CVE-2025-46552 - KHC-INVITATION-AUTOMATION is a GitHub automation script that automatically invites followers of a bot account to join your organization. In some commits on version 1.2, a vulnerability was identified where user data, including email addresses and Discord usernames, were exposed in API responses without proper access controls. This allowed unauthorized users to access sensitive user information by directly calling specific endpoints. This issue has been patched in a later commit on version 1.2.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46552
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3358 - Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3358
Partager : LinkedIn / Twitter / Facebook

CVE-2025-29906 - Finit is a fast init for Linux systems. Versions starting from 3.0-rc1 and prior to version 4.11 bundle an implementation of getty for the `tty` configuration directive that can bypass `/bin/login`, i.e., a user can log in as any user without authentication. This issue has been patched in version 4.11.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-29906
Partager : LinkedIn / Twitter / Facebook

CVE-2023-4377 - Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2023-4377
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46550 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the `/?BazaR` endpoint and `idformulaire` parameter are vulnerable to cross-site scripting. An attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user's session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46550
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46549 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user's session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46549
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46348 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the request to commence a site backup can be performed and downloaded without authentication. The archives are created with a predictable filename, so a malicious user could create and download an archive without being authenticated. This could result in a malicious attacker making numerous requests to create archives and fill up the file system, or by downloading the archive which contains sensitive site information. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46348
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46344 - The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions starting from 4.0.1 and prior to 4.5.1, do not invoke `.setExpirationTime` when generating a JWE token for the session. As a result, the JWE does not contain an internal expiration claim. While the session cookie may expire or be cleared, the JWE remains valid. This issue has been patched in version 4.5.1.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46344
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3910 - A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3910
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3501 - A flaw was found in Keycloak. By setting a verification policy to 'ALL', the trust store certificate verification is skipped, which is unintended.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3501
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4080 - A vulnerability has been found in PHPGurukul Online Nurse Hiring System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/view-request.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4080
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4078 - A vulnerability, which was classified as problematic, has been found in Wangshen SecGate 3600 2400. This issue affects some unknown processing of the file ?g=log_export_file. The manipulation of the argument file_name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4078
Partager : LinkedIn / Twitter / Facebook

CVE-2025-0520 - An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-0520
Partager : LinkedIn / Twitter / Facebook

CVE-2024-57698 - An issue in modernwms v.1.0 allows an attacker view the MD5 hash of the administrator password and other attributes without authentication, even after initial configuration and password change. This happens due to excessive exposure of information and the lack of adequate access control on the /user/list?culture=en-us endpoint.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-57698
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4079 - A vulnerability, which was classified as critical, was found in PCMan FTP Server up to 2.0.7. Affected is an unknown function of the component RENAME Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4079
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4095 - Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. When a MacOS configuration profile is used to enforce organization sign-in, the RAM policies are not being applied, which would allow Docker Desktop users to pull down unapproved, and potentially malicious images from any registry.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4095
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4077 - A vulnerability classified as critical was found in code-projects School Billing System 1.0. This vulnerability affects the function searchrec. The manipulation of the argument Name leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4077
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4076 - A vulnerability classified as critical has been found in LB-LINK BL-AC3600 up to 1.0.22. This affects the function easy_uci_set_option_string_0 of the file /cgi-bin/lighttpd.cgi of the component Password Handler. The manipulation of the argument routepwd leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4076
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4075 - A vulnerability was found in VMSMan up to 20250416. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument Email with the input ">alert(1) leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4075
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4074 - A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/pass-bwdates-report.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4074
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46350 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user's session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46350
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46349 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki is vulnerable to reflected XSS in the file upload form. This vulnerability allows any malicious unauthenticated user to create a link that can be clicked on by the victim to perform arbitrary actions. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46349
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46347 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, YesWiki vulnerable to remote code execution. An arbitrary file write can be used to write a file with a PHP extension, which then can be browsed to in order to execute arbitrary code on the server, resulting in a full compromise of the server. This could potentially be performed unwittingly by a user. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46347
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3911 - Recording of environment variables, configured for running containers, in Docker Desktop application logs could lead to unintentional disclosure of sensitive information such as api keys, passwords, etc. A malicious actor with read access to these logs could obtain sensitive credentials information and further use it to gain unauthorized access to other systems. Starting with version 4.41.0, Docker Desktop no longer logs environment variables set by the user.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3911
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4073 - A vulnerability was found in PHPGurukul Student Record System 3.20. It has been classified as critical. Affected is an unknown function of the file /change-password.php. The manipulation of the argument currentpassword leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4073
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4072 - A vulnerability was found in PHPGurukul Online Nurse Hiring System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/edit-nurse.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4072
Partager : LinkedIn / Twitter / Facebook

CVE-2025-45956 - A SQL injection vulnerability in manage_damage.php in Sourcecodester Computer Laboratory Management System v1.0 allows an authenticated attacker to execute arbitrary SQL commands via the "id" parameter
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-45956
Partager : LinkedIn / Twitter / Facebook

CVE-2025-23181 - CWE-250: Execution with Unnecessary Privileges
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-23181
Partager : LinkedIn / Twitter / Facebook

CVE-2025-23180 - CWE-250: Execution with Unnecessary Privileges
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-23180
Partager : LinkedIn / Twitter / Facebook

CVE-2025-0716 - Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-0716
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4071 - A vulnerability has been found in PHPGurukul COVID19 Testing Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /test-details.php. The manipulation of the argument Status leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4071
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4070 - A vulnerability, which was classified as critical, was found in PHPGurukul Rail Pass Management System 1.0. This affects an unknown part of the file /admin/changeimage.php. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4070
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4069 - A vulnerability, which was classified as critical, has been found in code-projects Product Management System 1.0. Affected by this issue is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4069
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4068 - A vulnerability classified as critical was found in code-projects Simple Movie Ticket Booking System 1.0. Affected by this vulnerability is the function changeprize. The manipulation of the argument prize leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4068
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46346 - YesWiki is a wiki system written in PHP. Prior to version 4.5.4, a stored cross-site scripting (XSS) vulnerability was discovered in the application's comments feature. This issue allows a malicious actor to inject JavaScript payloads that are stored and later executed in the browser of any user viewing the affected comment. The XSS occurs because the application fails to properly sanitize or encode user input submitted to the comments. Notably, the application sanitizes or does not allow execution of `` tags, but does not account for payloads obfuscated using JavaScript block comments like `/* JavaScriptPayload */`. This issue has been patched in version 4.5.4.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46346
Partager : LinkedIn / Twitter / Facebook

CVE-2025-40619 - Bookgy does not provide for proper authorisation control in multiple areas of the application. This deficiency could allow a malicious actor, without authentication, to reach private areas and/or areas intended for other roles.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-40619
Partager : LinkedIn / Twitter / Facebook

CVE-2025-40618 - SQL injection vulnerability in Bookgy. This vulnerability could allow an attacker to retrieve, create, update and delete databases by sending an HTTP request through the "IDRESERVA"  parameter in /bkg_imprimir_comprobante.php
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-40618
Partager : LinkedIn / Twitter / Facebook

CVE-2025-40617 - SQL injection vulnerability in Bookgy. This vulnerability could allow an attacker to retrieve, create, update and delete databases by sending an HTTP request through the "IDTIPO", "IDPISTA" and "IDSOCIO" parameters in /bkg_seleccionar_hora_ajax.php.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-40617
Partager : LinkedIn / Twitter / Facebook

CVE-2025-40616 - Reflected Cross-Site Scripting (XSS) vulnerability in Bookgy. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the "IDRESERVA" parameter in /bkg_imprimir_comprobante.php.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-40616
Partager : LinkedIn / Twitter / Facebook

CVE-2025-40615 - Reflected Cross-Site Scripting (XSS) vulnerability in Bookgy. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the "TEXTO" parameter in /api/api_ajustes.php.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-40615
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32354 - In Zimbra Collaboration (ZCS) 9.0 through 10.1, a Cross-Site Request Forgery (CSRF) vulnerability exists in the GraphQL endpoint (/service/extension/graphql) of Zimbra webmail due to a lack of CSRF token validation. This allows attackers to perform unauthorized GraphQL operations, such as modifying contacts, changing account settings, and accessing sensitive user data when an authenticated user visits a malicious website.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-32354
Partager : LinkedIn / Twitter / Facebook

CVE-2025-25962 - An issue in Coresmartcontracts Uniswap v.3.0 and fixed in v.4.0 allows a remote attacker to escalate privileges via the _modifyPosition function
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-25962
Partager : LinkedIn / Twitter / Facebook

CVE-2025-25403 - Slims (Senayan Library Management Systems) 9 Bulian V9.6.1 is vulnerable to SQL Injection in admin/modules/master_file/coll_type.php.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-25403
Partager : LinkedIn / Twitter / Facebook

CVE-2025-23179 - CWE-798: Use of Hard-coded Credentials
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-23179
Partager : LinkedIn / Twitter / Facebook

CVE-2025-23178 - CWE-923: Improper Restriction of Communication Channel to Intended Endpoints
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-23178
Partager : LinkedIn / Twitter / Facebook

CVE-2025-23177 - CWE-427: Uncontrolled Search Path Element
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-23177
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1551 - IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, and 9.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-1551
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4067 - A vulnerability classified as critical has been found in ScriptAndTools Online-Travling-System 1.0. Affected is an unknown function of the file /admin/viewpackage.php. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4067
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4066 - A vulnerability was found in ScriptAndTools Online-Travling-System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/addpackage.php. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4066
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4065 - A vulnerability was found in ScriptAndTools Online-Travling-System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/addadvertisement.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4065
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4093 - Memory safety bug present in Firefox ESR 128.9, and Thunderbird 128.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 128.10 and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4093
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4092 - Memory safety bugs present in Firefox 137 and Thunderbird 137. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 138 and Thunderbird < 138.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4092
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4091 - Memory safety bugs present in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4091
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4090 - A vulnerability existed in Firefox for Android where potentially sensitive library locations were logged via Logcat. This vulnerability affects Firefox < 138 and Thunderbird < 138.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4090
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4089 - Due to insufficient escaping of special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 138 and Thunderbird < 138.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4089
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4088 - A security vulnerability in Firefox allowed malicious sites to use redirects to send credentialed requests to arbitrary endpoints on any site that had invoked the Storage Access API. This enabled potential Cross-Site Request Forgery attacks across origins. This vulnerability affects Firefox < 138 and Thunderbird < 138.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4088
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4087 - A vulnerability was identified in Firefox where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4087
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4086 - A specially crafted filename containing a large number of encoded newline characters could obscure the file's extension when displayed in the download dialog. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 138 and Thunderbird < 138.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4086
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4085 - An attacker with control over a content process could potentially leverage the privileged UITour actor to leak sensitive information or escalate privileges. This vulnerability affects Firefox < 138 and Thunderbird < 138.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4085
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4084 - Due to insufficient escaping of the special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. *This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox ESR < 128.10, Firefox ESR < 115.23, and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4084
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4083 - A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4083
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4082 - Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. *This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4082
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4064 - A vulnerability was found in ScriptAndTools Online-Travling-System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/viewenquiry.php. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4064
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4063 - A vulnerability was found in code-projects Student Information Management System 1.0 and classified as critical. Affected by this issue is the function cancel. The manipulation of the argument first_name/last_name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4063
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4062 - A vulnerability has been found in code-projects Theater Seat Booking System 1.0 and classified as critical. Affected by this vulnerability is the function cancel. The manipulation of the argument cancelcustomername leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4062
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3301 - DPA countermeasures are unavailable for ECDH key agreement and EdDSA signing operations on Curve25519 and Curve448 on all Series 2 modules and SoCs due to a lack of hardware and software support. A successful DPA attack may result in exposure of confidential information. The best practice is to use the impacted crypto curves and operations with ephemeral keys to reduce the number of DPA traces that can be collected.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3301
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2817 - Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2817
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4061 - A vulnerability, which was classified as critical, was found in code-projects Clothing Store Management System up to 1.0. Affected is the function add_item. The manipulation of the argument st.productname leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4061
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4060 - A vulnerability, which was classified as critical, has been found in PHPGurukul Notice Board System 1.0. This issue affects some unknown processing of the file /category.php. The manipulation of the argument catname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4060
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4035 - A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4035
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4059 - A vulnerability classified as critical was found in code-projects Prison Management System 1.0. This vulnerability affects the function addrecord of the component Prison_Mgmt_Sys. The manipulation of the argument filename leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4059
Partager : LinkedIn / Twitter / Facebook

CVE-2025-4058 - A vulnerability classified as critical has been found in Projectworlds Online Examination System 1.0. This affects an unknown part of the file /Bloodgroop_process.php. The manipulation of the argument Pat_BloodGroup1 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-4058
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3929 - An XSS issue was discovered in MDaemon Email Server version 25.0.1 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window, and access user data.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3929
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3891 - A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3891
Partager : LinkedIn / Twitter / Facebook

CVE-2025-30194 - When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.9 version. A workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version. We would like to thank Charles Howes for bringing this issue to our attention.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-30194
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1194 - A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest).
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-1194
Partager : LinkedIn / Twitter / Facebook

CVE-2024-58099 - In the Linux kernel, the following vulnerability has been resolved: vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame Andrew and Nikolay reported connectivity issues with Cilium's service load-balancing in case of vmxnet3. If a BPF program for native XDP adds an encapsulation header such as IPIP and transmits the packet out the same interface, then in case of vmxnet3 a corrupted packet is being sent and subsequently dropped on the path. vmxnet3_xdp_xmit_frame() which is called e.g. via vmxnet3_run_xdp() through vmxnet3_xdp_xmit_back() calculates an incorrect DMA address: page = virt_to_page(xdpf->data); tbi->dma_addr = page_pool_get_dma_addr(page) + VMXNET3_XDP_HEADROOM; dma_sync_single_for_device(&adapter->pdev->dev, tbi->dma_addr, buf_size, DMA_TO_DEVICE); The above assumes a fixed offset (VMXNET3_XDP_HEADROOM), but the XDP BPF program could have moved xdp->data. While the passed buf_size is correct (xdpf->len), the dma_addr needs to have a dynamic offset which can be calculated as xdpf->data - (void *)xdpf, that is, xdp->data - xdp->data_hard_start.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-58099
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3452 - The SecuPress Free — WordPress Security plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'secupress_reinstall_plugins_admin_ajax_cb' function in all versions up to, and including, 2.3.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-3452
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2893 - The Gutenverse – Ultimate Block Addons and Page Builder for Site Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's countdown Block in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-2893
Partager : LinkedIn / Twitter / Facebook

CVE-2024-12273 - The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2024-12273
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46343 - n8n is a workflow automation platform. Prior to version 1.90.0, n8n is vulnerable to stored cross-site scripting (XSS) through the attachments view endpoint. n8n workflows can store and serve binary files, which are accessible to authenticated users. However, there is no restriction on the MIME type of uploaded files, and the MIME type could be controlled via a GET parameter. This allows the server to respond with any MIME type, potentially enabling malicious content to be interpreted and executed by the browser. An authenticated attacker with member-level permissions could exploit this by uploading a crafted HTML file containing malicious JavaScript. When another user visits the binary data endpoint with the MIME type set to text/html, the script executes in the context of the user's session. This script could send a request to change the user's email address in their account settings, effectively enabling account takeover. This issue has been patched in version 1.90.0.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46343
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46338 - Audiobookshelf is a self-hosted audiobook and podcast server. Prior to version 2.21.0, an improper input handling vulnerability in the `/api/upload` endpoint allows an attacker to perform a reflected cross-site scripting (XSS) attack by submitting malicious payloads in the `libraryId` field. The unsanitized input is reflected in the server's error message, enabling arbitrary JavaScript execution in a victim's browser. This issue has been patched in version 2.21.0.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46338
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46330 - libsnowflakeclient is the Snowflake Connector for C/C++. Versions starting from 0.5.0 to before 2.2.0, incorrectly treat malformed requests that caused the HTTP response status code 400, as able to be retried. This could hang the application until SF_CON_MAX_RETRY requests were sent. This issue has been patched in version 2.2.0.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46330
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46329 - libsnowflakeclient is the Snowflake Connector for C/C++. Versions starting from 0.5.0 to before 2.2.0, are vulnerable to local logging of sensitive information. When the logging level was set to DEBUG, the Connector would log locally the client-side encryption master key of the target stage during the execution of GET/PUT commands. This key by itself does not grant access to any sensitive data without additional access authorizations, and is not logged server-side by Snowflake. This issue has been patched in version 2.2.0.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46329
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46761 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46761
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46760 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46760
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46759 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46759
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46758 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46758
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46757 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46757
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46756 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46756
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46755 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46755
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46754 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46754
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46753 - Rejected reason: Not used
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-46753
Partager : LinkedIn / Twitter / Facebook

CVE-2025-31203 - An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may be able to cause a denial-of-service.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-31203
Partager : LinkedIn / Twitter / Facebook

CVE-2025-31202 - A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4. An attacker on the local network may be able to cause a denial-of-service.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-31202
Partager : LinkedIn / Twitter / Facebook

CVE-2025-31197 - The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-31197
Partager : LinkedIn / Twitter / Facebook

CVE-2025-30445 - A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-30445
Partager : LinkedIn / Twitter / Facebook

CVE-2025-24271 - An access issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-24271
Partager : LinkedIn / Twitter / Facebook

CVE-2025-24270 - This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to leak sensitive user information.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-24270
Partager : LinkedIn / Twitter / Facebook

CVE-2025-24252 - A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to corrupt process memory.
29/04/2025 | https://cve.nohackme.com/index.php?action=detail&id=CVE-2025-24252
Partager : LinkedIn / Twitter / Facebook

Soutenez No Hack Me sur Tipeee

Les annonces ayant été modifiées dernièrement

CVE-2025-4039 - A vulnerability was found in PHPGurukul Rail Pass Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/search-pass.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-4039
Partager : LinkedIn / Twitter / Facebook

CVE-2025-45953 - A vulnerability was found in PHPGurukul Hostel Management System 2.1 in the /hostel/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-45953
Partager : LinkedIn / Twitter / Facebook

CVE-2025-45949 - A critical vulnerability was found in PHPGurukul User Registration & Login and User Management System V3.3 in the /loginsystem/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely and leading to account takeover.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-45949
Partager : LinkedIn / Twitter / Facebook

CVE-2025-45947 - An issue in phpgurukul Online Banquet Booking System V1.2 allows an attacker to execute arbitrary code via the /obbs/change-password.php file of the My Account - Change Password component
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-45947
Partager : LinkedIn / Twitter / Facebook

CVE-2024-9771 - The WP-Recall WordPress plugin before 16.26.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-9771
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46673 - NASA CryptoLib before 1.3.2 does not check whether the SA is in an operational state before use, possibly leading to a bypass of the Space Data Link Security protocol (SDLS).
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46673
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46672 - NASA CryptoLib before 1.3.2 does not check the OTAR crypto function returned status, potentially leading to spacecraft hijacking.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46672
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46656 - python-markdownify (aka markdownify) before 0.14.1 allows large headline prefixes such as in addition to through . This causes memory consumption.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46656
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46655 - CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46655
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46654 - CodiMD through 2.2.0 has a CSP-based protection mechanism against XSS through uploaded JavaScript content, but it can be bypassed by uploading a .html file that references an uploaded .js file.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46654
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46653 - Formidable (aka node-formidable) 2.1.0 through 3.x before 3.5.3 relies on hexoid to prevent guessing of filenames for untrusted executable content; however, hexoid is documented as not "cryptographically secure." (Also, there is a scenario in which only the last two characters of a hexoid string need to be guessed, but this is not often relevant.) NOTE: this does not imply that, in a typical use case, attackers will be able to exploit any hexoid behavior to upload and execute their own content.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46653
Partager : LinkedIn / Twitter / Facebook

CVE-2024-53636 - An arbitrary file upload vulnerability via writefile.php of Serosoft Academia Student Information System (SIS) EagleR-1.0.118 allows attackers to execute arbitrary code via ../ in the filePath parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2024-53636
Partager : LinkedIn / Twitter / Facebook

CVE-2025-2907 - The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-2907
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32986 - NETSCOUT nGeniusONE before 6.4.0 b2350 has a Sensitive File Accessible Without Proper Authentication to an endpoint.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-32986
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32985 - NETSCOUT nGeniusONE before 6.4.0 b2350 has Hardcoded Credentials that can be obtained from JAR files.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-32985
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32982 - NETSCOUT nGeniusONE before 6.4.0 b2350 has a Broken Authorization Schema for the report module.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-32982
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32981 - NETSCOUT nGeniusONE before 6.4.0 b2350 allows local users to leverage Insecure Permissions for the nGeniusCLI File.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-32981
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32980 - NETSCOUT nGeniusONE before 6.4.0 b2350 has a Weak Sudo Configuration.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-32980
Partager : LinkedIn / Twitter / Facebook

CVE-2025-32979 - NETSCOUT nGeniusONE before 6.4.0 b2350 allows Arbitrary File Creation by authenticated users.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-32979
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3928 - Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3928
Partager : LinkedIn / Twitter / Facebook

CVE-2025-0671 - The Icegram Express WordPress plugin before 5.7.50 does not sanitise and escape some of its Template settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-0671
Partager : LinkedIn / Twitter / Facebook

CVE-2025-1976 - Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-1976
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28039 - TOTOLINK EX1200T V4.1.2cu.5232_B20210713 was found to contain a pre-auth remote command execution vulnerability in the setUpgradeFW function through the FileName parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28039
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28038 - TOTOLINK EX1200T V4.1.2cu.5232_B20210713 was found to contain a pre-auth remote command execution vulnerability in the setWebWlanIdx function through the webWlanIdx parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28038
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28036 - TOTOLINK A950RG V4.1.2cu.5161_B20200903 was found to contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28036
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28035 - TOTOLINK A830R V4.1.2cu.5182_B20201102 was found to contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28035
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28037 - TOTOLINK A810R V4.1.2cu.5182_B20201026 and A950RG V4.1.2cu.5161_B20200903 were found to contain a pre-auth remote command execution vulnerability in the setDiagnosisCfg function through the ipDomain parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28037
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28031 - TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a hardcoded password for the telnet service in product.ini.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28031
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28030 - TOTOLINK A810R V4.1.2cu.5182_B20201026 was discovered to contain a stack overflow via the startTime and endTime parameters in setParentalRules function.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28030
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28024 - TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerability in the cstecgi.cgi
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28024
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28034 - TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth remote command execution vulnerability in the NTPSyncWithHost function through the hostTime parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28034
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28033 - TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 were found to contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpTo parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28033
Partager : LinkedIn / Twitter / Facebook

CVE-2025-28032 - TOTOLINK A800R V4.1.2cu.5137_B20200730, A810R V4.1.2cu.5182_B20201026, A830R V4.1.2cu.5182_B20201102, A950RG V4.1.2cu.5161_B20200903, A3000RU V5.9c.5185_B20201128, and A3100R V4.1.2cu.5247_B20211129 contain a pre-auth buffer overflow vulnerability in the setNoticeCfg function through the IpForm parameter.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-28032
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46247 - Missing Authorization vulnerability in codepeople Appointment Booking Calendar allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Appointment Booking Calendar: from n/a through 1.3.92.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46247
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46246 - Cross-Site Request Forgery (CSRF) vulnerability in CreativeMindsSolutions CM Answers allows Cross Site Request Forgery. This issue affects CM Answers: from n/a through 3.3.3.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46246
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46245 - Cross-Site Request Forgery (CSRF) vulnerability in CreativeMindsSolutions CM Ad Changer allows Cross Site Request Forgery. This issue affects CM Ad Changer: from n/a through 2.0.5.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46245
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46244 - Missing Authorization vulnerability in Dotstore Advanced Linked Variations for Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Advanced Linked Variations for Woocommerce: from n/a through 1.0.3.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46244
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46243 - Cross-Site Request Forgery (CSRF) vulnerability in sonalsinha21 Recover abandoned cart for WooCommerce allows Cross Site Request Forgery. This issue affects Recover abandoned cart for WooCommerce: from n/a through 2.2.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46243
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46242 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bob Watu Quiz allows SQL Injection. This issue affects Watu Quiz: from n/a through 3.4.3.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46242
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46241 - Cross-Site Request Forgery (CSRF) vulnerability in codepeople Appointment Booking Calendar allows SQL Injection. This issue affects Appointment Booking Calendar: from n/a through 1.3.92.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46241
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46240 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeff Starr Simple Download Counter allows Stored XSS. This issue affects Simple Download Counter: from n/a through 2.2.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46240
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46239 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeff Starr Theme Switcha allows Stored XSS. This issue affects Theme Switcha: from n/a through 3.4.
29/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46239
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46690 - Ververica Platform 2.14.0 allows low-privileged users to access SQL connectors via a direct namespaces/default/formats request.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46690
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46689 - Ververica Platform 2.14.0 contain an Reflected XSS vulnerability via a namespaces/default/formats URI.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46689
Partager : LinkedIn / Twitter / Facebook

CVE-2025-46688 - quickjs-ng through 0.9.0 has an incorrect size calculation in JS_ReadBigInt for a BigInt, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-46688
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3982 - A vulnerability, which was classified as problematic, was found in nortikin Sverchok 1.3.0. Affected is the function SvSetPropNodeMK2 of the file sverchok/nodes/object_nodes/getsetprop_mk2.py of the component Set Property Mk2 Node. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3982
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3981 - A vulnerability, which was classified as problematic, has been found in wowjoy ?????????????? Internet Doctor Workstation System 1.0. This issue affects some unknown processing of the file /v1/prescription/details/. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3981
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3980 - A vulnerability classified as problematic was found in wowjoy ?????????????? Internet Doctor Workstation System 1.0. This vulnerability affects unknown code of the file /v1/prescription/list. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3980
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3979 - A vulnerability classified as problematic has been found in dazhouda lecms 3.0.3. This affects an unknown part of the file /index.php?my-password-ajax-1 of the component Password Change Handler. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3979
Partager : LinkedIn / Twitter / Facebook

CVE-2025-3978 - A vulnerability was found in dazhouda lecms 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/view/default/user_set.htm. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
28/04/2025 | https://nvd.nist.gov/vuln/detail/CVE-2025-3978
Partager : LinkedIn / Twitter / Facebook