90 CVEs tracked today. 9 Critical, 33 High, 41 Medium, 5 Low.
-
CVE-2025-32463
CRITICAL
CVSS 9.3
Sudo before 1.9.17p1 contains a local root escalation vulnerability (CVE-2025-32463, CVSS 9.3) through the --chroot option, which loads /etc/nsswitch.conf from the user-controlled chroot directory instead of the host system. KEV-listed with EPSS 26.5% and public PoC, this vulnerability allows any user with sudo --chroot access to achieve root privileges by placing a malicious nsswitch configuration and library in their chroot.
Information Disclosure
Ubuntu
Debian
Leap
Linux Enterprise Desktop
-
CVE-2025-53076
CRITICAL
CVSS 9.8
Improper Input Validation vulnerability in Samsung Open Source rLottie allows Overread Buffers.This issue affects rLottie: V0.2.
Information Disclosure
Samsung
Ubuntu
Debian
Rlottie
-
CVE-2025-53075
CRITICAL
CVSS 9.8
Improper Input Validation vulnerability in Samsung Open Source rLottie allows Path Traversal.This issue affects rLottie: V0.2.
Samsung
Path Traversal
Ubuntu
Debian
Rlottie
-
CVE-2025-53074
CRITICAL
CVSS 9.1
Out-of-bounds Read vulnerability in Samsung Open Source rLottie allows Overflow Buffers.This issue affects rLottie: V0.2.
Samsung
Information Disclosure
Buffer Overflow
Ubuntu
Debian
-
CVE-2025-53004
CRITICAL
CVSS 9.8
A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.
Authentication Bypass
Dataease
-
CVE-2025-45931
CRITICAL
CVSS 9.8
An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote attacker to execute arbitrary code via system() function in the bin/goahead file
RCE
Command Injection
Dir 816 Firmware
D-Link
-
CVE-2025-40731
CRITICAL
CVSS 9.8
SQL injection vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to retrieve, create, update and delete databases through the pname, pprice and id parameters in /update.php.
PHP
SQLi
Daily Expense Manager
-
CVE-2025-26074
CRITICAL
CVSS 9.8
Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
Java
Command Injection
-
CVE-2025-6554
HIGH
CVSS 8.1
Chrome's V8 engine contains a type confusion vulnerability (CVE-2025-6554, CVSS 8.1) enabling arbitrary read/write operations through crafted HTML pages. KEV-listed with public PoC, type confusion in V8 is the most reliable class of browser exploitation primitives, providing full memory read/write capability for code execution within the renderer sandbox.
Google
Information Disclosure
Memory Corruption
Debian
Chrome
-
CVE-2025-0634
CRITICAL
CVSS 9.8
Use After Free vulnerability in Samsung Open Source rLottie allows Remote Code Inclusion.This issue affects rLottie: V0.2.
Samsung
Use After Free
Memory Corruption
Denial Of Service
Ubuntu
-
CVE-2025-53416
HIGH
CVSS 7.8
Delta Electronics DTN Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution
Deserialization
RCE
-
CVE-2025-53415
HIGH
CVSS 7.8
Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution
Deserialization
RCE
-
CVE-2025-52995
HIGH
CVSS 8.0
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.33.10, the implementation of the allowlist is erroneous, allowing a user to execute more shell commands than they are authorized for. The concrete impact of this vulnerability depends on the commands configured, and the binaries installed on the server or in the container image. Due to the missing separation of scopes on the OS-level, this could give an attacker access to all files managed the application, including the File Browser database. This issue has been patched in version 2.33.10.
Command Injection
Filebrowser
Suse
-
CVE-2025-52898
HIGH
CVSS 8.8
Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, a carefully crafted request could lead to a malicious actor getting access to a user's password reset token. This can only be exploited on self hosted instances configured in a certain way. Frappe Cloud users are safe. This issue has been patched in versions 14.94.3 and 15.58.0. Workarounds for this issue involve verifying password reset URLs before clicking on them or upgrading for self hosted users.
Information Disclosure
Frappe
-
CVE-2025-52895
HIGH
CVSS 7.5
Frappe is a full-stack web application framework. Prior to versions 14.94.3 and 15.58.0, SQL injection could be achieved via a specially crafted request, which could allow malicious person to gain access to sensitive information. This issue has been patched in versions 14.94.3 and 15.58.0. There are no workarounds for this issue other than upgrading.
SQLi
Frappe
-
CVE-2025-49521
HIGH
CVSS 8.8
A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
RCE
Code Injection
Redhat
-
CVE-2025-49520
HIGH
CVSS 8.8
A security vulnerability in A flaw (CVSS 8.8) that allows an authenticated attacker. High severity vulnerability requiring prompt remediation.
Code Injection
Kubernetes
Redhat
-
CVE-2025-46014
HIGH
CVSS 8.8
Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation.
Privilege Escalation
Pc Manager
-
CVE-2025-45143
HIGH
CVSS 7.0
string-math v1.2.2 was discovered to contain a Regex Denial of Service (ReDoS) which is exploited via a crafted input.
Denial Of Service
String Math
-
CVE-2025-40732
HIGH
CVSS 7.5
A security vulnerability in Daily Expense Manager (CVSS 7.5). High severity vulnerability requiring prompt remediation.
PHP
Information Disclosure
Daily Expense Manager
-
CVE-2025-38088
HIGH
CVSS 7.1
In the Linux kernel, the following vulnerability has been resolved:
powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap
memtrace mmap issue has an out of bounds issue. This patch fixes the by
checking that the requested mapping region size should stay within the
allocated region size.
Information Disclosure
Buffer Overflow
Linux
Ubuntu
Debian
-
CVE-2025-38087
HIGH
CVSS 7.8
In the Linux kernel, the following vulnerability has been resolved:
net/sched: fix use-after-free in taprio_dev_notifier
Since taprio’s taprio_dev_notifier() isn’t protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.
Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
Linux
Use After Free
Memory Corruption
Information Disclosure
Ubuntu
-
CVE-2025-36593
HIGH
CVSS 8.8
Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.
Dell
Authentication Bypass
Openmanage Network Integration
-
CVE-2025-6917
HIGH
CVSS 7.3
A vulnerability has been found in code-projects Online Hotel Booking 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/registration.php. The manipulation of the argument uname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Online Hotel Booking
-
CVE-2025-6916
HIGH
CVSS 8.8
A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. This affects the function Form_Login of the file /formLoginAuth.htm. The manipulation of the argument authCode/goURL leads to missing authentication. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used.
Authentication Bypass
T6 Firmware
TOTOLINK
-
CVE-2025-6907
HIGH
CVSS 7.3
A vulnerability classified as critical was found in code-projects Car Rental System 1.0. This vulnerability affects unknown code of the file /book_car.php. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Car Rental System
-
CVE-2025-6906
HIGH
CVSS 7.3
A vulnerability classified as critical has been found in code-projects Car Rental System 1.0. This affects an unknown part of the file /login.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Car Rental System
-
CVE-2025-6905
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, has been found in code-projects Car Rental System 1.0. This issue affects some unknown processing of the file /signup.php. The manipulation of the argument fname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Car Rental System
-
CVE-2025-6904
HIGH
CVSS 7.3
A vulnerability was found in code-projects Car Rental System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add_cars.php. The manipulation of the argument car_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Car Rental System
-
CVE-2025-6903
HIGH
CVSS 7.3
A vulnerability was found in code-projects Car Rental System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/approve.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Car Rental System
-
CVE-2025-6902
HIGH
CVSS 7.3
A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /php_action/editUser.php. The manipulation of the argument edituserName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Inventory Management System
-
CVE-2025-6901
HIGH
CVSS 7.3
A vulnerability was found in code-projects Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /php_action/removeUser.php. The manipulation of the argument userid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Inventory Management System
-
CVE-2025-6891
HIGH
CVSS 7.3
A vulnerability classified as critical has been found in code-projects Inventory Management System 1.0. Affected is an unknown function of the file /php_action/createUser.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Inventory Management System
-
CVE-2025-6889
HIGH
CVSS 7.3
A vulnerability was found in code-projects Movie Ticketing System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /logIn.php. The manipulation of the argument postName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Movie Ticketing System
-
CVE-2025-6888
HIGH
CVSS 7.3
A vulnerability was found in PHPGurukul Teachers Record Management System 2.1. It has been classified as critical. This affects an unknown part of the file /admin/changeimage.php. The manipulation of the argument tid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Teachers Record Management System
-
CVE-2025-6887
HIGH
CVSS 8.8
A vulnerability was found in Tenda AC5 15.03.06.47 and classified as critical. Affected by this issue is some unknown functionality of the file /goform/SetSysTimeCfg. The manipulation of the argument time/timeZone leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Buffer Overflow
Ac5 Firmware
Tenda
-
CVE-2025-6886
HIGH
CVSS 8.8
A vulnerability has been found in Tenda AC5 15.03.06.47 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime/schedEndTime leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Buffer Overflow
Ac5 Firmware
Tenda
-
CVE-2025-6885
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, was found in PHPGurukul Teachers Record Management System 2.1. Affected is an unknown function of the file /admin/edit-teacher-detail.php. The manipulation of the argument tid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Teachers Record Management System
-
CVE-2025-6882
HIGH
CVSS 8.8
A vulnerability classified as critical has been found in D-Link DIR-513 1.0. This affects an unknown part of the file /goform/formSetWanPPTP. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Buffer Overflow
Dir 513 Firmware
D-Link
-
CVE-2025-6881
HIGH
CVSS 8.8
A vulnerability was found in D-Link DI-8100 16.07.21. It has been rated as critical. Affected by this issue is some unknown functionality of the file /pppoe_base.asp of the component jhttpd. The manipulation of the argument mschap_en leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Buffer Overflow
Di 8100 Firmware
D-Link
-
CVE-2024-53621
HIGH
CVSS 7.5
A buffer overflow in the formSetCfm() function of Tenda AC1206 1200M 11ac US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Buffer Overflow
Stack Overflow
Denial Of Service
-
CVE-2024-8419
HIGH
CVSS 7.5
The endpoint hosts a script that allows an unauthorized remote attacker to put the system in a fail-safe state over the network due to missing authentication.
Authentication Bypass
-
CVE-2025-52997
MEDIUM
CVSS 5.9
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.34.1, a missing password policy and brute-force protection makes the authentication process insecure. Attackers could mount a brute-force attack to retrieve the passwords of all accounts in a given instance. This issue has been patched in version 2.34.1.
Information Disclosure
Filebrowser
Suse
-
CVE-2025-52901
MEDIUM
CVSS 4.5
CVE-2025-52901 is a security vulnerability (CVSS 4.5). Risk factors: public PoC available. Vendor patch is available.
Information Disclosure
Filebrowser
Suse
-
CVE-2025-52896
MEDIUM
CVSS 5.4
Frappe is a full-stack web application framework. Prior to versions 14.94.2 and 15.57.0, authenticated users could upload carefully crafted malicious files via Data Import, leading to cross-site scripting (XSS). This issue has been patched in versions 14.94.2 and 15.57.0. There are no workarounds for this issue other than upgrading.
XSS
Frappe
-
CVE-2025-52491
MEDIUM
CVSS 5.8
Akamai CloudTest before 60 2025.06.09 (12989) allows SSRF.
SSRF
-
CVE-2025-49493
MEDIUM
CVSS 5.8
CVE-2025-49493 is a security vulnerability (CVSS 5.8) that allows file inclusion. Remediation should follow standard vulnerability management procedures.
XXE
-
CVE-2025-47871
MEDIUM
CVSS 4.3
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.
Authentication Bypass
Debian
Mattermost Server
Suse
-
CVE-2025-46702
MEDIUM
CVSS 5.4
Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly enforce channel member management permissions when adding participants to playbook runs. This allows authenticated users with member-level permissions to bypass system admin restrictions and add or remove users to/from private channels via the playbook run participants feature, even when the 'Manage Members' permission has been explicitly removed. This can lead to unauthorized access to sensitive channel content and allow guest users to gain channel management privileges.
Authentication Bypass
Debian
Mattermost Server
Suse
-
CVE-2025-41439
MEDIUM
CVSS 6.1
A reflected cross-site scripting vulnerability via a specific parameter exists in SLNX Help Documentation of RICOH Streamline NX. If this vulnerability is exploited, an arbitrary script may be executed in the web browser of the user who accessed the product.
XSS
-
CVE-2025-40734
MEDIUM
CVSS 6.1
Reflected Cross-Site Scripting (XSS) vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to execute JavaScript code by sending a POST request through the password and confirm_password parameters in /register.php.
PHP
XSS
Daily Expense Manager
-
CVE-2025-40733
MEDIUM
CVSS 6.1
Reflected Cross-Site Scripting (XSS) vulnerability in Daily Expense Manager v1.0. This vulnerability allows an attacker to execute JavaScript code by sending a POST request through the username parameter in /login.php.
PHP
XSS
Daily Expense Manager
-
CVE-2025-38090
MEDIUM
CVSS 5.5
CVE-2025-38090 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Linux
Information Disclosure
Ubuntu
Debian
Linux Kernel
-
CVE-2025-38089
MEDIUM
CVSS 5.5
In the Linux kernel, the following vulnerability has been resolved:
sunrpc: handle SVC_GARBAGE during svc auth processing as auth error
tianshuo han reported a remotely-triggerable crash if the client sends a
kernel RPC server a specially crafted packet. If decoding the RPC reply
fails in such a way that SVC_GARBAGE is returned without setting the
rq_accept_statp pointer, then that pointer can be dereferenced and a
value stored there.
If it's the first time the thread has processed an RPC, then that
pointer will be set to NULL and the kernel will crash. In other cases,
it could create a memory scribble.
The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531
says that if authentication fails that the RPC should be rejected
instead with a status of AUTH_ERR.
Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This
sidesteps the whole problem of touching the rpc_accept_statp pointer in
this situation and avoids the crash.
Linux
Null Pointer Dereference
Denial Of Service
Ubuntu
Debian
-
CVE-2025-6930
MEDIUM
CVSS 6.3
A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/manage-foreigners-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-6929
MEDIUM
CVSS 6.3
A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. This issue affects some unknown processing of the file /admin/view-normal-ticket.php. The manipulation of the argument viewid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-6925
MEDIUM
CVSS 5.3
A vulnerability has been found in Dromara RuoYi-Vue-Plus 5.4.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /src/main/java/org/dromara/demo/controller/MailController.java of the component Mail Handler. The manipulation of the argument filePath leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Java
Path Traversal
Ruoyi Vue Plus
-
CVE-2025-6915
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, has been found in PHPGurukul Student Record System 3.2. Affected by this issue is some unknown functionality of the file /register.php. The manipulation of the argument session leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Record System
-
CVE-2025-6914
MEDIUM
CVSS 6.3
A vulnerability classified as critical was found in PHPGurukul Student Record System 3.2. Affected by this vulnerability is an unknown functionality of the file /edit-student.php. The manipulation of the argument fmarks2 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Record System
-
CVE-2025-6913
MEDIUM
CVSS 6.3
A vulnerability classified as critical has been found in PHPGurukul Student Record System 3.2. Affected is an unknown function of the file /admin-profile.php. The manipulation of the argument aemailid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Record System
-
CVE-2025-6912
MEDIUM
CVSS 6.3
A vulnerability was found in PHPGurukul Student Record System 3.2. It has been rated as critical. This issue affects some unknown processing of the file /manage-students.php. The manipulation of the argument del leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Record System
-
CVE-2025-6911
MEDIUM
CVSS 6.3
A vulnerability was found in PHPGurukul Student Record System 3.2. It has been declared as critical. This vulnerability affects unknown code of the file /manage-subjects.php. The manipulation of the argument del leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Record System
-
CVE-2025-6910
MEDIUM
CVSS 6.3
A vulnerability was found in PHPGurukul Student Record System 3.2. It has been classified as critical. This affects an unknown part of the file /session.php. The manipulation of the argument session leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Record System
-
CVE-2025-6909
MEDIUM
CVSS 6.3
A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add-scdetails.php. The manipulation of the argument emeradd leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Old Age Home Management System
-
CVE-2025-6908
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/edit-services.php. The manipulation of the argument sertitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Old Age Home Management System
-
CVE-2025-6900
MEDIUM
CVSS 6.3
A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-book.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
File Upload
PHP
Authentication Bypass
Library System
-
CVE-2025-6899
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Command Injection
Di 8200g Firmware
D-Link
-
CVE-2025-6898
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, has been found in D-Link DI-7300G+ 19.12.25A1. Affected by this issue is some unknown functionality of the file in proxy_client.asp. The manipulation of the argument proxy_srv/proxy_lanport/proxy_lanip/proxy_srvport leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Command Injection
D-Link
-
CVE-2025-6897
MEDIUM
CVSS 5.5
A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. Affected by this vulnerability is an unknown functionality of the file httpd_debug.asp. The manipulation of the argument Time leads to os command injection. The exploit has been disclosed to the public and may be used.
Command Injection
D-Link
-
CVE-2025-6896
MEDIUM
CVSS 6.3
A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12.25A1. Affected is an unknown function of the file wget_test.asp. The manipulation of the argument url leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Command Injection
D-Link
-
CVE-2025-6890
MEDIUM
CVSS 6.3
A vulnerability was found in code-projects Movie Ticketing System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /ticketConfirmation.php. The manipulation of the argument Date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Movie Ticketing System
-
CVE-2025-6884
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, has been found in code-projects Staff Audit System 1.0. This issue affects some unknown processing of the file /search_index.php. The manipulation of the argument Search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Staff Audit System
-
CVE-2025-6883
MEDIUM
CVSS 6.3
A vulnerability classified as critical was found in code-projects Staff Audit System 1.0. This vulnerability affects unknown code of the file /update_index.php. The manipulation of the argument updateid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Staff Audit System
-
CVE-2025-6880
MEDIUM
CVSS 6.3
A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/edit-tax.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Best Salon Management System
-
CVE-2025-6879
MEDIUM
CVSS 6.3
A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /panel/add-tax.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Best Salon Management System
-
CVE-2025-6878
MEDIUM
CVSS 6.3
A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /panel/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Best Salon Management System
-
CVE-2025-6877
MEDIUM
CVSS 6.3
A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /panel/edit-category.php. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Best Salon Management System
-
CVE-2025-5730
MEDIUM
CVSS 4.3
The Contact Form Plugin WordPress plugin before 1.1.29 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks.
WordPress
XSS
Contact Form
PHP
-
CVE-2025-4407
MEDIUM
CVSS 6.7
Insufficient Session Expiration vulnerability in ABB Lite Panel Pro.This issue affects Lite Panel Pro: through 1.0.1.
Information Disclosure
-
CVE-2025-3745
MEDIUM
CVSS 6.3
The WP Lightbox 2 WordPress plugin before 3.0.6.8 does not correctly sanitize the value of the title attribute of links before using them, which may allow malicious users to conduct XSS attacks.
WordPress
XSS
Wp Lightbox 2
PHP
-
CVE-2025-2895
MEDIUM
CVSS 5.4
IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, 2.3.4.1, and 2.3.4.1 iFix1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
XSS
IBM
Cloud Pak System
-
CVE-2024-12915
MEDIUM
CVSS 4.6
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Devinim Software Library Software allows Reflected XSS.This issue affects Library Software: before 24.11.02.
XSS
-
CVE-2023-47310
MEDIUM
CVSS 6.5
A security vulnerability in the default settings of MikroTik RouterOS 7 and fixed in (CVSS 6.5). Remediation should follow standard vulnerability management procedures.
Information Disclosure
-
CVE-2025-53017
None
Rejected reason: Reason: This candidate was issued in error. No vendor patch available.
Information Disclosure
-
CVE-2025-53001
None
Rejected reason: Reason: This candidate was issued in error. No vendor patch available.
Information Disclosure
-
CVE-2025-52996
LOW
CVSS 3.1
CVE-2025-52996 is a security vulnerability (CVSS 3.1). Risk factors: public PoC available.
Information Disclosure
-
CVE-2025-40710
LOW
CVSS 2.3
Host Header Injection (HHI) vulnerability in the Hotspot Shield VPN client, which can induce unexpected behaviour when accessing third-party web applications through the VPN tunnel. Although such applications do not present this vulnerability per se, the use of the tunnel, together with a forged Host header, can cause the VPN client to redirect or forward HTTP requests to servers other than those originally intended, leading to consequences such as open redirects or delivery of traffic to infrastructure controlled by an attacker. This does not imply a flaw in the target applications, but in how the VPN client internally handles outgoing headers and requests.
Code Injection
-
CVE-2025-32462
LOW
CVSS 2.8
Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
Authentication Bypass
Ubuntu
Debian
-
CVE-2025-6932
LOW
CVSS 3.7
A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Authentication Bypass
D-Link
-
CVE-2025-6931
LOW
CVSS 3.7
A vulnerability classified as problematic was found in D-Link DCS-6517 and DCS-7517 up to 2.02.0. Affected by this vulnerability is the function generate_pass_from_mac of the file /bin/httpd of the component Root Password Generation Handler. The manipulation leads to insufficient entropy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Information Disclosure
D-Link