CVE-2025-46333 - z2d is a pure Zig 2D graphics library. In version 0.6.0, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, the source surface can be completely out-of-bounds on the x-axis (but not on the y-axis) by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption. This issue is patched in version 0.6.1.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46333
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32986 - NETSCOUT nGeniusONE before 6.4.0 b2350 has a Sensitive File Accessible Without Proper Authentication to an endpoint.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32986
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32985 - NETSCOUT nGeniusONE before 6.4.0 b2350 has Hardcoded Credentials that can be obtained from JAR files.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32985
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32984 - NETSCOUT nGeniusONE before 6.4.0 b2350 allows Stored Cross-Site Scripting (XSS) via a certain POST parameter.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32984
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32983 - NETSCOUT nGeniusONE before 6.4.0 b2350 allows Technical Information Disclosure via a Stack Trace.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32983
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32982 - NETSCOUT nGeniusONE before 6.4.0 b2350 has a Broken Authorization Schema for the report module.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32982
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32981 - NETSCOUT nGeniusONE before 6.4.0 b2350 allows local users to leverage Insecure Permissions for the nGeniusCLI File.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32981
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32980 - NETSCOUT nGeniusONE before 6.4.0 b2350 has a Weak Sudo Configuration.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32980
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32979 - NETSCOUT nGeniusONE before 6.4.0 b2350 allows Arbitrary File Creation by authenticated users.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32979
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28128 - An issue in Mytel Telecom Online Account System v1.0 allows attackers to bypass the OTP verification process via a crafted request.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-28128
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3935 - ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.  The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.  This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3935
Partager : LinkedIn / Twitter / Facebook

CVE-2024-30152 - HCL SX v21 is affected by usage of a weak cryptographic algorithm. An attacker could exploit this weakness to gain access to sensitive information, modify data, or other impacts.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-30152
Partager : LinkedIn / Twitter / Facebook

CVE-2025-25775 - Codeastro Bus Ticket Booking System v1.0 is vulnerable to SQL injection via the kodetiket parameter in /BusTicket-CI/tiket/cekorder.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-25775
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3928 - Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3928
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2070 - An improper XML parsing vulnerability was reported in the FileZ client that could allow arbitrary file reads on the system if a crafted url is visited by a local user.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2070
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2069 - A cross-site scripting vulnerability was reported in the FileZ client that could allow execution of code if a crafted url is visited by a local user.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2069
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2068 - An open redirect vulnerability was reported in the FileZ client that could allow information disclosure if a crafted url is visited by a local user.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2068
Partager : LinkedIn / Twitter / Facebook

CVE-2024-56156 - Halo is an open source website building tool. Prior to version 2.20.13, a vulnerability in Halo allows attackers to bypass file type validation controls. This bypass enables the upload of malicious files including executables and HTML files, which can lead to stored cross-site scripting attacks and potential remote code execution under certain circumstances. This issue has been patched in version 2.20.13.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-56156
Partager : LinkedIn / Twitter / Facebook

CVE-2021-32601 - Rejected reason: Not used
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2021-32601
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46618 - In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46618
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46433 - In JetBrains TeamCity before 2025.03.1 improper path validation in loggingPreset parameter was possible
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46433
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46432 - In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46432
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43862 - Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43862
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43016 - In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43016
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3647 - A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3647
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3645 - A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3645
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3644 - A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3644
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3643 - A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3643
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3642 - A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3642
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3641 - A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3641
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3640 - A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3640
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3638 - A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3638
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3637 - A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3637
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3636 - A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3636
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3635 - A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3635
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3628 - A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3628
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3627 - A security vulnerability was discovered in Moodle that allows some users to access sensitive information about other students before they finish verifying their identities using two-factor authentication (2FA).
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3627
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3625 - A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA).
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3625
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32432 - Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32432
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32045 - A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32045
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32044 - A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32044
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28076 - Multiple SQL injection vulnerabilities in EasyVirt DCScope
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-28076
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3634 - A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3634
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28354 - An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-28354
Partager : LinkedIn / Twitter / Facebook

CVE-2024-57375 - Andamiro Pump It Up 20th Anniversary (aka Double X or XX/2019) 1.00.0-2.08.3 allows a physically proximate attacker to cause a denial of service (application crash) via certain deselect actions.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-57375
Partager : LinkedIn / Twitter / Facebook

CVE-2024-6199 - An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem. Customers that have not enabled Dynamic DNS on their modem are not vulnerable.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-6199
Partager : LinkedIn / Twitter / Facebook

CVE-2024-6198 - The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-6198
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3912 - The WS Form LITE – Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_config' function in all versions up to, and including, 1.10.35. This makes it possible for unauthenticated attackers to read the value of the plugin's settings, including API keys for integrated services.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3912
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2986 - IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2986
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2470 - The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the 'nsl_registration_store_extra_input' function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2470
Partager : LinkedIn / Twitter / Facebook

CVE-2024-11917 - The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-11917
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1565 - The Mayosis Core plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.4.1 via the library/wave-audio/peaks/remote_dl.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-1565
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3870 - The 1 Decembrie 1918 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.dec.2012. This is due to missing or incorrect nonce validation on the 1-decembrie-1918/1-decembrie-1918.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3870
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1279 - The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ux_cb_tools_import_item_ajax AJAX action in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-1279
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46535 - Missing Authorization vulnerability in AlphaEfficiencyTeam Custom Login and Registration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Custom Login and Registration: from n/a through 1.0.0.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46535
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46482 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MyThemeShop WP Quiz allows Stored XSS.This issue affects WP Quiz: from n/a through 2.0.10.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46482
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46617 - Quantum StorNext Web GUI API before 7.2.4 grants access to internal StorNext configuration and unauthorized modification of some software configuration parameters via undocumented user credentials. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46617
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46616 - Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46616
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3868 - The Custom Admin-Bar Favorites plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menuObject' parameter in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3868
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3867 - The Ajax Comment Form CST plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation via the 'acform_cst_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3867
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3866 - The Add Google +1 (Plus one) social share Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the google-plus-one-share-button page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3866
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3743 - The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3743
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2238 - The Vikinger theme for WordPress is vulnerable to privilege in all versions up to, and including, 1.9.30. This is due to insufficient user_meta restrictions in the 'vikinger_user_meta_update_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate their privileges to Administrator-level.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2238
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46613 - OpenPLC 3 through 64f9c11 has server.cpp Memory Corruption because a thread may access handleConnections arguments after the parent stack frame becomes unavailable.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46613
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3923 - The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3923
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3861 - The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to unauthorized access and modification of data| due to a misconfigured capability check on the 'pda_lite_custom_permission_check' function in versions 2.8.6 to 2.8.8.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to access and change the protection status of media.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3861
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3511 - Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module and CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3511
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2580 - The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2580
Partager : LinkedIn / Twitter / Facebook

CVE-2025-0671 - The Icegram Express WordPress plugin before 5.7.50 does not sanitise and escape some of its Template settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-0671
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46599 - CNCF K3s 1.32 before 1.32.4-rc1+k3s1 has a Kubernetes kubelet configuration change with the unintended consequence that, in some situations, ReadOnlyPort is set to 10255. For example, the default behavior of a K3s online installation might allow unauthenticated access to this port, exposing credentials.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46599
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3775 - The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.2 via the woolentor_template_proxy function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application, and can be used to query and modify information from internal services.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3775
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3752 - The Able Player, accessible HTML5 media player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘preload' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3752
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46595 - An XSS issue was discovered in the Flag module before 1.x-3.6.2 for Backdrop CMS. Flag is a module that allows flags to be added to nodes, comments, users, and any other type of entity. It doesn't verify flag links before performing the flag action, or verify that the response returned was provided by the flag module. This can allow crafted HTML to result in Cross Site Scripting. This is mitigated by the fact that an attacker must have a role with permission to create links on the website, for example: create or edit comments or content with a filtered text format.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46595
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46547 - In Sherpa Orchestrator 141851, the web application lacks protection against CSRF attacks, with resultant effects of an attacker conducting XSS attacks, adding a new user or role, or exploiting a SQL injection issue.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46547
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46546 - In Sherpa Orchestrator 141851, multiple time-based blind SQL injections can be performed by an authenticated user. This affects api/gui/asset/list, /api/gui/files/export/csv/, /api/gui/files/list, /api/gui/process/export/csv, /api/gui/process/export/xlsx, /api/gui/process/listAll, /api/gui/processVersion/export/csv/, /api/gui/processVersion/export/xlsx/, /api/gui/processVersion/list/, /api/gui/robot/list/, /api/gui/task/export/csv/, /api/gui/task/export/xlsx/, and /api/gui/task/list/.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46546
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46545 - In Sherpa Orchestrator 141851, the functionality for adding or updating licenses allows for stored XSS attacks by an administrator through the name parameter. The XSS payload can execute when the license expires.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46545
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46544 - In Sherpa Orchestrator 141851, a low-privileged user can elevate their privileges by creating new users and roles.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46544
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43865 - React Router is a router for React. In versions on the 7.0 branch prior to version 7.5.2, it's possible to modify pre-rendered data by adding a header to the request. This allows to completely spoof its contents and modify all the values ??of the data object passed to the HTML. This issue has been patched in version 7.5.2.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43865
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43864 - React Router is a router for React. Starting in version 7.2.0 and prior to version 7.5.2, it is possible to force an application to switch to SPA mode by adding a header to the request. If the application uses SSR and is forced to switch to SPA, this causes an error that completely corrupts the page. If a cache system is in place, this allows the response containing the error to be cached, resulting in a cache poisoning that strongly impacts the availability of the application. This issue has been patched in version 7.5.2.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43864
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3606 - Vestel AC Charger version 3.75.0 contains a vulnerability that could enable an attacker to access files containing sensitive information, such as credentials which could be used to further compromise the device.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3606
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2185 - ALBEDO Telecom Net.Time - PTP/NTP clock (Serial No. NBC0081P) software release 1.4.4 is vulnerable to an insufficient session expiration vulnerability, which could permit an attacker to transmit passwords over unencrypted connections, resulting in the product becoming vulnerable to interception.
25/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2185
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46275 - WGS-80HPT-V2 and WGS-4215-8T2S are missing authentication that could allow an attacker to create an administrator account without knowing any existing credentials.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46275
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46274 - UNI-NMS-Lite uses hard-coded credentials that could allow an unauthenticated attacker to read, manipulate and create entries in the managed database.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46274
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46273 - UNI-NMS-Lite uses hard-coded credentials that could allow an unauthenticated attacker to gain administrative privileges to all UNI-NMS managed devices.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46273
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46272 - WGS-80HPT-V2 and WGS-4215-8T2S are vulnerable to a command injection attack that could allow an unauthenticated attacker to execute OS commands on the host system.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46272
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46271 - UNI-NMS-Lite is vulnerable to a command injection attack that could allow an unauthenticated attacker to read or manipulate device data.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46271
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3749 - The Breeze Display plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘cal_size' parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3749
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1294 - The eForm - WordPress Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.18.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-1294
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43861 - ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 2f177dc, ManageWiki is vulnerable to reflected or stored XSS in the review dialog. A logged-in attacker must change a form field to include a malicious payload. If that same user then opens the "Review Changes" dialog, the payload will be rendered and executed in the context of their own session. This issue has been patched in commit 2f177dc.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43861
Partager : LinkedIn / Twitter / Facebook

CVE-2024-30127 - Missing "no cache" headers in HCL Leap permits sensitive data to be cached.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-30127
Partager : LinkedIn / Twitter / Facebook

CVE-2023-37516 - Missing "no cache" headers in HCL Leap permits user directory information to be cached.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2023-37516
Partager : LinkedIn / Twitter / Facebook

CVE-2022-44760 - Unsafe default file type filter policy in HCL Leap allows execution of unsafe JavaScript in deployed applications.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2022-44760
Partager : LinkedIn / Twitter / Facebook

CVE-2022-44759 - Improper sanitization of SVG files in HCL Leap allows client-side script injection in deployed applications.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2022-44759
Partager : LinkedIn / Twitter / Facebook

CVE-2025-26382 - Under certain circumstances the iSTAR Configuration Utility (ICU) tool could have a buffer overflow issue
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-26382
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43859 - h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43859
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43858 - YoutubeDLSharp is a wrapper for the command-line video downloaders youtube-dl and yt-dlp. In versions starting from 1.0.0-beta4 and prior to 1.1.2, an unsafe conversion of arguments allows the injection of a malicious commands when starting `yt-dlp` from a commands prompt running on Windows OS with the `UseWindowsEncodingWorkaround` value defined to true (default behavior). If a user is using built-in methods from the YoutubeDL.cs file, the value is true by default and a user cannot disable it from these methods. This issue has been patched in version 1.1.2.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-43858
Partager : LinkedIn / Twitter / Facebook

CVE-2025-31324 - SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-31324
Partager : LinkedIn / Twitter / Facebook

CVE-2024-30147 - Multiple vectors in HCL Leap allow client-side script injection in the authoring environment and deployed applications.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-30147
Partager : LinkedIn / Twitter / Facebook

CVE-2024-30114 - Insufficient sanitization in HCL Leap allows client-side script injection in the authoring environment.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-30114
Partager : LinkedIn / Twitter / Facebook

CVE-2024-30113 - Insufficient sanitization policy in HCL Leap allows client-side script injection in the deployed application through the HTML widget.
24/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-30113
Partager : LinkedIn / Twitter / Facebook

Soutenez No Hack Me sur Tipeee

Les annonces ayant été modifiées dernièrement

CVE-2025-29529 - ITC Systems Multiplan/Matrix OneCard platform v3.7.4.1002 was discovered to contain a SQL injection vulnerability via the component Forgotpassword.aspx.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29529
Partager : LinkedIn / Twitter / Facebook

CVE-2025-25777 - Insecure Direct Object Reference (IDOR) in Codeastro Bus Ticket Booking System v1.0 allows unauthorized access to user profiles. By manipulating the user ID in the URL, an attacker can access another user's profile without proper authentication or authorization checks.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-25777
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3900 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Colorbox allows Cross-Site Scripting (XSS).This issue affects Colorbox: from 0.0.0 before 2.1.3.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3900
Partager : LinkedIn / Twitter / Facebook

CVE-2025-37088 - A security vulnerability has been identified in HPE Cray Data Virtualization Service (DVS). Depending on race conditions and configuration, this vulnerability may lead to local/cluster unauthorized access.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-37088
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43946 - TCPWave DDI 11.34P1C2 allows Remote Code Execution via Unrestricted File Upload (combined with Path Traversal).
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43946
Partager : LinkedIn / Twitter / Facebook

CVE-2025-37838 - In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work. If we remove the module which will call ssi_protocol_remove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | ssip_xmit_work ssi_protocol_remove | kfree(ssi); | | struct hsi_client *cl = ssi->cl; | // use ssi Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssi_protocol_remove().
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-37838
Partager : LinkedIn / Twitter / Facebook

CVE-2025-37893 - In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Fix off-by-one error in build_prologue() Vincent reported that running BPF progs with tailcalls on LoongArch causes kernel hard lockup. Debugging the issues shows that the JITed image missing a jirl instruction at the end of the epilogue. There are two passes in JIT compiling, the first pass set the flags and the second pass generates JIT code based on those flags. With BPF progs mixing bpf2bpf and tailcalls, build_prologue() generates N insns in the first pass and then generates N+1 insns in the second pass. This makes epilogue_offset off by one and we will jump to some unexpected insn and cause lockup. Fix this by inserting a nop insn.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-37893
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29460 - An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Add Mycode function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29460
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29449 - An issue in twonav v.2.1.18-20241105 allows a remote attacker to obtain sensitive information via the link identification function.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29449
Partager : LinkedIn / Twitter / Facebook

CVE-2025-26268 - DragonflyDB Dragonfly before 1.27.0 allows authenticated users to cause a denial of service (daemon crash) via a crafted Redis command. The validity of the scan cursor was not checked.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-26268
Partager : LinkedIn / Twitter / Facebook

CVE-2024-55211 - An issue in Think Router Tk-Rt-Wr135G V3.0.2-X000 allows attackers to bypass authentication via a crafted cookie.
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-55211
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29039 - An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x41dda8
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29039
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43015 - In JetBrains RubyMine before 2025.1 remote Interpreter overwrote ports to listen on all interfaces
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43015
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29043 - An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the function 0x417234
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29043
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29042 - An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the macaddr key value to the function 0x42232c
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29042
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29041 - An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41710c
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29041
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29040 - An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the target_addr key value and the function 0x41737c
25/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29040
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28169 - BYD QIN PLUS DM-i Dilink OS v3.0_13.1.7.2204050.1 to v3.0_13.1.7.2312290.1_0 was discovered to cend broadcasts to the manufacturer's cloud server unencrypted, allowing attackers to execute a man-in-the-middle attack.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28169
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28028 - TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v5 parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28028
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28025 - TOTOLINK A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28025
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28022 - TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28022
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28021 - TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the downloadFile.cgi through the v14 and v3 parameters
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28021
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28020 - TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v25 parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28020
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28019 - TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in the downloadFile.cgi component
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28019
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28018 - TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in downloadFile.cgi through the v14 parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28018
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28017 - TOTOLINK A800R V4.1.2cu.5032_B20200408 is vulnerable to Command Injection in downloadFile.cgi via the QUERY_STRING parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28017
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46394 - In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46394
Partager : LinkedIn / Twitter / Facebook

CVE-2023-44753 - A stored cross-site scripting (XSS) vulnerability fin Student Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter on the profile.php page.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2023-44753
Partager : LinkedIn / Twitter / Facebook

CVE-2023-44752 - An issue in Student Study Center Desk Management System v1.0 allows attackers to bypass authentication via a crafted GET request to /php-sscdms/admin/login.php.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2023-44752
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3518 - It technically possible for a user to upload a file to a conversation despite the file upload functionality being disabled. The file upload functionality can be enabled or disabled for specific use cases through configuration. In case the functionality is disabled for at least one use case, the system nevertheless allows files to be uploaded through direct API requests. During the upload file, interception and allowed file type rules are still applied correctly. If file sharing is generally enabled, this issue is not of concern.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3518
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1731 - An incorrect permission assignment vulnerability in the PostgreSQL commands of the USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Modifying the system configuration is only possible if the administrator has not logged out and the token remains valid.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-1731
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29287 - An arbitrary file upload vulnerability in the ueditor component of MCMS v5.4.3 allows attackers to execute arbitrary code via uploading a crafted file.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29287
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28121 - code-projects Online Exam Mastering System 1.0 is vulnerable to Cross Site Scripting (XSS) in feedback.php via the "q" parameter allowing remote attackers to execute arbitrary code.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28121
Partager : LinkedIn / Twitter / Facebook

CVE-2024-42699 - Cross Site Scripting vulnerability in Create/Modify article function in Alkacon OpenCMS 17.0 allows remote attacker to inject javascript payload via image title sub-field in the image field
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-42699
Partager : LinkedIn / Twitter / Facebook

CVE-2024-41446 - A stored cross-site scripting (XSS) vulnerability in Alkacon OpenCMS v17.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the image parameter under the Create/Modify article function.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-41446
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3822 - A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file changepassword.php. The manipulation of the argument txtconfirm_password/txtnew_password/txtold_password leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3822
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3821 - A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file add-admin.php. The manipulation of the argument txtpassword/txtfullname/txtemail leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3821
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43929 - open_actions.py in kitty before 0.41.0 does not ask for user confirmation before running a local executable file that may have been linked from an untrusted document (e.g., a document opened in KDE ghostwriter).
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43929
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43928 - In Infodraw Media Relay Service (MRS) 7.1.0.0, the MRS web server (on port 12654) allows reading arbitrary files via ../ directory traversal in the username field. Reading ServerParameters.xml may reveal administrator credentials in cleartext or with MD5 hashing.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43928
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43921 - GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43921
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43920 - GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43920
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43919 - GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43919
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29458 - An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Change Avatar function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29458
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29457 - An issue in MyBB 1.8.38 allows a remote attacker to obtain sensitive information via the Import a Theme function. NOTE: the Supplier disputes this because of the allowed actions of Board administrators and because of SSRF mitigation.
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-29457
Partager : LinkedIn / Twitter / Facebook

CVE-2024-55238 - OpenMetadata
24/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-55238
Partager : LinkedIn / Twitter / Facebook

CVE-2025-27087 - A vulnerability in the kernel of the Cray Operating System (COS) could allow an attacker to perform a local Denial of Service (DoS) attack.
23/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-27087
Partager : LinkedIn / Twitter / Facebook

CVE-2025-37087 - A vulnerability in the cmdb service of the HPE Performance Cluster Manager (HPCM) could allow an attacker to gain access to an arbitrary file on the server host.
23/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-37087
Partager : LinkedIn / Twitter / Facebook

CVE-2024-53568 - A stored cross-site scripting (XSS) vulnerability in the Image Upload section of Volmarg Personal Management System v1.4.65 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the tag parameter.
23/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-53568
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43951 - LabVantage before LV 8.8.0.13 HF6 allows local file inclusion. Authenticated users can retrieve arbitrary files from the environment via the objectname request parameter.
23/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43951
Partager : LinkedIn / Twitter / Facebook

CVE-2025-43950 - DPMAdirektPro 4.1.5 is vulnerable to DLL Hijacking. It happens by placing a malicious DLL in a directory (in the absence of a legitimate DLL), which is then loaded by the application instead of the legitimate DLL. This causes the malicious DLL to load with the same privileges as the application, thus causing a privilege escalation.
23/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-43950
Partager : LinkedIn / Twitter / Facebook