Information Disclosure

13734 CVEs technique

Monthly

CVE-2025-20988 MEDIUM This Month

Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.

Buffer Overflow Information Disclosure Android
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-20987 MEDIUM This Month

A security vulnerability in fingerprint trustlet (CVSS 5.2) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
CVSS 3.1
5.2
EPSS
0.0%
CVE-2025-20986 MEDIUM This Month

A security vulnerability in ScreenCapture for Galaxy Watch (CVSS 5.5) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Wear Os
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-20985 MEDIUM This Month

A security vulnerability in ThemeManager (CVSS 5.5) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-20981 MEDIUM This Month

Improper access control in AudioService prior to SMR Jun-2025 Release 1 allows local attackers to access sensitive information.

Information Disclosure Android
NVD
CVSS 3.1
6.2
EPSS
0.0%
CVE-2024-31127 HIGH PATCH This Week

Privilege escalation vulnerability in Zscaler Client Connector for macOS versions prior to 4.2.0.241, caused by improper verification of loaded libraries. A local attacker with standard user privileges can exploit this weakness without user interaction to gain elevated system privileges, potentially compromising system integrity and confidentiality. The CVSS 7.3 score reflects the moderate-to-high severity of local privilege escalation with high impact on confidentiality and integrity.

Information Disclosure
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-49210 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49209 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49208 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49207 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49206 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49205 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49204 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49203 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-49202 Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
CVE-2025-24015 Cargo MEDIUM POC PATCH This Month

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue.

Information Disclosure Node.js Deno Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-49001 CRITICAL PATCH Act Now

Auth bypass in DataEase BI tool before 2.10.10.

Information Disclosure Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-48950 HIGH POC PATCH This Week

MaxKB prior to version 1.10.8-lts contains an incomplete sandbox implementation that only blacklists binary execution in common system directories (/bin, /usr/bin, etc.), allowing local attackers with low privileges to execute arbitrary code via executable files in non-blacklisted directories and achieve full system compromise. The vulnerability affects enterprise AI assistant deployments and has a high CVSS score of 8.8 reflecting significant impact potential; exploitation requires local access but no user interaction.

Information Disclosure Maxkb
NVD GitHub
CVSS 3.1
8.8
EPSS
0.2%
CVE-2025-30360 npm MEDIUM POC PATCH This Month

webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue.

Information Disclosure Chrome Google Redhat Webpack Dev Server
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-5511 MEDIUM POC This Month

A security vulnerability in quequnlong shiyi-blog (CVSS 5.3). Risk factors: public PoC available.

Information Disclosure Shiyi Blog
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-25022 CRITICAL Act Now

Credential exposure in IBM QRadar Suite 1.10.12.0-1.11.2.0.

Information Disclosure IBM Cloud Pak For Security Qradar Suite
NVD
CVSS 3.1
9.6
EPSS
0.1%
CVE-2025-25019 MEDIUM This Month

IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system.

Information Disclosure IBM Cloud Pak For Security Qradar Suite
NVD
CVSS 3.1
4.8
EPSS
0.0%
CVE-2025-1334 MEDIUM This Month

CVE-2025-1334 is a security vulnerability (CVSS 4.0) that allows web pages. Remediation should follow standard vulnerability management procedures.

Information Disclosure IBM Cloud Pak For Security Qradar Suite
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-43925 MEDIUM This Month

An issue was discovered in Unicom Focal Point 7.6.1. The database is encrypted with a hardcoded key, making it easier to recover the cleartext data.

Information Disclosure Focal Point
NVD
CVSS 3.1
4.6
EPSS
0.0%
CVE-2025-4330 HIGH PATCH This Week

Path traversal vulnerability in Python's tarfile module extraction filters that allows attackers to bypass the 'data' and 'tar' filter protections, enabling symlink targets to point outside the extraction directory and permitting modification of file metadata. This affects any application using TarFile.extractall() or TarFile.extract() with filter='data' or filter='tar' on untrusted tar archives, as well as Python 3.14+ users relying on the new 'data' default filter. The vulnerability has a CVSS score of 7.5 (High) with high integrity impact, though exploitation requires an attacker to control the tar archive contents.

RCE Python Information Disclosure Path Traversal Redhat +1
NVD GitHub
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-4138 HIGH PATCH This Week

CVE-2025-4138 is a security vulnerability (CVSS 7.5) that allows the extraction filter. High severity vulnerability requiring prompt remediation.

RCE Python Information Disclosure Path Traversal Redhat +1
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-21463 HIGH This Week

Transient denial-of-service vulnerability in wireless beacon frame processing that occurs when a device receives a malformed EHT (Extremely High Throughput) operation information element. An unauthenticated remote attacker can trigger a temporary service disruption by sending a specially crafted beacon frame, affecting WiFi 6E and later devices. With a CVSS score of 7.5 and high availability impact, this vulnerability requires no user interaction and is network-accessible, making it a notable threat to wireless infrastructure and client devices, though there is currently no evidence of active exploitation in the wild.

Information Disclosure Ar8035 Firmware Csr8811 Firmware Fastconnect 6700 Firmware Fastconnect 6900 Firmware +205
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-53026 HIGH This Week

CVE-2024-53026 is an information disclosure vulnerability in IMS (IP Multimedia Subsystem) implementations affecting VoLTE and VoWiFi call processing. When a malicious or malformed RTCP (Real-time Transport Control Protocol) packet is received during an active call, the vulnerable system leaks sensitive information to a network-adjacent attacker without requiring authentication or user interaction. The CVSS 8.2 rating reflects high confidentiality impact with partial availability degradation; exploitation likelihood and real-world activity status require cross-referencing with EPSS and KEV data.

Information Disclosure Wcd9335 Firmware Sm7325p Firmware Qcn9274 Firmware Sa6155 Firmware +207
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2024-53021 HIGH This Week

CVE-2024-53021 is an information disclosure vulnerability in RTCP (Real-time Transport Control Protocol) packet processing that allows unauthenticated remote attackers to leak sensitive data through malicious goodbye (BYE) RTCP packets. The vulnerability affects multiple VoIP and real-time communication products processing RTCP traffic; attackers can extract confidential information across the network without authentication or user interaction, and may also cause limited availability impact. The high CVSS score of 8.2 reflects the severe confidentiality impact and network-based attack vector, though exploitation complexity is low.

Information Disclosure Qcn9011 Firmware Wcn7860 Firmware Wcd9340 Firmware Wcn6450 Firmware +198
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2024-53020 HIGH This Week

CVE-2024-53020 is an information disclosure vulnerability in RTP (Real-time Transport Protocol) packet processing that occurs when decoding packets with malformed header extensions. An attacker on the network can send specially crafted RTP packets to trigger memory disclosure, potentially exposing sensitive information while also causing minor availability impact. The vulnerability affects multiple implementations of RTP protocol handling across various media processing frameworks and VoIP applications; while there is no confirmed active KEV status or public exploit code documented, the high CVSS score (8.2) combined with network accessibility (CVSS:3.1/AV:N) indicates significant real-world risk to exposed services.

Information Disclosure Sa8650p Firmware Apq8017 Firmware Qamsrv1h Firmware Wcn3610 Firmware +207
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2024-53019 HIGH This Week

Network-based information disclosure vulnerability in RTP (Real-time Transport Protocol) packet decoding that occurs when the CSRC (Contributing Source) count header field is improperly validated, allowing an attacker to read sensitive memory contents. The vulnerability affects any system processing RTP streams with malformed headers and has a high CVSS score of 8.2 due to the combination of high confidentiality impact and network accessibility without authentication; no patch availability, KEV status, EPSS score, or active exploitation details are currently documented.

Information Disclosure Fastconnect 6200 Firmware Fastconnect 6700 Firmware Fastconnect 6900 Firmware Fastconnect 7800 Firmware +73
NVD
CVSS 3.1
8.2
EPSS
0.1%
CVE-2025-49164 MEDIUM This Month

CVE-2025-49164 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-49163 MEDIUM This Month

CVE-2025-49163 is a security vulnerability (CVSS 6.7) that allows booting an arbitrary image. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-49162 MEDIUM This Month

CVE-2025-49162 is a security vulnerability (CVSS 6.4) that allows file overwrite. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
6.4
EPSS
0.0%
CVE-2025-48996 npm MEDIUM This Month

HAX open-apis provides microservice apis for HAX webcomponents repo that are shared infrastructure calls. An unauthenticated information disclosure vulnerability exists in the Penn State University deployment of the HAX content management system via the `haxPsuUsage` API endpoint, related to a flat present in open-apis versions up to and including 10.0.2. This allows any remote unauthenticated user to retrieve a full list of PSU websites hosted on HAX CMS. When chained with other authorization issues (e.g., HAX-3), this could assist in targeted attacks such as unauthorized content modification or deletion. Commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7 patches the vulnerability.

Information Disclosure
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-48387 npm HIGH PATCH This Week

tar-fs versions prior to 3.0.9, 2.1.3, and 1.16.5 contain a path traversal vulnerability (CWE-22) that allows attackers to extract tar archives outside the intended directory using specially crafted tarballs. This affects all users of vulnerable tar-fs versions with network-accessible extraction endpoints; the high CVSS 8.7 score reflects the integrity impact and network-accessible attack vector, though no KEV status or widespread public exploits have been confirmed at this time.

Information Disclosure Redhat
NVD GitHub
CVSS 4.0
8.7
EPSS
0.3%
CVE-2025-27956 HIGH POC This Week

Directory Traversal vulnerability (CWE-22) in WebLaudos version 24.2 (04) that allows unauthenticated remote attackers to read arbitrary files and obtain sensitive information through improper validation of the 'id' parameter. With a CVSS score of 7.5 and network-based attack vector requiring no privileges or user interaction, this vulnerability poses a significant confidentiality risk to exposed WebLaudos instances. The vulnerability's active exploitation status and proof-of-concept availability should be verified through current KEV databases and security advisories.

Information Disclosure Path Traversal Weblaudos
NVD GitHub
CVSS 3.1
7.5
EPSS
2.5%
CVE-2025-20298 HIGH PATCH This Week

Privilege escalation vulnerability in Splunk Universal Forwarder for Windows where incorrect file system permissions are assigned during installation or upgrade, allowing non-administrator users to read and modify sensitive files in the installation directory. This affects versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, and could enable unauthorized access to credentials, configuration files, and system monitoring data. While CVSS 8.0 indicates high severity, real-world exploitation requires local access and user interaction (UI requirement per vector), limiting attack scope.

Windows Privilege Escalation Information Disclosure Microsoft Splunk +1
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2025-5036 HIGH PATCH This Week

Use-After-Free vulnerability (CWE-416) in Autodesk Revit triggered by maliciously crafted RFA (Revit Family) files that can be linked or imported into the application. An unauthenticated attacker with local access can exploit this vulnerability to crash the application, exfiltrate sensitive data, or achieve arbitrary code execution with the privileges of the Revit process. The attack requires user interaction (opening/importing a malicious file) but has high impact potential (confidentiality, integrity, and availability all compromised); current KEV and exploitation status unknown without additional intelligence sources.

RCE Information Disclosure Revit
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-48995 PyPI MEDIUM PATCH This Month

A security vulnerability in SignXML (CVSS 6.9). Remediation should follow standard vulnerability management procedures.

Python Information Disclosure Debian Ubuntu
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2025-48994 PyPI MEDIUM PATCH This Month

A security vulnerability in SignXML (CVSS 6.9). Remediation should follow standard vulnerability management procedures.

Python Information Disclosure Debian Ubuntu
NVD GitHub
CVSS 4.0
6.9
EPSS
0.1%
CVE-2024-7073 MEDIUM PATCH This Month

A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and external resources available through the network or filesystem. Exploitation of this vulnerability could lead to unauthorized access to sensitive data and systems, including resources within private networks, as long as they are reachable by the affected product.

Authentication Bypass Information Disclosure SSRF Identity Server Identity Server As Key Manager +2
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-48941 MEDIUM PATCH This Month

A remote code execution vulnerability in MyBB (CVSS 5.3) that allows attackers. Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Mybb
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-48940 HIGH PATCH This Week

MyBB versions prior to 1.8.39 contain a local file inclusion (LFI) vulnerability in the upgrade component due to improper input validation (CWE-22). This vulnerability allows authenticated administrators or unauthenticated attackers with access to an unlocked installer to read arbitrary files from the server filesystem. The vulnerability requires either the installer to be accessible via re-installation or the attacker to have administrative privileges, significantly limiting real-world exploitability despite the CVSS 7.2 score.

PHP Information Disclosure Mybb
NVD GitHub
CVSS 3.1
7.2
EPSS
0.1%
CVE-2024-40113 MEDIUM POC This Month

A security vulnerability in Sitecom WLX-2006 Wall Mount Range Extender N300 v.1.5 and before (CVSS 6.5). Risk factors: public PoC available.

Information Disclosure Wlx 2006 Firmware
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2024-40112 MEDIUM POC This Month

A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the "language" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information.

PHP Information Disclosure Lfi Wlx 2006 Firmware
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-37095 CRITICAL PATCH Act Now

Directory Traversal in HPE StoreOnce backup storage software. One of 6 critical CVEs.

Information Disclosure Path Traversal Storeonce System
NVD
CVSS 3.1
9.8
EPSS
0.4%
CVE-2025-20001 MEDIUM POC This Month

An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability.

Buffer Overflow Information Disclosure Fontcreator
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-48745 Awaiting Data

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD
CVE-2024-12168 HIGH PATCH This Week

DLL hijacking vulnerability in Yandex Telemost for Desktop versions before 2.7.0, where the application searches for dynamic libraries in untrusted paths, allowing local attackers with user-level privileges to execute arbitrary code through malicious DLL injection. The vulnerability has a high CVSS score of 7.8 and requires user interaction (running the application), but poses significant risk as DLL hijacking is a well-understood and commonly exploitable attack vector with publicly available proof-of-concept techniques.

Information Disclosure Yandex Telemost
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-48957 PyPI HIGH POC PATCH This Week

AstrBot versions 3.4.4 through 3.5.12 contain a path traversal vulnerability (CWE-23) in the dashboard feature that allows unauthenticated remote attackers to disclose sensitive information including LLM provider API keys, account passwords, and other confidential data. The vulnerability has a CVSS score of 7.5 (High) with high confidentiality impact and no authentication requirements. Patch is available in version 3.5.13 and later via Pull Request #1676.

Information Disclosure Path Traversal Astrbot
NVD GitHub
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-48955 Maven MEDIUM PATCH This Month

Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue.

Information Disclosure
NVD GitHub
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-46807 HIGH PATCH This Week

A remote code execution vulnerability in A Allocation of Resources Without Limits or Throttling vulnerability in sslh (CVSS 8.7) that allows attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Redhat Suse
NVD GitHub
CVSS 4.0
8.7
EPSS
0.1%
CVE-2025-1246 HIGH This Week

Buffer over-read vulnerability in Arm GPU userspace drivers (Bifrost, Valhall, and 5th Gen architectures) that allows unprivileged local users to access memory outside allocated buffer bounds through valid GPU operations including WebGL and WebGPU. The vulnerability affects multiple driver versions across three GPU architectures and has a CVSS score of 7.8 with high impact on confidentiality, integrity, and availability; exploitation status and POC availability are not documented in the provided data.

Information Disclosure 5th Gen Gpu Architecture Userspace Driver Bifrost Gpu Userspace Driver Valhall Gpu Userspace Driver
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-3260 Go HIGH PATCH This Week

CVE-2025-3260 is an authorization bypass vulnerability in Grafana's dashboard API endpoints (/apis/dashboard.grafana.app/*) that allows authenticated users to circumvent dashboard and folder permission controls across all API versions (v0alpha1, v1alpha1, v2alpha1). Affected users with viewer or editor roles can access, modify, or delete dashboards and folders they should not have permission to interact with, while organization isolation boundaries and datasource access controls remain unaffected. With a CVSS score of 8.3 and requiring only low-privilege authentication, this represents a significant risk to multi-tenant Grafana deployments and requires immediate patching.

Authentication Bypass Privilege Escalation Information Disclosure Redhat Grafana +1
NVD GitHub
CVSS 3.1
8.3
EPSS
0.0%
CVE-2025-5436 MEDIUM This Month

A vulnerability was found in Multilaser Sirius RE016 MLT1.0. It has been rated as problematic. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Information Disclosure
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-0325 MEDIUM PATCH This Month

CVE-2025-0325 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-1235 MEDIUM This Month

A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970.

Information Disclosure Integer Overflow
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-5429 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-49112 LOW PATCH Monitor

setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.

Information Disclosure Integer Overflow Debian Ubuntu
NVD GitHub
CVSS 3.1
3.1
EPSS
0.0%
CVE-2025-5428 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5427 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5426 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5425 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5424 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5423 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5422 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 4.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-5421 MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-5409 HIGH POC PATCH This Week

Critical improper access control vulnerability in Mist Community Edition's API Token Handler (create_token function) that allows unauthenticated remote attackers to manipulate token generation. Affected versions up to 4.7.1 are vulnerable; the vulnerability has been publicly disclosed with exploitation techniques available, and upgrading to version 4.7.2 provides the necessary fix. The CVSS 7.3 score reflects medium-to-high severity with potential for confidentiality, integrity, and availability impact.

Information Disclosure Mist
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.2%
CVE-2025-40908 CRITICAL POC PATCH Act Now

File modification via 2-args open in YAML-LibYAML before 0.903.0 for Perl. PoC and patch available.

Information Disclosure Path Traversal Redhat Yaml Libyaml Suse
NVD GitHub
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-33005 MEDIUM This Month

IBM Planning Analytics Local 2.0 and 2.1 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system.

Information Disclosure IBM Planning Analytics Local
NVD
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-1499 MEDIUM This Month

IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user.

Information Disclosure IBM Infosphere Information Server Infosphere Information Server On Cloud
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-5390 MEDIUM This Month

A vulnerability, which was classified as critical, was found in JeeWMS up to 20250504. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jeewms
NVD VulDB
CVSS 4.0
5.3
EPSS
0.2%
CVE-2025-5389 MEDIUM This Month

A vulnerability, which was classified as critical, has been found in JeeWMS up to 20250504. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jeewms
NVD VulDB
CVSS 4.0
5.3
EPSS
0.2%
CVE-2025-5387 MEDIUM This Month

A vulnerability classified as critical has been found in JeeWMS up to 20250504. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jeewms
NVD VulDB
CVSS 4.0
5.3
EPSS
0.2%
CVE-2025-4857 HIGH PATCH This Month

The Newsletters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.9.9.9 via the 'file' parameter. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. This Path Traversal vulnerability could allow attackers to access files and directories outside the intended path.

PHP WordPress RCE Information Disclosure Path Traversal +1
NVD
CVSS 3.1
7.2
EPSS
0.5%
CVE-2025-48946 LOW PATCH Monitor

liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required.

Information Disclosure Liboqs
NVD GitHub
CVSS 3.1
3.7
EPSS
0.1%

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD
CVE-2025-2503 MEDIUM This Month

An improper permission handling vulnerability was reported in Lenovo PC Manager that could allow a local attacker to perform arbitrary file deletions as an elevated user. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Pcmanager Lenovo
NVD
CVSS 4.0
6.9
EPSS
0.1%
CVE-2025-2501 HIGH This Week

An untrusted search path vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges. Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Pcmanager Lenovo
NVD
CVSS 4.0
8.5
EPSS
0.1%
CVE-2025-48942 PyPI MEDIUM POC PATCH This Week

vLLM is an inference and serving engine for large language models (LLMs). Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Information Disclosure Redhat Vllm
NVD GitHub
CVSS 3.1
6.5
EPSS
0.2%
CVE-2025-48938 Go LOW PATCH Monitor

go-gh is a collection of Go modules to make authoring GitHub CLI extensions easier. Rated low severity (CVSS 2.6), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Go Gh
NVD GitHub
CVSS 4.0
2.6
EPSS
0.4%
CVE-2024-42191 MEDIUM This Month

HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a COM hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Microsoft Traveler For Microsoft Outlook
NVD
CVSS 3.1
6.5
EPSS
0.2%
CVE-2024-42190 MEDIUM This Month

HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a DLL hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Microsoft Traveler For Microsoft Outlook
NVD
CVSS 3.1
6.5
EPSS
0.2%
CVE-2024-23589 MEDIUM This Month

Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs. Rated medium severity (CVSS 6.8). No vendor patch available.

Information Disclosure
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2024-13916 MEDIUM This Month

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Rated medium severity (CVSS 6.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Google
NVD
CVSS 4.0
6.9
EPSS
0.1%
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds read in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.

Buffer Overflow Information Disclosure Android
NVD
EPSS 0% CVSS 5.2
MEDIUM This Month

A security vulnerability in fingerprint trustlet (CVSS 5.2) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

A security vulnerability in ScreenCapture for Galaxy Watch (CVSS 5.5) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Wear Os
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

A security vulnerability in ThemeManager (CVSS 5.5) that allows local privileged attackers. Remediation should follow standard vulnerability management procedures.

Information Disclosure Android
NVD
EPSS 0% CVSS 6.2
MEDIUM This Month

Improper access control in AudioService prior to SMR Jun-2025 Release 1 allows local attackers to access sensitive information.

Information Disclosure Android
NVD
EPSS 0% CVSS 7.3
HIGH PATCH This Week

Privilege escalation vulnerability in Zscaler Client Connector for macOS versions prior to 4.2.0.241, caused by improper verification of loaded libraries. A local attacker with standard user privileges can exploit this weakness without user interaction to gain elevated system privileges, potentially compromising system integrity and confidentiality. The CVSS 7.3 score reflects the moderate-to-high severity of local privilege escalation with high impact on confidentiality and integrity.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: Not used. No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions 1.46.0 through 2.1.6 have an issue that affects AES-256-GCM and AES-128-GCM in Deno in which the authentication tag is not being validated. This means tampered ciphertexts or incorrect keys might not be detected, which breaks the guarantees expected from AES-GCM. Older versions of Deno correctly threw errors in such cases, as does Node.js. Without authentication tag verification, AES-GCM degrades to essentially CTR mode, removing integrity protection. Authenticated data set with set_aad is also affected, as it is incorporated into the GCM hash (ghash) but this too is not validated, rendering AAD checks ineffective. Version 2.1.7 includes a patch that addresses this issue.

Information Disclosure Node.js Deno +1
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Auth bypass in DataEase BI tool before 2.10.10.

Information Disclosure Dataease
NVD GitHub
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

MaxKB prior to version 1.10.8-lts contains an incomplete sandbox implementation that only blacklists binary execution in common system directories (/bin, /usr/bin, etc.), allowing local attackers with low privileges to execute arbitrary code via executable files in non-blacklisted directories and achieve full system compromise. The vulnerability affects enterprise AI assistant deployments and has a high CVSS score of 8.8 reflecting significant impact potential; exploitation requires local access but no user interaction.

Information Disclosure Maxkb
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `Origin` header is checked to prevent Cross-site WebSocket hijacking from happening, which was reported by CVE-2018-14732. But webpack-dev-server always allows IP address `Origin` headers. This allows websites that are served on IP addresses to connect WebSocket. An attacker can obtain source code via a method similar to that used to exploit CVE-2018-14732. Version 5.2.1 contains a patch for the issue.

Information Disclosure Chrome Google +2
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A security vulnerability in quequnlong shiyi-blog (CVSS 5.3). Risk factors: public PoC available.

Information Disclosure Shiyi Blog
NVD GitHub VulDB
EPSS 0% CVSS 9.6
CRITICAL Act Now

Credential exposure in IBM QRadar Suite 1.10.12.0-1.11.2.0.

Information Disclosure IBM Cloud Pak For Security +1
NVD
EPSS 0% CVSS 4.8
MEDIUM This Month

IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system.

Information Disclosure IBM Cloud Pak For Security +1
NVD
EPSS 0% CVSS 4.0
MEDIUM This Month

CVE-2025-1334 is a security vulnerability (CVSS 4.0) that allows web pages. Remediation should follow standard vulnerability management procedures.

Information Disclosure IBM Cloud Pak For Security +1
NVD
EPSS 0% CVSS 4.6
MEDIUM This Month

An issue was discovered in Unicom Focal Point 7.6.1. The database is encrypted with a hardcoded key, making it easier to recover the cleartext data.

Information Disclosure Focal Point
NVD
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Path traversal vulnerability in Python's tarfile module extraction filters that allows attackers to bypass the 'data' and 'tar' filter protections, enabling symlink targets to point outside the extraction directory and permitting modification of file metadata. This affects any application using TarFile.extractall() or TarFile.extract() with filter='data' or filter='tar' on untrusted tar archives, as well as Python 3.14+ users relying on the new 'data' default filter. The vulnerability has a CVSS score of 7.5 (High) with high integrity impact, though exploitation requires an attacker to control the tar archive contents.

RCE Python Information Disclosure +3
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CVE-2025-4138 is a security vulnerability (CVSS 7.5) that allows the extraction filter. High severity vulnerability requiring prompt remediation.

RCE Python Information Disclosure +3
NVD GitHub
EPSS 0% CVSS 7.5
HIGH This Week

Transient denial-of-service vulnerability in wireless beacon frame processing that occurs when a device receives a malformed EHT (Extremely High Throughput) operation information element. An unauthenticated remote attacker can trigger a temporary service disruption by sending a specially crafted beacon frame, affecting WiFi 6E and later devices. With a CVSS score of 7.5 and high availability impact, this vulnerability requires no user interaction and is network-accessible, making it a notable threat to wireless infrastructure and client devices, though there is currently no evidence of active exploitation in the wild.

Information Disclosure Ar8035 Firmware Csr8811 Firmware +207
NVD
EPSS 0% CVSS 8.2
HIGH This Week

CVE-2024-53026 is an information disclosure vulnerability in IMS (IP Multimedia Subsystem) implementations affecting VoLTE and VoWiFi call processing. When a malicious or malformed RTCP (Real-time Transport Control Protocol) packet is received during an active call, the vulnerable system leaks sensitive information to a network-adjacent attacker without requiring authentication or user interaction. The CVSS 8.2 rating reflects high confidentiality impact with partial availability degradation; exploitation likelihood and real-world activity status require cross-referencing with EPSS and KEV data.

Information Disclosure Wcd9335 Firmware Sm7325p Firmware +209
NVD
EPSS 0% CVSS 8.2
HIGH This Week

CVE-2024-53021 is an information disclosure vulnerability in RTCP (Real-time Transport Control Protocol) packet processing that allows unauthenticated remote attackers to leak sensitive data through malicious goodbye (BYE) RTCP packets. The vulnerability affects multiple VoIP and real-time communication products processing RTCP traffic; attackers can extract confidential information across the network without authentication or user interaction, and may also cause limited availability impact. The high CVSS score of 8.2 reflects the severe confidentiality impact and network-based attack vector, though exploitation complexity is low.

Information Disclosure Qcn9011 Firmware Wcn7860 Firmware +200
NVD
EPSS 0% CVSS 8.2
HIGH This Week

CVE-2024-53020 is an information disclosure vulnerability in RTP (Real-time Transport Protocol) packet processing that occurs when decoding packets with malformed header extensions. An attacker on the network can send specially crafted RTP packets to trigger memory disclosure, potentially exposing sensitive information while also causing minor availability impact. The vulnerability affects multiple implementations of RTP protocol handling across various media processing frameworks and VoIP applications; while there is no confirmed active KEV status or public exploit code documented, the high CVSS score (8.2) combined with network accessibility (CVSS:3.1/AV:N) indicates significant real-world risk to exposed services.

Information Disclosure Sa8650p Firmware Apq8017 Firmware +209
NVD
EPSS 0% CVSS 8.2
HIGH This Week

Network-based information disclosure vulnerability in RTP (Real-time Transport Protocol) packet decoding that occurs when the CSRC (Contributing Source) count header field is improperly validated, allowing an attacker to read sensitive memory contents. The vulnerability affects any system processing RTP streams with malformed headers and has a high CVSS score of 8.2 due to the combination of high confidentiality impact and network accessibility without authentication; no patch availability, KEV status, EPSS score, or active exploitation details are currently documented.

Information Disclosure Fastconnect 6200 Firmware Fastconnect 6700 Firmware +75
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

CVE-2025-49164 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 6.7
MEDIUM This Month

CVE-2025-49163 is a security vulnerability (CVSS 6.7) that allows booting an arbitrary image. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 6.4
MEDIUM This Month

CVE-2025-49162 is a security vulnerability (CVSS 6.4) that allows file overwrite. Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

HAX open-apis provides microservice apis for HAX webcomponents repo that are shared infrastructure calls. An unauthenticated information disclosure vulnerability exists in the Penn State University deployment of the HAX content management system via the `haxPsuUsage` API endpoint, related to a flat present in open-apis versions up to and including 10.0.2. This allows any remote unauthenticated user to retrieve a full list of PSU websites hosted on HAX CMS. When chained with other authorization issues (e.g., HAX-3), this could assist in targeted attacks such as unauthorized content modification or deletion. Commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7 patches the vulnerability.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 8.7
HIGH PATCH This Week

tar-fs versions prior to 3.0.9, 2.1.3, and 1.16.5 contain a path traversal vulnerability (CWE-22) that allows attackers to extract tar archives outside the intended directory using specially crafted tarballs. This affects all users of vulnerable tar-fs versions with network-accessible extraction endpoints; the high CVSS 8.7 score reflects the integrity impact and network-accessible attack vector, though no KEV status or widespread public exploits have been confirmed at this time.

Information Disclosure Redhat
NVD GitHub
EPSS 2% CVSS 7.5
HIGH POC This Week

Directory Traversal vulnerability (CWE-22) in WebLaudos version 24.2 (04) that allows unauthenticated remote attackers to read arbitrary files and obtain sensitive information through improper validation of the 'id' parameter. With a CVSS score of 7.5 and network-based attack vector requiring no privileges or user interaction, this vulnerability poses a significant confidentiality risk to exposed WebLaudos instances. The vulnerability's active exploitation status and proof-of-concept availability should be verified through current KEV databases and security advisories.

Information Disclosure Path Traversal Weblaudos
NVD GitHub
EPSS 0% CVSS 8.0
HIGH PATCH This Week

Privilege escalation vulnerability in Splunk Universal Forwarder for Windows where incorrect file system permissions are assigned during installation or upgrade, allowing non-administrator users to read and modify sensitive files in the installation directory. This affects versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, and could enable unauthorized access to credentials, configuration files, and system monitoring data. While CVSS 8.0 indicates high severity, real-world exploitation requires local access and user interaction (UI requirement per vector), limiting attack scope.

Windows Privilege Escalation Information Disclosure +3
NVD
EPSS 0% CVSS 7.8
HIGH PATCH This Week

Use-After-Free vulnerability (CWE-416) in Autodesk Revit triggered by maliciously crafted RFA (Revit Family) files that can be linked or imported into the application. An unauthenticated attacker with local access can exploit this vulnerability to crash the application, exfiltrate sensitive data, or achieve arbitrary code execution with the privileges of the Revit process. The attack requires user interaction (opening/importing a malicious file) but has high impact potential (confidentiality, integrity, and availability all compromised); current KEV and exploitation status unknown without additional intelligence sources.

RCE Information Disclosure Revit
NVD
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

A security vulnerability in SignXML (CVSS 6.9). Remediation should follow standard vulnerability management procedures.

Python Information Disclosure Debian +1
NVD GitHub
EPSS 0% CVSS 6.9
MEDIUM PATCH This Month

A security vulnerability in SignXML (CVSS 6.9). Remediation should follow standard vulnerability management procedures.

Python Information Disclosure Debian +1
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and external resources available through the network or filesystem. Exploitation of this vulnerability could lead to unauthorized access to sensitive data and systems, including resources within private networks, as long as they are reachable by the affected product.

Authentication Bypass Information Disclosure SSRF +4
NVD
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A remote code execution vulnerability in MyBB (CVSS 5.3) that allows attackers. Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Mybb
NVD GitHub
EPSS 0% CVSS 7.2
HIGH PATCH This Week

MyBB versions prior to 1.8.39 contain a local file inclusion (LFI) vulnerability in the upgrade component due to improper input validation (CWE-22). This vulnerability allows authenticated administrators or unauthenticated attackers with access to an unlocked installer to read arbitrary files from the server filesystem. The vulnerability requires either the installer to be accessible via re-installation or the attacker to have administrative privileges, significantly limiting real-world exploitability despite the CVSS 7.2 score.

PHP Information Disclosure Mybb
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A security vulnerability in Sitecom WLX-2006 Wall Mount Range Extender N300 v.1.5 and before (CVSS 6.5). Risk factors: public PoC available.

Information Disclosure Wlx 2006 Firmware
NVD GitHub
EPSS 0% CVSS 5.9
MEDIUM POC This Month

A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the "language" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information.

PHP Information Disclosure Lfi +1
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Directory Traversal in HPE StoreOnce backup storage software. One of 6 critical CVEs.

Information Disclosure Path Traversal Storeonce System
NVD
EPSS 0% CVSS 6.5
MEDIUM POC This Month

An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability.

Buffer Overflow Information Disclosure Fontcreator
NVD
Awaiting Data

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 7.8
HIGH PATCH This Week

DLL hijacking vulnerability in Yandex Telemost for Desktop versions before 2.7.0, where the application searches for dynamic libraries in untrusted paths, allowing local attackers with user-level privileges to execute arbitrary code through malicious DLL injection. The vulnerability has a high CVSS score of 7.8 and requires user interaction (running the application), but poses significant risk as DLL hijacking is a well-understood and commonly exploitable attack vector with publicly available proof-of-concept techniques.

Information Disclosure Yandex Telemost
NVD
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

AstrBot versions 3.4.4 through 3.5.12 contain a path traversal vulnerability (CWE-23) in the dashboard feature that allows unauthenticated remote attackers to disclose sensitive information including LLM provider API keys, account passwords, and other confidential data. The vulnerability has a CVSS score of 7.5 (High) with high confidentiality impact and no authentication requirements. Patch is available in version 3.5.13 and later via Pull Request #1676.

Information Disclosure Path Traversal Astrbot
NVD GitHub
EPSS 0% CVSS 6.2
MEDIUM PATCH This Month

Para is a multitenant backend server/framework for object persistence and retrieval. A vulnerability that exists in versions prior to 1.50.8 exposes both access and secret keys in logs without redaction. These credentials are later reused in variable assignments for persistence but do not require logging for debugging or system health purposes. Version 1.50.8 fixes the issue.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 8.7
HIGH PATCH This Week

A remote code execution vulnerability in A Allocation of Resources Without Limits or Throttling vulnerability in sslh (CVSS 8.7) that allows attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Redhat Suse
NVD GitHub
EPSS 0% CVSS 7.8
HIGH This Week

Buffer over-read vulnerability in Arm GPU userspace drivers (Bifrost, Valhall, and 5th Gen architectures) that allows unprivileged local users to access memory outside allocated buffer bounds through valid GPU operations including WebGL and WebGPU. The vulnerability affects multiple driver versions across three GPU architectures and has a CVSS score of 7.8 with high impact on confidentiality, integrity, and availability; exploitation status and POC availability are not documented in the provided data.

Information Disclosure 5th Gen Gpu Architecture Userspace Driver Bifrost Gpu Userspace Driver +1
NVD
EPSS 0% CVSS 8.3
HIGH PATCH This Week

CVE-2025-3260 is an authorization bypass vulnerability in Grafana's dashboard API endpoints (/apis/dashboard.grafana.app/*) that allows authenticated users to circumvent dashboard and folder permission controls across all API versions (v0alpha1, v1alpha1, v2alpha1). Affected users with viewer or editor roles can access, modify, or delete dashboards and folders they should not have permission to interact with, while organization isolation boundaries and datasource access controls remain unaffected. With a CVSS score of 8.3 and requiring only low-privilege authentication, this represents a significant risk to multi-tenant Grafana deployments and requires immediate patching.

Authentication Bypass Privilege Escalation Information Disclosure +3
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability was found in Multilaser Sirius RE016 MLT1.0. It has been rated as problematic. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Information Disclosure
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

CVE-2025-0325 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970.

Information Disclosure Integer Overflow
NVD
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 3.1
LOW PATCH Monitor

setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.

Information Disclosure Integer Overflow Debian +1
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 4.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A security vulnerability in juzaweb CMS (CVSS 6.3). Risk factors: public PoC available.

Information Disclosure Cms
NVD GitHub VulDB
EPSS 0% CVSS 7.3
HIGH POC PATCH This Week

Critical improper access control vulnerability in Mist Community Edition's API Token Handler (create_token function) that allows unauthenticated remote attackers to manipulate token generation. Affected versions up to 4.7.1 are vulnerable; the vulnerability has been publicly disclosed with exploitation techniques available, and upgrading to version 4.7.2 provides the necessary fix. The CVSS 7.3 score reflects medium-to-high severity with potential for confidentiality, integrity, and availability impact.

Information Disclosure Mist
NVD GitHub VulDB
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

File modification via 2-args open in YAML-LibYAML before 0.903.0 for Perl. PoC and patch available.

Information Disclosure Path Traversal Redhat +2
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM This Month

IBM Planning Analytics Local 2.0 and 2.1 does not invalidate session after a logout which could allow an authenticated user to impersonate another user on the system.

Information Disclosure IBM Planning Analytics Local
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user.

Information Disclosure IBM Infosphere Information Server +1
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability, which was classified as critical, was found in JeeWMS up to 20250504. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jeewms
NVD VulDB
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability, which was classified as critical, has been found in JeeWMS up to 20250504. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jeewms
NVD VulDB
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability classified as critical has been found in JeeWMS up to 20250504. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Jeewms
NVD VulDB
EPSS 0% CVSS 7.2
HIGH PATCH This Month

The Newsletters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.9.9.9 via the 'file' parameter. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. This Path Traversal vulnerability could allow attackers to access files and directories outside the intended path.

PHP WordPress RCE +3
NVD
EPSS 0% CVSS 3.7
LOW PATCH Monitor

liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required.

Information Disclosure Liboqs
NVD GitHub

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 6.9
MEDIUM This Month

An improper permission handling vulnerability was reported in Lenovo PC Manager that could allow a local attacker to perform arbitrary file deletions as an elevated user. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Pcmanager Lenovo
NVD
EPSS 0% CVSS 8.5
HIGH This Week

An untrusted search path vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges. Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Pcmanager Lenovo
NVD
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Week

vLLM is an inference and serving engine for large language models (LLMs). Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Information Disclosure Redhat Vllm
NVD GitHub
EPSS 0% CVSS 2.6
LOW PATCH Monitor

go-gh is a collection of Go modules to make authoring GitHub CLI extensions easier. Rated low severity (CVSS 2.6), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Go Gh
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM This Month

HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a COM hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Microsoft Traveler For Microsoft Outlook
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a DLL hijacking vulnerability which could allow an attacker to modify or replace the application with malicious content. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.

Information Disclosure Microsoft Traveler For Microsoft Outlook
NVD
EPSS 0% CVSS 6.8
MEDIUM This Month

Due to outdated Hash algorithm, HCL Glovius Cloud could allow attackers to guess the input data using brute-force or dictionary attacks efficiently using modern hardware such as GPUs or ASICs. Rated medium severity (CVSS 6.8). No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 6.9
MEDIUM This Month

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Rated medium severity (CVSS 6.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Google
NVD
Prev Page 103 of 153 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy