Information Disclosure

13732 CVEs technique

Monthly

CVE-2025-27709 HIGH PATCH This Week

A SQL injection vulnerability (CVSS 8.3). High severity vulnerability requiring prompt remediation.

Information Disclosure SQLi Zoho Manageengine Adaudit Plus
NVD
CVSS 3.1
8.3
EPSS
0.7%
CVE-2025-5894 HIGH This Week

Critical Missing Authorization (CWE-862) vulnerability in Honding Technology's Smart Parking Management System that allows authenticated users with regular privileges to bypass authorization controls and create administrator accounts without proper authorization checks. Attackers can leverage this flaw to escalate privileges, create backdoor admin accounts, and gain full system control (confidentiality, integrity, and availability impact). The CVSS 8.8 score reflects the high severity, though real-world exploitability depends on whether this vulnerability is actively exploited in the wild and whether public proof-of-concept code exists.

Information Disclosure
NVD
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-5868 HIGH POC This Week

Critical array index validation vulnerability in RT-Thread 5.1.0's signal mask syscall handler that allows authenticated local attackers to read and modify kernel memory with high impact. The vulnerability exists in the sys_thread_sigprocmask function where improper validation of the 'how' parameter enables out-of-bounds array access, potentially leading to privilege escalation or denial of service. This is an actively exploitable vulnerability requiring local access and low privileges with no user interaction needed.

Information Disclosure Rt Thread
NVD GitHub VulDB
CVSS 3.1
8.0
EPSS
0.3%
CVE-2025-5893 CRITICAL Act Now

Critical authentication bypass vulnerability in Honding Technology's Smart Parking Management System that allows unauthenticated remote attackers to directly access an administrative credentials page and retrieve plaintext administrator passwords without authentication. With a CVSS score of 9.8 and network-accessible attack vector, this vulnerability poses an immediate and severe risk to all deployed instances, potentially enabling complete system compromise and unauthorized access to parking infrastructure management.

Information Disclosure
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-5864 LOW Monitor

A vulnerability was found in Tenda TDSEE App up to 1.7.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/ConfirmSmsCode of the component Password Reset Confirmation Code Handler. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.15 is able to address this issue. It is recommended to upgrade the affected component.

Information Disclosure Tenda
NVD GitHub VulDB
CVSS 3.1
3.7
EPSS
0.1%
CVE-2025-47711 MEDIUM PATCH This Month

CVE-2025-47711 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Ubuntu Redhat Enterprise Linux +3
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-25209 MEDIUM This Month

The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP connection, as long the attacker knows the name of the targeted secrets and those secrets are limited to one line only.

Information Disclosure Redhat
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2025-27563 LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure
NVD
CVSS 3.1
3.3
EPSS
0.0%
CVE-2025-27247 MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure Openharmony
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-27242 LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.

Information Disclosure
NVD
CVSS 3.1
3.3
EPSS
0.0%
CVE-2025-27131 MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.

Information Disclosure Openharmony
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-26693 LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure
NVD
CVSS 3.1
3.3
EPSS
0.0%
CVE-2025-26691 MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure Openharmony
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-24493 MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition.

Information Disclosure Race Condition Openharmony
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-23235 LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read.

Buffer Overflow Information Disclosure
NVD
CVSS 3.1
3.3
EPSS
0.0%
CVE-2025-38003 MEDIUM PATCH This Month

CVE-2025-38003 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Linux Debian Ubuntu Redhat +3
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-5242 Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
CVE-2025-5223 Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
CVE-2025-5097 Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
CVE-2025-5026 Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
CVE-2024-55585 CRITICAL Act Now

moPS App through version 1.8.618 contains a critical authentication bypass vulnerability (CVE-2024-55585, CVSS 9.0) that allows all authenticated users to access administrative API endpoints without proper authorization checks, enabling unrestricted read and write operations including password resets. This vulnerability is particularly severe as it requires only low privileges (PR:L) to exploit via network access, and the /api/v1/users/resetpassword endpoint demonstrates direct administrative function access. No KEV or active exploitation data is referenced, but the high CVSS score and authentication bypass nature suggest significant real-world risk if exploited.

Authentication Bypass Privilege Escalation Information Disclosure
NVD
CVSS 4.0
9.0
EPSS
0.1%
CVE-2025-5399 HIGH POC PATCH This Week

Denial of Service vulnerability in libcurl's WebSocket implementation that allows a malicious server to send a specially crafted packet triggering an endless busy-loop, forcing applications to kill the affected thread or process to recover. This affects all libcurl versions with WebSocket support, with CVSS 7.5 (High) severity due to network-accessible attack vector requiring no authentication. The vulnerability has high real-world impact for any application using libcurl for WebSocket connections, though exploitation requires active malicious server control.

Information Disclosure Redhat Curl Suse
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-49128 Maven MEDIUM PATCH This Month

Jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage.

Information Disclosure Debian Ubuntu Redhat
NVD GitHub
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-49011 Go LOW PATCH Monitor

A remote code execution vulnerability in SpiceDB (CVSS 3.7). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure
NVD GitHub
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-33031 HIGH PATCH This Week

CVE-2025-33031 is an improper certificate validation vulnerability in Synology File Station 5 that allows authenticated remote attackers to compromise system confidentiality, integrity, and availability. An attacker with valid user credentials can exploit insufficient SSL/TLS certificate validation to perform man-in-the-middle attacks or bypass security controls. The vulnerability has a high CVSS score of 8.8 and affects all versions of File Station 5 prior to 5.5.6.4847; patches are available from Synology.

Information Disclosure File Station
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-29871 MEDIUM PATCH This Month

An out-of-bounds read vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later

Buffer Overflow Information Disclosure File Station
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-22486 HIGH PATCH This Week

CVE-2025-22486 is an improper certificate validation vulnerability in Synology File Station 5 that allows authenticated remote attackers to compromise system confidentiality, integrity, and availability. The vulnerability affects File Station 5 versions prior to 5.5.6.4791, and while it requires valid user credentials (PR:L in CVSS), the lack of user interaction requirement (UI:N) and network accessibility (AV:N) make it a high-severity threat in multi-user environments. No confirmed KEV or active exploitation data is available at this time, but the high CVSS score of 8.8 and the nature of certificate validation bypass attacks warrant immediate patching.

Information Disclosure File Station
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-22482 HIGH PATCH This Week

Format string vulnerability in QNAP Qsync Central that allows authenticated remote attackers to read sensitive data or modify memory without user interaction. The vulnerability affects all versions prior to Qsync Central 4.5.0.6 (released March 20, 2025), with a CVSS score of 8.1 indicating high severity. While no public exploit or KEV status is currently documented, the low attack complexity and requirement for only low-privilege user access make this a significant risk for organizations running vulnerable versions.

Information Disclosure Qnap Code Injection Qsync Central
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-27531 Maven CRITICAL PATCH Act Now

Critical deserialization of untrusted data vulnerability in Apache InLong versions 1.13.0 through 2.0.x that allows authenticated attackers to read arbitrary files through parameter manipulation ('double writing' the param). With a CVSS 9.8 score and network-based attack vector requiring no user interaction, this represents a high-severity information disclosure risk affecting data ingestion pipeline deployments.

Apache Java Information Disclosure Deserialization Inlong
NVD GitHub
CVSS 3.1
9.8
EPSS
0.5%
CVE-2025-5778 HIGH POC This Week

Critical SQL injection vulnerability in 1000 Projects ABC Courier Management System version 1.0, affecting the /admin endpoint's Username parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with proof-of-concept availability, significantly increasing real-world exploitation risk.

Information Disclosure SQLi Abc Courier Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-38002 MEDIUM POC PATCH This Month

CVE-2025-38002 is a security vulnerability (CVSS 5.5). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Linux Debian Ubuntu Redhat +2
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-0620 MEDIUM PATCH This Month

A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again.

Information Disclosure Path Traversal Debian Ubuntu Redhat +2
NVD
CVSS 3.1
4.9
EPSS
0.1%
CVE-2025-49419 MEDIUM This Month

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in esigngenie Foxit eSign for WordPress allows Retrieve Embedded Sensitive Data. This issue affects Foxit eSign for WordPress: from n/a through 2.0.3.

WordPress Information Disclosure
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-49313 HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in ovatheme BRW versions up to 1.8.6, stemming from improper control of filename parameters in include/require statements. An authenticated attacker with low privileges can exploit this to read arbitrary files from the server filesystem, potentially gaining access to sensitive configuration files, source code, or credentials. The vulnerability requires network access and authenticated user status (CWE-98 improper input validation on file paths), with a CVSS score of 7.5 indicating high confidentiality and integrity impact.

PHP Information Disclosure Lfi
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-49308 HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in WP Travel Engine affecting versions through 6.5.1. An authenticated attacker with low privileges can exploit improper filename control in PHP include/require statements to read arbitrary files from the server, potentially obtaining sensitive configuration data, credentials, or source code. While the CVSS score is moderate (7.5), the vulnerability requires authentication and higher attack complexity, but successful exploitation could lead to complete information disclosure and potential privilege escalation.

PHP Information Disclosure Lfi
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-49307 HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in Magazine3's WP Multilang plugin versions up to 2.4.19, stemming from improper control of filenames in PHP include/require statements. An authenticated attacker with low privileges can exploit this vulnerability to read arbitrary local files on the affected WordPress server, potentially leading to information disclosure, code execution, or system compromise. The CVSS score of 7.5 reflects high confidentiality and integrity impact, though exploitation requires valid credentials and non-standard conditions (AC:H).

PHP Information Disclosure Lfi
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-49294 MEDIUM This Month

Insertion of Sensitive Information Into Sent Data vulnerability in CodeRevolution Crawlomatic Multisite Scraper Post Generator allows Retrieve Embedded Sensitive Data. This issue affects Crawlomatic Multisite Scraper Post Generator: from n/a through 2.6.8.2.

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-49292 MEDIUM This Month

A security vulnerability in Cozmoslabs Profile Builder allows Phishing (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-30999 HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in the WP Shopify plugin (versions up to 1.5.3) that allows authenticated attackers to include and execute arbitrary local files on the web server through improper control of filename parameters in PHP include/require statements. The vulnerability requires low-privilege user access (PR:L) and has moderate attack complexity (AC:H), but results in complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), making it a significant risk for WordPress sites using this plugin.

PHP Information Disclosure Lfi
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-23969 MEDIUM This Month

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in whassan KI Live Video Conferences allows Retrieve Embedded Sensitive Data. This issue affects KI Live Video Conferences: from n/a through 5.5.15.

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2023-25995 HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in choicehomemortgage AI Mortgage Calculator versions up to 1.0.1, caused by improper input validation on file inclusion statements. An authenticated attacker with low privileges can exploit this vulnerability over the network to read arbitrary files from the server, potentially leading to information disclosure, privilege escalation, or remote code execution. The high CVSS score of 7.5 reflects the severity of potential impacts (confidentiality, integrity, availability compromise), though the requirement for authenticated access and high attack complexity somewhat limit real-world exploitability.

PHP Information Disclosure Lfi
NVD
CVSS 3.1
7.5
EPSS
0.2%
CVE-2025-5760 MEDIUM This Month

The Simple History plugin for WordPress is vulnerable to sensitive data exposure via Detective Mode due to improper sanitization within the append_debug_info_to_context() function in versions prior to 5.8.1. When Detective Mode is enabled, the plugin’s logger captures the entire contents of $_POST (and sometimes raw request bodies or $_GET) without redacting any password‐related keys. As a result, whenever a user submits a login form, whether via native wp_login or a third‐party login widget, their actual password is written in clear text into the logs. An authenticated attacker or any user whose actions generate a login event will have their password recorded; an administrator (or anyone with database read access) can then read those logs and retrieve every captured password.

PHP WordPress Information Disclosure
NVD GitHub
CVSS 3.1
4.9
EPSS
0.1%
CVE-2025-47586 CRITICAL Act Now

PHP Local File Inclusion (LFI) vulnerability in StylemixThemes Motors - Events plugin affecting versions up to 1.4.7, allowing unauthenticated remote attackers to include and execute arbitrary PHP files under certain conditions. With a CVSS score of 9.0 and network accessibility, this vulnerability enables complete system compromise through code execution. Active exploitation status and proof-of-concept availability should be verified through KEV database and security research databases.

PHP Information Disclosure Lfi
NVD
CVSS 3.1
9.0
EPSS
0.2%
CVE-2025-41366 MEDIUM PATCH This Month

A remote code execution vulnerability in IDF (CVSS 5.1). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 4.0
5.1
EPSS
0.1%
CVE-2025-41363 MEDIUM PATCH This Month

A remote code execution vulnerability in IDF (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 4.0
5.3
EPSS
0.1%
CVE-2025-5755 HIGH POC This Week

SourceCodester Open Source Clinic Management System version 1.0 contains a critical SQL injection vulnerability in the /email_config.php file affecting the 'email' parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or system compromise. Public disclosure and exploit code availability significantly elevate real-world risk.

PHP Information Disclosure SQLi Open Source Clinic Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-48784 HIGH This Week

Missing authorization vulnerability in Soar Cloud HRD Human Resource Management System versions up to 7.3.2025.0408 that allows unauthenticated remote attackers to modify critical system settings without any credentials or user interaction. This is a high-severity integrity violation (CVSS 7.5) affecting HR management infrastructure; attackers can alter configurations that may impact payroll, employee records, access controls, and compliance functions. No exploitation complexity is required (AC:L, PR:N), making this vulnerability immediately exploitable in real-world environments.

Information Disclosure Hr Portal
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-48783 HIGH This Week

CVE-2025-48783 is an external control of file name or path vulnerability (CWE-73) in the delete file function of Soar Cloud HRD Human Resource Management System versions up to 7.3.2025.0408, allowing unauthenticated remote attackers to delete arbitrary files by manipulating file path parameters. The vulnerability has a CVSS score of 7.5 with high integrity impact, enabling attackers to perform unauthorized file deletion without authentication. Exploitation requires only network access and no user interaction, making this a significant threat to organizations using affected HRD system versions.

Information Disclosure Hr Portal
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-48781 HIGH This Week

A remote code execution vulnerability in the download file function of Soar Cloud HRD Human Resource Management System (CVSS 7.5) that allows remote attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Hr Portal
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-3365 CRITICAL Act Now

Critical path traversal vulnerability (CWE-23) that allows unauthenticated remote attackers to read, write, or delete arbitrary files on affected servers with a CVSS score of 9.8. The vulnerability requires no user interaction, has low attack complexity, and grants complete confidentiality, integrity, and availability impact. Without access to KEV status, EPSS scores, POC details, or specific CPE identifiers from the provided data, this appears to be a severe vulnerability affecting multiple server-side products; confirmation of active exploitation status and patch availability requires cross-referencing official vendor security advisories.

Information Disclosure Path Traversal
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-48911 HIGH This Week

CVE-2025-48911 is an improper permission assignment vulnerability in a note sharing module that allows local attackers with user interaction to compromise system availability and potentially access sensitive information. The vulnerability has a CVSS score of 8.2 (High) with a broad scope impact, though specific affected products, patch status, and exploitation telemetry are not provided in the available intelligence sources. Without KEV confirmation or EPSS data, the real-world exploitation risk cannot be definitively assessed, but the local attack vector and user interaction requirement suggest this is less critical than remote, unauthenticated vulnerabilities.

Privilege Escalation Information Disclosure Harmonyos
NVD
CVSS 3.1
8.2
EPSS
0.0%
CVE-2025-48909 HIGH This Week

Bypass vulnerability in device management channels that allows unauthenticated attackers on adjacent networks to compromise service confidentiality and cause minor availability impact. The vulnerability affects device management implementations across multiple vendors (specific products require vendor advisories to identify). While no active exploitation in the wild has been confirmed in public KEV databases at time of analysis, the 7.1 CVSS score and high confidentiality impact warrant immediate attention for organizations managing devices on trusted networks.

Authentication Bypass Information Disclosure Harmonyos
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-48908 MEDIUM This Month

CVE-2025-48908 is a security vulnerability (CVSS 6.7). Remediation should follow standard vulnerability management procedures.

Information Disclosure Harmonyos
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-48905 HIGH This Week

WebAssembly exception handling vulnerability in the arkweb v8 module that prevents proper capture of specific Wasm exception types, potentially allowing attackers to bypass security controls or trigger unexpected application behavior. The vulnerability affects arkweb's V8 integration layer and requires network access but high attack complexity to exploit. While the CVSS score of 8.1 indicates high severity with potential impacts to confidentiality, integrity, and availability, real-world exploitability depends on whether active exploitation or proof-of-concept code exists.

Information Disclosure Harmonyos
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2025-48902 MEDIUM This Month

A remote code execution vulnerability (CVSS 6.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure Emui Harmonyos
NVD
CVSS 3.1
6.6
EPSS
0.0%
CVE-2025-5733 MEDIUM This Month

A security vulnerability in for WordPress is vulnerable to Full Path Disclosure in all (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

PHP WordPress Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-5715 LOW POC Monitor

A security vulnerability in A vulnerability (CVSS 3.8). Risk factors: public PoC available.

Information Disclosure Google Android
NVD VulDB
CVSS 3.1
3.8
EPSS
0.1%
CVE-2024-46941 MEDIUM This Month

A security vulnerability in SystemUI (CVSS 4.8) that allows access. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 4.0
4.8
EPSS
0.0%
CVE-2024-56342 MEDIUM This Month

IBM Verify Identity Access Digital Credentials 24.06 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

Information Disclosure IBM Verify Identity Access Digital Credentials
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2024-22330 MEDIUM This Month

CVE-2024-22330 is a security vulnerability (CVSS 5.9). Remediation should follow standard vulnerability management procedures.

Information Disclosure IBM Security Verify Governance
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-47966 CRITICAL Act Now

Critical information disclosure vulnerability in Microsoft Power Automate that allows unauthenticated remote attackers to expose sensitive information and escalate privileges across a network without requiring user interaction. With a CVSS score of 9.8 and an unauthenticated attack vector, this vulnerability represents an immediate and severe risk to organizations using Power Automate; exploitation is likely being actively pursued given the severity metrics and network-accessible nature of the vulnerability.

Information Disclosure Power Automate For Desktop
NVD
CVSS 3.1
9.8
EPSS
1.8%
CVE-2025-5745 MEDIUM PATCH This Month

A security vulnerability in the GNU C Library (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Ubuntu Redhat Glibc +1
NVD
CVSS 3.1
5.6
EPSS
0.1%
CVE-2025-5702 MEDIUM PATCH This Month

A security vulnerability in the GNU C Library (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Ubuntu Redhat Glibc +1
NVD
CVSS 3.1
5.6
EPSS
0.1%
CVE-2025-49009 Maven MEDIUM PATCH This Month

Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 in `FacebookAuthFilter.java` results in a full request URL being logged during a failed request to a Facebook user profile. The log includes the user's access token in plain text. Since WARN-level logs are often retained in production and accessible to operators or log aggregation systems, this poses a risk of token exposure. Version 1.50.8 fixes the issue.

Information Disclosure
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-48493 PHP MEDIUM PATCH This Month

The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.

Information Disclosure Redis Yii2 Redis
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-5649 MEDIUM POC This Month

A remote code execution vulnerability in A vulnerability classified as critical (CVSS 5.3). Risk factors: public PoC available.

Information Disclosure Student Result Management System
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-5690 MEDIUM PATCH This Month

PostgreSQL Anonymizer v2.0 and v2.1 contain a vulnerability that allows a masked user to bypass the masking rules defined on a table and read the original data using a database cursor or the --insert option of pg_dump. This problem occurs only when dynamic masking is enabled, which is not the default setting. The problem is resolved in version 2.2.1

Information Disclosure PostgreSQL
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-48947 npm HIGH PATCH This Week

A security vulnerability in Next.js applications. In Auth0 Next.js SDK (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Authentication Bypass Information Disclosure Node.js Nextjs
NVD GitHub
CVSS 4.0
7.7
EPSS
0.1%
CVE-2025-48934 Cargo MEDIUM POC PATCH This Month

A security vulnerability in Deno (CVSS 5.3). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Deno Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-46339 MEDIUM POC PATCH This Month

A security vulnerability in FreshRSS (CVSS 4.3). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Debian Freshrss
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-31134 HIGH POC PATCH This Week

FreshRSS versions prior to 1.26.2 suffer from an information disclosure vulnerability that allows unauthenticated remote attackers to enumerate server directories and infer installed software versions (such as PHP versions) without requiring privileges or user interaction. This information leakage can be weaponized for reconnaissance to identify additional attack surfaces. The vulnerability has a CVSS 3.1 score of 7.5 (High) with a network attack vector and no complexity barriers, making it trivially exploitable at scale.

PHP Information Disclosure Freshrss
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-20286 CRITICAL Act Now

Default credentials in Cisco ISE cloud deployments on AWS/Azure/OCI. CVSS 9.9.

Authentication Bypass Information Disclosure Aws Cisco Azure +2
NVD
CVSS 3.1
9.9
EPSS
0.1%
CVE-2025-20163 HIGH This Week

Man-in-the-middle vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) caused by insufficient SSH host key validation, allowing unauthenticated remote attackers to impersonate NDFC-managed devices and intercept SSH traffic. This vulnerability affects Cisco NDFC deployments and could lead to credential capture and device impersonation with a CVSS score of 8.7 (High). Without confirmed KEV status or public POC availability noted in standard databases, organizations should prioritize patching based on CVSS severity and the network-accessible nature of the vulnerability (AV:N).

Authentication Bypass Information Disclosure Ssh Cisco Nexus Dashboard
NVD
CVSS 3.1
8.7
EPSS
0.0%
CVE-2025-20129 MEDIUM This Month

A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data. This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker.

Information Disclosure Cisco Socialminer Unified Contact Center Express
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-48962 MEDIUM PATCH This Month

Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938.

Windows Information Disclosure SSRF Microsoft
NVD
CVSS 3.0
4.3
EPSS
0.0%
CVE-2025-48960 MEDIUM PATCH This Month

CVE-2025-48960 is a security vulnerability (CVSS 5.9). Remediation should follow standard vulnerability management procedures.

Windows Information Disclosure Apple macOS Microsoft
NVD
CVSS 3.0
5.9
EPSS
0.0%
CVE-2025-5598 CRITICAL Act Now

Path traversal in Airleader MASTER enables reading embedded sensitive data.

Information Disclosure Path Traversal
NVD GitHub
CVSS 4.0
9.2
EPSS
0.2%
CVE-2025-47728 HIGH PATCH This Week

Local code execution vulnerability in Delta Electronics CNCSoft-G2 resulting from insufficient file validation when processing user-supplied files. An authenticated local attacker can craft a malicious file that, when opened by a user, executes arbitrary code with the privileges of the affected application. This vulnerability has a CVSS score of 7.3 (High) and requires local access and user interaction, making it a significant risk for organizations deploying CNCSoft-G2 in manufacturing or industrial control environments.

Information Disclosure Cncsoft G2
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-47726 HIGH This Week

Buffer overflow vulnerability (CWE-787) in Delta Electronics CNCSoft that allows local authenticated users to execute arbitrary code by opening a specially crafted malicious file. The vulnerability requires user interaction (file opening) but results in complete compromise of the affected process with high impact to confidentiality, integrity, and availability. No KEV status, EPSS score, or confirmed active exploitation data is available in the provided intelligence.

Information Disclosure Cncsoft
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-47725 HIGH This Week

Local arbitrary code execution vulnerability in Delta Electronics CNCSoft caused by insufficient validation of user-supplied files. An attacker with local access can craft a malicious file that, when opened by a user, executes arbitrary code with the privileges of the CNCSoft process. With a CVSS score of 7.3 and CWE-787 (Out-of-bounds Write) classification, this represents a significant local privilege escalation risk, though exploitation requires user interaction and local access.

Information Disclosure Cncsoft
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-47724 HIGH This Week

Local privilege escalation vulnerability in Delta Electronics CNCSoft caused by insufficient validation of user-supplied files. When a user opens a malicious file, an attacker can execute arbitrary code with the privileges of the current process. While the CVSS score of 7.3 is moderate-to-high, the attack requires local access and user interaction, limiting immediate widespread impact; however, the high integrity and confidentiality impact (CWE-787: Out-of-bounds Write) warrants prompt patching.

Information Disclosure Cncsoft
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2024-13967 HIGH This Week

CVE-2024-13967 is an authentication bypass vulnerability in EIBPORT V3 KNX web server that allows unauthenticated attackers to access sensitive configuration pages through the integrated web interface. Affects EIBPORT V3 KNX and EIBPORT V3 KNX GSM through version 3.9.8. Successful exploitation enables complete compromise of the device including confidentiality, integrity, and availability of configuration settings and potentially the entire KNX installation.

Authentication Bypass Information Disclosure Siemens
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-20996 MEDIUM This Month

A security vulnerability in Smart Switch installed on non-Samsung Device (CVSS 5.0) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Samsung Smart Switch
NVD
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-20995 MEDIUM This Month

A arbitrary file access vulnerability in ClientProvider in Samsung Internet installed on non-Samsung Device (CVSS 4.9) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Samsung Internet
NVD
CVSS 3.1
4.9
EPSS
0.0%
CVE-2025-20994 MEDIUM This Month

A arbitrary file access vulnerability in SyncClientProvider in Samsung Internet installed on non-Samsung Device (CVSS 4.5) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Samsung Internet
NVD
CVSS 3.1
4.5
EPSS
0.0%
CVE-2025-20992 MEDIUM This Month

Out-of-bound read in libsecimaging.camera.samsung.so prior to SMR Feb-2025 Release 1 allows local attackers to read out-of-bounds memory.

Buffer Overflow Information Disclosure Samsung Android
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-20991 MEDIUM This Month

A security vulnerability in Bluetooth (CVSS 4.0) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Google Android
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-20989 MEDIUM This Month

A security vulnerability in fingerprint trustlet (CVSS 5.2) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
CVSS 3.1
5.2
EPSS
0.0%
CVE-2025-20988 MEDIUM This Month

Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.

Buffer Overflow Information Disclosure Android
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-20987 MEDIUM This Month

A security vulnerability in fingerprint trustlet (CVSS 5.2) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
CVSS 3.1
5.2
EPSS
0.0%
EPSS 1% CVSS 8.3
HIGH PATCH This Week

A SQL injection vulnerability (CVSS 8.3). High severity vulnerability requiring prompt remediation.

Information Disclosure SQLi Zoho +1
NVD
EPSS 0% CVSS 8.8
HIGH This Week

Critical Missing Authorization (CWE-862) vulnerability in Honding Technology's Smart Parking Management System that allows authenticated users with regular privileges to bypass authorization controls and create administrator accounts without proper authorization checks. Attackers can leverage this flaw to escalate privileges, create backdoor admin accounts, and gain full system control (confidentiality, integrity, and availability impact). The CVSS 8.8 score reflects the high severity, though real-world exploitability depends on whether this vulnerability is actively exploited in the wild and whether public proof-of-concept code exists.

Information Disclosure
NVD
EPSS 0% CVSS 8.0
HIGH POC This Week

Critical array index validation vulnerability in RT-Thread 5.1.0's signal mask syscall handler that allows authenticated local attackers to read and modify kernel memory with high impact. The vulnerability exists in the sys_thread_sigprocmask function where improper validation of the 'how' parameter enables out-of-bounds array access, potentially leading to privilege escalation or denial of service. This is an actively exploitable vulnerability requiring local access and low privileges with no user interaction needed.

Information Disclosure Rt Thread
NVD GitHub VulDB
EPSS 0% CVSS 9.8
CRITICAL Act Now

Critical authentication bypass vulnerability in Honding Technology's Smart Parking Management System that allows unauthenticated remote attackers to directly access an administrative credentials page and retrieve plaintext administrator passwords without authentication. With a CVSS score of 9.8 and network-accessible attack vector, this vulnerability poses an immediate and severe risk to all deployed instances, potentially enabling complete system compromise and unauthorized access to parking infrastructure management.

Information Disclosure
NVD
EPSS 0% CVSS 3.7
LOW Monitor

A vulnerability was found in Tenda TDSEE App up to 1.7.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/ConfirmSmsCode of the component Password Reset Confirmation Code Handler. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.15 is able to address this issue. It is recommended to upgrade the affected component.

Information Disclosure Tenda
NVD GitHub VulDB
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

CVE-2025-47711 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Ubuntu +5
NVD
EPSS 0% CVSS 5.7
MEDIUM This Month

The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP connection, as long the attacker knows the name of the targeted secrets and those secrets are limited to one line only.

Information Disclosure Redhat
NVD
EPSS 0% CVSS 3.3
LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure Openharmony
NVD
EPSS 0% CVSS 3.3
LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.

Information Disclosure
NVD
EPSS 0% CVSS 6.1
MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input.

Information Disclosure Openharmony
NVD
EPSS 0% CVSS 3.3
LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission.

Information Disclosure Openharmony
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition.

Information Disclosure Race Condition Openharmony
NVD
EPSS 0% CVSS 3.3
LOW Monitor

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read.

Buffer Overflow Information Disclosure
NVD
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

CVE-2025-38003 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Linux Debian +5
NVD
Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 9.0
CRITICAL Act Now

moPS App through version 1.8.618 contains a critical authentication bypass vulnerability (CVE-2024-55585, CVSS 9.0) that allows all authenticated users to access administrative API endpoints without proper authorization checks, enabling unrestricted read and write operations including password resets. This vulnerability is particularly severe as it requires only low privileges (PR:L) to exploit via network access, and the /api/v1/users/resetpassword endpoint demonstrates direct administrative function access. No KEV or active exploitation data is referenced, but the high CVSS score and authentication bypass nature suggest significant real-world risk if exploited.

Authentication Bypass Privilege Escalation Information Disclosure
NVD
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Denial of Service vulnerability in libcurl's WebSocket implementation that allows a malicious server to send a specially crafted packet triggering an endless busy-loop, forcing applications to kill the affected thread or process to recover. This affects all libcurl versions with WebSocket support, with CVSS 7.5 (High) severity due to network-accessible attack vector requiring no authentication. The vulnerability has high real-world impact for any application using libcurl for WebSocket connections, though exploitation requires active malicious server control.

Information Disclosure Redhat Curl +1
NVD
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage.

Information Disclosure Debian Ubuntu +1
NVD GitHub
EPSS 0% CVSS 3.7
LOW PATCH Monitor

A remote code execution vulnerability in SpiceDB (CVSS 3.7). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 8.8
HIGH PATCH This Week

CVE-2025-33031 is an improper certificate validation vulnerability in Synology File Station 5 that allows authenticated remote attackers to compromise system confidentiality, integrity, and availability. An attacker with valid user credentials can exploit insufficient SSL/TLS certificate validation to perform man-in-the-middle attacks or bypass security controls. The vulnerability has a high CVSS score of 8.8 and affects all versions of File Station 5 prior to 5.5.6.4847; patches are available from Synology.

Information Disclosure File Station
NVD
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

An out-of-bounds read vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later

Buffer Overflow Information Disclosure File Station
NVD
EPSS 0% CVSS 8.8
HIGH PATCH This Week

CVE-2025-22486 is an improper certificate validation vulnerability in Synology File Station 5 that allows authenticated remote attackers to compromise system confidentiality, integrity, and availability. The vulnerability affects File Station 5 versions prior to 5.5.6.4791, and while it requires valid user credentials (PR:L in CVSS), the lack of user interaction requirement (UI:N) and network accessibility (AV:N) make it a high-severity threat in multi-user environments. No confirmed KEV or active exploitation data is available at this time, but the high CVSS score of 8.8 and the nature of certificate validation bypass attacks warrant immediate patching.

Information Disclosure File Station
NVD
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Format string vulnerability in QNAP Qsync Central that allows authenticated remote attackers to read sensitive data or modify memory without user interaction. The vulnerability affects all versions prior to Qsync Central 4.5.0.6 (released March 20, 2025), with a CVSS score of 8.1 indicating high severity. While no public exploit or KEV status is currently documented, the low attack complexity and requirement for only low-privilege user access make this a significant risk for organizations running vulnerable versions.

Information Disclosure Qnap Code Injection +1
NVD
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Critical deserialization of untrusted data vulnerability in Apache InLong versions 1.13.0 through 2.0.x that allows authenticated attackers to read arbitrary files through parameter manipulation ('double writing' the param). With a CVSS 9.8 score and network-based attack vector requiring no user interaction, this represents a high-severity information disclosure risk affecting data ingestion pipeline deployments.

Apache Java Information Disclosure +2
NVD GitHub
EPSS 0% CVSS 7.3
HIGH POC This Week

Critical SQL injection vulnerability in 1000 Projects ABC Courier Management System version 1.0, affecting the /admin endpoint's Username parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with proof-of-concept availability, significantly increasing real-world exploitation risk.

Information Disclosure SQLi Abc Courier Management System
NVD GitHub VulDB
EPSS 0% CVSS 5.5
MEDIUM POC PATCH This Month

CVE-2025-38002 is a security vulnerability (CVSS 5.5). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Linux Debian +4
NVD
EPSS 0% CVSS 4.9
MEDIUM PATCH This Month

A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again.

Information Disclosure Path Traversal Debian +4
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in esigngenie Foxit eSign for WordPress allows Retrieve Embedded Sensitive Data. This issue affects Foxit eSign for WordPress: from n/a through 2.0.3.

WordPress Information Disclosure
NVD
EPSS 0% CVSS 7.5
HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in ovatheme BRW versions up to 1.8.6, stemming from improper control of filename parameters in include/require statements. An authenticated attacker with low privileges can exploit this to read arbitrary files from the server filesystem, potentially gaining access to sensitive configuration files, source code, or credentials. The vulnerability requires network access and authenticated user status (CWE-98 improper input validation on file paths), with a CVSS score of 7.5 indicating high confidentiality and integrity impact.

PHP Information Disclosure Lfi
NVD
EPSS 0% CVSS 7.5
HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in WP Travel Engine affecting versions through 6.5.1. An authenticated attacker with low privileges can exploit improper filename control in PHP include/require statements to read arbitrary files from the server, potentially obtaining sensitive configuration data, credentials, or source code. While the CVSS score is moderate (7.5), the vulnerability requires authentication and higher attack complexity, but successful exploitation could lead to complete information disclosure and potential privilege escalation.

PHP Information Disclosure Lfi
NVD
EPSS 0% CVSS 7.5
HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in Magazine3's WP Multilang plugin versions up to 2.4.19, stemming from improper control of filenames in PHP include/require statements. An authenticated attacker with low privileges can exploit this vulnerability to read arbitrary local files on the affected WordPress server, potentially leading to information disclosure, code execution, or system compromise. The CVSS score of 7.5 reflects high confidentiality and integrity impact, though exploitation requires valid credentials and non-standard conditions (AC:H).

PHP Information Disclosure Lfi
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Insertion of Sensitive Information Into Sent Data vulnerability in CodeRevolution Crawlomatic Multisite Scraper Post Generator allows Retrieve Embedded Sensitive Data. This issue affects Crawlomatic Multisite Scraper Post Generator: from n/a through 2.6.8.2.

Information Disclosure
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

A security vulnerability in Cozmoslabs Profile Builder allows Phishing (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 7.5
HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in the WP Shopify plugin (versions up to 1.5.3) that allows authenticated attackers to include and execute arbitrary local files on the web server through improper control of filename parameters in PHP include/require statements. The vulnerability requires low-privilege user access (PR:L) and has moderate attack complexity (AC:H), but results in complete compromise of confidentiality, integrity, and availability (C:H/I:H/A:H), making it a significant risk for WordPress sites using this plugin.

PHP Information Disclosure Lfi
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in whassan KI Live Video Conferences allows Retrieve Embedded Sensitive Data. This issue affects KI Live Video Conferences: from n/a through 5.5.15.

Information Disclosure
NVD
EPSS 0% CVSS 7.5
HIGH This Week

PHP Local File Inclusion (LFI) vulnerability in choicehomemortgage AI Mortgage Calculator versions up to 1.0.1, caused by improper input validation on file inclusion statements. An authenticated attacker with low privileges can exploit this vulnerability over the network to read arbitrary files from the server, potentially leading to information disclosure, privilege escalation, or remote code execution. The high CVSS score of 7.5 reflects the severity of potential impacts (confidentiality, integrity, availability compromise), though the requirement for authenticated access and high attack complexity somewhat limit real-world exploitability.

PHP Information Disclosure Lfi
NVD
EPSS 0% CVSS 4.9
MEDIUM This Month

The Simple History plugin for WordPress is vulnerable to sensitive data exposure via Detective Mode due to improper sanitization within the append_debug_info_to_context() function in versions prior to 5.8.1. When Detective Mode is enabled, the plugin’s logger captures the entire contents of $_POST (and sometimes raw request bodies or $_GET) without redacting any password‐related keys. As a result, whenever a user submits a login form, whether via native wp_login or a third‐party login widget, their actual password is written in clear text into the logs. An authenticated attacker or any user whose actions generate a login event will have their password recorded; an administrator (or anyone with database read access) can then read those logs and retrieve every captured password.

PHP WordPress Information Disclosure
NVD GitHub
EPSS 0% CVSS 9.0
CRITICAL Act Now

PHP Local File Inclusion (LFI) vulnerability in StylemixThemes Motors - Events plugin affecting versions up to 1.4.7, allowing unauthenticated remote attackers to include and execute arbitrary PHP files under certain conditions. With a CVSS score of 9.0 and network accessibility, this vulnerability enables complete system compromise through code execution. Active exploitation status and proof-of-concept availability should be verified through KEV database and security research databases.

PHP Information Disclosure Lfi
NVD
EPSS 0% CVSS 5.1
MEDIUM PATCH This Month

A remote code execution vulnerability in IDF (CVSS 5.1). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A remote code execution vulnerability in IDF (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 7.3
HIGH POC This Week

SourceCodester Open Source Clinic Management System version 1.0 contains a critical SQL injection vulnerability in the /email_config.php file affecting the 'email' parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or system compromise. Public disclosure and exploit code availability significantly elevate real-world risk.

PHP Information Disclosure SQLi +1
NVD GitHub VulDB
EPSS 0% CVSS 7.5
HIGH This Week

Missing authorization vulnerability in Soar Cloud HRD Human Resource Management System versions up to 7.3.2025.0408 that allows unauthenticated remote attackers to modify critical system settings without any credentials or user interaction. This is a high-severity integrity violation (CVSS 7.5) affecting HR management infrastructure; attackers can alter configurations that may impact payroll, employee records, access controls, and compliance functions. No exploitation complexity is required (AC:L, PR:N), making this vulnerability immediately exploitable in real-world environments.

Information Disclosure Hr Portal
NVD
EPSS 0% CVSS 7.5
HIGH This Week

CVE-2025-48783 is an external control of file name or path vulnerability (CWE-73) in the delete file function of Soar Cloud HRD Human Resource Management System versions up to 7.3.2025.0408, allowing unauthenticated remote attackers to delete arbitrary files by manipulating file path parameters. The vulnerability has a CVSS score of 7.5 with high integrity impact, enabling attackers to perform unauthorized file deletion without authentication. Exploitation requires only network access and no user interaction, making this a significant threat to organizations using affected HRD system versions.

Information Disclosure Hr Portal
NVD
EPSS 0% CVSS 7.5
HIGH This Week

A remote code execution vulnerability in the download file function of Soar Cloud HRD Human Resource Management System (CVSS 7.5) that allows remote attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Hr Portal
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Critical path traversal vulnerability (CWE-23) that allows unauthenticated remote attackers to read, write, or delete arbitrary files on affected servers with a CVSS score of 9.8. The vulnerability requires no user interaction, has low attack complexity, and grants complete confidentiality, integrity, and availability impact. Without access to KEV status, EPSS scores, POC details, or specific CPE identifiers from the provided data, this appears to be a severe vulnerability affecting multiple server-side products; confirmation of active exploitation status and patch availability requires cross-referencing official vendor security advisories.

Information Disclosure Path Traversal
NVD
EPSS 0% CVSS 8.2
HIGH This Week

CVE-2025-48911 is an improper permission assignment vulnerability in a note sharing module that allows local attackers with user interaction to compromise system availability and potentially access sensitive information. The vulnerability has a CVSS score of 8.2 (High) with a broad scope impact, though specific affected products, patch status, and exploitation telemetry are not provided in the available intelligence sources. Without KEV confirmation or EPSS data, the real-world exploitation risk cannot be definitively assessed, but the local attack vector and user interaction requirement suggest this is less critical than remote, unauthenticated vulnerabilities.

Privilege Escalation Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 7.1
HIGH This Week

Bypass vulnerability in device management channels that allows unauthenticated attackers on adjacent networks to compromise service confidentiality and cause minor availability impact. The vulnerability affects device management implementations across multiple vendors (specific products require vendor advisories to identify). While no active exploitation in the wild has been confirmed in public KEV databases at time of analysis, the 7.1 CVSS score and high confidentiality impact warrant immediate attention for organizations managing devices on trusted networks.

Authentication Bypass Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 6.7
MEDIUM This Month

CVE-2025-48908 is a security vulnerability (CVSS 6.7). Remediation should follow standard vulnerability management procedures.

Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 8.1
HIGH This Week

WebAssembly exception handling vulnerability in the arkweb v8 module that prevents proper capture of specific Wasm exception types, potentially allowing attackers to bypass security controls or trigger unexpected application behavior. The vulnerability affects arkweb's V8 integration layer and requires network access but high attack complexity to exploit. While the CVSS score of 8.1 indicates high severity with potential impacts to confidentiality, integrity, and availability, real-world exploitability depends on whether active exploitation or proof-of-concept code exists.

Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 6.6
MEDIUM This Month

A remote code execution vulnerability (CVSS 6.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure Emui Harmonyos
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A security vulnerability in for WordPress is vulnerable to Full Path Disclosure in all (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

PHP WordPress Information Disclosure
NVD
EPSS 0% CVSS 3.8
LOW POC Monitor

A security vulnerability in A vulnerability (CVSS 3.8). Risk factors: public PoC available.

Information Disclosure Google Android
NVD VulDB
EPSS 0% CVSS 4.8
MEDIUM This Month

A security vulnerability in SystemUI (CVSS 4.8) that allows access. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

IBM Verify Identity Access Digital Credentials 24.06 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

Information Disclosure IBM Verify Identity Access Digital Credentials
NVD
EPSS 0% CVSS 5.9
MEDIUM This Month

CVE-2024-22330 is a security vulnerability (CVSS 5.9). Remediation should follow standard vulnerability management procedures.

Information Disclosure IBM Security Verify Governance
NVD
EPSS 2% CVSS 9.8
CRITICAL Act Now

Critical information disclosure vulnerability in Microsoft Power Automate that allows unauthenticated remote attackers to expose sensitive information and escalate privileges across a network without requiring user interaction. With a CVSS score of 9.8 and an unauthenticated attack vector, this vulnerability represents an immediate and severe risk to organizations using Power Automate; exploitation is likely being actively pursued given the severity metrics and network-accessible nature of the vulnerability.

Information Disclosure Power Automate For Desktop
NVD
EPSS 0% CVSS 5.6
MEDIUM PATCH This Month

A security vulnerability in the GNU C Library (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Ubuntu +3
NVD
EPSS 0% CVSS 5.6
MEDIUM PATCH This Month

A security vulnerability in the GNU C Library (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Ubuntu +3
NVD
EPSS 0% CVSS 6.2
MEDIUM PATCH This Month

Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 in `FacebookAuthFilter.java` results in a full request URL being logged during a failed request to a Facebook user profile. The log includes the user's access token in plain text. Since WARN-level logs are often retained in production and accessible to operators or log aggregation systems, this poses a risk of token exposure. Version 1.50.8 fixes the issue.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

The Yii 2 Redis extension provides the redis key-value store support for the Yii framework 2.0. On failing connection, the extension writes commands sequence to logs. Prior to version 2.0.20, AUTH parameters are written in plain text exposing username and password. That might be an issue if attacker has access to logs. Version 2.0.20 fixes the issue.

Information Disclosure Redis Yii2 Redis
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A remote code execution vulnerability in A vulnerability classified as critical (CVSS 5.3). Risk factors: public PoC available.

Information Disclosure Student Result Management System
NVD GitHub VulDB
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

PostgreSQL Anonymizer v2.0 and v2.1 contain a vulnerability that allows a masked user to bypass the masking rules defined on a table and read the original data using a database cursor or the --insert option of pg_dump. This problem occurs only when dynamic masking is enabled, which is not the default setting. The problem is resolved in version 2.2.1

Information Disclosure PostgreSQL
NVD
EPSS 0% CVSS 7.7
HIGH PATCH This Week

A security vulnerability in Next.js applications. In Auth0 Next.js SDK (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Authentication Bypass Information Disclosure Node.js +1
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

A security vulnerability in Deno (CVSS 5.3). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Deno Suse
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

A security vulnerability in FreshRSS (CVSS 4.3). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Debian Freshrss
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

FreshRSS versions prior to 1.26.2 suffer from an information disclosure vulnerability that allows unauthenticated remote attackers to enumerate server directories and infer installed software versions (such as PHP versions) without requiring privileges or user interaction. This information leakage can be weaponized for reconnaissance to identify additional attack surfaces. The vulnerability has a CVSS 3.1 score of 7.5 (High) with a network attack vector and no complexity barriers, making it trivially exploitable at scale.

PHP Information Disclosure Freshrss
NVD GitHub
EPSS 0% CVSS 9.9
CRITICAL Act Now

Default credentials in Cisco ISE cloud deployments on AWS/Azure/OCI. CVSS 9.9.

Authentication Bypass Information Disclosure Aws +4
NVD
EPSS 0% CVSS 8.7
HIGH This Week

Man-in-the-middle vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) caused by insufficient SSH host key validation, allowing unauthenticated remote attackers to impersonate NDFC-managed devices and intercept SSH traffic. This vulnerability affects Cisco NDFC deployments and could lead to credential capture and device impersonation with a CVSS score of 8.7 (High). Without confirmed KEV status or public POC availability noted in standard databases, organizations should prioritize patching based on CVSS severity and the network-accessible nature of the vulnerability (AV:N).

Authentication Bypass Information Disclosure Ssh +2
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data. This vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker.

Information Disclosure Cisco Socialminer +1
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938.

Windows Information Disclosure SSRF +1
NVD
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

CVE-2025-48960 is a security vulnerability (CVSS 5.9). Remediation should follow standard vulnerability management procedures.

Windows Information Disclosure Apple +2
NVD
EPSS 0% CVSS 9.2
CRITICAL Act Now

Path traversal in Airleader MASTER enables reading embedded sensitive data.

Information Disclosure Path Traversal
NVD GitHub
EPSS 0% CVSS 7.3
HIGH PATCH This Week

Local code execution vulnerability in Delta Electronics CNCSoft-G2 resulting from insufficient file validation when processing user-supplied files. An authenticated local attacker can craft a malicious file that, when opened by a user, executes arbitrary code with the privileges of the affected application. This vulnerability has a CVSS score of 7.3 (High) and requires local access and user interaction, making it a significant risk for organizations deploying CNCSoft-G2 in manufacturing or industrial control environments.

Information Disclosure Cncsoft G2
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Buffer overflow vulnerability (CWE-787) in Delta Electronics CNCSoft that allows local authenticated users to execute arbitrary code by opening a specially crafted malicious file. The vulnerability requires user interaction (file opening) but results in complete compromise of the affected process with high impact to confidentiality, integrity, and availability. No KEV status, EPSS score, or confirmed active exploitation data is available in the provided intelligence.

Information Disclosure Cncsoft
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Local arbitrary code execution vulnerability in Delta Electronics CNCSoft caused by insufficient validation of user-supplied files. An attacker with local access can craft a malicious file that, when opened by a user, executes arbitrary code with the privileges of the CNCSoft process. With a CVSS score of 7.3 and CWE-787 (Out-of-bounds Write) classification, this represents a significant local privilege escalation risk, though exploitation requires user interaction and local access.

Information Disclosure Cncsoft
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Local privilege escalation vulnerability in Delta Electronics CNCSoft caused by insufficient validation of user-supplied files. When a user opens a malicious file, an attacker can execute arbitrary code with the privileges of the current process. While the CVSS score of 7.3 is moderate-to-high, the attack requires local access and user interaction, limiting immediate widespread impact; however, the high integrity and confidentiality impact (CWE-787: Out-of-bounds Write) warrants prompt patching.

Information Disclosure Cncsoft
NVD
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2024-13967 is an authentication bypass vulnerability in EIBPORT V3 KNX web server that allows unauthenticated attackers to access sensitive configuration pages through the integrated web interface. Affects EIBPORT V3 KNX and EIBPORT V3 KNX GSM through version 3.9.8. Successful exploitation enables complete compromise of the device including confidentiality, integrity, and availability of configuration settings and potentially the entire KNX installation.

Authentication Bypass Information Disclosure Siemens
NVD
EPSS 0% CVSS 5.0
MEDIUM This Month

A security vulnerability in Smart Switch installed on non-Samsung Device (CVSS 5.0) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Samsung Smart Switch
NVD
EPSS 0% CVSS 4.9
MEDIUM This Month

A arbitrary file access vulnerability in ClientProvider in Samsung Internet installed on non-Samsung Device (CVSS 4.9) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Samsung Internet
NVD
EPSS 0% CVSS 4.5
MEDIUM This Month

A arbitrary file access vulnerability in SyncClientProvider in Samsung Internet installed on non-Samsung Device (CVSS 4.5) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Samsung Internet
NVD
EPSS 0% CVSS 4.0
MEDIUM This Month

Out-of-bound read in libsecimaging.camera.samsung.so prior to SMR Feb-2025 Release 1 allows local attackers to read out-of-bounds memory.

Buffer Overflow Information Disclosure Samsung +1
NVD
EPSS 0% CVSS 4.0
MEDIUM This Month

A security vulnerability in Bluetooth (CVSS 4.0) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Google Android
NVD
EPSS 0% CVSS 5.2
MEDIUM This Month

A security vulnerability in fingerprint trustlet (CVSS 5.2) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.

Buffer Overflow Information Disclosure Android
NVD
EPSS 0% CVSS 5.2
MEDIUM This Month

A security vulnerability in fingerprint trustlet (CVSS 5.2) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
Prev Page 102 of 153 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy