netgear
Command Injection
Ex8000 Firmware
-
CVE-2025-45490
CRITICAL
CVSS 9.8
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the password parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
Linksys
E5600 Firmware
-
CVE-2025-45489
CRITICAL
CVSS 9.8
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the hostname parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
Linksys
E5600 Firmware
-
CVE-2025-45488
CRITICAL
CVSS 9.8
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.ddnsStatus DynDNS function via the mailex parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
Linksys
E5600 Firmware
-
CVE-2025-45487
CRITICAL
CVSS 9.8
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.InternetConnection function. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
Linksys
E5600 Firmware
-
CVE-2025-44899
CRITICAL
CVSS 9.8
There is a stack overflow vulnerability in Tenda RX3 V1.0br_V16.03.13.11 In the fromSetWifiGusetBasic function of the web url /goform/ WifiGuestSet, the manipulation of the parameter shareSpeed leads. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Tenda
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2025-44073
CRITICAL
CVSS 9.8
SeaCMS v13.3 was discovered to contain a SQL injection vulnerability via the component admin_comment_news.php. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Seacms
-
CVE-2025-40625
CRITICAL
CVSS 9.3
Unrestricted file upload in TCMAN's GIM v11. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
RCE
File Upload
Gim
-
CVE-2025-40624
CRITICAL
CVSS 9.3
SQL injection in TCMAN's GIM v11. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Gim
-
CVE-2025-40623
CRITICAL
CVSS 9.3
SQL injection in TCMAN's GIM v11. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Gim
Android
-
CVE-2025-40622
CRITICAL
CVSS 9.3
SQL injection in TCMAN's GIM v11. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Gim
-
CVE-2025-40621
CRITICAL
CVSS 9.3
SQL injection in TCMAN's GIM v11. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Gim
-
CVE-2025-40620
CRITICAL
CVSS 9.3
SQL injection in TCMAN's GIM v11. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Gim
-
CVE-2025-25014
CRITICAL
CVSS 9.1
A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. This Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) vulnerability could allow attackers to modify object prototypes to inject properties affecting application logic.
Prototype Pollution
RCE
Elastic
Kibana
-
CVE-2025-4041
CRITICAL
CVSS 9.3
In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
Authentication Bypass
-
CVE-2025-2011
HIGH
CVSS 7.5
The Depicter Slider & Popup Builder WordPress plugin through version 3.6.1 contains an unauthenticated SQL injection via the 's' search parameter. The insufficient escaping allows attackers to append additional SQL queries, extracting the entire WordPress database without authentication.
WordPress
SQLi
PHP
-
CVE-2025-0855
CRITICAL
CVSS 9.8
The PGS Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.8.0 via deserialization of untrusted input in the 'import_header' function. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
WordPress
PHP
Deserialization
-
CVE-2024-12225
CRITICAL
CVSS 9.1
A vulnerability was found in Quarkus in the quarkus-security-webauthn module. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Quarkus
Redhat
-
CVE-2025-47420
HIGH
CVSS 8.7
266 vulnerability in Crestron Automate VX allows Privilege Escalation.6.8161.21536 through 6.4.0.49. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Privilege Escalation
-
CVE-2025-46820
HIGH
CVSS 7.1
phpgt/Dom provides access to modern DOM APIs. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
-
CVE-2025-46815
HIGH
CVSS 8.0
The identity infrastructure software ZITADEL offers developers the ability to manage user sessions using the Session API. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, no authentication required.
Information Disclosure
Zitadel
Suse
-
CVE-2025-46762
HIGH
CVSS 7.1
Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Apache
RCE
Parquet
Redhat
-
CVE-2025-46728
HIGH
CVSS 7.5
cpp-httplib is a C++ header-only HTTP/HTTPS server and client library. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
Nginx
Denial Of Service
Cpp Httplib
Suse
-
CVE-2025-46585
HIGH
CVSS 7.5
Out-of-bounds array read/write vulnerability in the kernel module Impact: Successful exploitation of this vulnerability may affect availability. Rated high severity (CVSS 7.5). No vendor patch available.
Memory Corruption
Buffer Overflow
Harmonyos
-
CVE-2025-46584
HIGH
CVSS 7.8
Vulnerability of improper authentication logic implementation in the file system module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-46573
HIGH
CVSS 8.6
passport-wsfed-saml2 provides passport strategy for both WS-fed and SAML2 protocol. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-30165
HIGH
CVSS 8.0
vLLM is an inference and serving engine for large language models. Rated high severity (CVSS 8.0), this vulnerability is low attack complexity. No vendor patch available.
RCE
Deserialization
Vllm
Redhat
-
CVE-2025-22478
HIGH
CVSS 8.1
Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. Rated high severity (CVSS 8.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
XXE
Dell
Information Disclosure
Storage Manager
-
CVE-2025-22477
HIGH
CVSS 8.3
Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Authentication vulnerability. Rated high severity (CVSS 8.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Dell
Authentication Bypass
Storage Manager
-
CVE-2025-21475
HIGH
CVSS 7.8
Memory corruption while processing escape code, when DisplayId is passed with large unsigned value. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
-
CVE-2025-21470
HIGH
CVSS 7.8
Memory corruption while processing image encoding, when configuration is NULL in IOCTL parameter. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Authentication Bypass
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
-
CVE-2025-21469
HIGH
CVSS 7.8
Memory corruption while processing image encoding, when input buffer length is 0 in IOCTL call. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Authentication Bypass
Fastconnect 6700 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
-
CVE-2025-21468
HIGH
CVSS 7.8
Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Out-of-bounds Write vulnerability could allow attackers to write data beyond allocated buffer boundaries leading to code execution or crashes.
Memory Corruption
Buffer Overflow
Ar8035 Firmware
Csra6620 Firmware
Csra6640 Firmware
-
CVE-2025-21467
HIGH
CVSS 7.8
Memory corruption while reading the FW response from the shared queue. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Out-of-bounds Write vulnerability could allow attackers to write data beyond allocated buffer boundaries leading to code execution or crashes.
Memory Corruption
Buffer Overflow
Csra6620 Firmware
Csra6640 Firmware
Fastconnect 6200 Firmware
-
CVE-2025-21462
HIGH
CVSS 7.8
Memory corruption while processing an IOCTL request, when buffer significantly exceeds the command argument limit. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sa4150p Firmware
-
CVE-2025-21460
HIGH
CVSS 7.8
Memory corruption while processing a message, when the buffer is controlled by a Guest VM, the value can be changed continuously. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
Qam8650p Firmware
-
CVE-2025-21459
HIGH
CVSS 7.5
Transient DOS while parsing per STA profile in ML IE. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Buffer Overflow
Ar8035 Firmware
Fastconnect 6700 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
-
CVE-2025-21453
HIGH
CVSS 7.8
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
315 5g Iot Modem Firmware
Apq8017 Firmware
-
CVE-2025-4372
HIGH
CVSS 8.8
Use after free in WebAudio in Google Chrome prior to 136.0.7103.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Google
Denial Of Service
Chrome
-
CVE-2025-4368
HIGH
CVSS 8.7
A vulnerability, which was classified as critical, was found in Tenda AC8 16.03.34.06. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Tenda
Buffer Overflow
Ac8 Firmware
-
CVE-2025-4356
HIGH
CVSS 8.7
A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Tenda
Buffer Overflow
Dap 1520 Firmware
-
CVE-2025-4355
HIGH
CVSS 8.7
A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Tenda
Buffer Overflow
Dap 1520 Firmware
-
CVE-2025-4354
HIGH
CVSS 8.7
A vulnerability was found in Tenda DAP-1520 1.10B04_BETA02 and classified as critical. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Tenda
Buffer Overflow
Dap 1520 Firmware
-
CVE-2025-4350
HIGH
CVSS 8.7
A vulnerability classified as critical was found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Command Injection
Dir 600L Firmware
-
CVE-2025-4349
HIGH
CVSS 8.7
A vulnerability classified as critical has been found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Command Injection
Dir 600L Firmware
-
CVE-2025-4348
HIGH
CVSS 8.7
A vulnerability was found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4347
HIGH
CVSS 8.7
A vulnerability was found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4346
HIGH
CVSS 8.7
A vulnerability was found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4345
HIGH
CVSS 8.7
A vulnerability was found in D-Link DIR-600L up to 2.07B01 and classified as critical. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4344
HIGH
CVSS 8.7
A vulnerability, which was classified as critical, was found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4343
HIGH
CVSS 8.7
A vulnerability has been found in D-Link DIR-600L up to 2.07B01 and classified as critical. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4342
HIGH
CVSS 8.7
A vulnerability, which was classified as critical, has been found in D-Link DIR-600L up to 2.07B01. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Buffer Overflow
Dir 600L Firmware
-
CVE-2025-4299
HIGH
CVSS 8.7
A vulnerability was found in Tenda AC1206 up to 15.03.06.23. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Tenda
Buffer Overflow
Ac1206 Firmware
-
CVE-2025-4298
HIGH
CVSS 8.7
A vulnerability was found in Tenda AC1206 up to 15.03.06.23. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Tenda
Buffer Overflow
Ac1206 Firmware
-
CVE-2025-3610
HIGH
CVSS 8.8
The Reales WP STPT plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.1.2. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
WordPress
Authentication Bypass
Privilege Escalation
PHP
-
CVE-2025-2898
HIGH
CVSS 7.5
IBM Maximo Application Suite 9.0 could allow an attacker with some level of access to elevate their privileges due to a security configuration vulnerability in Role-Based Access Control (RBAC). Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Information Disclosure
IBM
Maximo Application Suite
-
CVE-2025-2802
HIGH
CVSS 7.3
The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
RCE
WordPress
Code Injection
PHP
-
CVE-2025-2509
HIGH
CVSS 7.8
Out-of-Bounds Read in Virglrenderer in ChromeOS 16093.57.0 allows a malicious guest VM to achieve arbitrary address access within the crosvm sandboxed process, potentially leading to VM escape via. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
Information Disclosure
Buffer Overflow
Chrome Os
Chrome
-
CVE-2025-0984
HIGH
CVSS 8.2
Unrestricted Upload of File with Dangerous Type, Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Netoloji Software E-Flow allows Accessing. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
File Upload
-
CVE-2025-0856
HIGH
CVSS 7.3
The PGS Core plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including,. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
PHP
-
CVE-2025-0853
HIGH
CVSS 7.5
The PGS Core plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'save_header_builder' function in all versions up to, and including, 5.8.0 due to insufficient. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
SQLi
PHP
-
CVE-2025-0649
HIGH
CVSS 8.9
Incorrect JSON input stringification in Google's Tensorflow serving versions up to 2.18.0 allows for potentially unbounded recursion leading to server crash. Rated high severity (CVSS 8.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Google
Buffer Overflow
Stack Overflow
Tensorflow Serving
Tensorflow
-
CVE-2024-49847
HIGH
CVSS 7.5
Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Ar8035 Firmware
Fastconnect 7800 Firmware
Qca6574au Firmware
Qca6584au Firmware
-
CVE-2024-49846
HIGH
CVSS 8.2
Memory corruption while decoding of OTA messages from T3448 IE. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Qca6688aq Firmware
Qca6698aq Firmware
Qca8081 Firmware
Qca8337 Firmware
-
CVE-2024-49845
HIGH
CVSS 7.8
Memory corruption during the FRS UDS generation process. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Wcd9385 Firmware
Wcd9390 Firmware
Wcd9395 Firmware
Wcn3950 Firmware
-
CVE-2024-49844
HIGH
CVSS 7.8
Memory corruption while triggering commands in the PlayReady Trusted application. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Ar8035 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
-
CVE-2024-49842
HIGH
CVSS 7.8
Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Authentication Bypass
Aqt1000 Firmware
Ar8035 Firmware
Fastconnect 6200 Firmware
-
CVE-2024-49841
HIGH
CVSS 7.8
Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Snapdragon Ar2 Gen 1 Firmware
Snapdragon Auto 5g Modem Rf Gen 2 Firmware
Snapdragon X24 Lte Modem Firmware
Snapdragon X32 5g Modem Rf Firmware
-
CVE-2024-49835
HIGH
CVSS 7.8
Memory corruption while reading secure file. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Aqt1000 Firmware
Ar8035 Firmware
Csra6620 Firmware
-
CVE-2024-45579
HIGH
CVSS 7.8
Memory corruption may occur when invoking IOCTL calls from userspace to the camera kernel driver to dump request information, due to a missing memory requirement check. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
-
CVE-2024-45578
HIGH
CVSS 7.8
Memory corruption while acquire and update IOCTLs during IFE output resource ID validation. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
-
CVE-2024-45577
HIGH
CVSS 7.8
Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
-
CVE-2024-45576
HIGH
CVSS 7.8
Memory corruption while prociesing command buffer buffer in OPE module. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
-
CVE-2024-45575
HIGH
CVSS 7.8
Memory corruption Camera kernel when large number of devices are attached through userspace. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Integer Overflow vulnerability could allow attackers to cause unexpected behavior through arithmetic overflow.
Integer Overflow
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
-
CVE-2024-45574
HIGH
CVSS 7.8
Memory corruption during array access in Camera kernel due to invalid index from invalid command data. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.
Buffer Overflow
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
Wcn3620 Firmware
Wcn3660b Firmware
-
CVE-2024-45567
HIGH
CVSS 7.8
Memory corruption while encoding JPEG format. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
-
CVE-2024-45566
HIGH
CVSS 7.8
Memory corruption during concurrent buffer access due to modification of the reference count. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
-
CVE-2024-45565
HIGH
CVSS 7.8
Memory corruption when blob structure is modified by user-space after kernel verification. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.
Buffer Overflow
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
Wcn3620 Firmware
Wcn3660b Firmware
-
CVE-2024-45564
HIGH
CVSS 7.8
Memory corruption during concurrent access to server info object due to incorrect reference count update. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
C V2x 9150 Firmware
Fastconnect 6800 Firmware
-
CVE-2024-45554
HIGH
CVSS 7.8
Memory corruption during concurrent SSR execution due to race condition on the global maps list. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
-
CVE-2025-47418
MEDIUM
CVSS 5.3
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-47417
MEDIUM
CVSS 5.1
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Crestron Automate VX allows Functionality Misuse. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-47256
MEDIUM
CVSS 5.6
Libxmp through 4.6.2 has a stack-based buffer overflow in depack_pha in loaders/prowizard/pha.c via a malformed Pha format tracker module in a .mod file. Rated medium severity (CVSS 5.6), this vulnerability is no authentication required. No vendor patch available.
Integer Overflow
Buffer Overflow
Suse
-
CVE-2025-46736
MEDIUM
CVSS 5.3
Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Information Disclosure
Umbraco Cms
-
CVE-2025-46593
MEDIUM
CVSS 5.1
Process residence vulnerability in abnormal scenarios in the print module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
Harmonyos
-
CVE-2025-46592
MEDIUM
CVSS 4.4
Null pointer dereference vulnerability in the USB HDI driver module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.4), this vulnerability is low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Harmonyos
-
CVE-2025-46591
MEDIUM
CVSS 6.2
Out-of-bounds data read vulnerability in the authorization module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2025-46590
MEDIUM
CVSS 6.3
Bypass vulnerability in the network search instruction authentication module Impact: Successful exploitation of this vulnerability can bypass authentication and enable access to some network search. Rated medium severity (CVSS 6.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-46589
MEDIUM
CVSS 4.4
Vulnerability of unauthorized access in the app lock module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated medium severity (CVSS 4.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-46588
MEDIUM
CVSS 4.4
Vulnerability of unauthorized access in the app lock module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated medium severity (CVSS 4.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-46587
MEDIUM
CVSS 6.2
Permission control vulnerability in the media library module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Privilege Escalation
Harmonyos
-
CVE-2025-46586
MEDIUM
CVSS 5.1
Permission control vulnerability in the contacts module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-45250
MEDIUM
CVSS 5.5
MrDoc v0.95 and before is vulnerable to Server-Side Request Forgery (SSRF) in the validate_url function of the app_doc/utils.py file. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SSRF
Mrdoc
-
CVE-2025-44900
MEDIUM
CVSS 6.5
In Tenda RX3 V1.0br_V16.03.13.11 in the GetParentControlInfo function of the web url /goform/GetParentControlInfo, the manipulation of the parameter mac leads to stack overflow. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Tenda
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2025-37730
MEDIUM
CVSS 6.5
Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in “client” mode, as hostname verification in TCP output was not being performed when the. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
-
CVE-2025-32022
MEDIUM
CVSS 4.6
Finit provides fast init for Linux systems. Rated medium severity (CVSS 4.6). No vendor patch available.
Memory Corruption
Buffer Overflow
-
CVE-2025-26262
MEDIUM
CVSS 6.5
An issue in the component /internals/functions of R-fx Networks Linux Malware Detect v1.6.5 allows attackers to escalate privileges and execute arbitrary code via supplying a file that contains a. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
-
CVE-2025-22476
MEDIUM
CVSS 5.5
Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Command Injection
Dell
Storage Manager
-
CVE-2025-4388
MEDIUM
CVSS 6.9
A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.131, and Liferay DXP 2024.Q4.0 through 2024.Q4.5, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 25.1% and no vendor patch available.
XSS
Digital Experience Platform
Liferay Portal
-
CVE-2025-4384
MEDIUM
CVSS 6.0
The MQTT add-on of PcVue fails to verify that a remote device’s certificate has not already expired or has not yet become valid. Rated medium severity (CVSS 6.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-4374
MEDIUM
CVSS 6.5
A flaw was found in Quay. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Quay
Redhat
-
CVE-2025-4373
MEDIUM
CVSS 4.8
A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Buffer Overflow
Redhat
Suse
-
CVE-2025-4363
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in itsourcecode Gym Management System 1.0.php?action=end_membership. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Gym Management System
-
CVE-2025-4362
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in itsourcecode Gym Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Gym Management System
-
CVE-2025-4361
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in PHPGurukul Company Visitor Management System 2.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Company Visitor Management System
-
CVE-2025-4360
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in itsourcecode Gym Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Gym Management System
-
CVE-2025-4359
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in itsourcecode Gym Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Gym Management System
-
CVE-2025-4358
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in PHPGurukul Company Visitor Management System 2.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Company Visitor Management System
-
CVE-2025-4357
MEDIUM
CVSS 5.1
A vulnerability was found in Tenda RX3 16.03.13.11_multi. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Command Injection
Tenda
Rx3 Firmware
-
CVE-2025-4353
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, was found in Brilliance Golden Link Secondary System up to 20250424. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Golden Link Secondary System
-
CVE-2025-4352
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, has been found in Brilliance Golden Link Secondary System up to 20250424.htm. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Golden Link Secondary System
-
CVE-2025-4341
MEDIUM
CVSS 5.3
A vulnerability classified as critical was found in D-Link DIR-880L up to 104WWb01. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
D-Link
Command Injection
Dir 880L Firmware
-
CVE-2025-4340
MEDIUM
CVSS 5.3
A vulnerability classified as critical has been found in D-Link DIR-890L and DIR-806A1 up to 100CNb11/108B03. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
D-Link
Command Injection
Dir 806 Firmware
Dir 890L Firmware
-
CVE-2025-4337
MEDIUM
CVSS 4.3
The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
CSRF
PHP
-
CVE-2025-4333
MEDIUM
CVSS 5.3
A vulnerability was found in feng_ha_ha/megagao ssm-erp and production_ssm up to 0.0.1. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
File Upload
Java
-
CVE-2025-4332
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Company Visitor Management System
-
CVE-2025-4331
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in SourceCodester Online Student Clearance System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Student Clearance System
-
CVE-2025-4329
MEDIUM
CVSS 5.3
A vulnerability was found in 74CMS up to 3.33.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
Path Traversal
74Cms
-
CVE-2025-4328
MEDIUM
CVSS 5.1
A vulnerability was found in fp2952 spring-cloud-base up to 7f050dc6db9afab82c5ce1d41cd74ed255ec9bfa. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Open Redirect
Java
-
CVE-2025-4327
MEDIUM
CVSS 5.3
A vulnerability was found in MRCMS 3.1.2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
CSRF
Mrcms
-
CVE-2025-4326
MEDIUM
CVSS 4.8
A vulnerability was found in MRCMS 3.1.2 and classified as problematic.do of the component Add Fragment Page. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Mrcms
-
CVE-2025-4325
MEDIUM
CVSS 4.8
A vulnerability has been found in MRCMS 3.1.2 and classified as problematic. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Mrcms
-
CVE-2025-4324
MEDIUM
CVSS 4.8
A vulnerability, which was classified as problematic, was found in MRCMS 3.1.2. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Mrcms
-
CVE-2025-4323
MEDIUM
CVSS 4.8
A vulnerability, which was classified as problematic, has been found in MRCMS 3.1.2. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Mrcms
-
CVE-2025-4314
MEDIUM
CVSS 6.9
A vulnerability has been found in SourceCodester Advanced Web Store 1.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Advanced Web Store
-
CVE-2025-4313
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in SourceCodester Advanced Web Store 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Advanced Web Store
-
CVE-2025-4312
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in SourceCodester Advanced Web Store 1.0.php. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Advanced Web Store
-
CVE-2025-4311
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in itsourcecode Content Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Content Management System
-
CVE-2025-4310
MEDIUM
CVSS 5.1
A vulnerability classified as critical has been found in itsourcecode Content Management System 1.0. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
Authentication Bypass
File Upload
Content Management System
-
CVE-2025-4309
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Art Gallery Management System 1.1. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Art Gallery Management System
-
CVE-2025-4308
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Art Gallery Management System 1.1. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Art Gallery Management System
-
CVE-2025-4307
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Art Gallery Management System 1.1. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Art Gallery Management System
-
CVE-2025-4306
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0 and classified as critical.php. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Nipah Virus Testing Management System
-
CVE-2025-4305
MEDIUM
CVSS 5.3
A vulnerability has been found in kefaming mayi up to 1.3.9 and classified as critical. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
PHP
Authentication Bypass
File Upload
-
CVE-2025-4304
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in PHPGurukul Cyber Cafe Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Cyber Cafe Management System
-
CVE-2025-4303
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Human Metapneumovirus Testing Management System
-
CVE-2025-4301
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in itsourcecode Content Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Content Management System
-
CVE-2025-4300
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in itsourcecode Content Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Content Management System
-
CVE-2025-3782
MEDIUM
CVSS 6.4
The Cision Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.3.0 due to insufficient input sanitization and output. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
XSS
PHP
-
CVE-2025-3609
MEDIUM
CVSS 5.3
The Reales WP STPT plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 2.1.2. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
Privilege Escalation
PHP
-
CVE-2025-3281
MEDIUM
CVSS 5.3
The User Registration & Membership - Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
PHP
-
CVE-2025-3020
MEDIUM
CVSS 5.4
An low privileged remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into several fields of the configuration webpage with limited impact. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XSS
-
CVE-2024-58252
MEDIUM
CVSS 6.2
Vulnerability of insufficient information protection in the media library module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2024-49830
MEDIUM
CVSS 6.6
Memory corruption while processing an IOCTL call to set mixer controls. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. This Buffer Copy without Size Check vulnerability could allow attackers to overflow a buffer to corrupt adjacent memory.
Buffer Overflow
Qca6574au Firmware
Qca6595au Firmware
Qca6678aq Firmware
Qca6688aq Firmware
-
CVE-2024-49829
MEDIUM
CVSS 6.7
Memory corruption can occur during context user dumps due to inadequate checks on buffer length. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. This Buffer Copy without Size Check vulnerability could allow attackers to overflow a buffer to corrupt adjacent memory.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
-
CVE-2024-45583
MEDIUM
CVSS 6.6
Memory corruption while handling multiple IOCTL calls from userspace to operate DMA operations. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
Fastconnect 7800 Firmware
Snapdragon 8 Gen 3 Mobile Firmware
-
CVE-2024-45581
MEDIUM
CVSS 6.6
Memory corruption while sound model registration for voice activation with audio kernel driver. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. This Out-of-bounds Write vulnerability could allow attackers to write data beyond allocated buffer boundaries leading to code execution or crashes.
Memory Corruption
Buffer Overflow
Mdm9628 Firmware
Qam8295p Firmware
Qca6564a Firmware
-
CVE-2024-45570
MEDIUM
CVSS 6.6
Memory corruption may occur during IO configuration processing when the IO port count is invalid. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity.
Memory Corruption
Buffer Overflow
Qca6391 Firmware
Qca6426 Firmware
Qca6436 Firmware
-
CVE-2024-45568
MEDIUM
CVSS 6.7
Memory corruption due to improper bounds check while command handling in camera-kernel driver. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
Snapdragon 429 Mobile Firmware
-
CVE-2024-45563
MEDIUM
CVSS 6.6
Memory corruption while handling schedule request in Camera Request Manager(CRM) due to invalid link count in the corresponding session. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. This Out-of-bounds Write vulnerability could allow attackers to write data beyond allocated buffer boundaries leading to code execution or crashes.
Memory Corruption
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sdm429w Firmware
-
CVE-2024-45562
MEDIUM
CVSS 6.6
Memory corruption during concurrent access to server info object due to unprotected critical field. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.
Use After Free
Memory Corruption
Buffer Overflow
C V2x 9150 Firmware
Fastconnect 6800 Firmware
-
CVE-2024-39442
MEDIUM
CVSS 6.2
In sprd ssense service, there is a possible missing permission check. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-47303
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47302
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47301
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47300
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47299
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47298
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47297
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47296
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-46814
LOW
CVSS 3.4
FastAPI Guard is a security library for FastAPI that provides middleware to control IPs, log requests, and detect penetration attempts. Rated low severity (CVSS 3.4), this vulnerability is remotely exploitable, no authentication required. Public exploit code available.
Authentication Bypass
Fastapi Guard
-
CVE-2025-46735
LOW
CVSS 1.1
Terraform WinDNS Provider allows users to manage their Windows DNS server resources through Terraform. Rated low severity (CVSS 1.1), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Command Injection
Hashicorp
Windows
-
CVE-2025-27248
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Openharmony
-
CVE-2025-27241
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Openharmony
-
CVE-2025-27132
LOW
CVSS 3.8
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. Rated low severity (CVSS 3.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Openharmony
-
CVE-2025-25218
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Openharmony
-
CVE-2025-25052
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Openharmony
-
CVE-2025-23379
LOW
CVSS 3.5
Dell Storage Center - Dell Storage Manager, version(s) 21.0.20, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. Rated low severity (CVSS 3.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Dell
XSS
Storage Manager
-
CVE-2025-22886
LOW
CVSS 3.3
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Openharmony
-
CVE-2025-22479
LOW
CVSS 3.5
Dell Storage Center - Dell Storage Manager, version(s) 20.0.21, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. Rated low severity (CVSS 3.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Dell
Path Traversal
Storage Manager