Information Disclosure

12883 CVEs technique

Monthly

CVE-2025-13632 MEDIUM PATCH This Month

A security vulnerability in DevTools in Google Chrome (CVSS 5.4). Remediation should follow standard vulnerability management procedures.

Google Information Disclosure Ubuntu Debian Chrome +2
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-13630 HIGH PATCH This Week

Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Google Information Disclosure Memory Corruption Ubuntu Debian +3
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-65105 Go MEDIUM PATCH This Month

A remote code execution vulnerability in Apptainer (CVSS 4.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Debian Redhat Ubuntu Apptainer +1
NVD GitHub
CVSS 3.1
4.5
EPSS
0.0%
CVE-2025-64750 Go MEDIUM PATCH This Month

A remote code execution vulnerability (CVSS 4.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Ubuntu Debian Suse
NVD GitHub
CVSS 3.1
4.5
EPSS
0.0%
CVE-2025-65656 CRITICAL POC Act Now

dcat-admin v2.2.3-beta and before is vulnerable to file inclusion in admin/src/Extend/VersionManager.php.

PHP Lfi Information Disclosure Dcat Admin
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-64460 PyPI HIGH PATCH This Week

An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.

Information Disclosure Python Ubuntu Debian Django +2
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-58113 MEDIUM POC This Month

An out-of-bounds read vulnerability exists in the EMF functionality of PDF-XChange Co. Ltd PDF-XChange Editor 10.7.3.401. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

Information Disclosure Buffer Overflow Pdf Xchange Editor
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-13877 npm MEDIUM PATCH This Month

A security vulnerability in nocobase (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD GitHub VulDB
CVSS 3.1
5.6
EPSS
0.1%
CVE-2025-12630 MEDIUM PATCH This Month

A security vulnerability in Upload.am WordPress (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Information Disclosure WordPress PHP
NVD WPScan
CVSS 3.1
4.9
EPSS
0.0%
CVE-2025-59702 HIGH POC This Week

A privilege escalation vulnerability (CVSS 7.2) that allows a physically proximate attacker with elevated privileges. Risk factors: public PoC available.

Information Disclosure Nshield Connect Xc High Firmware Nshield Connect Xc Base Firmware Nshield 5c Firmware Nshield Hsmi Firmware +1
NVD GitHub
CVSS 3.1
7.2
EPSS
0.0%
CVE-2025-59701 MEDIUM POC This Month

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker (with elevated privileges) to read and modify the Appliance SSD contents (because they are unencrypted).

Information Disclosure Nshield Hsmi Firmware Nshield Connect Xc High Firmware Nshield 5c Firmware Nshield Connect Xc Mid Firmware +1
NVD GitHub
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-59700 LOW POC Monitor

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with root access to modify the Recovery Partition (because of a lack of integrity protection).

Information Disclosure
NVD GitHub
CVSS 3.1
3.9
EPSS
0.0%
CVE-2025-59698 MEDIUM POC This Month

CVE-2025-59698 is a security vulnerability (CVSS 6.8) that allows a physically proximate attacker. Risk factors: public PoC available.

Information Disclosure Nshield 5c Firmware Nshield Connect Xc Mid Firmware Nshield Connect Xc Base Firmware Nshield Connect Xc High Firmware +1
NVD GitHub
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-59696 LOW POC Monitor

CVE-2025-59696 is a security vulnerability (CVSS 3.2) that allows a physically proximate attacker. Risk factors: public PoC available.

Information Disclosure
NVD GitHub
CVSS 3.1
3.2
EPSS
0.0%
CVE-2025-59694 MEDIUM POC This Month

CVE-2025-59694 is a security vulnerability (CVSS 6.8) that allows a physically proximate attacker. Risk factors: public PoC available.

Information Disclosure Nshield Hsmi Firmware Nshield Connect Xc Base Firmware Nshield Connect Xc Mid Firmware Nshield Connect Xc High Firmware +1
NVD GitHub
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-41066 MEDIUM PATCH This Month

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

PHP Information Disclosure Ubuntu Debian Groupware
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-41015 HIGH PATCH This Week

User Enumeration Vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system. The vulnerability is exploitable through the 'pda:username' parameter with 'soapaction GetUserQuestionAndAnswer' in '/WS/PDAWebService.asmx'.

Information Disclosure Gim
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-41014 HIGH PATCH This Week

User Enumeration Vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system. The vulnerability is exploitable through the 'pda:username' parameter with 'soapaction GetLastDatePasswordChange' in '/WS/PDAWebService.asmx'.

Information Disclosure Gim
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-13295 HIGH PATCH This Week

Insertion of Sensitive Information Into Sent Data vulnerability in Argus Technology Inc. BILGER allows Choosing Message Identifier.This issue affects BILGER: before 2.4.9.

Information Disclosure Bilger
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-11789 HIGH This Week

Out-of-bounds read vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. The 'DownloadFile' function converts a parameter to an integer using 'atoi()' and then uses it as an index in the 'FilesDownload' array with '(&FilesDownload)[iVar2]'. If the parameter is too large, it will access memory beyond the limits.

Information Disclosure Buffer Overflow Sge Plc50 Firmware Sge Plc1000 Firmware
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-41744 CRITICAL Act Now

CVE-2025-41744 is a security vulnerability (CVSS 9.1) that allows an unprivileged remote attacker. Critical severity with potential for significant impact on affected systems.

Information Disclosure Sprecon E T3 Firmware Sprecon E P Firmware Sprecon E C Firmware
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-41743 MEDIUM PATCH This Month

Insufficient encryption strength in Sprecher Automation SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 allows a local unprivileged attacker to extract data from update images and thus obtain limited information about the architecture and internal processes.

Information Disclosure Sprecon E P Firmware Sprecon E C Firmware Sprecon E T3 Firmware
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-13353 Go MEDIUM PATCH This Month

In gokey versions <0.2.0, a flaw in the seed decryption logic resulted in passwords incorrectly being derived solely from the initial vector and the AES-GCM authentication tag of the key seed. This issue has been fixed in gokey version 0.2.0. This is a breaking change. The fix has invalidated any passwords/secrets that were derived from the seed file (using the -s option). Even if the input seed file stays the same, version 0.2.0 gokey will generate different secrets. Impact This vulnerability impacts generated keys/secrets using a seed file as an entropy input (using the -s option). Keys/secrets generated just from the master password (without the -s option) are not impacted. The confidentiality of the seed itself is also not impacted (it is not required to regenerate the seed itself). Specific impact includes: * keys/secrets generated from a seed file may have lower entropy: it was expected that the whole seed would be used to generate keys (240 bytes of entropy input), where in vulnerable versions only 28 bytes was used * a malicious entity could have recovered all passwords, generated from a particular seed, having only the seed file in possession without the knowledge of the seed master password Patches The code logic bug has been fixed in gokey version 0.2.0 and above. Due to the deterministic nature of gokey, fixed versions will produce different passwords/secrets using seed files, as all seed entropy will be used now. System secret rotation guidance It is advised for users to regenerate passwords/secrets using the patched version of gokey (0.2.0 and above), and provision/rotate these secrets into respective systems in place of the old secret. A specific rotation procedure is system-dependent, but most common patterns are described below. Systems that do not require the old password/secret for rotation Such systems usually have a "Forgot password" facility or a similar facility allowing users to rotate their password/secrets by sending a unique "magic" link to the user's email or phone. In such cases users are advised to use this facility and input the newly generated password secret, when prompted by the system. Systems that require the old password/secret for rotation Such systems usually have a modal password rotation window usually in the user settings section requiring the user to input the old and the new password sometimes with a confirmation. To generate/recover the old password in such cases users are advised to: * temporarily download gokey version 0.1.3 https://github.com/cloudflare/gokey/releases/tag/v0.1.3 for their respective operating system to recover the old password * use gokey version 0.2.0 or above to generate the new password * populate the system provided password rotation form Systems that allow multiple credentials for the same account to be provisioned Such systems usually require a secret or a cryptographic key as a credential for access, but allow several credentials at the same time. One example is SSH: a particular user may have several authorized public keys configured on the SSH server for access. For such systems users are advised to: * generate a new secret/key/credential using gokey version 0.2.0 or above * provision the new secret/key/credential in addition to the existing credential on the system * verify that the access or required system operation is still possible with the new secret/key/credential * revoke authorization for the existing/old credential from the system Credit This vulnerability was found by Théo Cusnir ( @mister_mime https://hackerone.com/mister_mime ) and responsibly disclosed through Cloudflare's bug bounty program.

Information Disclosure Ubuntu Debian Gokey Suse
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-10543 Go MEDIUM PATCH This Month

A security vulnerability in Eclipse Paho Go MQTT (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Paho Mqtt Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-13696 MEDIUM This Month

The Zigaform plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.6.5. This is due to the plugin exposing a public AJAX endpoint that retrieves form submission data without performing authorization checks to verify ownership or access rights. This makes it possible for unauthenticated attackers to extract sensitive form submission data including personal information, payment details, and other private data via the rocket_front_payment_seesummary action by enumerating sequential form_r_id values.

Information Disclosure WordPress PHP
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-10971 HIGH This Week

Insecure Storage of Sensitive Information vulnerability in MeetMe on iOS, Android allows Retrieve Embedded Sensitive Data. This issue affects MeetMe: through v2.2.5.

Google Information Disclosure Android
NVD
CVSS 4.0
8.8
EPSS
0.0%
CVE-2025-20789 MEDIUM This Month

In GPU pdma, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117741; Issue ID: MSV-4538.

Information Disclosure Android Google
NVD
CVSS 3.1
4.4
EPSS
0.0%
CVE-2025-20776 MEDIUM This Month

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.

Privilege Escalation Information Disclosure Buffer Overflow Android Google
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-20768 HIGH This Week

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4805.

Privilege Escalation Information Disclosure Buffer Overflow Android Google
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-20759 MEDIUM This Month

In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.

Information Disclosure Denial Of Service Buffer Overflow Nr16 Nr15
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2024-45675 HIGH This Week

CVE-2024-45675 is a security vulnerability (CVSS 8.4) that allows a local user. High severity vulnerability requiring prompt remediation.

Information Disclosure IBM Informix Dynamic Server
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-58488 MEDIUM This Month

Improper verification of source of a communication channel in SmartTouchCall prior to version 1.0.1.1 allows remote attackers to access sensitive information. User interaction is required for triggering this vulnerability.

Information Disclosure Smart Touch Call
NVD
CVSS 3.1
4.5
EPSS
0.1%
CVE-2025-58487 MEDIUM This Month

A security vulnerability in Samsung Account (CVSS 4.0) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Samsung Information Disclosure Account
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-58486 MEDIUM This Month

A security vulnerability in Samsung Account (CVSS 4.0) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Samsung Information Disclosure Account
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-58484 MEDIUM This Month

A security vulnerability in Samsung Cloud Assistant (CVSS 4.0) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Samsung Information Disclosure
NVD
CVSS 3.1
4.0
EPSS
0.0%
CVE-2025-58483 MEDIUM This Month

A security vulnerability in Galaxy Store for Galaxy Watch (CVSS 5.9) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Google Information Disclosure Galaxy Store Android
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2025-58482 HIGH This Week

A security vulnerability in MPLocalService of MotionPhoto (CVSS 7.3) that allows local attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Motionphoto
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-58481 HIGH This Week

A security vulnerability in MPRemoteService of MotionPhoto (CVSS 7.3) that allows local attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Motionphoto
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-58479 MEDIUM This Month

Out-of-bounds read in libimagecodec.quram.so prior to SMR Dec-2025 Release 1 allows remote attackers to access out-of-bounds memory.

Information Disclosure Buffer Overflow Android
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-58476 MEDIUM This Month

Out-of-bounds read vulnerability in bootloader prior to SMR Dec-2025 Release 1 allows physical attackers to access out-of-bounds memory.

Information Disclosure Buffer Overflow Android
NVD
CVSS 3.1
4.2
EPSS
0.0%
CVE-2025-55129 MEDIUM POC This Month

HackerOne community member Kassem S.(kassem_s94) has reported that username handling in Revive Adserver was still vulnerable to impersonation attacks after the fix for CVE-2025-52672, via several alternate techniques. Homoglyphs based impersonation has been independently reported by other HackerOne users, such as itz_hari_ and khoof.

Information Disclosure Revive Adserver
NVD
CVSS 3.0
5.4
EPSS
0.0%
CVE-2025-21080 MEDIUM This Month

A security vulnerability in Dynamic Lockscreen (CVSS 6.2) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Google Information Disclosure Android
NVD
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-66415 npm MEDIUM PATCH This Month

A security vulnerability in to forward the current HTTP request to another server. (CVSS 5.4). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Reply From Redhat
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-66400 npm MEDIUM PATCH This Month

mdast-util-to-hast is an mdast utility to transform to hast. From 13.0.0 to before 13.2.1, multiple (unprefixed) classnames could be added in markdown source by using character references. This could make rendered user supplied markdown code elements appear like the rest of the page. This vulnerability is fixed in 13.2.1.

Information Disclosure Mdast Util To Hast Redhat Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-66307 PHP MEDIUM POC PATCH This Month

A security vulnerability in This admin (CVSS 6.5). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Grav Plugin Admin
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-66304 PHP MEDIUM POC PATCH This Month

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to privilege escalation if an attacker can crack these password hashes. This vulnerability is fixed in 1.8.0-beta.27.

Information Disclosure Privilege Escalation Grav
NVD GitHub
CVSS 3.1
6.2
EPSS
0.1%
CVE-2025-66298 PHP HIGH POC PATCH This Week

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, having a simple form on site can reveal the whole Grav configuration details (including plugin configuration details) by using the correct POST payload to exploit a Server-Side Template (SST) vulnerability. Sensitive information may be contained in the configuration details. This vulnerability is fixed in 1.8.0-beta.27.

Information Disclosure Grav
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-51999 LOW PATCH Monitor

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVSS 4.0
2.7
EPSS
1.0%
CVE-2025-51682 CRITICAL POC Act Now

CVE-2025-51682 is a security vulnerability (CVSS 9.8) that allows an attacker. Risk factors: public PoC available.

Information Disclosure Mjobtime
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-13653 MEDIUM This Month

In Search Guard FLX versions from 3.1.0 up to 4.0.0 with enterprise modules being disabled, there exists an issue which allows authenticated users to use specially crafted requests to read documents from data streams without having the respective privileges.

Information Disclosure
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-65794 Awaiting Data

Rejected reason: DO NOT USE THIS CVE RECORD. No vendor patch available.

Information Disclosure
NVD
CVE-2025-65793 Awaiting Data

Rejected reason: DO NOT USE THIS CVE RECORD. No vendor patch available.

Information Disclosure
NVD
CVE-2025-11699 HIGH POC PATCH This Week

nopCommerce v4.70 and prior, and version 4.80.3, does not invalidate session cookies after logout or session termination, allowing an attacker who has a a valid session cookie access to privileged endpoints (such as /admin) even after the legitimate user has logged out, enabling session hijacking. Any version above 4.70 that is not 4.80.3 fixes the vulnerability.

Information Disclosure Nopcommerce
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2024-48894 MEDIUM This Month

A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.

Information Disclosure Diris M 70 Firmware
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2024-32384 MEDIUM This Month

Kerlink gateways running KerOS prior to version 5.10 expose their web interface exclusively over HTTP, without HTTPS support. This lack of transport layer security allows a man-in-the-middle attacker to intercept and modify traffic between the client and the device.

Information Disclosure Keros
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-63523 PHP MEDIUM POC This Month

FeehiCMS version 2.1.1 fails to enforce server-side immutability for parameters that are presented to clients as "read-only." An authenticated attacker can intercept and modify the parameter in transit and the backend accepts the changes. This can lead to unintended username changes.

Information Disclosure Buffer Overflow Feehicms
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-13129 MEDIUM This Month

A remote code execution vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-49642 MEDIUM PATCH This Month

CVE-2025-49642 is a security vulnerability (CVSS 5.8). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Suse
NVD
CVSS 4.0
5.8
EPSS
0.0%
CVE-2025-2879 MEDIUM This Month

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to expose sensitive data.This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.

Information Disclosure Valhall Gpu Kernel Driver 5th Gen Gpu Architecture Kernel Driver
NVD
CVSS 3.1
5.1
EPSS
0.0%
CVE-2025-41739 MEDIUM PATCH This Month

An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.

Information Disclosure Denial Of Service Buffer Overflow
NVD
CVSS 3.1
5.9
EPSS
0.1%
CVE-2025-41738 HIGH PATCH This Week

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.

Information Disclosure Memory Corruption Control For Pfc100 Sl Runtime Toolkit Control For Wago Touch Panels 600 Sl +12
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-13808 HIGH POC This Week

A security vulnerability in orionsec orion-ops (CVSS 7.3). Risk factors: public PoC available.

Information Disclosure Java Orion Ops
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-13807 MEDIUM POC This Month

A security vulnerability in orionsec orion-ops (CVSS 4.3). Risk factors: public PoC available.

Information Disclosure Java Orion Ops
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-13806 Maven HIGH POC This Week

A security vulnerability in nutzam NutzBoot (CVSS 7.3). Risk factors: public PoC available.

Information Disclosure Java Nutzboot
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-13804 Maven MEDIUM POC This Month

A security flaw has been discovered in nutzam NutzBoot up to 2.6.0-SNAPSHOT. The impacted element is an unknown function of the file nutzboot-demo/nutzboot-demo-simple/nutzboot-demo-simple-web3j/src/main/java/io/nutz/demo/simple/module/EthModule.java of the component Ethereum Wallet Handler. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

Information Disclosure Java
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-13803 HIGH This Week

A security vulnerability in A vulnerability (CVSS 7.3). High severity vulnerability requiring prompt remediation.

Information Disclosure
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-13787 MEDIUM POC This Month

A flaw has been found in ZenTao up to 21.7.6-8564. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

PHP Information Disclosure Zentao
NVD GitHub VulDB
CVSS 4.0
5.3
EPSS
0.1%
CVE-2025-13785 PHP MEDIUM POC This Month

A security vulnerability has been detected in yungifez Skuul School Management System up to 2.6.5. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Skuul
NVD GitHub VulDB
CVSS 4.0
5.3
EPSS
0.0%
CVE-2025-66432 MEDIUM This Month

In Oxide control plane 15 through 17 before 17.1, API tokens can be renewed past their expiration date. Rated medium severity (CVSS 5.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-66422 PyPI MEDIUM POC PATCH This Month

Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Trytond
NVD
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-6666 LOW Monitor

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Rated low severity (CVSS 1.0), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure
NVD VulDB
CVSS 4.0
1.0
EPSS
0.0%
CVE-2025-66291 MEDIUM PATCH This Month

OrangeHRM is a comprehensive human resource management (HRM) system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. This Exposure of Sensitive Information vulnerability could allow attackers to access sensitive data that should not be disclosed.

Information Disclosure Orangehrm
NVD GitHub
CVSS 4.0
5.3
EPSS
0.0%
CVE-2025-66290 MEDIUM This Month

OrangeHRM is a comprehensive human resource management (HRM) system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Orangehrm
NVD GitHub
CVSS 4.0
5.3
EPSS
0.0%
CVE-2025-66225 HIGH This Week

OrangeHRM is a comprehensive human resource management (HRM) system. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Orangehrm
NVD GitHub
CVSS 4.0
8.7
EPSS
0.0%
CVE-2025-66221 PyPI MEDIUM PATCH This Month

Werkzeug is a comprehensive WSGI web application library. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Information Disclosure Microsoft Werkzeug Windows Redhat +1
NVD GitHub
CVSS 4.0
6.3
EPSS
0.0%
CVE-2025-61915 MEDIUM POC PATCH This Month

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Rated medium severity (CVSS 6.0), this vulnerability is low attack complexity. Public exploit code available.

Information Disclosure Cups Redhat Suse
NVD GitHub
CVSS 3.1
6.0
EPSS
0.0%
CVE-2025-53939 MEDIUM PATCH This Month

Kiteworks is a private data network (PDN). Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Kiteworks
NVD GitHub
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-53896 HIGH PATCH This Week

Kiteworks MFT orchestrates end-to-end file transfer workflows. Rated high severity (CVSS 7.1), this vulnerability is low attack complexity.

Information Disclosure Kiteworks Managed File Transfer
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2025-66027 HIGH POC PATCH This Week

Rallly is an open-source scheduling and collaboration tool. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Information Disclosure Rallly
NVD GitHub
CVSS 4.0
7.1
EPSS
0.0%
CVE-2025-13683 MEDIUM This Month

Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.3.8.0; Remote Desktop Manager: through 2025.3.23.0. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Microsoft Devolutions Server Remote Desktop Manager Windows
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-12183 Maven HIGH PATCH This Week

Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Denial Of Service Buffer Overflow Java Information Disclosure Redhat +1
NVD GitHub
CVSS 4.0
8.8
EPSS
0.1%
CVE-2025-59792 MEDIUM This Month

Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks.0.0 through 2.13.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Apache Kvrocks
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-66384 HIGH This Week

app/Controller/EventsController.php in MISP before 2.5.24 has invalid logic in checking for uploaded file validity, related to tmp_name. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

PHP Information Disclosure
NVD GitHub
CVSS 3.1
8.2
EPSS
0.1%
CVE-2025-66382 LOW Monitor

In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. Rated low severity (CVSS 2.9), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Libexpat
NVD GitHub
CVSS 3.1
2.9
EPSS
0.0%
CVE-2025-64312 MEDIUM This Month

Permission control vulnerability in the file management module. Rated medium severity (CVSS 4.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Harmonyos
NVD
CVSS 3.1
4.9
EPSS
0.0%
CVE-2025-58311 MEDIUM This Month

UAF vulnerability in the USB driver module. Rated medium severity (CVSS 5.8). No vendor patch available.

Memory Corruption Information Disclosure Use After Free Emui Harmonyos
NVD
CVSS 3.1
5.8
EPSS
0.0%
CVE-2025-58308 HIGH This Week

Vulnerability of improper criterion security check in the call module. Rated high severity (CVSS 7.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Harmonyos
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-58305 MEDIUM This Month

Identity authentication bypass vulnerability in the Gallery app. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Authentication Bypass Harmonyos
NVD
CVSS 3.1
6.2
EPSS
0.0%
CVE-2025-58304 MEDIUM This Month

Permission control vulnerability in the file management module. Rated medium severity (CVSS 4.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Harmonyos
NVD
CVSS 3.1
4.9
EPSS
0.0%
CVE-2025-64314 CRITICAL Act Now

Permission control vulnerability in the memory management module. Rated critical severity (CVSS 9.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Memory Corruption Information Disclosure Harmonyos
NVD
CVSS 3.1
9.3
EPSS
0.0%
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A security vulnerability in DevTools in Google Chrome (CVSS 5.4). Remediation should follow standard vulnerability management procedures.

Google Information Disclosure Ubuntu +4
NVD
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Google Information Disclosure Memory Corruption +5
NVD
EPSS 0% CVSS 4.5
MEDIUM PATCH This Month

A remote code execution vulnerability in Apptainer (CVSS 4.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Debian Redhat +3
NVD GitHub
EPSS 0% CVSS 4.5
MEDIUM PATCH This Month

A remote code execution vulnerability (CVSS 4.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Ubuntu Debian +1
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

dcat-admin v2.2.3-beta and before is vulnerable to file inclusion in admin/src/Extend/VersionManager.php.

PHP Lfi Information Disclosure +1
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.

Information Disclosure Python Ubuntu +4
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

An out-of-bounds read vulnerability exists in the EMF functionality of PDF-XChange Co. Ltd PDF-XChange Editor 10.7.3.401. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information.

Information Disclosure Buffer Overflow Pdf Xchange Editor
NVD
EPSS 0% CVSS 5.6
MEDIUM PATCH This Month

A security vulnerability in nocobase (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD GitHub VulDB
EPSS 0% CVSS 4.9
MEDIUM PATCH This Month

A security vulnerability in Upload.am WordPress (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Information Disclosure WordPress PHP
NVD WPScan
EPSS 0% CVSS 7.2
HIGH POC This Week

A privilege escalation vulnerability (CVSS 7.2) that allows a physically proximate attacker with elevated privileges. Risk factors: public PoC available.

Information Disclosure Nshield Connect Xc High Firmware Nshield Connect Xc Base Firmware +3
NVD GitHub
EPSS 0% CVSS 4.1
MEDIUM POC This Month

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker (with elevated privileges) to read and modify the Appliance SSD contents (because they are unencrypted).

Information Disclosure Nshield Hsmi Firmware Nshield Connect Xc High Firmware +3
NVD GitHub
EPSS 0% CVSS 3.9
LOW POC Monitor

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with root access to modify the Recovery Partition (because of a lack of integrity protection).

Information Disclosure
NVD GitHub
EPSS 0% CVSS 6.8
MEDIUM POC This Month

CVE-2025-59698 is a security vulnerability (CVSS 6.8) that allows a physically proximate attacker. Risk factors: public PoC available.

Information Disclosure Nshield 5c Firmware Nshield Connect Xc Mid Firmware +3
NVD GitHub
EPSS 0% CVSS 3.2
LOW POC Monitor

CVE-2025-59696 is a security vulnerability (CVSS 3.2) that allows a physically proximate attacker. Risk factors: public PoC available.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 6.8
MEDIUM POC This Month

CVE-2025-59694 is a security vulnerability (CVSS 6.8) that allows a physically proximate attacker. Risk factors: public PoC available.

Information Disclosure Nshield Hsmi Firmware Nshield Connect Xc Base Firmware +3
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

PHP Information Disclosure Ubuntu +2
NVD
EPSS 0% CVSS 7.5
HIGH PATCH This Week

User Enumeration Vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system. The vulnerability is exploitable through the 'pda:username' parameter with 'soapaction GetUserQuestionAndAnswer' in '/WS/PDAWebService.asmx'.

Information Disclosure Gim
NVD
EPSS 0% CVSS 7.5
HIGH PATCH This Week

User Enumeration Vulnerability in TCMAN GIM v11 version 20250304. This vulnerability allows an unauthenticated attacker to determine whether a user exists on the system. The vulnerability is exploitable through the 'pda:username' parameter with 'soapaction GetLastDatePasswordChange' in '/WS/PDAWebService.asmx'.

Information Disclosure Gim
NVD
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Insertion of Sensitive Information Into Sent Data vulnerability in Argus Technology Inc. BILGER allows Choosing Message Identifier.This issue affects BILGER: before 2.4.9.

Information Disclosure Bilger
NVD
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-bounds read vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. The 'DownloadFile' function converts a parameter to an integer using 'atoi()' and then uses it as an index in the 'FilesDownload' array with '(&FilesDownload)[iVar2]'. If the parameter is too large, it will access memory beyond the limits.

Information Disclosure Buffer Overflow Sge Plc50 Firmware +1
NVD
EPSS 0% CVSS 9.1
CRITICAL Act Now

CVE-2025-41744 is a security vulnerability (CVSS 9.1) that allows an unprivileged remote attacker. Critical severity with potential for significant impact on affected systems.

Information Disclosure Sprecon E T3 Firmware Sprecon E P Firmware +1
NVD
EPSS 0% CVSS 4.0
MEDIUM PATCH This Month

Insufficient encryption strength in Sprecher Automation SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 allows a local unprivileged attacker to extract data from update images and thus obtain limited information about the architecture and internal processes.

Information Disclosure Sprecon E P Firmware Sprecon E C Firmware +1
NVD
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In gokey versions <0.2.0, a flaw in the seed decryption logic resulted in passwords incorrectly being derived solely from the initial vector and the AES-GCM authentication tag of the key seed. This issue has been fixed in gokey version 0.2.0. This is a breaking change. The fix has invalidated any passwords/secrets that were derived from the seed file (using the -s option). Even if the input seed file stays the same, version 0.2.0 gokey will generate different secrets. Impact This vulnerability impacts generated keys/secrets using a seed file as an entropy input (using the -s option). Keys/secrets generated just from the master password (without the -s option) are not impacted. The confidentiality of the seed itself is also not impacted (it is not required to regenerate the seed itself). Specific impact includes: * keys/secrets generated from a seed file may have lower entropy: it was expected that the whole seed would be used to generate keys (240 bytes of entropy input), where in vulnerable versions only 28 bytes was used * a malicious entity could have recovered all passwords, generated from a particular seed, having only the seed file in possession without the knowledge of the seed master password Patches The code logic bug has been fixed in gokey version 0.2.0 and above. Due to the deterministic nature of gokey, fixed versions will produce different passwords/secrets using seed files, as all seed entropy will be used now. System secret rotation guidance It is advised for users to regenerate passwords/secrets using the patched version of gokey (0.2.0 and above), and provision/rotate these secrets into respective systems in place of the old secret. A specific rotation procedure is system-dependent, but most common patterns are described below. Systems that do not require the old password/secret for rotation Such systems usually have a "Forgot password" facility or a similar facility allowing users to rotate their password/secrets by sending a unique "magic" link to the user's email or phone. In such cases users are advised to use this facility and input the newly generated password secret, when prompted by the system. Systems that require the old password/secret for rotation Such systems usually have a modal password rotation window usually in the user settings section requiring the user to input the old and the new password sometimes with a confirmation. To generate/recover the old password in such cases users are advised to: * temporarily download gokey version 0.1.3 https://github.com/cloudflare/gokey/releases/tag/v0.1.3 for their respective operating system to recover the old password * use gokey version 0.2.0 or above to generate the new password * populate the system provided password rotation form Systems that allow multiple credentials for the same account to be provisioned Such systems usually require a secret or a cryptographic key as a credential for access, but allow several credentials at the same time. One example is SSH: a particular user may have several authorized public keys configured on the SSH server for access. For such systems users are advised to: * generate a new secret/key/credential using gokey version 0.2.0 or above * provision the new secret/key/credential in addition to the existing credential on the system * verify that the access or required system operation is still possible with the new secret/key/credential * revoke authorization for the existing/old credential from the system Credit This vulnerability was found by Théo Cusnir ( @mister_mime https://hackerone.com/mister_mime ) and responsibly disclosed through Cloudflare's bug bounty program.

Information Disclosure Ubuntu Debian +2
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A security vulnerability in Eclipse Paho Go MQTT (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure Paho Mqtt Redhat +1
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

The Zigaform plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.6.5. This is due to the plugin exposing a public AJAX endpoint that retrieves form submission data without performing authorization checks to verify ownership or access rights. This makes it possible for unauthenticated attackers to extract sensitive form submission data including personal information, payment details, and other private data via the rocket_front_payment_seesummary action by enumerating sequential form_r_id values.

Information Disclosure WordPress PHP
NVD GitHub
EPSS 0% CVSS 8.8
HIGH This Week

Insecure Storage of Sensitive Information vulnerability in MeetMe on iOS, Android allows Retrieve Embedded Sensitive Data. This issue affects MeetMe: through v2.2.5.

Google Information Disclosure Android
NVD
EPSS 0% CVSS 4.4
MEDIUM This Month

In GPU pdma, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117741; Issue ID: MSV-4538.

Information Disclosure Android Google
NVD
EPSS 0% CVSS 6.7
MEDIUM This Month

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.

Privilege Escalation Information Disclosure Buffer Overflow +2
NVD
EPSS 0% CVSS 7.8
HIGH This Week

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4805.

Privilege Escalation Information Disclosure Buffer Overflow +2
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.

Information Disclosure Denial Of Service Buffer Overflow +2
NVD
EPSS 0% CVSS 8.4
HIGH This Week

CVE-2024-45675 is a security vulnerability (CVSS 8.4) that allows a local user. High severity vulnerability requiring prompt remediation.

Information Disclosure IBM Informix Dynamic Server
NVD
EPSS 0% CVSS 4.5
MEDIUM This Month

Improper verification of source of a communication channel in SmartTouchCall prior to version 1.0.1.1 allows remote attackers to access sensitive information. User interaction is required for triggering this vulnerability.

Information Disclosure Smart Touch Call
NVD
EPSS 0% CVSS 4.0
MEDIUM This Month

A security vulnerability in Samsung Account (CVSS 4.0) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Samsung Information Disclosure Account
NVD
EPSS 0% CVSS 4.0
MEDIUM This Month

A security vulnerability in Samsung Account (CVSS 4.0) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Samsung Information Disclosure Account
NVD
EPSS 0% CVSS 4.0
MEDIUM This Month

A security vulnerability in Samsung Cloud Assistant (CVSS 4.0) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Samsung Information Disclosure
NVD
EPSS 0% CVSS 5.9
MEDIUM This Month

A security vulnerability in Galaxy Store for Galaxy Watch (CVSS 5.9) that allows local attacker. Remediation should follow standard vulnerability management procedures.

Google Information Disclosure Galaxy Store +1
NVD
EPSS 0% CVSS 7.3
HIGH This Week

A security vulnerability in MPLocalService of MotionPhoto (CVSS 7.3) that allows local attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Motionphoto
NVD
EPSS 0% CVSS 7.3
HIGH This Week

A security vulnerability in MPRemoteService of MotionPhoto (CVSS 7.3) that allows local attackers. High severity vulnerability requiring prompt remediation.

Information Disclosure Motionphoto
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Out-of-bounds read in libimagecodec.quram.so prior to SMR Dec-2025 Release 1 allows remote attackers to access out-of-bounds memory.

Information Disclosure Buffer Overflow Android
NVD
EPSS 0% CVSS 4.2
MEDIUM This Month

Out-of-bounds read vulnerability in bootloader prior to SMR Dec-2025 Release 1 allows physical attackers to access out-of-bounds memory.

Information Disclosure Buffer Overflow Android
NVD
EPSS 0% CVSS 5.4
MEDIUM POC This Month

HackerOne community member Kassem S.(kassem_s94) has reported that username handling in Revive Adserver was still vulnerable to impersonation attacks after the fix for CVE-2025-52672, via several alternate techniques. Homoglyphs based impersonation has been independently reported by other HackerOne users, such as itz_hari_ and khoof.

Information Disclosure Revive Adserver
NVD
EPSS 0% CVSS 6.2
MEDIUM This Month

A security vulnerability in Dynamic Lockscreen (CVSS 6.2) that allows local attackers. Remediation should follow standard vulnerability management procedures.

Google Information Disclosure Android
NVD
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A security vulnerability in to forward the current HTTP request to another server. (CVSS 5.4). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Reply From Redhat
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

mdast-util-to-hast is an mdast utility to transform to hast. From 13.0.0 to before 13.2.1, multiple (unprefixed) classnames could be added in markdown source by using character references. This could make rendered user supplied markdown code elements appear like the rest of the page. This vulnerability is fixed in 13.2.1.

Information Disclosure Mdast Util To Hast Redhat +1
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

A security vulnerability in This admin (CVSS 6.5). Risk factors: public PoC available. Vendor patch is available.

Information Disclosure Grav Plugin Admin
NVD GitHub
EPSS 0% CVSS 6.2
MEDIUM POC PATCH This Month

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to privilege escalation if an attacker can crack these password hashes. This vulnerability is fixed in 1.8.0-beta.27.

Information Disclosure Privilege Escalation Grav
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, having a simple form on site can reveal the whole Grav configuration details (including plugin configuration details) by using the correct POST payload to exploit a Server-Side Template (SST) vulnerability. Sensitive information may be contained in the configuration details. This vulnerability is fixed in 1.8.0-beta.27.

Information Disclosure Grav
NVD GitHub
EPSS 1% CVSS 2.7
LOW PATCH Monitor

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

CVE-2025-51682 is a security vulnerability (CVSS 9.8) that allows an attacker. Risk factors: public PoC available.

Information Disclosure Mjobtime
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

In Search Guard FLX versions from 3.1.0 up to 4.0.0 with enterprise modules being disabled, there exists an issue which allows authenticated users to use specially crafted requests to read documents from data streams without having the respective privileges.

Information Disclosure
NVD
Awaiting Data

Rejected reason: DO NOT USE THIS CVE RECORD. No vendor patch available.

Information Disclosure
NVD
Awaiting Data

Rejected reason: DO NOT USE THIS CVE RECORD. No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

nopCommerce v4.70 and prior, and version 4.80.3, does not invalidate session cookies after logout or session termination, allowing an attacker who has a a valid session cookie access to privileged endpoints (such as /admin) even after the legitimate user has logged out, enabling session hijacking. Any version above 4.70 that is not 4.80.3 fixes the vulnerability.

Information Disclosure Nopcommerce
NVD GitHub
EPSS 0% CVSS 5.9
MEDIUM This Month

A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.

Information Disclosure Diris M 70 Firmware
NVD
EPSS 0% CVSS 6.8
MEDIUM This Month

Kerlink gateways running KerOS prior to version 5.10 expose their web interface exclusively over HTTP, without HTTPS support. This lack of transport layer security allows a man-in-the-middle attacker to intercept and modify traffic between the client and the device.

Information Disclosure Keros
NVD
EPSS 0% CVSS 6.5
MEDIUM POC This Month

FeehiCMS version 2.1.1 fails to enforce server-side immutability for parameters that are presented to clients as "read-only." An authenticated attacker can intercept and modify the parameter in transit and the backend accepts the changes. This can lead to unintended username changes.

Information Disclosure Buffer Overflow Feehicms
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM This Month

A remote code execution vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.

Information Disclosure
NVD
EPSS 0% CVSS 5.8
MEDIUM PATCH This Month

CVE-2025-49642 is a security vulnerability (CVSS 5.8). Remediation should follow standard vulnerability management procedures.

Information Disclosure Debian Suse
NVD
EPSS 0% CVSS 5.1
MEDIUM This Month

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to expose sensitive data.This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.

Information Disclosure Valhall Gpu Kernel Driver 5th Gen Gpu Architecture Kernel Driver
NVD
EPSS 0% CVSS 5.9
MEDIUM PATCH This Month

An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.

Information Disclosure Denial Of Service Buffer Overflow
NVD
EPSS 0% CVSS 7.5
HIGH PATCH This Week

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.

Information Disclosure Memory Corruption Control For Pfc100 Sl +14
NVD
EPSS 0% CVSS 7.3
HIGH POC This Week

A security vulnerability in orionsec orion-ops (CVSS 7.3). Risk factors: public PoC available.

Information Disclosure Java Orion Ops
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM POC This Month

A security vulnerability in orionsec orion-ops (CVSS 4.3). Risk factors: public PoC available.

Information Disclosure Java Orion Ops
NVD GitHub VulDB
EPSS 0% CVSS 7.3
HIGH POC This Week

A security vulnerability in nutzam NutzBoot (CVSS 7.3). Risk factors: public PoC available.

Information Disclosure Java Nutzboot
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM POC This Month

A security flaw has been discovered in nutzam NutzBoot up to 2.6.0-SNAPSHOT. The impacted element is an unknown function of the file nutzboot-demo/nutzboot-demo-simple/nutzboot-demo-simple-web3j/src/main/java/io/nutz/demo/simple/module/EthModule.java of the component Ethereum Wallet Handler. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

Information Disclosure Java
NVD GitHub VulDB
EPSS 0% CVSS 7.3
HIGH This Week

A security vulnerability in A vulnerability (CVSS 7.3). High severity vulnerability requiring prompt remediation.

Information Disclosure
NVD GitHub VulDB
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A flaw has been found in ZenTao up to 21.7.6-8564. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

PHP Information Disclosure Zentao
NVD GitHub VulDB
EPSS 0% CVSS 5.3
MEDIUM POC This Month

A security vulnerability has been detected in yungifez Skuul School Management System up to 2.6.5. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Skuul
NVD GitHub VulDB
EPSS 0% CVSS 5.0
MEDIUM This Month

In Oxide control plane 15 through 17 before 17.1, API tokens can be renewed past their expiration date. Rated medium severity (CVSS 5.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Trytond
NVD
EPSS 0% CVSS 1.0
LOW Monitor

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Rated low severity (CVSS 1.0), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure
NVD VulDB
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

OrangeHRM is a comprehensive human resource management (HRM) system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. This Exposure of Sensitive Information vulnerability could allow attackers to access sensitive data that should not be disclosed.

Information Disclosure Orangehrm
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

OrangeHRM is a comprehensive human resource management (HRM) system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Orangehrm
NVD GitHub
EPSS 0% CVSS 8.7
HIGH This Week

OrangeHRM is a comprehensive human resource management (HRM) system. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Orangehrm
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Werkzeug is a comprehensive WSGI web application library. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Information Disclosure Microsoft Werkzeug +3
NVD GitHub
EPSS 0% CVSS 6.0
MEDIUM POC PATCH This Month

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Rated medium severity (CVSS 6.0), this vulnerability is low attack complexity. Public exploit code available.

Information Disclosure Cups Redhat +1
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Kiteworks is a private data network (PDN). Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity.

Information Disclosure Kiteworks
NVD GitHub
EPSS 0% CVSS 7.1
HIGH PATCH This Week

Kiteworks MFT orchestrates end-to-end file transfer workflows. Rated high severity (CVSS 7.1), this vulnerability is low attack complexity.

Information Disclosure Kiteworks Managed File Transfer
NVD GitHub
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

Rallly is an open-source scheduling and collaboration tool. Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Information Disclosure Rallly
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM This Month

Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.3.8.0; Remote Desktop Manager: through 2025.3.23.0. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Microsoft Devolutions Server +2
NVD
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Denial Of Service Buffer Overflow Java +3
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks.0.0 through 2.13.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Apache Kvrocks
NVD
EPSS 0% CVSS 8.2
HIGH This Week

app/Controller/EventsController.php in MISP before 2.5.24 has invalid logic in checking for uploaded file validity, related to tmp_name. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

PHP Information Disclosure
NVD GitHub
EPSS 0% CVSS 2.9
LOW Monitor

In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time. Rated low severity (CVSS 2.9), this vulnerability is no authentication required. No vendor patch available.

Information Disclosure Libexpat
NVD GitHub
EPSS 0% CVSS 4.9
MEDIUM This Month

Permission control vulnerability in the file management module. Rated medium severity (CVSS 4.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 5.8
MEDIUM This Month

UAF vulnerability in the USB driver module. Rated medium severity (CVSS 5.8). No vendor patch available.

Memory Corruption Information Disclosure Use After Free +2
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Vulnerability of improper criterion security check in the call module. Rated high severity (CVSS 7.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 6.2
MEDIUM This Month

Identity authentication bypass vulnerability in the Gallery app. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Authentication Bypass Harmonyos
NVD
EPSS 0% CVSS 4.9
MEDIUM This Month

Permission control vulnerability in the file management module. Rated medium severity (CVSS 4.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Harmonyos
NVD
EPSS 0% CVSS 9.3
CRITICAL Act Now

Permission control vulnerability in the memory management module. Rated critical severity (CVSS 9.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Memory Corruption Information Disclosure Harmonyos
NVD
Prev Page 44 of 144 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy