75 CVEs tracked today. 19 Critical, 21 High, 21 Medium, 13 Low.
-
CVE-2025-52939
CRITICAL
CVSS 9.4
CVE-2025-52939 is an out-of-bounds write vulnerability in the Lua interpreter modules (ldebug.c, lvm.c) bundled with NotepadNext through version 0.11, allowing local attackers without privileges to achieve arbitrary code execution with high impact on confidentiality, integrity, and availability. With a CVSS score of 9.4 and local attack vector requiring no user interaction, this represents a critical local privilege escalation and code execution risk; KEV status and active exploitation data are not confirmed in available intelligence, but the high CVSS and presence of affected interpreter code suggest this warrants immediate patching.
Buffer Overflow
-
CVE-2025-52936
CRITICAL
CVSS 9.3
CVE-2025-52936 is a symlink following vulnerability (CWE-59) in sslh before version 2.2.2 that allows local attackers with low privileges to bypass file access controls and potentially achieve high-impact confidentiality and integrity violations. The vulnerability enables attackers to read, modify, or delete sensitive files through improper resolution of symbolic links during file operations. With a CVSS v4.0 score of 9.3 and an attack vector limited to local access requiring low privileges, this is a critical local privilege escalation risk for multi-user systems running vulnerable sslh versions.
Information Disclosure
Suse
-
CVE-2025-52935
CRITICAL
CVSS 9.4
CVE-2025-52935 is an integer overflow/wraparound vulnerability in DragonflyDB's Lua struct module (lua_struct.C) that allows authenticated attackers with low privileges to trigger memory corruption, information disclosure, and potential code execution. The vulnerability affects DragonflyDB versions 1.30.1, 1.30.0, and 1.28.18, and carries a critical CVSS v4.0 score of 9.4 with high impact across confidentiality, integrity, and availability. No public exploit code or active exploitation has been confirmed at this time, but the authenticated attack vector and high severity warrant immediate patching.
Integer Overflow
Denial Of Service
-
CVE-2025-52921
CRITICAL
CVSS 9.9
A remote code execution vulnerability in Innoshop (CVSS 9.9). Critical severity with potential for significant impact on affected systems.
PHP
RCE
-
CVE-2025-52562
CRITICAL
CVSS 10.0
A path traversal vulnerability in versions 3.9.0-rc3 to (CVSS 10.0) that allows the attacker. Critical severity with potential for significant impact on affected systems.
PHP
Path Traversal
-
CVE-2025-46101
CRITICAL
CVSS 9.8
A SQL injection vulnerability (CVSS 9.8) that allows a remote attacker. Risk factors: public PoC available.
PHP
SQLi
Learning Management System Sharable Content Object Reference Model
-
CVE-2025-6547
CRITICAL
CVSS 9.1
CVE-2025-6547 is an improper input validation vulnerability in the pbkdf2 cryptographic library (versions ≤3.1.2) that allows attackers to spoof cryptographic signatures through inadequate validation mechanisms. This affects any application using vulnerable pbkdf2 versions for password hashing or key derivation, potentially compromising authentication and integrity verification. With a CVSS score of 9.1 and high integrity/signature impact ratings, this vulnerability has significant real-world implications for systems relying on pbkdf2 for security-critical operations.
Authentication Bypass
Redhat
Suse
-
CVE-2025-6545
CRITICAL
CVSS 9.1
CVE-2025-6545 is an improper input validation vulnerability in the pbkdf2 library (versions 3.0.10 through 3.1.2) affecting the lib/to-buffer.js file that enables signature spoofing through inadequate validation mechanisms. Attackers with network access and minimal attack complexity can compromise the integrity of PBKDF2-derived cryptographic signatures, potentially allowing unauthorized authentication or data tampering. The high CVSS score of 9.1 reflects critical integrity and scope impacts, though real-world exploitation likelihood depends on confirmation of active exploitation and proof-of-concept availability.
Information Disclosure
Redhat
Suse
-
CVE-2025-6513
CRITICAL
CVSS 9.3
CVE-2025-6513 is a local privilege escalation vulnerability in the BRAIN2 application where standard Windows users can access and decrypt the application's database configuration file without authentication. This allows unprivileged local users to obtain database credentials and potentially compromise sensitive data, with a CVSS score of 9.3 indicating critical severity. The vulnerability affects system confidentiality, integrity, and availability across trust boundaries.
Microsoft
Information Disclosure
Windows
Privilege Escalation
-
CVE-2025-6512
CRITICAL
CVSS 10.0
CVE-2025-6512 is a critical privilege escalation vulnerability in BRAIN2 where unauthenticated attackers can inject malicious scripts into reports on non-admin client systems, which are then executed with administrator privileges on the BRAIN2 server. This represents a complete system compromise with CVSS 10.0 severity, affecting all users regardless of their local privilege level. No authentication is required to exploit this vulnerability, making it immediately exploitable in network environments.
RCE
Code Injection
Privilege Escalation
-
CVE-2025-2828
CRITICAL
CVSS 10.0
A remote code execution vulnerability in langchain-ai/langchain (CVSS 10.0). Risk factors: public PoC available. Vendor patch is available.
Microsoft
SSRF
Langchain
Redhat
AI / ML
-
CVE-2024-45347
CRITICAL
CVSS 9.6
CVE-2024-45347 is a critical authentication bypass vulnerability in Xiaomi Mi Connect Service APP caused by flawed validation logic that allows unauthenticated attackers on the same network segment to gain unauthorized access to victim devices with complete control (confidentiality, integrity, and availability compromise). With a CVSS score of 9.6 and CVSS vector indicating adjacent network access with no privileges or user interaction required, this vulnerability represents a severe risk to Xiaomi device users, particularly in shared network environments (corporate WiFi, home networks, public hotspots).
Authentication Bypass
-
CVE-2023-48978
CRITICAL
CVSS 9.8
A remote code execution vulnerability (CVSS 9.8) that allows a remote attacker. Critical severity with potential for significant impact on affected systems.
RCE
Itm Web Terminal
-
CVE-2023-47297
CRITICAL
CVSS 9.8
CVE-2023-47297 is a critical settings manipulation vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated remote attackers to execute arbitrary commands and modify system security auditing configurations without authentication. With a CVSS score of 9.8 and network-accessible attack vector, this vulnerability poses an immediate threat to NCR terminal deployments in retail and financial environments. The vulnerability's presence in point-of-sale systems and payment terminals makes it particularly dangerous for organizations processing financial transactions.
Information Disclosure
Terminal Handler
-
CVE-2023-47295
CRITICAL
CVSS 9.8
CVE-2023-47295 is a critical CSV injection vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated remote attackers to execute arbitrary commands through crafted payloads injected into any text input field. The vulnerability has a CVSS 9.8 score indicating maximum severity due to network accessibility, no authentication requirements, and complete system compromise potential (confidentiality, integrity, and availability impact). This represents a direct remote code execution risk affecting payment terminal infrastructure.
Code Injection
Terminal Handler
-
CVE-2023-47032
CRITICAL
CVSS 9.8
CVE-2023-47032 is a critical remote code execution vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated attackers to execute arbitrary code by sending malicious scripts to the UserService SOAP API endpoint. The vulnerability affects NCR's point-of-sale terminal handler software and carries a CVSS score of 9.8 (critical severity). There is no indication of active exploitation in the wild, but the network-accessible SOAP API, lack of authentication requirements, and high-severity CWE-94 (Improper Control of Generation of Code) suggest this poses significant risk to NCR terminal deployments.
RCE
Terminal Handler
-
CVE-2023-47031
CRITICAL
CVSS 9.8
CVE-2023-47031 is a critical privilege escalation vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated remote attackers to gain administrative privileges by crafting malicious POST requests to SOAP API endpoints (grantRolesToUsers, grantRolesToGroups, grantRolesToOrganization). With a CVSS score of 9.8 and attack vector requiring no authentication or user interaction, this vulnerability poses an immediate threat to exposed NCR Terminal Handler installations. The vulnerability has been confirmed with public disclosure and is listed in CISA's Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.
Privilege Escalation
Terminal Handler
-
CVE-2023-47030
CRITICAL
CVSS 9.8
CVE-2023-47030 is a critical remote code execution vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated attackers to execute arbitrary code and access sensitive information through improper input validation in the UserService SOAP API endpoint. The vulnerability affects point-of-sale and terminal systems used in retail and hospitality environments, enabling complete system compromise without authentication or user interaction.
RCE
Terminal Handler
-
CVE-2023-47029
CRITICAL
CVSS 9.8
CVE-2023-47029 is a critical remote code execution vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated attackers to execute arbitrary code and exfiltrate sensitive information through a crafted POST request to the UserService component. With a CVSS score of 9.8 and network-based attack vector requiring no privileges or user interaction, this vulnerability poses an immediate threat to NCR point-of-sale and payment terminal environments. The vulnerability's status as actively exploited (KEV designation) and the existence of public proof-of-concept code indicate high real-world exploitation risk.
RCE
Terminal Handler
-
CVE-2025-52922
HIGH
CVSS 7.4
CVE-2025-52922 is a directory traversal vulnerability in Innoshop through version 0.4.1 that allows authenticated administrators to abuse multiple FileManager API endpoints to map the filesystem, create/delete arbitrary directories and files, read sensitive files, and move files anywhere on the server. With a CVSS score of 7.4 and low attack complexity, this represents a significant integrity and confidentiality risk for affected deployments, though exploitation requires valid administrative credentials.
Path Traversal
-
CVE-2025-52558
HIGH
CVSS 7.0
CVE-2025-52558 is a reflected/stored cross-site scripting (XSS) vulnerability in changedetection.io prior to version 0.50.4, where error messages from website change detection filters are not properly sanitized before display. Attackers can inject malicious JavaScript through crafted filter configurations or monitored web pages, potentially compromising user sessions and data. The vulnerability requires user interaction (clicking a link/visiting a page) and affects all users of the open-source change detection service, though no CISA KEV listing or widespread active exploitation is currently documented.
XSS
-
CVE-2025-50349
HIGH
CVSS 7.5
PHPGurukul Pre-School Enrollment System v1.0 contains a directory traversal vulnerability in the update-teacher-pic.php endpoint that allows unauthenticated remote attackers to read arbitrary files from the server with high confidence. An attacker can exploit this network-accessible vulnerability without any privileges or user interaction to disclose sensitive files, potentially exposing database credentials, configuration files, or other system information. The high CVSS score of 7.5 reflects the ease of exploitation (network-accessible, low complexity, no authentication required) and significant confidentiality impact, though this vulnerability does not permit file modification or denial of service.
PHP
Path Traversal
Pre School Enrollment System
-
CVE-2025-50348
HIGH
CVSS 7.5
CVE-2025-50348 is a Directory Traversal vulnerability in PHPGurukul Pre-School Enrollment System Project version 1.0, specifically in the update-class-pic.php file. An unauthenticated remote attacker can exploit this vulnerability to read sensitive files from the server, achieving high confidentiality impact without requiring user interaction or special privileges. The vulnerability has a CVSS score of 7.5 (High) with a network-based attack vector and low attack complexity, indicating it is easily exploitable by remote actors; however, exploitation is limited to information disclosure without modification capabilities.
PHP
Path Traversal
Pre School Enrollment System
-
CVE-2025-49144
HIGH
CVSS 7.3
CVE-2025-49144 is a privilege escalation vulnerability in Notepad++ v8.8.1 and earlier that exploits insecure executable search paths in the installer to allow unprivileged local users to execute arbitrary code with SYSTEM privileges. An attacker can leverage social engineering to colocate a malicious executable with the legitimate installer in a writable directory (e.g., Downloads), and upon installer execution, the malicious payload runs with elevated privileges. The vulnerability is fixed in version 8.8.2.
Privilege Escalation
-
CVE-2025-49126
HIGH
CVSS 8.8
Visionatrix versions 1.5.0 through 2.5.0 contain a Reflected XSS vulnerability in the /docs/flows endpoint that allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers. The vulnerability stems from improper use of FastAPI's get_swagger_ui_html function with unsanitized user-controlled input, enabling session hijacking and exfiltration of application secrets. The CVSS 8.8 score reflects high severity due to network accessibility, low attack complexity, and no privilege requirements, though user interaction is required to trigger the exploit.
XSS
Information Disclosure
Python
-
CVE-2025-48026
HIGH
CVSS 7.5
CVE-2025-48026 is a path traversal vulnerability in the WebApl component of Mitel OpenScape Xpressions that allows unauthenticated attackers to read arbitrary files from the underlying operating system due to insufficient input validation. The vulnerability affects OpenScape Xpressions through version V7R1 FR5 HF43 P913, and successful exploitation could expose sensitive information without requiring authentication, elevated privileges, or user interaction. The CVSS 7.5 score reflects the high confidentiality impact, though integrity and availability are not affected.
Path Traversal
-
CVE-2025-44528
HIGH
CVSS 7.5
CVE-2025-44528 is a network-based Denial of Service vulnerability in Texas Instruments LP-CC2652RB SimpleLink CC13XX CC26XX SDK version 7.41.00.17 that allows unauthenticated remote attackers to crash or disable affected devices by sending a maliciously crafted LL_Pause_Enc_Req packet during the Bluetooth Low Energy authentication and connection establishment phase. The vulnerability has a CVSS 3.1 score of 7.5 (High) with no authentication required and low attack complexity, making it readily exploitable against vulnerable deployments. No KEV status, EPSS score, or public POC availability data was provided, but the network-accessible attack vector and lack of prerequisite conditions indicate moderate real-world risk for exposed BLE devices.
Denial Of Service
-
CVE-2025-27387
HIGH
CVSS 7.4
OPPO Clone Phone devices implement a WiFi hotspot file transfer feature that uses weak default or easily guessable passwords, allowing unauthenticated attackers on the local network to connect and access sensitive files without authentication. This vulnerability (CVE-2025-27387) carries a CVSS score of 7.4 with high confidentiality impact, though exploitation requires physical proximity to the affected device's WiFi network. No active exploitation in the wild has been confirmed in public KEV databases, but the attack surface is significant given the prevalence of file-sharing features in budget smartphone lines.
Information Disclosure
-
CVE-2025-23092
HIGH
CVSS 7.2
A path traversal vulnerability (CVSS 7.2) that allows an authenticated attacker with administrative privileges. High severity vulnerability requiring prompt remediation.
Path Traversal
-
CVE-2025-23049
HIGH
CVSS 8.4
CVE-2025-23049 is an OS Command Injection vulnerability in Meridian Technique Materialise OrthoView through version 7.5.1 that allows unauthenticated remote attackers to execute arbitrary operating system commands when servlet sharing is enabled. The vulnerability has a CVSS score of 8.4 (High) and affects healthcare/dental imaging software used by medical professionals. Attackers can achieve high confidentiality impact and high availability impact, making this a significant threat to healthcare organizations relying on OrthoView for patient imaging workflows.
Command Injection
-
CVE-2025-6529
HIGH
CVSS 8.8
A security vulnerability in 70mai M300 (CVSS 8.8). Risk factors: public PoC available.
Information Disclosure
M300 Firmware
-
CVE-2025-6511
HIGH
CVSS 8.8
CVE-2025-6511 is a critical stack-based buffer overflow vulnerability in Netgear EX6150 (version 1.0.0.46_1.0.76) affecting the sub_410090 function, allowing authenticated attackers to achieve remote code execution with high integrity, confidentiality, and availability impact. The vulnerability is publicly disclosed with proof-of-concept code available, and impacts only end-of-life products no longer receiving vendor support, elevating real-world exploitation risk for unpatched legacy deployments.
Buffer Overflow
Netgear
RCE
Denial Of Service
Ex6150 Firmware
-
CVE-2025-6510
HIGH
CVSS 8.8
CVE-2025-6510 is a critical stack-based buffer overflow vulnerability in Netgear EX6100 WiFi extender (version 1.0.2.28_1.1.138) affecting the sub_415EF8 function. An authenticated remote attacker can exploit this vulnerability to achieve arbitrary code execution with high integrity and availability impact. The vulnerability has public exploit disclosure and affects only end-of-life products no longer receiving vendor support.
Buffer Overflow
Netgear
RCE
Ex6100 Firmware
-
CVE-2025-6503
HIGH
CVSS 7.3
CVE-2025-6503 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0, specifically in the /php_action/fetchSelectedCategories.php file where the 'categoriesId' parameter is inadequately sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit has been publicly disclosed and proof-of-concept code is available, significantly elevating exploitation risk in production environments.
PHP
SQLi
Inventory Management System
-
CVE-2025-6502
HIGH
CVSS 7.3
CVE-2025-6502 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0, specifically in the /php_action/changePassword.php file where the user_id parameter is inadequately sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit details available, increasing immediate risk of active exploitation.
PHP
SQLi
Inventory Management System
-
CVE-2025-6501
HIGH
CVSS 7.3
CVE-2025-6501 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0 affecting the /php_action/createCategories.php file, where the 'categoriesStatus' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Public exploit disclosure and proof-of-concept availability indicate active threat potential with low barrier to exploitation.
PHP
SQLi
Remote Code Execution
Inventory Management System
-
CVE-2025-6500
HIGH
CVSS 7.3
CVE-2025-6500 is a critical SQL injection vulnerability in code-projects Inventory Management System 1.0, specifically in the /php_action/editCategories.php file where the 'editCategoriesName' parameter is inadequately sanitized. An unauthenticated attacker can exploit this remotely to read, modify, or delete database contents, affecting confidentiality, integrity, and availability. Public exploit disclosure and confirmed proof-of-concept availability increase real-world risk significantly.
PHP
SQLi
Inventory Management System
-
CVE-2025-2171
HIGH
CVSS 7.8
Aviatrix Controller versions before 7.1.4208, 7.2.5090, and 8.0.0 lack rate limiting on password reset PIN attempts, allowing unauthenticated attackers to brute force 6-digit PINs over the network without authentication or user interaction. This vulnerability is characterized as having exploitation probability (E:P in CVSS vector) and enables complete account takeover via password reset bypass, affecting all Aviatrix Controller deployments in vulnerable versions.
Information Disclosure
-
CVE-2023-50450
HIGH
CVSS 8.4
A privilege escalation vulnerability in Sensopart VISOR Vision Sensors (CVSS 8.4) that allows local users. High severity vulnerability requiring prompt remediation.
Privilege Escalation
Visor Vision Sensors Firmware
-
CVE-2023-47294
HIGH
CVSS 8.1
CVE-2023-47294 is a session cookie validation flaw in NCR Terminal Handler v1.5.1 that permits authenticated attackers with low privileges to craft malicious session cookies to arbitrarily deactivate, lock, and delete user accounts, resulting in high integrity and availability impact. This vulnerability has a CVSS 8.1 score (High severity) and affects NCR's point-of-sale and terminal management infrastructure; while no public POC or active KEV listing is confirmed from the provided data, the network-accessible nature (AV:N) and low attack complexity (AC:L) make this a material risk for organizations deploying this terminal handler in production environments.
Information Disclosure
Terminal Handler
-
CVE-2025-52967
MEDIUM
CVSS 5.8
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation.
SSRF
Mlflow
AI / ML
-
CVE-2025-52938
MEDIUM
CVSS 5.1
Out-of-bounds Read vulnerability in dail8859 NotepadNext (src/lua/src modules). This vulnerability is associated with program files lparser.C.
This issue affects NotepadNext: through v0.11.
The singlevar() in lparser.c lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.
Information Disclosure
Buffer Overflow
-
CVE-2025-52920
MEDIUM
CVSS 6.4
A security vulnerability in Innoshop through 0.4.1 (CVSS 6.4). Remediation should follow standard vulnerability management procedures.
Information Disclosure
-
CVE-2025-52879
MEDIUM
CVSS 4.8
In JetBrains TeamCity before 2025.03.3 reflected XSS in the NPM Registry integration was possible
XSS
Node.js
Teamcity
-
CVE-2025-52878
MEDIUM
CVSS 4.3
In JetBrains TeamCity before 2025.03.3 usernames were exposed to the users without proper permissions
Authentication Bypass
Teamcity
-
CVE-2025-52877
MEDIUM
CVSS 4.8
In JetBrains TeamCity before 2025.03.3 reflected XSS on diskUsageBuildsStats page was possible
XSS
Teamcity
-
CVE-2025-52876
MEDIUM
CVSS 5.4
In JetBrains TeamCity before 2025.03.3 reflected XSS on the favoriteIcon page was possible
XSS
Teamcity
-
CVE-2025-52875
MEDIUM
CVSS 5.4
In JetBrains TeamCity before 2025.03.3 a DOM-based XSS at the Performance Monitor page was possible
XSS
Teamcity
-
CVE-2025-52561
MEDIUM
CVSS 6.9
HTMLSanitizer.jl is a Whitelist-based HTML sanitizer. Prior to version 0.2.1, when adding the style tag to the whitelist, content inside the tag is incorrectly unescaped, and closing tags injected as content are interpreted as real HTML, enabling tag injection and JavaScript execution. This could result in possible cross-site scripting (XSS) in any HTML that is sanitized with this library. This issue has been patched in version 0.2.1. A workaround involves adding the math and svg elements to the whitelist manually.
XSS
-
CVE-2025-49574
MEDIUM
CVSS 6.4
A security vulnerability in versions (CVSS 6.4). Remediation should follow standard vulnerability management procedures.
Information Disclosure
Java
Redhat
-
CVE-2025-48700
MEDIUM
CVSS 6.1
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI, requiring no additional user interaction.
XSS
Authentication Bypass
Zimbra Collaboration Suite
-
CVE-2025-6530
MEDIUM
CVSS 4.8
A vulnerability was found in 70mai M300 up to 20250611. It has been classified as problematic. This affects an unknown part of the file demo.sh of the component Telnet Service. The manipulation leads to denial of service. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Denial Of Service
M300 Firmware
-
CVE-2025-6528
MEDIUM
CVSS 4.3
A vulnerability has been found in 70mai M300 up to 20250611 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /livestream/12 of the component RTSP Live Video Stream Endpoint. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Authentication Bypass
M300 Firmware
-
CVE-2025-6525
MEDIUM
CVSS 4.3
A security vulnerability in 70mai 1S (CVSS 4.3). Remediation should follow standard vulnerability management procedures.
Information Disclosure
-
CVE-2025-6518
MEDIUM
CVSS 6.3
A security vulnerability in PySpur-Dev pyspur (CVSS 6.3). Remediation should follow standard vulnerability management procedures.
Information Disclosure
-
CVE-2025-6517
MEDIUM
CVSS 6.3
A vulnerability was found in Dromara MaxKey up to 4.1.7 and classified as critical. This issue affects the function Add of the file maxkey-webs\maxkey-web-mgt\src\main\java\org\dromara\maxkey\web\apps\contorller\SAML20DetailsController.java of the component Meta URL Handler. The manipulation of the argument post leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
SSRF
Java
Maxkey
-
CVE-2025-6516
MEDIUM
CVSS 5.3
A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
Buffer Overflow
Ubuntu
Debian
Hdf5
Redhat
-
CVE-2025-2172
MEDIUM
CVSS 6.6
Aviatrix Controller versions prior to 7.1.4208, 7.2.5090, and 8.0.0 fail to sanitize user input prior to passing the input to command line utilities, allowing command injection via special characters in filenames
Command Injection
-
CVE-2024-3511
MEDIUM
CVSS 4.3
An incorrect authorization vulnerability exists in multiple WSO2 products that allows unauthorized access to versioned files stored in the registry. Due to flawed authorization logic, a malicious actor with access to the management console can exploit a specific bypass method to retrieve versioned files without proper authorization.
Successful exploitation of this vulnerability could lead to unauthorized disclosure of configuration or resource files that may be stored as registry versions, potentially aiding further attacks or system reconnaissance.
Authentication Bypass
Identity Server As Key Manager
Open Banking Am
Enterprise Integrator
Identity Server
-
CVE-2023-47298
MEDIUM
CVSS 4.3
An issue in NCR Terminal Handler 1.5.1 allows a low-level privileged authenticated attacker to query the SOAP API endpoint to obtain information about all of the users of the application including their usernames, roles, security groups and account statuses.
Information Disclosure
Terminal Handler
-
CVE-2021-47688
MEDIUM
CVSS 5.7
A security vulnerability in WhiteBeam 0.2.0 (CVSS 5.7). Remediation should follow standard vulnerability management procedures.
Authentication Bypass
-
CVE-2025-52969
LOW
CVSS 2.8
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Rated low severity (CVSS 2.8). No vendor patch available.
Information Disclosure
Ubuntu
-
CVE-2025-52968
LOW
CVSS 2.7
xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin.
CSRF
Ubuntu
Debian
-
CVE-2025-52937
LOW
CVSS 2.0
CVE-2025-52937 is a security vulnerability (CVSS 2.0). Remediation should follow standard vulnerability management procedures.
Information Disclosure
Ubuntu
Debian
-
CVE-2025-52926
LOW
CVSS 2.7
A security vulnerability in scan.rs in spytrap-adb (CVSS 2.7). Remediation should follow standard vulnerability management procedures.
Information Disclosure
Ubuntu
Debian
-
CVE-2025-52542
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2025-6527
LOW
CVSS 3.1
A security vulnerability in 70mai M300 (CVSS 3.1). Risk factors: public PoC available.
Information Disclosure
-
CVE-2025-6526
LOW
CVSS 3.1
A vulnerability, which was classified as problematic, has been found in 70mai M300 up to 20250611. This issue affects some unknown processing of the component HTTP Server. The manipulation leads to insufficiently protected credentials. The attack can only be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Information Disclosure
-
CVE-2025-6524
LOW
CVSS 3.1
A vulnerability classified as problematic has been found in 70mai 1S up to 20250611. This affects an unknown part of the component Video Services. The manipulation leads to improper authentication. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Authentication Bypass
-
CVE-2025-6509
LOW
CVSS 3.5
A vulnerability was found in seaswalker spring-analysis up to 4379cce848af96997a9d7ef91d594aa129be8d71. It has been declared as problematic. Affected by this vulnerability is the function echo of the file /src/main/java/controller/SimpleController.java. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
XSS
Java
-
CVE-2025-6499
LOW
CVSS 3.3
A vulnerability classified as problematic was found in vstakhov libucl up to 0.9.2. Affected by this vulnerability is the function ucl_parse_multiline_string of the file src/ucl_parser.c. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
Buffer Overflow
-
CVE-2025-6498
LOW
CVSS 3.3
A vulnerability classified as problematic has been found in HTACG tidy-html5 5.8.0. Affected is the function defaultAlloc of the file src/alloc.c. The manipulation leads to memory leak. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
Information Disclosure
Ubuntu
Debian
-
CVE-2025-6497
LOW
CVSS 3.3
A vulnerability was found in HTACG tidy-html5 5.8.0. It has been rated as problematic. This issue affects the function prvTidyParseNamespace of the file src/parser.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Denial Of Service
Ubuntu
Debian
-
CVE-2025-6496
LOW
CVSS 3.3
A vulnerability was found in HTACG tidy-html5 5.8.0. It has been declared as problematic. This vulnerability affects the function InsertNodeAsParent of the file src/parser.c. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Denial Of Service
Ubuntu
Debian
-
CVE-2025-4563
LOW
CVSS 2.7
A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.
Privilege Escalation
Ubuntu
Debian