High Vulnerabilities
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info |
|---|---|---|---|---|
| 1000projects–Beauty Parlour Management System | A vulnerability was identified in 1000projects Beauty Parlour Management System 1.0. This affects an unknown function of the file /admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. | 2025-09-03 | 7.3 | CVE-2025-9919 |
| 1000projects–Beauty Parlour Management System | A security vulnerability has been detected in 1000projects Beauty Parlour Management System 1.0. This impacts an unknown function of the file /admin/contact-us.php. The manipulation of the argument mobnumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. | 2025-09-03 | 7.3 | CVE-2025-9930 |
| aakash1911–WP likes | Cross-Site Request Forgery (CSRF) vulnerability in aakash1911 WP likes allows Reflected XSS. This issue affects WP likes: from n/a through 3.1.1. | 2025-09-05 | 7.1 | CVE-2025-58848 |
| Akinsoft–e-Mutabakat | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft e-Mutabakat allows Authentication Bypass.This issue affects e-Mutabakat: from 2.02.06 before v2.02.06. | 2025-09-04 | 8.6 | CVE-2025-2417 |
| Akinsoft–LimonDesk | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft LimonDesk allows Authentication Bypass.This issue affects LimonDesk: from s1.02.14 before v1.02.17. | 2025-09-03 | 8.6 | CVE-2025-2416 |
| Akinsoft–LimonDesk | Origin Validation Error vulnerability in Akinsoft LimonDesk allows Forceful Browsing.This issue affects LimonDesk: from s1.02.14 before v1.02.17. | 2025-09-03 | 7.3 | CVE-2024-13068 |
| Akinsoft–MyRezzta | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft MyRezzta allows Authentication Bypass, Password Recovery Exploitation, Brute Force.This issue affects MyRezzta: from s2.03.01 before v2.05.01. | 2025-09-03 | 9.8 | CVE-2025-1740 |
| Akinsoft–MyRezzta | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft MyRezzta allows Authentication Bypass.This issue affects MyRezzta: from s2.03.01 before v2.05.01. | 2025-09-03 | 8.6 | CVE-2025-2415 |
| Akinsoft–OctoCloud | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft OctoCloud allows Authentication Bypass.This issue affects OctoCloud: from s1.09.03 before v1.11.01. | 2025-09-02 | 8.6 | CVE-2025-2414 |
| Akinsoft–ProKuafor | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft ProKuafor allows Authentication Bypass.This issue affects ProKuafor: from s1.02.08 before v1.02.08. | 2025-09-02 | 8.6 | CVE-2025-2413 |
| Akinsoft–QR Menu | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft QR Menu allows Authentication Bypass.This issue affects QR Menu: from s1.05.07 before v1.05.12. | 2025-09-01 | 8.6 | CVE-2025-2412 |
| Akinsoft–TaskPano | Improper Restriction of Excessive Authentication Attempts vulnerability in Akinsoft TaskPano allows Authentication Bypass.This issue affects TaskPano: from s1.06.04 before v1.06.06. | 2025-09-04 | 8.6 | CVE-2025-2411 |
| Aknsoft–QR Men | Cross-Site Request Forgery (CSRF) vulnerability in Akınsoft QR Menü allows Cross Site Request Forgery.This issue affects QR Menü: from s1.05.06 before v1.05.12. | 2025-09-01 | 8.6 | CVE-2025-0610 |
| Aknsoft–QR Men | Improper Validation of Certificate with Host Mismatch vulnerability in Akınsoft QR Menü allows HTTP Response Splitting.This issue affects QR Menü: from s1.05.05 before v1.05.12. | 2025-09-01 | 7.3 | CVE-2024-12925 |
| alaneuler–batteryKid | A weakness has been identified in alaneuler batteryKid up to 2.1 on macOS. The affected element is an unknown function of the file PrivilegeHelper/PrivilegeHelper.swift of the component NSXPCListener. This manipulation causes missing authentication. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be exploited. | 2025-09-02 | 7.8 | CVE-2025-9815 |
| AMD–AMD EPYC 9005 Series Processors | Improper cleanup in AMD CPU microcode patch loading could allow an attacker with local administrator privilege to load malicious CPU microcode, potentially resulting in loss of integrity of x86 instruction execution. | 2025-09-06 | 7.2 | CVE-2025-0032 |
| AMD–AMD Radeon RX 7000 Series Graphics Products | Type confusion in the ASP could allow an attacker to pass a malformed argument to the Reliability, Availability, and Serviceability trusted application (RAS TA) potentially leading to a read or write to shared memory resulting in loss of confidentiality, integrity, or availability. | 2025-09-06 | 8.7 | CVE-2023-31322 |
| AMD–AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics | Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution. | 2025-09-06 | 8.8 | CVE-2024-36342 |
| AMD–AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics | Improper input validation in the AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary writes or denial of service. | 2025-09-06 | 8.4 | CVE-2024-36352 |
| AMD–AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics | Insufficient bounds checking in AMD TEE (Trusted Execution Environment) could allow an attacker with a compromised userspace to invoke a command with malformed arguments leading to out of bounds memory access, potentially resulting in loss of integrity or availability. | 2025-09-05 | 7.9 | CVE-2021-26383 |
| AMD–AMD Ryzen 7040 Series Mobile Processors with Radeon Graphics | Missing authorization in AMD RomArmor could allow an attacker to bypass ROMArmor protections during system resume from a standby state, potentially resulting in a loss of confidentiality and integrity. | 2025-09-06 | 8.4 | CVE-2024-36326 |
| AMD–AMD Ryzen 8000 Series Desktop Processors | Improper isolation of shared resources on System-on-a-chip (SOC) could a privileged attacker to tamper with the contents of the PSP reserved DRAM region potentially resulting in loss of confidentiality and integrity. | 2025-09-06 | 7.2 | CVE-2023-31325 |
| AMD–AMD Ryzen Threadripper 3000 Processors | Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory potentially resulting in arbitrary code execution at the SMM level. | 2025-09-06 | 7.5 | CVE-2024-21947 |
| AMD–AMD Ryzen Threadripper 3000 Processors | Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary code execution at the SMM level. | 2025-09-06 | 7.5 | CVE-2024-36354 |
| argoproj–argo-cd | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the token only has standard application management permissions and no explicit access to secrets. This vulnerability does not only affect project-level permissions. Any token with project get permissions is also vulnerable, including global permissions such as: `p, role/user, projects, get, *, allow`. This issue is fixed in versions 2.13.9, 2.14.16, 3.0.14 and 3.1.2. | 2025-09-04 | 10 | CVE-2025-55190 |
| aThemeArt Translations–eDS Responsive Menu | Deserialization of Untrusted Data vulnerability in aThemeArt Translations eDS Responsive Menu allows Object Injection. This issue affects eDS Responsive Menu: from n/a through 1.2. | 2025-09-05 | 7.2 | CVE-2025-58839 |
| Brent Jett–Assistant | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Brent Jett Assistant allows Reflected XSS. This issue affects Assistant: from n/a through 1.5.2. | 2025-09-05 | 7.1 | CVE-2025-53307 |
| BuddyDev–MediaPress | Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in BuddyDev MediaPress allows PHP Local File Inclusion. This issue affects MediaPress: from n/a through 1.5.9.1. | 2025-09-03 | 7.5 | CVE-2025-58608 |
| Campcodes–Computer Sales and Inventory System | A flaw has been found in Campcodes Computer Sales and Inventory System 1.0. The affected element is an unknown function of the file /pages/pos_transac.php?action=add. Executing manipulation of the argument cash/firstname can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. Other parameters might be affected as well. | 2025-09-01 | 7.3 | CVE-2025-9794 |
| Campcodes–Courier Management System | A vulnerability was determined in Campcodes/SourceCodester Courier Management System 1.0. Affected is the function Login of the file /ajax.php. This manipulation of the argument email causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-01 | 7.3 | CVE-2025-9757 |
| Campcodes–Courier Management System | A security flaw has been discovered in Campcodes/SourceCodester Courier Management System 1.0. Affected by this issue is the function Signup of the file /ajax.php. Performing manipulation of the argument lastname results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. | 2025-09-01 | 7.3 | CVE-2025-9759 |
| Campcodes–Farm Management System | A vulnerability was found in Campcodes Farm Management System 1.0. This affects an unknown part of the file /reviewInput.php. Performing manipulation of the argument rating results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. | 2025-09-02 | 7.3 | CVE-2025-9811 |
| Campcodes–Grocery Sales and Inventory System | A weakness has been identified in Campcodes Grocery Sales and Inventory System 1.0. This issue affects some unknown processing of the file /ajax.php?action=save_receiving. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. | 2025-09-06 | 7.3 | CVE-2025-10030 |
| Campcodes–Grocery Sales and Inventory System | A security vulnerability has been detected in Campcodes Grocery Sales and Inventory System 1.0. Impacted is an unknown function of the file /ajax.php?action=delete_sales. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. | 2025-09-06 | 7.3 | CVE-2025-10031 |
| Campcodes–Hospital Management System | A weakness has been identified in Campcodes Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ of the component Admin Dashboard Login. This manipulation of the argument Password causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. | 2025-09-01 | 7.3 | CVE-2025-9770 |
| Campcodes–Online Feeds Product Inventory System | A security vulnerability has been detected in Campcodes Online Feeds Product Inventory System 1.0. This vulnerability affects unknown code of the file /feeds/index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. | 2025-09-01 | 7.3 | CVE-2025-9761 |
| Campcodes–Online Learning Management System | A vulnerability was detected in Campcodes Online Learning Management System 1.0. This issue affects some unknown processing of the file /student_signup.php. The manipulation of the argument Username results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. | 2025-09-01 | 7.3 | CVE-2025-9763 |
| Campcodes–Online Learning Management System | A vulnerability was found in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /teacher_signup.php. Performing manipulation of the argument firstname results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Other parameters might be affected as well. | 2025-09-01 | 7.3 | CVE-2025-9786 |
| charmbracelet–soft-serve | Soft Serve is a self-hostable Git server for the command line. In versions 0.9.1 and below, attackers can create or override arbitrary files with uncontrolled data through its SSH API. This issue is fixed in version 0.10.0. | 2025-09-03 | 7.7 | CVE-2025-58355 |
| ChrisHurst–Bulk Watermark | Cross-Site Request Forgery (CSRF) vulnerability in ChrisHurst Bulk Watermark allows Reflected XSS. This issue affects Bulk Watermark: from n/a through 1.6.10. | 2025-09-05 | 7.1 | CVE-2025-58845 |
| cloudinfrastructureservices–Cloud SAML SSO Single Sign On Login | The Cloud SAML SSO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘set_organization_settings’ action of the csso_handle_actions() function in all versions up to, and including, 1.0.19. The handler reads client-supplied POST parameters for organization settings and passes them directly to update_option() without any check of the user’s capabilities or a CSRF nonce. This makes it possible for unauthenticated attackers to change critical configuration (including toggling signing and encryption), potentially breaking the SSO flow and causing a denial-of-service. | 2025-09-06 | 8.2 | CVE-2025-7040 |
| coder–coder | Coder allows organizations to provision remote development environments via Terraform. In versions 2.22.0 through 2.24.3, 2.25.0 and 2.25.1, Coder can be compromised through insecure session handling in prebuilt workspaces. Coder automatically generates a session token for a user when a workspace is started. It is automatically exposed via coder_workspace_owner.session_token. Prebuilt workspaces are initially owned by a built-in prebuilds system user. When a prebuilt workspace is claimed, a new session token is generated for the user that claimed the workspace, but the previous session token for the prebuilds user was not expired. Any Coder workspace templates that persist this automatically generated session token are potentially impacted. This is fixed in versions 2.24.4 and 2.25.2. | 2025-09-06 | 8.1 | CVE-2025-58437 |
| CreedAlly–Bulk Featured Image | Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.2. | 2025-09-05 | 9.1 | CVE-2025-58819 |
| D-Link–DI-8400 | A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. | 2025-09-03 | 8.8 | CVE-2025-9938 |
| D-Link–DIR-825 | A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. | 2025-09-06 | 8.8 | CVE-2025-10034 |
| D-Link–DIR-852 | A security vulnerability has been detected in D-Link DIR-852 1.00CN B09. Impacted is the function soapcgi_main of the file soap.cgi of the component SOAP Service. Such manipulation of the argument service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | 2025-09-01 | 7.3 | CVE-2025-9752 |
| David Merinas–Add to Feedly | Cross-Site Request Forgery (CSRF) vulnerability in David Merinas Add to Feedly allows Stored XSS. This issue affects Add to Feedly: from n/a through 1.2.11. | 2025-09-05 | 7.1 | CVE-2025-58859 |
| David Merinas–Auto Last Youtube Video | Cross-Site Request Forgery (CSRF) vulnerability in David Merinas Auto Last Youtube Video allows Stored XSS. This issue affects Auto Last Youtube Video: from n/a through 1.0.7. | 2025-09-05 | 7.1 | CVE-2025-58843 |
| Deepak S–Hide Real Download Path | Cross-Site Request Forgery (CSRF) vulnerability in Deepak S Hide Real Download Path allows Stored XSS. This issue affects Hide Real Download Path: from n/a through 1.6. | 2025-09-05 | 7.1 | CVE-2025-58849 |
| Dejan Markovic–WordPress Buffer HYPESocial. Social Media Auto Post, Social Media Auto Publish and Schedule | Cross-Site Request Forgery (CSRF) vulnerability in Dejan Markovic WordPress Buffer – HYPESocial. Social Media Auto Post, Social Media Auto Publish and Schedule allows Reflected XSS. This issue affects WordPress Buffer – HYPESocial. Social Media Auto Post, Social Media Auto Publish and Schedule: from n/a through 2020.1.0. | 2025-09-05 | 7.1 | CVE-2025-58846 |
| Denis V (Artprima)–AP HoneyPot WordPress Plugin | Improper Neutralization of Formula Elements in a CSV File vulnerability in Denis V (Artprima) AP HoneyPot WordPress Plugin allows Reflected XSS. This issue affects AP HoneyPot WordPress Plugin: from n/a through 1.4. | 2025-09-05 | 7.1 | CVE-2025-58855 |
| Digilent–DASYLab | There is an out of bounds write vulnerability due to improper bounds checking resulting in invalid data when parsing a DSB file with Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-57774 |
| Digilent–DASYLab | There is a heap-based Buffer Overflow vulnerability due to improper bounds checking when parsing a DSB file with Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-57775 |
| Digilent–DASYLab | There is an out of bounds write vulnerability due to improper bounds checking resulting in an invalid address when parsing a DSB file with Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-57776 |
| Digilent–DASYLab | There is an out of bounds write vulnerability due to improper bounds checking in displ2.dll when parsing a DSB file with Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-57777 |
| Digilent–DASYLab | There is an out of bounds write vulnerability due to improper bounds checking resulting in an invalid source address when parsing a DSB file with Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-57778 |
| Digilent–DASYLab | There is a deserialization of untrusted data vulnerability in Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-9188 |
| Digilent–DASYLab | There is an out of bounds write vulnerability due to improper bounds checking resulting in a large destination address when parsing a DSB file with Digilent DASYLab. This vulnerability may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted DSB file. The vulnerability affects all versions of DASYLab. | 2025-09-02 | 7.8 | CVE-2025-9189 |
| djangoproject–Django | An issue was discovered in Django 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. FilteredRelation is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed QuerySet.annotate() or QuerySet.alias(). | 2025-09-03 | 7.1 | CVE-2025-57833 |
| docjojo–atec Debug | The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the ‘custom_log’ parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server. | 2025-09-04 | 7.2 | CVE-2025-9517 |
| docjojo–atec Debug | The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the ‘debug_path’ parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | 2025-09-04 | 7.2 | CVE-2025-9518 |
| Dsingh–Purge Varnish Cache | Cross-Site Request Forgery (CSRF) vulnerability in Dsingh Purge Varnish Cache allows Stored XSS. This issue affects Purge Varnish Cache: from n/a through 2.6. | 2025-09-05 | 7.1 | CVE-2025-58807 |
| ECOVACS–DEEBOT X1 Series | ECOVACS vacuum robot base stations do not validate firmware updates, so malicious over-the-air updates can be sent to base station via insecure connection between robot and base station. | 2025-09-05 | 7.2 | CVE-2025-30199 |
| Endress+Hauser–Promag 10 with HART | A low-privileged attacker in bluetooth range may be able to access the password of a higher-privilege user (Maintenance) by viewing the device’s event log. This vulnerability could allow the Operator to authenticate as the Maintenance user, thereby gaining unauthorized access to sensitive configuration settings and the ability to modify device parameters. | 2025-09-02 | 7.4 | CVE-2025-41690 |
| enituretechnology–LTL Freight Quotes – TQL Edition | Deserialization of Untrusted Data vulnerability in enituretechnology LTL Freight Quotes – TQL Edition allows Object Injection. This issue affects LTL Freight Quotes – TQL Edition: from n/a through 1.2.6. | 2025-09-03 | 7.2 | CVE-2025-58644 |
| enituretechnology–LTL Freight Quotes Day & Ross Edition | Deserialization of Untrusted Data vulnerability in enituretechnology LTL Freight Quotes – Day & Ross Edition allows Object Injection. This issue affects LTL Freight Quotes – Day & Ross Edition: from n/a through 2.1.11. | 2025-09-03 | 7.2 | CVE-2025-58642 |
| enituretechnology–LTL Freight Quotes Daylight Edition | Deserialization of Untrusted Data vulnerability in enituretechnology LTL Freight Quotes – Daylight Edition allows Object Injection. This issue affects LTL Freight Quotes – Daylight Edition: from n/a through 2.2.7. | 2025-09-03 | 7.2 | CVE-2025-58643 |
| envoyproxy–envoy | Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. Versions 1.34.0 through 1.34.4 and 1.35.0 contain a use-after-free (UAF) vulnerability in the DNS cache, causing abnormal process termination. The vulnerability is in Envoy’s Dynamic Forward Proxy implementation, occurring when a completion callback for a DNS resolution triggers new DNS resolutions or removes existing pending resolutions. This condition may occur when the following conditions are met: dynamic Forwarding Filter is enabled, the `envoy.reloadable_features.dfp_cluster_resolves_hosts` runtime flag is enabled, and the Host header is modified between the Dynamic Forwarding Filter and Router filters. This issue is resolved in versions 1.34.5 and 1.35.1. To work around this issue, set the envoy.reloadable_features.dfp_cluster_resolves_hosts runtime flag to false. | 2025-09-02 | 7.5 | CVE-2025-54588 |
| ericzane–Floating Window Music Player | Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2. | 2025-09-05 | 7.1 | CVE-2025-48104 |
| esphome–esphome | ESPHome is a system to control microcontrollers remotely through Home Automation systems. In version 2025.8.0 in the ESP-IDF platform, ESPHome’s web_server authentication check can pass incorrectly when the client-supplied base64-encoded Authorization value is empty or is a substring of the correct value. This allows access to web_server functionality (including OTA, if enabled) without knowing any information about the correct username or password. This issue has been patched in version 2025.8.1. | 2025-09-02 | 8.1 | CVE-2025-57808 |
| ExpressTech Systems–Quiz And Survey Master | Deserialization of Untrusted Data vulnerability in ExpressTech Systems Quiz And Survey Master allows Object Injection. This issue affects Quiz And Survey Master: from n/a through 10.2.5. | 2025-09-05 | 9.8 | CVE-2025-49401 |
| flightphp–core | The mikecao/flight PHP framework in versions prior to v1.2 is vulnerable to Denial of Service (DoS) attacks due to eager loading of request bodies in the Request class constructor. The framework automatically reads the entire request body on every HTTP request, regardless of whether the application needs it. An attacker can exploit this by sending requests with large payloads, causing excessive memory consumption and potentially exhausting available server memory, leading to application crashes or service unavailability. The vulnerability was fixed in v1.2 by implementing lazy loading of request bodies. | 2025-09-03 | 7.5 | CVE-2014-125127 |
| frappe–erpnext | ERP is a free and open source Enterprise Resource Planning tool. In versions below 14.89.2 and 15.0.0 through 15.75.1, lack of validation of parameters left certain endpoints vulnerable to error-based SQL Injection. Some information like version could be retrieved. This issue is fixed in versions 14.89.2 and 15.76.0. | 2025-09-06 | 8.1 | CVE-2025-58439 |
| Fuji Electric–FRENIC-Loader 4 | Fuji Electric FRENIC-Loader 4 is vulnerable to a deserialization of untrusted data when importing a file through a specified window, which may allow an attacker to execute arbitrary code. | 2025-09-03 | 7.8 | CVE-2025-9365 |
| gavias–Indutri | Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in gavias Indutri allows PHP Local File Inclusion. This issue affects Indutri: from n/a through n/a. | 2025-09-05 | 8.1 | CVE-2025-58214 |
| gopiplus–New Simple Gallery | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in gopiplus New Simple Gallery allows Blind SQL Injection. This issue affects New Simple Gallery: from n/a through 8.0. | 2025-09-05 | 8.5 | CVE-2025-58881 |
| HCL Software–Compass | A security vulnerability in HCL Compass can allow attacker to gain unauthorized database access. | 2025-09-03 | 7.5 | CVE-2025-0280 |
| honojs–hono | Hono is a Web application framework that provides support for any JavaScript runtime. Versions 4.8.0 through 4.9.5 contain a flaw in the getPath utility function which could allow path confusion and potential bypass of proxy-level ACLs (e.g. Nginx location blocks). The original implementation relied on fixed character offsets when parsing request URLs. Under certain malformed absolute-form Request-URIs, this could lead to incorrect path extraction depending on the application and environment. If proxy ACLs are used to protect sensitive endpoints such as /admin, this flaw could have allowed unauthorized access. The confidentiality impact depends on what data is exposed: if sensitive administrative data is exposed, the impact may be high, otherwise it may be moderate. This issue is fixed in version 4.9.6. | 2025-09-04 | 7.5 | CVE-2025-58362 |
| Huawei–HarmonyOS | Vulnerability of exposing object heap addresses in the Ark eTS module. Impact: Successful exploitation of this vulnerability may affect availability. | 2025-09-05 | 8.4 | CVE-2025-58280 |
| Huawei–HarmonyOS | Out-of-bounds read vulnerability in the runtime interpreter module. Impact: Successful exploitation of this vulnerability may affect availability. | 2025-09-05 | 8.4 | CVE-2025-58281 |
| Huawei–HarmonyOS | Race condition vulnerability in the audio module. Impact: Successful exploitation of this vulnerability may affect function stability. | 2025-09-05 | 7.5 | CVE-2025-58296 |
| IBM–Transformation Advisor | IBM Transformation Advisor 2.0.1 through 4.3.1 incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Transformation Advisor Operator Catalog image. | 2025-09-03 | 8.4 | CVE-2025-36193 |
| imjoehaines–WordPress Error Monitoring by Bugsnag | Cross-Site Request Forgery (CSRF) vulnerability in imjoehaines WordPress Error Monitoring by Bugsnag allows Stored XSS. This issue affects WordPress Error Monitoring by Bugsnag: from n/a through 1.6.3. | 2025-09-05 | 7.1 | CVE-2025-58806 |
| immonex–immonex Kickstart | Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in immonex immonex Kickstart allows PHP Local File Inclusion. This issue affects immonex Kickstart: from n/a through 1.11.6. | 2025-09-03 | 7.5 | CVE-2025-58637 |
| InspiryThemes–RealHomes | Incorrect Privilege Assignment vulnerability in InspiryThemes RealHomes allows Privilege Escalation.This issue affects RealHomes: from n/a through 4.3.6. | 2025-09-03 | 9.8 | CVE-2024-32444 |
| integromat–Make Connector | The Make Connector plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the ‘upload_media’ function in all versions up to, and including, 1.5.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. | 2025-09-04 | 7.2 | CVE-2025-6085 |
| INVELITY–Invelity MyGLS connect | Cross-Site Request Forgery (CSRF) vulnerability in INVELITY Invelity MyGLS connect allows Object Injection. This issue affects Invelity MyGLS connect: from n/a through 1.1.1. | 2025-09-05 | 8.8 | CVE-2025-58833 |
| itsourcecode–Apartment Management System | A security vulnerability has been detected in itsourcecode Apartment Management System 1.0. This issue affects some unknown processing of the file /e_dashboard/e_all_info.php. Such manipulation of the argument mid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. | 2025-09-01 | 7.3 | CVE-2025-9792 |
| itsourcecode–Apartment Management System | A vulnerability was detected in itsourcecode Apartment Management System 1.0. Impacted is an unknown function of the file /setting/admin.php of the component Setting Handler. Performing manipulation of the argument ddlBranch results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. | 2025-09-01 | 7.3 | CVE-2025-9793 |
| itsourcecode–Online Discussion Forum | A vulnerability has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown function of the file /admin. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. | 2025-09-06 | 7.3 | CVE-2025-10033 |
| itsourcecode–Online Discussion Forum | A flaw has been found in itsourcecode Online Discussion Forum 1.0. This affects an unknown function of the file /admin/admin_forum/add_views.php. Executing manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. | 2025-09-07 | 7.3 | CVE-2025-10068 |
| itsourcecode–Sports Management System | A flaw has been found in itsourcecode Sports Management System 1.0. Impacted is an unknown function of the file /Admin/resultdetails.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. | 2025-09-01 | 7.3 | CVE-2025-9764 |
| itsourcecode–Sports Management System | A vulnerability has been found in itsourcecode Sports Management System 1.0. The affected element is an unknown function of the file /Admin/tournament_details.php. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | 2025-09-01 | 7.3 | CVE-2025-9765 |
| itsourcecode–Sports Management System | A vulnerability was found in itsourcecode Sports Management System 1.0. The impacted element is an unknown function of the file /Admin/facilitator.php. Performing manipulation of the argument code results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. | 2025-09-01 | 7.3 | CVE-2025-9766 |
| itsourcecode–Sports Management System | A vulnerability was determined in itsourcecode Sports Management System 1.0. This affects an unknown function of the file /Admin/sporttype.php. Executing manipulation of the argument code can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-01 | 7.3 | CVE-2025-9767 |
| itsourcecode–Student Information Management System | A vulnerability was determined in itsourcecode Student Information Management System 1.0. This affects an unknown part of the file /admin/login.php. Executing manipulation of the argument uname can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-06 | 7.3 | CVE-2025-10062 |
| itsourcecode–Student Information Management System | A vulnerability was determined in itsourcecode Student Information Management System 1.0. This issue affects some unknown processing of the file /admin/modules/student/index.php. This manipulation of the argument studentId causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-02 | 7.3 | CVE-2025-9837 |
| itsourcecode–Student Information Management System | A vulnerability was identified in itsourcecode Student Information Management System 1.0. Impacted is an unknown function of the file /admin/modules/subject/index.php. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. | 2025-09-02 | 7.3 | CVE-2025-9838 |
| itsourcecode–Student Information Management System | A security flaw has been discovered in itsourcecode Student Information Management System 1.0. The affected element is an unknown function of the file /admin/modules/course/index.php. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. | 2025-09-02 | 7.3 | CVE-2025-9839 |
| KaizenCoders–Enable Latex | Cross-Site Request Forgery (CSRF) vulnerability in KaizenCoders Enable Latex allows Stored XSS. This issue affects Enable Latex: from n/a through 1.2.16. | 2025-09-05 | 7.1 | CVE-2025-58860 |
| KaizenCoders–Table of content | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in KaizenCoders Table of content allows Stored XSS. This issue affects Table of content: from n/a through 1.5.3.1. | 2025-09-05 | 7.1 | CVE-2025-58857 |
| kamleshyadav–Miraculous | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in kamleshyadav Miraculous allows Blind SQL Injection. This issue affects Miraculous: from n/a through n/a. | 2025-09-05 | 9.3 | CVE-2025-58628 |
| kleor–Easy Timer | The Easy Timer plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.1 via the plugin’s shortcodes. This is due to insufficient restriction of shortcode attributes. This makes it possible for authenticated attackers, with Editor-level access and above, to execute code on the server. | 2025-09-04 | 7.2 | CVE-2025-9519 |
| MarceloTessaro–promptcraft-forge-studio | Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions contain an non-exhaustive URL scheme check that does not protect against XSS. User-controlled URLs pass through src/utils/validation.ts, but the check only strips `javascript:` and a few patterns. `data:` URLs (for example data:image/svg+xml,…) still pass. If a sanitized value is used in href/src, an attacker can execute a script. There is currently no fix for this issue. | 2025-09-04 | 9.3 | CVE-2025-58361 |
| MarceloTessaro–promptcraft-forge-studio | Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, ”)`. Because the package uses multi-character tokens and each replacement is applied only once, removing one occurrence can create a new dangerous token due to overlap. The “sanitized” value may still contain an executable payload when used in href/src (or injected into the DOM). There is currently no fix for this issue. | 2025-09-04 | 8.2 | CVE-2025-58353 |
| Mark O’Donnell–MSTW League Manager | Cross-Site Request Forgery (CSRF) vulnerability in Mark O’Donnell MSTW League Manager allows Stored XSS. This issue affects MSTW League Manager: from n/a through 2.10. | 2025-09-05 | 7.1 | CVE-2025-58852 |
| Microsoft–Azure Bot Service | Azure Bot Service Elevation of Privilege Vulnerability | 2025-09-04 | 9 | CVE-2025-55244 |
| Microsoft–Dynamics 365 FastTrack Implementation | Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability | 2025-09-04 | 7.5 | CVE-2025-55238 |
| Microsoft–Microsoft Entra | Azure Entra Elevation of Privilege Vulnerability | 2025-09-04 | 9 | CVE-2025-55241 |
| Microsoft–Networking | Azure Networking Elevation of Privilege Vulnerability | 2025-09-04 | 10 | CVE-2025-54914 |
| Mitsubishi Electric Corporation–MELSEC iQ-F Series FX5U-32MT/ES | Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to read or write the device values of the product and stop the operation of the programs, since MODBUS/TCP in the products does not have authentication features. | 2025-09-01 | 7.3 | CVE-2025-7405 |
| Mitsubishi Electric Corporation–MELSEC iQ-F Series FX5U-32MT/ES | Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information. | 2025-09-01 | 7.5 | CVE-2025-7731 |
| mondula2016–Multi Step Form | The Multi Step Form plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the import functionality in all versions up to, and including, 1.7.25. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. | 2025-09-06 | 7.2 | CVE-2025-9515 |
| n/a–RemoteClinic | A vulnerability was detected in RemoteClinic up to 2.0. This affects an unknown part of the file /staff/edit.php. Performing manipulation of the argument image results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | 2025-09-01 | 7.3 | CVE-2025-9772 |
| n/a–RemoteClinic | A vulnerability was found in RemoteClinic up to 2.0. Impacted is an unknown function of the file /staff/edit-my-profile.php. The manipulation of the argument image results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used. | 2025-09-01 | 7.3 | CVE-2025-9775 |
| N/A–smolagents | Incomplete validation of dunder attributes allows an attacker to escape from the Local Python execution environment sandbox, enforced by smolagents. The attack requires a Prompt Injection in order to trick the agent to create malicious code. | 2025-09-03 | 7.6 | CVE-2025-9959 |
| nanbingxyz–5ire | 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Version 0.13.2 contains a vulnerability in the chat page’s script gadgets that enables content injection attacks through multiple vectors: malicious prompt injection pages, compromised MCP servers, and exploited tool integrations. This is fixed in version 0.14.0. | 2025-09-04 | 9.7 | CVE-2025-58357 |
| Nick Ciske–To Lead For Salesforce | Cross-Site Request Forgery (CSRF) vulnerability in Nick Ciske To Lead For Salesforce allows Reflected XSS. This issue affects To Lead For Salesforce: from n/a through 2.7.3.9. | 2025-09-05 | 7.1 | CVE-2025-58809 |
| NVIDIA–BlueField GA | NVIDIA BlueField contains a vulnerability in the management interface, where an attacker with local access could cause incorrect authorization to modify the configuration. A successful exploit of this vulnerability might lead to denial of service, escalation of privileges, information disclosure, and data tampering. | 2025-09-04 | 8.7 | CVE-2025-23256 |
| NVIDIA–NVIDIA DOCA with collectx-clxapidev | NVIDIA DOCA contains a vulnerability in the collectx-clxapidev Debian package that could allow an actor with low privileges to escalate privileges. A successful exploit of this vulnerability might lead to escalation of privileges. | 2025-09-04 | 7.3 | CVE-2025-23257 |
| NVIDIA–NVIDIA DOCA with collectx-dpeserver | NVIDIA DOCA contains a vulnerability in the collectx-dpeserver Debian package for arm64 that could allow an attacker with low privileges to escalate privileges. A successful exploit of this vulnerability might lead to escalation of privileges. | 2025-09-04 | 7.3 | CVE-2025-23258 |
| OpenAgentPlatform–Dive | Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. In versions 0.9.0 through 0.9.3, there is a one-click Remote Code Execution vulnerability triggered through a custom url value, `transport` in the JSON object. An attacker can exploit the vulnerability in the following two scenarios: a victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or a victim clicks on such a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes Dive’s custom URL handler (dive:), which launches the Dive app and processes the crafted URL, leading to arbitrary code execution on the victim’s machine. This vulnerability is caused by improper processing of custom url. This is fixed in version 0.9.4. | 2025-09-03 | 8.8 | CVE-2025-58176 |
| OTWthemes–Popping Sidebars and Widgets Light | Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Popping Sidebars and Widgets Light allows Reflected XSS. This issue affects Popping Sidebars and Widgets Light: from n/a through 1.27. | 2025-09-05 | 7.1 | CVE-2025-58853 |
| pgadmin.org–pgAdmin 4 | pgAdmin <= 9.7 is affected by a Cross-Origin Opener Policy (COOP) vulnerability. This vulnerability allows an attacker to manipulate the OAuth flow, potentially leading to unauthorised account access, account takeover, data breaches, and privilege escalation. | 2025-09-04 | 7.9 | CVE-2025-9636 |
| PHPGurukul–Beauty Parlour Management System | A security flaw has been discovered in PHPGurukul Beauty Parlour Management System 1.1. Impacted is an unknown function of the file /admin/contact-us.php. The manipulation of the argument mobnumber results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. | 2025-09-02 | 7.3 | CVE-2025-9814 |
| PHPGurukul–Beauty Parlour Management System | A vulnerability was identified in PHPGurukul Beauty Parlour Management System 1.1. The impacted element is an unknown function of the file /signup.php. The manipulation of the argument mobilenumber leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. Other parameters might be affected as well. | 2025-09-02 | 7.3 | CVE-2025-9829 |
| PHPGurukul–Beauty Parlour Management System | A security flaw has been discovered in PHPGurukul Beauty Parlour Management System 1.1. This affects an unknown function of the file /admin/add-customer-services.php. The manipulation of the argument sids[] results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited. | 2025-09-02 | 7.3 | CVE-2025-9830 |
| PHPGurukul–Beauty Parlour Management System | A weakness has been identified in PHPGurukul Beauty Parlour Management System 1.1. This impacts an unknown function of the file /admin/edit-services.php. This manipulation of the argument sername causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. | 2025-09-02 | 7.3 | CVE-2025-9831 |
| PHPGurukul–Beauty Parlour Management System | A flaw has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this vulnerability is an unknown functionality of the file /admin/update-image.php. This manipulation of the argument lid causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. | 2025-09-03 | 7.3 | CVE-2025-9932 |
| PHPGurukul–Beauty Parlour Management System | A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. Such manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | 2025-09-03 | 7.3 | CVE-2025-9933 |
| PHPGurukul–Online Course Registration | A vulnerability has been found in PHPGurukul Online Course Registration 3.1. Affected is an unknown function of the file /admin/semester.php. The manipulation of the argument semester leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | 2025-09-05 | 7.3 | CVE-2025-10025 |
| Progress Software Corporation–OpenEdge | It was possible to perform Remote Command Execution (RCE) via Java RMI interface in the OpenEdge AdminServer, allowing authenticated users to inject and execute OS commands under the delegated authority of the AdminServer process. An RMI interface permitted manipulation of a configuration property with inadequate input validation leading to OS command injection. | 2025-09-04 | 8.4 | CVE-2025-7388 |
| projectworlds–Travel Management System | A vulnerability has been found in projectworlds Travel Management System 1.0. This vulnerability affects unknown code of the file /enquiry.php. The manipulation of the argument t2 leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. | 2025-09-03 | 7.3 | CVE-2025-9924 |
| projectworlds–Travel Management System | A vulnerability was found in projectworlds Travel Management System 1.0. This issue affects some unknown processing of the file /detail.php. The manipulation of the argument pid results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used. | 2025-09-03 | 7.3 | CVE-2025-9925 |
| projectworlds–Travel Management System | A vulnerability was determined in projectworlds Travel Management System 1.0. Impacted is an unknown function of the file /viewsubcategory.php. This manipulation of the argument t1 causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-03 | 7.3 | CVE-2025-9926 |
| projectworlds–Travel Management System | A vulnerability was identified in projectworlds Travel Management System 1.0. The affected element is an unknown function of the file /viewpackage.php. Such manipulation of the argument t1 leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. | 2025-09-03 | 7.3 | CVE-2025-9927 |
| projectworlds–Travel Management System | A security flaw has been discovered in projectworlds Travel Management System 1.0. The impacted element is an unknown function of the file /viewcategory.php. Performing manipulation of the argument t1 results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. | 2025-09-03 | 7.3 | CVE-2025-9928 |
| PTZOptics–PT12X-SE-xx-G3 | PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user. | 2025-09-05 | 9.8 | CVE-2025-35451 |
| PTZOptics–PT12X-SE-xx-G3 | PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface. | 2025-09-05 | 9.8 | CVE-2025-35452 |
| RealMag777–InPost Gallery | Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in RealMag777 InPost Gallery allows PHP Local File Inclusion. This issue affects InPost Gallery: from n/a through 2.1.4.5. | 2025-09-05 | 7.5 | CVE-2025-57889 |
| Red Hat–Red Hat build of Apache Camel for Spring Boot 4 | A flaw was found in Undertow where malformed client requests can trigger server-side stream resets without triggering abuse counters. This issue, referred to as the “MadeYouReset” attack, allows malicious clients to induce excessive server workload by repeatedly causing server-side stream aborts. While not a protocol bug, this highlights a common implementation weakness that can be exploited to cause a denial of service (DoS). | 2025-09-02 | 7.5 | CVE-2025-9784 |
| Red Hat–Red Hat Enterprise Linux 10 | There’s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1 | 2025-09-05 | 8.1 | CVE-2025-9566 |
| RooCodeInc–Roo-Code | Roo Code is an AI-powered autonomous coding agent that lives in users’ editors. Versions below 3.26.0 contain a vulnerability in the command parsing logic where the Bash parameter expansion and indirect reference were not handled correctly. If the agent was configured to auto-approve execution of certain commands, an attacker able to influence prompts could abuse this weakness to execute additional arbitrary commands alongside the intended one. This is fixed in version 3.26.0. | 2025-09-05 | 8.1 | CVE-2025-58370 |
| RooCodeInc–Roo-Code | Roo Code is an AI-powered autonomous coding agent that lives in users’ editors. Versions 3.25.23 and below contain a vulnerability where certain VS Code workspace configuration files (.code-workspace) are not protected in the same way as the .vscode folder. If the agent was configured to auto-approve file writes, an attacker able to influence prompts (for example via prompt injection) could cause malicious workspace settings or tasks to be written. These tasks could then be executed automatically when the workspace is reopened, resulting in arbitrary code execution. This issue is fixed in version 3.26.0. | 2025-09-05 | 8.1 | CVE-2025-58372 |
| RooCodeInc–Roo-Code | Roo Code is an AI-powered autonomous coding agent that lives in users’ editors. Versions 3.25.23 and below contain a default list of allowed commands that do not need manual approval if auto-approve is enabled, and npm install is included in that list. Because npm install executes lifecycle scripts, if a repository’s package.json file contains a malicious postinstall script, it would be executed automatically without user approval. This means that enabling auto-approved commands and opening a malicious repo could result in arbitrary code execution. This is fixed in version 3.26.0. | 2025-09-06 | 7.8 | CVE-2025-58374 |
| Rubel Miah–Aitasi Coming Soon | Deserialization of Untrusted Data vulnerability in Rubel Miah Aitasi Coming Soon allows Object Injection. This issue affects Aitasi Coming Soon: from n/a through 2.0.2. | 2025-09-05 | 7.2 | CVE-2025-58815 |
| Saad Iqbal–License Manager for WooCommerce | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Saad Iqbal License Manager for WooCommerce allows Blind SQL Injection. This issue affects License Manager for WooCommerce: from n/a through 3.0.12. | 2025-09-05 | 7.6 | CVE-2025-58788 |
| Samer Bechara–Ultimate AJAX Login | Cross-Site Request Forgery (CSRF) vulnerability in Samer Bechara Ultimate AJAX Login allows Reflected XSS. This issue affects Ultimate AJAX Login: from n/a through 1.2.1. | 2025-09-05 | 7.1 | CVE-2025-58854 |
| Samsung Mobile–GoodLock | Improper export of component in GoodLock prior to version 2.2.04.95 allows local attackers to install arbitrary applications from Galaxy Store. | 2025-09-04 | 7.7 | CVE-2024-34598 |
| Samsung Mobile–Samsung Mobile Devices | Out-of-bounds Write vulnerability in libaudiosaplus_sec.so library prior to SMR Apr-2023 Release 1 allows local attacker to execute arbitrary code. | 2025-09-03 | 8 | CVE-2023-21475 |
| Samsung Mobile–Samsung Mobile Devices | Out-of-bounds Write vulnerability in libaudiosaplus_sec.so library prior to SMR Apr-2023 Release 1 allows local attacker to execute arbitrary code. | 2025-09-03 | 8 | CVE-2023-21476 |
| Samsung Mobile–Samsung Mobile Devices | Improper input validation vulnerability in CertByte prior to SMR Apr-2023 Release 1 allows local attackers to launch privileged activities. | 2025-09-03 | 8.5 | CVE-2023-21480 |
| Samsung Mobile–Samsung Mobile Devices | Access of Memory Location After End of Buffer vulnerability in TIGERF trustlet prior to SMR Apr-2023 Release 1 allows local attackers to access protected data. | 2025-09-03 | 7.9 | CVE-2023-21477 |
| ScienceLogic–SL1 | index.em7 in ScienceLogic SL1 before 12.1.1 allows SQL Injection via a parameter in a request. | 2025-09-05 | 7.2 | CVE-2025-58780 |
| ScriptAndTools–Real Estate Management System | A security vulnerability has been detected in ScriptAndTools Real Estate Management System 1.0. The affected element is an unknown function of the file /admin/userlist.php. Such manipulation leads to execution after redirect. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. | 2025-09-03 | 7.3 | CVE-2025-9848 |
| scriptsbundle–AdForest | The AdForest theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 6.0.9. This is due to the plugin not properly verifying a user’s identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as other users, including administrators, without access to a password. | 2025-09-06 | 9.8 | CVE-2025-8359 |
| Sitecore–Experience Manager (XM) | Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0. | 2025-09-03 | 9 | CVE-2025-53690 |
| Sitecore–Experience Manager (XM) | Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Remote Code Execution (RCE).This issue affects Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4. | 2025-09-03 | 8.8 | CVE-2025-53691 |
| Sitecore–Sitecore Experience Manager (XM) | Use of Externally-Controlled Input to Select Classes or Code (‘Unsafe Reflection’) vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4. | 2025-09-03 | 9.8 | CVE-2025-53693 |
| Sitecore–Sitecore Experience Manager (XM) | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP).This issue affects Sitecore Experience Manager (XM): from 9.2 through 10.4; Experience Platform (XP): from 9.2 through 10.4. | 2025-09-03 | 7.5 | CVE-2025-53694 |
| sizam–REHub – Price Comparison, Multi Vendor Marketplace WordPress Theme | The The REHub – Price Comparison, Multi Vendor Marketplace WordPress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | 2025-09-06 | 7.3 | CVE-2025-7366 |
| smackcoders–WordPress Helpdesk Integration | The WordPress Helpdesk Integration plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.8.10 via the portal_type parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included. | 2025-09-05 | 8.1 | CVE-2025-9990 |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability was found by the ZDI team after researching a previous vulnerability and providing this report. The ZDI team was able to discover an unauthenticated attack during their research. We recommend all Web Help Desk customers apply the patch, which is now available. We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities. | 2025-09-01 | 9.8 | CVE-2024-28988 |
| SonarSource–sonarqube-scan-action | SonarQube Server and Cloud is a static analysis solution for continuous code quality and security inspection. In versions 4 to 5.3.0, a command injection vulnerability was discovered in the SonarQube Scan GitHub Action that allows untrusted input arguments to be processed without proper sanitization. Arguments sent to the action are treated as shell expressions, allowing potential execution of arbitrary commands. A fix has been released in SonarQube Scan GitHub Action 5.3.1. | 2025-09-02 | 7.8 | CVE-2025-58178 |
| SourceCodester–Eye Clinic Management System | A security vulnerability has been detected in SourceCodester Eye Clinic Management System 1.0. Affected by this issue is some unknown functionality of the file /main/search_index_Diagnosis.php. Such manipulation of the argument Search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. | 2025-09-01 | 7.3 | CVE-2025-9771 |
| SourceCodester–Food Ordering Management System | A security vulnerability has been detected in SourceCodester Food Ordering Management System 1.0. Affected is an unknown function of the file /routers/register-router.php. Such manipulation of the argument phone leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. | 2025-09-02 | 7.3 | CVE-2025-9832 |
| SourceCodester–Hotel Reservation System | A security flaw has been discovered in SourceCodester Hotel Reservation System 1.0. This affects an unknown part of the file /admin/updateabout.php. The manipulation of the argument address results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited. | 2025-09-01 | 7.3 | CVE-2025-9790 |
| SourceCodester–Online Farm Management System | A vulnerability was detected in SourceCodester Online Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /Login/login.php. Performing manipulation of the argument uname results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. | 2025-09-02 | 7.3 | CVE-2025-9833 |
| SourceCodester–Online Hotel Reservation System | A vulnerability was identified in SourceCodester Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file /admin/edituser.php. The manipulation of the argument userid leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used. | 2025-09-01 | 7.3 | CVE-2025-9789 |
| SourceCodester–School Log Management System | A vulnerability was determined in SourceCodester/Campcodes School Log Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_class.php. Executing manipulation of the argument id_no can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-01 | 7.3 | CVE-2025-9788 |
| Stefan Keller–WooCommerce Payment Gateway for Saferpay | Path Traversal vulnerability in Stefan Keller WooCommerce Payment Gateway for Saferpay allows Path Traversal. This issue affects WooCommerce Payment Gateway for Saferpay: from n/a through 0.4.9. | 2025-09-05 | 7.5 | CVE-2025-48317 |
| Subhash Kumar–Database to Excel | Cross-Site Request Forgery (CSRF) vulnerability in Subhash Kumar Database to Excel allows Stored XSS. This issue affects Database to Excel: from n/a through 1.0. | 2025-09-05 | 7.1 | CVE-2025-58844 |
| SUSE–Rancher | Unauthorized disclosure of sensitive data: Any user with `GET` or `LIST` permissions on `BundleDeployment` resources could retrieve Helm values containing credentials or other secrets. | 2025-09-02 | 7.7 | CVE-2024-52284 |
| SUSE–rancher | A vulnerability has been identified within Rancher Manager in which it did not enforce request body size limits on certain public (unauthenticated) and authenticated API endpoints. This allows a malicious user to exploit this by sending excessively large payloads, which are fully loaded into memory during processing, leading to Denial of Service (DoS). | 2025-09-02 | 8.2 | CVE-2024-58259 |
| Tenda–AC20 | A weakness has been identified in Tenda AC20 16.03.08.05. This vulnerability affects unknown code of the file /goform/fromAdvSetMacMtuWan. This manipulation of the argument wanMTU causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. | 2025-09-01 | 8.8 | CVE-2025-9791 |
| Tenda–CH22 | A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the function formexeCommand of the file /goform/exeCommand. Executing manipulation of the argument cmdinput can lead to buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. | 2025-09-02 | 8.8 | CVE-2025-9812 |
| Tenda–CH22 | A vulnerability was identified in Tenda CH22 1.0.0.1. This issue affects the function formSetSambaConf of the file /goform/SetSambaConf. The manipulation of the argument samba_userNameSda leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. | 2025-09-02 | 8.8 | CVE-2025-9813 |
| Themeisle–WP Full Stripe Free | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Themeisle WP Full Stripe Free allows SQL Injection. This issue affects WP Full Stripe Free: from n/a through 8.3.0. | 2025-09-05 | 7.6 | CVE-2025-58789 |
| ThemeMove–MaxCoach | Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) vulnerability in ThemeMove MaxCoach allows PHP Local File Inclusion. This issue affects MaxCoach: from n/a through 3.2.5. | 2025-09-05 | 8.1 | CVE-2025-58206 |
| TOTOLINK–A702R | A vulnerability was detected in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this vulnerability is the function sub_4162DC of the file /boafrm/formFilter. The manipulation of the argument ip6addr results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. | 2025-09-01 | 8.8 | CVE-2025-9779 |
| TOTOLINK–A702R | A flaw has been found in TOTOLINK A702R 4.0.0-B20211108.1423. Affected by this issue is the function sub_419BE0 of the file /boafrm/formIpQoS. This manipulation of the argument mac causes buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used. | 2025-09-01 | 8.8 | CVE-2025-9780 |
| TOTOLINK–A702R | A vulnerability has been found in TOTOLINK A702R 4.0.0-B20211108.1423. This affects the function sub_4162DC of the file /boafrm/formFilter. Such manipulation of the argument ip6addr leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | 2025-09-01 | 8.8 | CVE-2025-9781 |
| TOTOLINK–A702R | A vulnerability was found in TOTOLINK A702R 4.0.0-B20211108.1423. This vulnerability affects the function sub_4466F8 of the file /boafrm/formOneKeyAccessButton. Performing manipulation of the argument submit-url results in buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used. | 2025-09-01 | 8.8 | CVE-2025-9782 |
| TOTOLINK–A702R | A vulnerability was determined in TOTOLINK A702R 4.0.0-B20211108.1423. This issue affects the function sub_418030 of the file /boafrm/formParentControl. Executing manipulation of the argument submit-url can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-01 | 8.8 | CVE-2025-9783 |
| TOTOLINK–N600R | A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-03 | 7.3 | CVE-2025-9935 |
| Wireshark Foundation–Wireshark | SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service | 2025-09-03 | 7.8 | CVE-2025-9817 |
| withastro–astro | Astro is a web framework for content-driven websites. Versions 11.0.3 through 12.6.5 are vulnerable to SSRF when using Astro’s Cloudflare adapter. When configured with output: ‘server’ while using the default imageService: ‘compile’, the generated image optimization endpoint doesn’t check the URLs it receives, allowing content from unauthorized third-party domains to be served. a A bug in impacted versions of the @astrojs/cloudflare adapter for deployment on Cloudflare’s infrastructure, allows an attacker to bypass the third-party domain restrictions and serve any content from the vulnerable origin. This issue is fixed in version 12.6.6. | 2025-09-04 | 7.2 | CVE-2025-58179 |
| WP Corner–Quick Event Calendar | Cross-Site Request Forgery (CSRF) vulnerability in WP Corner Quick Event Calendar allows Stored XSS. This issue affects Quick Event Calendar: from n/a through 1.4.9. | 2025-09-05 | 7.1 | CVE-2025-58861 |
| WPFunnels–Mail Mint | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in WPFunnels Mail Mint allows SQL Injection. This issue affects Mail Mint: from n/a through 1.18.5. | 2025-09-03 | 7.6 | CVE-2025-58604 |
| Yaidier–WN Flipbox Pro | Cross-Site Request Forgery (CSRF) vulnerability in Yaidier WN Flipbox Pro allows Reflected XSS. This issue affects WN Flipbox Pro: from n/a through 2.1. | 2025-09-05 | 7.1 | CVE-2025-58847 |
| zcaceres–markdownify-mcp | Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process’s privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2. | 2025-09-04 | 7.5 | CVE-2025-58358 |
Medium Vulnerabilities
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info |
|---|---|---|---|---|
| ablancodev–Woocommerce Notify Updated Product | Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Notify Updated Product allows Stored XSS. This issue affects Woocommerce Notify Updated Product: from n/a through 1.6. | 2025-09-05 | 6.5 | CVE-2025-58856 |
| add-ons.org–PDF for WPForms | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in add-ons.org PDF for WPForms allows Stored XSS. This issue affects PDF for WPForms: from n/a through 6.2.1. | 2025-09-03 | 6.5 | CVE-2025-58620 |
| aitool–Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One | Server-Side Request Forgery (SSRF) vulnerability in aitool Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One allows Server Side Request Forgery. This issue affects Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One: from n/a through 2.2.6. | 2025-09-05 | 4.9 | CVE-2025-58829 |
| Akinsoft–e-Mutabakat | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akinsoft e-Mutabakat allows Cross-Site Scripting (XSS).This issue affects e-Mutabakat: from 2.02.05 before v2.02.06. | 2025-09-04 | 4.3 | CVE-2024-13071 |
| Akinsoft–LimonDesk | Improper Restriction of Rendered UI Layers or Frames vulnerability in Akinsoft LimonDesk allows iFrame Overlay, CAPEC – 103 – Clickjacking.This issue affects LimonDesk: from s1.02.14 before v1.02.17. | 2025-09-03 | 4.3 | CVE-2024-13066 |
| Akinsoft–LimonDesk | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akinsoft LimonDesk allows Cross-Site Scripting (XSS).This issue affects LimonDesk: from s1.02.14 before v1.02.17. | 2025-09-03 | 4.7 | CVE-2025-0878 |
| Akinsoft–MyRezzta | Authorization Bypass Through User-Controlled Key vulnerability in Akinsoft MyRezzta allows Forceful Browsing.This issue affects MyRezzta: from s2.02.02 before v2.05.01. | 2025-09-03 | 6.8 | CVE-2024-13063 |
| Akinsoft–MyRezzta | Improper Enforcement of Behavioral Workflow, Uncontrolled Resource Consumption vulnerability in Akinsoft MyRezzta allows Input Data Manipulation, CAPEC – 125 – Flooding.This issue affects MyRezzta: from s2.02.02 before v2.05.01. | 2025-09-03 | 6.3 | CVE-2024-13065 |
| Akinsoft–MyRezzta | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akinsoft MyRezzta allows Cross-Site Scripting (XSS).This issue affects MyRezzta: from s2.02.02 before v2.05.01. | 2025-09-03 | 4.3 | CVE-2024-13064 |
| Akinsoft–OctoCloud | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akinsoft OctoCloud allows Cross-Site Scripting (XSS).This issue affects OctoCloud: from s1.09.01 before v1.11.01. | 2025-09-02 | 4.3 | CVE-2024-12972 |
| Akinsoft–OctoCloud | Origin Validation Error vulnerability in Akinsoft OctoCloud allows HTTP Response Splitting, CAPEC – 87 – Forceful Browsing.This issue affects OctoCloud: from s1.09.01 before v1.11.01. | 2025-09-02 | 4.7 | CVE-2024-12973 |
| Akinsoft–OctoCloud | Authorization Bypass Through User-Controlled Key vulnerability in Akinsoft OctoCloud allows Resource Leak Exposure.This issue affects OctoCloud: from s1.09.02 before v1.11.01. | 2025-09-02 | 4.7 | CVE-2025-0640 |
| Akinsoft–ProKuafor | Authorization Bypass Through User-Controlled Key vulnerability in Akinsoft ProKuafor allows Resource Leak Exposure.This issue affects ProKuafor: from s1.02.07 before v1.02.08. | 2025-09-02 | 4.7 | CVE-2025-0670 |
| Akinsoft–ProKuafr | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akinsoft ProKuaför allows Cross-Site Scripting (XSS).This issue affects ProKuaför: from s1.02.07 before v1.02.08. | 2025-09-02 | 4.3 | CVE-2024-12974 |
| Akinsoft–TaskPano | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akinsoft TaskPano allows Cross-Site Scripting (XSS).This issue affects TaskPano: s1.06.04. | 2025-09-04 | 4.7 | CVE-2024-13073 |
| Aknsoft–QR Men | URL Redirection to Untrusted Site (‘Open Redirect’) vulnerability in Akınsoft QR Menü allows Forceful Browsing, Phishing.This issue affects QR Menü: from s1.05.05 before v1.05.12. | 2025-09-01 | 6.3 | CVE-2024-12924 |
| Aknsoft–QR Men | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Akınsoft QR Menü allows Cross-Site Scripting (XSS).This issue affects QR Menü: from s1.05.05 before v1.05.12. | 2025-09-01 | 4.3 | CVE-2024-12914 |
| Ali Aghdam–Aparat Video Shortcode | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Ali Aghdam Aparat Video Shortcode allows Stored XSS. This issue affects Aparat Video Shortcode: from n/a through 0.2.4. | 2025-09-05 | 6.5 | CVE-2025-58876 |
| Ali Khallad–Contact Form By Mega Forms | Missing Authorization vulnerability in Ali Khallad Contact Form By Mega Forms allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Contact Form By Mega Forms: from n/a through 1.6.1. | 2025-09-03 | 5.4 | CVE-2025-58639 |
| alimuzzamanalim–Html Social share buttons | The Html Social share buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘zm_sh_btn’ shortcode in all versions up to, and including, 2.1.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 5.3 | CVE-2025-9849 |
| alobaidi–PopAd | The PopAd plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on the PopAd_reset_cookie_time function. This makes it possible for unauthenticated attackers to reset cookie time settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2025-09-04 | 5.3 | CVE-2025-9616 |
| AMD–AMD EPYC 7003 Series Processors | Improper restriction of operations in the IOMMU could allow a malicious hypervisor to access guest private memory resulting in loss of integrity. | 2025-09-06 | 5.3 | CVE-2023-31351 |
| AMD–AMD Instinct MI300A | Improper input validation in AMD Power Management Firmware (PMFW) could allow a privileged attacker from Guest VM to send arbitrary input data potentially causing a GPU Reset condition. | 2025-09-06 | 6 | CVE-2024-36346 |
| AMD–AMD Instinct MI300X | Insufficient parameter sanitization in TEE SOC Driver could allow an attacker to issue a malformed DRV_SOC_CMD_ID_SRIOV_SPATIAL_PART and cause read or write past the end of allocated arrays, potentially resulting in a loss of platform integrity or denial of service. | 2025-09-06 | 4.7 | CVE-2025-0034 |
| AMD–AMD Radeon RX 5000 Series Graphics Products | An out of bounds write in the Linux graphics driver could allow an attacker to overflow the buffer potentially resulting in loss of confidentiality, integrity, or availability. | 2025-09-06 | 6.1 | CVE-2025-0010 |
| AMD–AMD Ryzen 5000 Series Processors with Radeon Graphics | Insufficient parameter validation while allocating process space in the Trusted OS (TOS) may allow for a malicious userspace process to trigger an integer overflow, leading to a potential denial of service. | 2025-09-06 | 4.1 | CVE-2021-26377 |
| AMD–AMD Ryzen 7035 Series Processor with Radeon Graphics | A NULL pointer dereference in AMD Crash Defender could allow an attacker to write a NULL output to a log file potentially resulting in a system crash and loss of availability. | 2025-09-06 | 5.5 | CVE-2025-0009 |
| AMD–AMD Ryzen Threadripper 3000 Processors | Improper validation of an array index in the AND power Management Firmware could allow a privileged attacker to corrupt AGESA memory potentially leading to a loss of integrity. | 2025-09-06 | 4.4 | CVE-2024-21970 |
| Amuse Labs–PuzzleMe for WordPress | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Amuse Labs PuzzleMe for WordPress allows Stored XSS. This issue affects PuzzleMe for WordPress: from n/a through 1.2.0. | 2025-09-03 | 6.5 | CVE-2025-58621 |
| antirez–linenoise | TOCTOU in linenoiseHistorySave in linenoise allows local attackers to overwrite arbitrary files and change permissions via a symlink race between fopen(“w”) on the history path and subsequent chmod() on the same path. | 2025-09-01 | 6.8 | CVE-2025-9810 |
| arisoft–ARI Fancy Lightbox | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in arisoft ARI Fancy Lightbox allows Stored XSS. This issue affects ARI Fancy Lightbox: from n/a through 1.4.0. | 2025-09-05 | 6.5 | CVE-2025-58784 |
| Arjan Olsder–SEO Auto Linker | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Arjan Olsder SEO Auto Linker allows Stored XSS. This issue affects SEO Auto Linker: from n/a through 1.5.3. | 2025-09-05 | 5.9 | CVE-2025-58791 |
| Babar–prettyPhoto | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Babar prettyPhoto allows Stored XSS. This issue affects prettyPhoto: from n/a through 1.2.4. | 2025-09-05 | 6.5 | CVE-2025-58808 |
| Barn2 Plugins–Posts Table with Search & Sort | Missing Authorization vulnerability in Barn2 Plugins Posts Table with Search & Sort allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Posts Table with Search & Sort: from n/a through 1.4.10. | 2025-09-03 | 5.3 | CVE-2025-58613 |
| Bjorn Manintveld–BCM Duplicate Menu | Cross-Site Request Forgery (CSRF) vulnerability in Bjorn Manintveld BCM Duplicate Menu allows Cross Site Request Forgery. This issue affects BCM Duplicate Menu: from n/a through 1.1.2. | 2025-09-05 | 4.3 | CVE-2025-58798 |
| Bohemia Plugins–Event Feed for Eventbrite | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Bohemia Plugins Event Feed for Eventbrite allows DOM-Based XSS. This issue affects Event Feed for Eventbrite: from n/a through 1.3.2. | 2025-09-03 | 6.5 | CVE-2025-58623 |
| brijrajs–WooCommerce Single Page Checkout | Cross-Site Request Forgery (CSRF) vulnerability in brijrajs WooCommerce Single Page Checkout allows Cross Site Request Forgery. This issue affects WooCommerce Single Page Checkout: from n/a through 1.2.7. | 2025-09-05 | 4.3 | CVE-2025-58804 |
| calliko–Bonus for Woo | Improper Validation of Specified Quantity in Input vulnerability in calliko Bonus for Woo allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Bonus for Woo: from n/a through 7.4.1. | 2025-09-05 | 5.3 | CVE-2025-58835 |
| Campcodes–Grocery Sales and Inventory System | A vulnerability was detected in Campcodes Grocery Sales and Inventory System 1.0. The affected element is an unknown function of the file /index.php. The manipulation of the argument page results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. | 2025-09-06 | 4.3 | CVE-2025-10032 |
| Campcodes–Recruitment Management System | A security flaw has been discovered in Campcodes Recruitment Management System 1.0. This impacts the function include of the file /admin/index.php. The manipulation of the argument page results in file inclusion. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. | 2025-09-03 | 4.7 | CVE-2025-9920 |
| Campcodes–Sales and Inventory System | A security vulnerability has been detected in Campcodes Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file /index.php. Such manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. | 2025-09-03 | 4.3 | CVE-2025-9922 |
| Campcodes–Sales and Inventory System | A flaw has been found in Campcodes Sales and Inventory System 1.0. This affects an unknown part of the file /index.php. Executing manipulation of the argument page can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used. | 2025-09-03 | 4.3 | CVE-2025-9923 |
| choijun–LA-Studio Element Kit for Elementor | The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin’s widgets in all versions up to, and including, 1.5.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-8360 |
| Cisco–Cisco Evolved Programmable Network Manager (EPNM) | A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to obtain sensitive information from an affected system. This vulnerability is due to improper validation of requests to API endpoints. An attacker could exploit this vulnerability by sending a valid request to a specific API endpoint within the affected system. A successful exploit could allow a low-privileged user to view sensitive configuration information on the affected system that should be restricted. To exploit this vulnerability, an attacker must have access as a low-privileged user. | 2025-09-03 | 4.3 | CVE-2025-20270 |
| Cisco–Cisco Evolved Programmable Network Manager (EPNM) | A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker must have valid administrative credentials. | 2025-09-03 | 4.8 | CVE-2025-20280 |
| Cisco–Cisco Evolved Programmable Network Manager (EPNM) | A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system. To exploit this vulnerability, an attacker must have at least valid Config Managers credentials on the affected device. | 2025-09-03 | 4.3 | CVE-2025-20287 |
| Cisco–Cisco Session Initiation Protocol (SIP) Software | A vulnerability in the directory permissions of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to write arbitrary files on an affected device. This vulnerability is due to a lack of proper authentication controls. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to perform arbitrary file writes to specific directories in the underlying operating system. Note: To exploit this vulnerability, Web Access must be enabled on the phone. Web Access is disabled by default. | 2025-09-03 | 5.3 | CVE-2025-20335 |
| Cisco–Cisco Session Initiation Protocol (SIP) Software | A vulnerability in the directory permissions of Cisco Desk Phone 9800 Series, Cisco IP Phone 7800 and 8800 Series, and Cisco Video Phone 8875 could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability exists because the product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. An attacker could exploit this vulnerability by sending a crafted packet to the IP address of a device that has Web Access enabled. A successful exploit could allow the attacker to access sensitive information from the device. Note: To exploit this vulnerability, Web Access must be enabled on the phone. Web Access is disabled by default. | 2025-09-03 | 5.3 | CVE-2025-20336 |
| Cisco–Cisco Unified Communications Manager | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) Software and Cisco Unified CM Session Management Edition (SME) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. | 2025-09-03 | 4.3 | CVE-2025-20326 |
| Cisco–Cisco Unified Communications Manager IM and Presence Service | A vulnerability in the web-based management interface of Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | 2025-09-03 | 6.1 | CVE-2025-20330 |
| Cisco–Cisco Webex Meetings | A vulnerability in the user profile component of Cisco Webex Meetings could have allowed an authenticated, remote attacker with low privileges to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed because of insufficient validation of user-supplied input to the user profile component of Cisco Webex Meetings. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could have allowed the attacker to conduct an XSS attack against the targeted user. | 2025-09-03 | 5.4 | CVE-2025-20328 |
| Cisco–Cisco Webex Meetings | A vulnerability in Cisco Webex Meetings could have allowed an unauthenticated, remote attacker to redirect a targeted Webex Meetings user to an untrusted website. Cisco has addressed this vulnerability in the Cisco Webex Meetings service, and no customer action is needed. This vulnerability existed because of insufficient validation of URLs that were included in a meeting-join URL. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by including a URL to a website of their choosing in a specific value of a Cisco Webex Meetings join URL. A successful exploit could have allowed the attacker to redirect a targeted user to a website that was controlled by the attacker, possibly making the user more likely to believe the website was trusted by Webex and perform additional actions as part of phishing attacks. | 2025-09-03 | 4.3 | CVE-2025-20291 |
| cloudinfrastructureservices–Cloud SAML SSO Single Sign On Login | The Cloud SAML SSO plugin for WordPress is vulnerable to Identity Provider Deletion due to a missing capability check on the delete_config action of the csso_handle_actions() function in all versions up to, and including, 1.0.19. This makes it possible for unauthenticated attackers to delete any configured IdP, breaking the SSO authentication flow and causing a denial-of-service. | 2025-09-06 | 6.5 | CVE-2025-7045 |
| code-projects–Mobile Shop Management System | A security vulnerability has been detected in code-projects Mobile Shop Management System 1.0. This affects an unknown function of the file AddNewProduct.php. The manipulation of the argument ProductImage leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. | 2025-09-02 | 6.3 | CVE-2025-9841 |
| CodeAstro–Real Estate Management System | A flaw has been found in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /register.php. Executing manipulation of the argument uimage can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used. | 2025-09-04 | 6.3 | CVE-2025-9941 |
| CodeAstro–Real Estate Management System | A vulnerability has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /submitproperty.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | 2025-09-04 | 6.3 | CVE-2025-9942 |
| codemstory– | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in codemstory ì½”ë“œì— ìƒµ 소셜톡 allows Stored XSS. This issue affects ì½”ë“œì— ìƒµ 소셜톡: from n/a through 1.2.1. | 2025-09-05 | 6.5 | CVE-2025-58828 |
| Course Finder | andr martin – it solutions & research UG–Course Booking Platform | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Course Finder | andré martin – it solutions & research UG Course Booking Platform allows Stored XSS. This issue affects Course Booking Platform: from n/a through 1.0.0. | 2025-09-05 | 6.5 | CVE-2025-58887 |
| Cozmoslabs–Paid Member Subscriptions | Missing Authorization vulnerability in Cozmoslabs Paid Member Subscriptions allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Paid Member Subscriptions: from n/a through 2.15.9. | 2025-09-03 | 5.3 | CVE-2025-58600 |
| CozyThemes–SaasLauncher | Missing Authorization vulnerability in CozyThemes SaasLauncher allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SaasLauncher: from n/a through 1.3.0. | 2025-09-03 | 5 | CVE-2025-58606 |
| D-Link–DI-7400G+ | A security flaw has been discovered in D-Link DI-7400G+ 19.12.25A1. Affected is the function sub_478D28 of the file /mng_platform.asp. The manipulation of the argument addr with the input `echo 12345 > poc.txt` results in command injection. An attack on the physical device is feasible. The exploit has been released to the public and may be exploited. | 2025-09-01 | 4.1 | CVE-2025-9769 |
| Dadevarzan–Dadevarzan WordPress Common | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Dadevarzan Dadevarzan WordPress Common allows Stored XSS. This issue affects Dadevarzan WordPress Common: from n/a through 2.2.2. | 2025-09-03 | 6.5 | CVE-2025-58632 |
| Das–Parking Management System | A vulnerability was detected in Das Parking Management System åœè½¦åœºç®¡ç†ç³»ç»Ÿ 6.2.0. This impacts an unknown function of the file /Operator/Search. The manipulation results in information disclosure. The attack may be performed from remote. The exploit is now public and may be used. | 2025-09-03 | 5.3 | CVE-2025-9842 |
| Das–Parking Management System | A flaw has been found in Das Parking Management System åœè½¦åœºç®¡ç†ç³»ç»Ÿ 6.2.0. Affected is an unknown function of the file /Operator/FindAll. This manipulation causes information disclosure. It is possible to initiate the attack remotely. The exploit has been published and may be used. | 2025-09-03 | 5.3 | CVE-2025-9843 |
| DeBAAT–WP-GraphViz | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in DeBAAT WP-GraphViz allows DOM-Based XSS. This issue affects WP-GraphViz: from n/a through 1.5.1. | 2025-09-05 | 6.5 | CVE-2025-58870 |
| deepakmisal24–Chemical Inventory Management System | A vulnerability was identified in deepakmisal24 Chemical Inventory Management System up to 1.0. Affected by this vulnerability is an unknown functionality of the file /inventory_form.php. Such manipulation of the argument chem_name leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. | 2025-09-01 | 6.3 | CVE-2025-9758 |
| Deetronix–Booking Ultra Pro | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Deetronix Booking Ultra Pro allows Stored XSS. This issue affects Booking Ultra Pro: from n/a through 1.1.21. | 2025-09-03 | 6.5 | CVE-2025-58633 |
| Dell–Alienware Command Center 5.x (AWCC) | Dell Alienware Command Center 5.x (AWCC), versions prior to 5.10.2.0, contains an Improper Link Resolution Before File Access (‘Link Following’)” vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. | 2025-09-02 | 6.7 | CVE-2025-43726 |
| DesertThemes–SoftMe | Missing Authorization vulnerability in DesertThemes SoftMe allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SoftMe: from n/a through 1.1.24. | 2025-09-05 | 4.3 | CVE-2025-58817 |
| designful–Smart Table Builder | The Smart Table Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-9126 |
| DigitalCourt–Boxed Content | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in DigitalCourt Boxed Content allows Stored XSS. This issue affects Boxed Content: from n/a through 1.0. | 2025-09-05 | 6.5 | CVE-2025-58851 |
| docjojo–atec Debug | The atec Debug plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.22 via the ‘custom_log’ parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to view the contents of files outside of the originally intended directory. | 2025-09-04 | 4.9 | CVE-2025-9516 |
| dudaster–Elementor Element Condition | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in dudaster Elementor Element Condition allows Stored XSS. This issue affects Elementor Element Condition: from n/a through 1.0.5. | 2025-09-05 | 6.5 | CVE-2025-58796 |
| Eaton–NMC G2 | An attacker with authenticated and privileged access could modify the contents of a non-sensitive file by traversing the path in the limited shell of the CLI. This security issue has been fixed in the latest version of NMC G2 which is available on the Eaton download center. | 2025-09-05 | 4.7 | CVE-2025-48395 |
| ECOVACS–DEEBOT X1 Series | ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic WPA2-PSK, which can be easily derived. | 2025-09-05 | 6.3 | CVE-2025-30198 |
| ECOVACS–DEEBOT X1 Series | ECOVACS robot vacuums and base stations communicate via an insecure Wi-Fi network with a deterministic AES encryption key, which can be easily derived. | 2025-09-05 | 6.3 | CVE-2025-30200 |
| electron–electron | Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions below 35.7.5, 36.0.0-alpha.1 through 36.8.0, 37.0.0-alpha.1 through 37.3.1 and 38.0.0-alpha.1 through 38.0.0-beta.6, ASAR Integrity Bypass via resource modification. This only impacts apps that have the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses enabled. Apps without these fuses enabled are not impacted. This issue is fixed in versions 35.7.5, 36.8.1, 37.3.1 and 38.0.0-beta.6. | 2025-09-04 | 6.1 | CVE-2025-55305 |
| elextensions–ELEX WooCommerce Google Shopping (Google Product Feed) | The ELEX WooCommerce Google Shopping (Google Product Feed) plugin for WordPress is vulnerable to SQL Injection via the ‘file_to_delete’ parameter in all versions up to, and including, 1.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2025-09-06 | 4.9 | CVE-2025-10046 |
| elunez–eladmin | A security flaw has been discovered in elunez eladmin 1.1. Impacted is the function deleteFile of the component LocalStorageController. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. | 2025-09-03 | 5.4 | CVE-2025-9937 |
| envoyproxy–envoy | Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In versions below 1.32.10 and 1.33.0 through 1.33.6, 1.34.0 through 1.34.4 and 1.35.0, insufficient Session Expiration in the Envoy OAuth2 filter leads to failed logout operations. When configured with __Secure- or __Host- prefixed cookie names, the filter fails to append the required Secure attribute to the Set-Cookie header during deletion. Modern browsers ignore this invalid request, causing the session cookie to persist. This allows a user to remain logged in after they believe they have logged out, creating a session hijacking risk on shared computers. The current implementation iterates through the configured cookie names to generate deletion headers but does not check for these prefixes. This failure to properly construct the deletion header means the user’s session cookies are never removed by the browser, leaving the session active and allowing the next user of the same browser to gain unauthorized access to the original user’s account and data. This is fixed in versions 1.32.10, 1.33.7, 1.34.5 and 1.35.1. | 2025-09-03 | 6.3 | CVE-2025-55162 |
| Eric Mann–WP Publication Archive | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Eric Mann WP Publication Archive allows Stored XSS. This issue affects WP Publication Archive : from n/a through 3.0.1. | 2025-09-05 | 6.5 | CVE-2025-58826 |
| FAKTOR VIER–F4 Media Taxonomies | Missing Authorization vulnerability in FAKTOR VIER F4 Media Taxonomies allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects F4 Media Taxonomies: from n/a through 1.1.4. | 2025-09-03 | 4.3 | CVE-2025-58617 |
| falselight–Exchange Rates | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in falselight Exchange Rates allows Stored XSS. This issue affects Exchange Rates: from n/a through 1.2.5. | 2025-09-03 | 6.5 | CVE-2025-58624 |
| Frisbii–Frisbii Pay | Missing Authorization vulnerability in Frisbii Frisbii Pay allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Frisbii Pay: from n/a through 1.8.2.1. | 2025-09-03 | 6.5 | CVE-2025-58616 |
| fullworks–Quick Paypal Payments | Cross-Site Request Forgery (CSRF) vulnerability in fullworks Quick Paypal Payments allows Cross Site Request Forgery. This issue affects Quick Paypal Payments: from n/a through 5.7.46. | 2025-09-05 | 4.3 | CVE-2025-27003 |
| fuyang_lipengjun–platform | A vulnerability was identified in fuyang_lipengjun platform 1.0.0. This issue affects the function AdController of the file /ad/queryAll. The manipulation leads to improper authorization. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. | 2025-09-03 | 4.3 | CVE-2025-9936 |
| GDPR Info–Cookie Notice & Consent Banner for GDPR & CCPA Compliance | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in GDPR Info Cookie Notice & Consent Banner for GDPR & CCPA Compliance allows Stored XSS. This issue affects Cookie Notice & Consent Banner for GDPR & CCPA Compliance: from n/a through 1.7.11. | 2025-09-03 | 6.5 | CVE-2025-58607 |
| George Sexton–WordPress Events Calendar Plugin connectDaily | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in George Sexton WordPress Events Calendar Plugin – connectDaily allows Stored XSS. This issue affects WordPress Events Calendar Plugin – connectDaily: from n/a through 1.5.3. | 2025-09-05 | 6.5 | CVE-2025-58862 |
| gfazioli–WP Bannerize Pro | Server-Side Request Forgery (SSRF) vulnerability in gfazioli WP Bannerize Pro allows Server Side Request Forgery. This issue affects WP Bannerize Pro: from n/a through 1.10.0. | 2025-09-03 | 4.4 | CVE-2025-58615 |
| givecloud–Donation Forms WP by Givecloud | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in givecloud Donation Forms WP by Givecloud allows Stored XSS. This issue affects Donation Forms WP by Givecloud: from n/a through 1.0.9. | 2025-09-05 | 6.5 | CVE-2025-58842 |
| gourl–GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in gourl GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership allows Stored XSS. This issue affects GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership: from n/a through 1.6.6. | 2025-09-05 | 5.9 | CVE-2025-48102 |
| gugu–short.io | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in gugu short.io allows DOM-Based XSS. This issue affects short.io: from n/a through 2.4.0. | 2025-09-05 | 6.5 | CVE-2025-58834 |
| gutentor–Gutentor | Missing Authorization vulnerability in gutentor Gutentor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutentor: from n/a through 3.5.1. | 2025-09-05 | 4.3 | CVE-2025-58783 |
| Habibur Rahman–Comment Form WP – Customize Default Comment Form | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Habibur Rahman Comment Form WP – Customize Default Comment Form allows Stored XSS. This issue affects Comment Form WP – Customize Default Comment Form: from n/a through 2.0.0. | 2025-09-05 | 5.9 | CVE-2025-58825 |
| Huawei–HarmonyOS | Permission verification vulnerability in the home screen module Impact: Successful exploitation of this vulnerability may affect availability. | 2025-09-05 | 6.8 | CVE-2025-58276 |
| Huawei–HarmonyOS | Race condition vulnerability in the device standby module. Impact: Successful exploitation of this vulnerability may cause feature exceptions of the device standby module. | 2025-09-05 | 5.1 | CVE-2025-58313 |
| iamroody– | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in iamroody é‡‘æ•°æ® allows Stored XSS. This issue affects 金数æ®: from n/a through 1.0. | 2025-09-05 | 6.5 | CVE-2025-58864 |
| IBM–App Connect Enterprise Certified Container | IBM App Connect Enterprise Certified Container CD: 9.2.0 through 11.6.0, 12.1.0 through 12.14.0, and 12.0 LTS: 12.0.0 through 12.0.14stores potentially sensitive information in log files during installation that could be read by a local user on the container. | 2025-09-01 | 5.9 | CVE-2025-36133 |
| IBM–Concert Software | IBM Concert Software 1.0.0 through 1.1.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | 2025-09-01 | 6.1 | CVE-2025-0656 |
| IBM–Concert Software | IBM Concert Software 1.0.0 through 1.1.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | 2025-09-01 | 5.4 | CVE-2025-33082 |
| IBM–Concert Software | IBM Concert Software 1.0.0 through 1.1.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | 2025-09-01 | 5.4 | CVE-2025-33083 |
| IBM–Concert Software | IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. | 2025-09-01 | 5.9 | CVE-2025-33084 |
| IBM–Concert Software | IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to perform unauthorized actions using man in the middle techniques due to improper certificate validation. | 2025-09-01 | 5.9 | CVE-2025-33099 |
| IBM–Concert Software | IBM Concert Software 1.0.0 through 1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 2025-09-01 | 5.9 | CVE-2025-33102 |
| IBM–Jazz Foundation | IBM Jazz Foundation 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, and 7.1.0 through 7.1.0 iFix002 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | 2025-09-04 | 6.1 | CVE-2024-43184 |
| IBM–Jazz Foundation | IBM Jazz Foundation 7.0.2 through 7.0.2 iFix033, 7.0.3 through 7.0.3 iFix012, and 7.1.0 through 7.1.0 iFix002 could allow an authenticated user to upload files to the system due to improper neutralization of sequences that can resolve to a restricted directory. | 2025-09-04 | 6.5 | CVE-2025-25048 |
| IBM–MQ | IBM MQ LTS 9.1.0.0 through 9.1.0.29, 9.2.0.0 through 9.2.0.36, 9.3.0.0 through 9.3.0.30 and 9.4.0.0 through 9.4.0.12 and IBM MQ CD 9.3.0.0 through 9.3.5.1 and 9.4.0.0 through 9.4.3.0 Java and JMS stores a password in client configuration files when trace is enabled which can be read by a local user. | 2025-09-07 | 5.1 | CVE-2025-36100 |
| IBM–Sterling B2B Integrator | IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | 2025-09-04 | 4.8 | CVE-2025-2694 |
| IBM–UrbanCode Deploy | IBM DevOps Deploy / IBM UrbanCode Deploy (UCD) 8.1 before 8.1.2.2 could allow an authenticated user to obtain sensitive information about configuration on the system. | 2025-09-02 | 4.3 | CVE-2025-36162 |
| Ibnul H.–Custom Team Manager | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Ibnul H. Custom Team Manager allows Stored XSS. This issue affects Custom Team Manager: from n/a through 2.4.2. | 2025-09-05 | 6.5 | CVE-2025-58840 |
| IfSo Dynamic Content–If-So Dynamic Content Personalization | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in IfSo Dynamic Content If-So Dynamic Content Personalization allows Stored XSS. This issue affects If-So Dynamic Content Personalization: from n/a through 1.9.4. | 2025-09-03 | 6.5 | CVE-2025-58602 |
| itsourcecode–POS Point of Sale System | A vulnerability was identified in itsourcecode POS Point of Sale System 1.0. This vulnerability affects unknown code of the file /inventory/main/vendors/datatables/unit_testing/templates/deferred_table.php. The manipulation of the argument scripts leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. | 2025-09-06 | 4.3 | CVE-2025-10063 |
| itsourcecode–POS Point of Sale System | A security flaw has been discovered in itsourcecode POS Point of Sale System 1.0. This issue affects some unknown processing of the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_two_headers.php. The manipulation of the argument scripts results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be exploited. | 2025-09-07 | 4.3 | CVE-2025-10064 |
| itsourcecode–POS Point of Sale System | A weakness has been identified in itsourcecode POS Point of Sale System 1.0. Impacted is an unknown function of the file /inventory/main/vendors/datatables/unit_testing/templates/dom_data_th.php. This manipulation of the argument scripts causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. | 2025-09-07 | 4.3 | CVE-2025-10065 |
| itsourcecode–POS Point of Sale System | A security vulnerability has been detected in itsourcecode POS Point of Sale System 1.0. The affected element is an unknown function of the file /inventory/main/vendors/datatables/unit_testing/templates/dymanic_table.php. Such manipulation of the argument scripts leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. | 2025-09-07 | 4.3 | CVE-2025-10066 |
| itsourcecode–POS Point of Sale System | A vulnerability was detected in itsourcecode POS Point of Sale System 1.0. The impacted element is an unknown function of the file /inventory/main/vendors/datatables/unit_testing/templates/empty_table.php. Performing manipulation of the argument scripts results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. | 2025-09-07 | 4.3 | CVE-2025-10067 |
| itsourcecode–Sports Management System | A vulnerability was identified in itsourcecode Sports Management System 1.0. This impacts an unknown function of the file /Admin/mode.php. The manipulation of the argument code leads to sql injection. The attack is possible to be carried out remotely. | 2025-09-01 | 6.3 | CVE-2025-9768 |
| itsourcecode–Sports Management System | A weakness has been identified in itsourcecode Sports Management System 1.0. The impacted element is an unknown function of the file /Admin/gametype.php. Executing manipulation of the argument code can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. | 2025-09-02 | 6.3 | CVE-2025-9840 |
| Iulia Cazan–Latest Post Shortcode | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Iulia Cazan Latest Post Shortcode allows Stored XSS. This issue affects Latest Post Shortcode: from n/a through 14.0.3. | 2025-09-03 | 6.5 | CVE-2025-58609 |
| Ivan Drago–vipdrv | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Ivan Drago vipdrv allows Stored XSS. This issue affects vipdrv: from n/a through 1.0.3. | 2025-09-05 | 5.9 | CVE-2025-58884 |
| Jamel.Z–Tooltipy | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Jamel.Z Tooltipy allows Stored XSS. This issue affects Tooltipy: from n/a through 5.5.6. | 2025-09-03 | 6.5 | CVE-2025-58614 |
| jbhovik–Ray Enterprise Translation | Missing Authorization vulnerability in jbhovik Ray Enterprise Translation allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ray Enterprise Translation: from n/a through 1.7.1. | 2025-09-05 | 5.4 | CVE-2025-58785 |
| jimmywb–Simple Link List Widget | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in jimmywb Simple Link List Widget allows Stored XSS. This issue affects Simple Link List Widget: from n/a through 0.3.2. | 2025-09-05 | 5.9 | CVE-2025-58810 |
| Jinher–OA | A vulnerability was detected in Jinher OA 1.0. Affected is an unknown function of the file /jc6/platform/sys/login!changePassWord.action of the component POST Request Handler. The manipulation of the argument Account results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used. | 2025-09-03 | 4.3 | CVE-2025-9931 |
| John Luetke–Media Author | Incorrect Privilege Assignment vulnerability in John Luetke Media Author allows Privilege Escalation. This issue affects Media Author: from n/a through 1.0.4. | 2025-09-05 | 5.5 | CVE-2025-58841 |
| Jonathan Jernigan–Pie Calendar | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Jonathan Jernigan Pie Calendar allows DOM-Based XSS. This issue affects Pie Calendar: from n/a through 1.2.8. | 2025-09-03 | 6.5 | CVE-2025-58618 |
| josepsitjar–StoryMap | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in josepsitjar StoryMap allows DOM-Based XSS. This issue affects StoryMap: from n/a through 2.1. | 2025-09-05 | 6.5 | CVE-2025-58874 |
| kamleshyadav–Exit Intent Popup | Server-Side Request Forgery (SSRF) vulnerability in kamleshyadav Exit Intent Popup allows Server Side Request Forgery. This issue affects Exit Intent Popup: from n/a through 1.0.1. | 2025-09-03 | 5.4 | CVE-2025-58641 |
| KCS–Responder | Cross-Site Request Forgery (CSRF) vulnerability in KCS Responder allows Cross Site Request Forgery. This issue affects Responder: from n/a through 4.3.8. | 2025-09-05 | 5.4 | CVE-2025-58801 |
| Khanakag-17–Library Management System | A vulnerability has been found in Khanakag-17 Library Management System up to 60ed174506094dcd166e34904a54288e5d10ff24. This affects an unknown function of the file /index.php. The manipulation of the argument msg leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. | 2025-09-01 | 4.3 | CVE-2025-9755 |
| Klarna–Klarna Order Management for WooCommerce | Insertion of Sensitive Information Into Debugging Code vulnerability in Klarna Klarna Order Management for WooCommerce allows Retrieve Embedded Sensitive Data. This issue affects Klarna Order Management for WooCommerce: from n/a through 1.9.8. | 2025-09-03 | 6.6 | CVE-2025-58598 |
| Kubernetes–secrets-store-sync-controller | Kubernetes secrets-store-sync-controller in versions before 0.0.2 discloses service account tokens in logs. | 2025-09-05 | 6.5 | CVE-2025-7445 |
| Luis Rock–Master Paper Collapse Toggle | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Luis Rock Master Paper Collapse Toggle allows Stored XSS. This issue affects Master Paper Collapse Toggle: from n/a through 1.1. | 2025-09-05 | 6.5 | CVE-2025-58871 |
| macrozheng–mall | A vulnerability has been found in macrozheng mall up to 1.0.3. This affects the function cancelOrder of the file /order/cancelUserOrder. The manipulation of the argument orderId leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | 2025-09-02 | 4.3 | CVE-2025-9835 |
| macrozheng–mall | A vulnerability was found in macrozheng mall up to 1.0.3. This vulnerability affects the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderId results in authorization bypass. The attack can be launched remotely. The exploit has been made public and could be used. | 2025-09-02 | 4.3 | CVE-2025-9836 |
| Mahmudul Hasan Arif–Ninja Charts | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Mahmudul Hasan Arif Ninja Charts allows Retrieve Embedded Sensitive Data. This issue affects Ninja Charts: from n/a through 3.3.2. | 2025-09-05 | 5.3 | CVE-2025-58797 |
| Malcure Web Security–Malcure Malware Scanner | Missing Authorization vulnerability in Malcure Web Security Malcure Malware Scanner allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Malcure Malware Scanner: from n/a through 16.8. | 2025-09-03 | 4.3 | CVE-2025-3701 |
| marcshowpass–Showpass WordPress Extension | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in marcshowpass Showpass WordPress Extension allows Stored XSS. This issue affects Showpass WordPress Extension: from n/a through 4.0.3. | 2025-09-05 | 6.5 | CVE-2025-58850 |
| MatrixAddons–Document Engine | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in MatrixAddons Document Engine allows Stored XSS. This issue affects Document Engine: from n/a through 1.2. | 2025-09-03 | 6.5 | CVE-2025-58640 |
| Mautic–Mautic | SummaryA user with administrator rights can change the configuration of the mautic application and extract secrets that are not normally available. ImpactAn administrator who usually does not have access to certain parameters, such as database credentials, can disclose them. | 2025-09-03 | 5.5 | CVE-2025-9822 |
| Mautic–Mautic | ImpactThe attacker can validate if a user exists by checking the time login returns. This timing difference can be used to enumerate valid usernames, after which an attacker could attempt brute force attacks. PatchesThis vulnerability has been patched, implementing a timing-safe form login authenticator that ensures consistent response times regardless of whether a user exists or not. Technical DetailsThe vulnerability was caused by different response times when: * A valid username was provided (password hashing occurred) * An invalid username was provided (no password hashing occurred) The fix introduces a TimingSafeFormLoginAuthenticator that performs a dummy password hash verification even for non-existent users, ensuring consistent timing. WorkaroundsNo workarounds are available. Users should upgrade to the patched version. References * https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/03-Identity_Management_Testing/04-Testing_for_Account_Enumeration_and_Guessable_User_Account | 2025-09-03 | 5.9 | CVE-2025-9824 |
| michalzagdan–TrustMate.io WooCommerce integration | Cross-Site Request Forgery (CSRF) vulnerability in michalzagdan TrustMate.io – WooCommerce integration allows Cross Site Request Forgery. This issue affects TrustMate.io – WooCommerce integration: from n/a through 1.14.0. | 2025-09-05 | 4.3 | CVE-2025-58802 |
| Microsoft–Microsoft Edge (Chromium-based) | Improper access control in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network. | 2025-09-05 | 4.7 | CVE-2025-53791 |
| Microsoft–Xbox Gaming Services | Exposure of sensitive information to an unauthorized actor in Xbox allows an unauthorized attacker to disclose information over a network. | 2025-09-04 | 6.5 | CVE-2025-55242 |
| Mikado Themes–Biagiotti Core | The Biagiotti Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-05 | 6.4 | CVE-2025-9057 |
| mndpsingh287–WP Mail | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in mndpsingh287 WP Mail allows DOM-Based XSS. This issue affects WP Mail: from n/a through 1.3. | 2025-09-05 | 6.5 | CVE-2025-58822 |
| MobSF–Mobile-Security-Framework-MobSF | MobSF is a mobile application security testing tool used. In version 4.4.0, an authenticated user who uploaded a specially prepared one.a, can write arbitrary files to any directory writable by the user of the MobSF process. This issue has been patched in version 4.4.1. | 2025-09-02 | 6.5 | CVE-2025-58162 |
| MongoDB Inc–MongoDB Server | An improper setting of the lsid field on any sharded query can cause a crash in MongoDB routers. This issue occurs when a generic argument (lsid) is provided in a case when it is not applicable. This affects MongoDB Server v6.0 versions prior to 6.0.x, MongoDB Server v7.0 versions prior to 7.0.18 and MongoDB Server v8.0 versions prior to 8.0.6. | 2025-09-05 | 6.5 | CVE-2025-10059 |
| MongoDB Inc–MongoDB Server | MongoDB Server may allow upsert operations retried within a transaction to violate unique index constraints, potentially causing an invariant failure and server crash during commit. This issue may be triggered by improper WriteUnitOfWork state management. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22 and MongoDB Server v8.0 versions prior to 8.0.12 | 2025-09-05 | 6.5 | CVE-2025-10060 |
| MongoDB Inc–MongoDB Server | An authorized user can cause a crash in the MongoDB Server through a specially crafted $group query. This vulnerability is related to the incorrect handling of certain accumulator functions when additional parameters are specified within the $group operation. This vulnerability could lead to denial of service if triggered repeatedly. This issue affects MongoDB Server v6.0 versions prior to 6.0.25, MongoDB Server v7.0 versions prior to 7.0.22, MongoDB Server v8.0 versions prior to 8.0.12 and MongoDB Server v8.1 versions prior to 8.1.2 | 2025-09-05 | 6.5 | CVE-2025-10061 |
| mulscully–Today’s Date Inserter | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in mulscully Today's Date Inserter allows Stored XSS. This issue affects Today's Date Inserter: from n/a through 1.2.1. | 2025-09-05 | 6.5 | CVE-2025-48103 |
| n/a–Langfuse | A security flaw has been discovered in Langfuse up to 3.88.0. Affected by this vulnerability is the function promptChangeEventSourcing of the file web/src/features/prompts/server/routers/promptRouter.ts of the component Webhook Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited. | 2025-09-01 | 5 | CVE-2025-9799 |
| n/a–RemoteClinic | A flaw has been found in RemoteClinic up to 2.0. This vulnerability affects unknown code of the file /staff/edit.php. Executing manipulation of the argument Last Name can lead to cross site scripting. The attack can be launched remotely. The exploit has been published and may be used. | 2025-09-01 | 4.3 | CVE-2025-9773 |
| n/a–RemoteClinic | A vulnerability has been found in RemoteClinic up to 2.0. This issue affects some unknown processing of the file /patients/edit-patient.php. The manipulation of the argument Email leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | 2025-09-01 | 4.3 | CVE-2025-9774 |
| n/a–RemoteClinic | A vulnerability was detected in RemoteClinic 2.0. This vulnerability affects unknown code of the file /staff/profile.php. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. | 2025-09-01 | 4.7 | CVE-2025-9802 |
| Netcad–NetGIS Server | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Netcad NetGIS Server allows Reflected XSS.This issue affects NetGIS Server: from 5.2.4 through 22.08.2025. | 2025-09-05 | 5.4 | CVE-2025-8695 |
| NVIDIA–ConnectX GA | NVIDIA ConnectX contains a vulnerability in the management interface, where an attacker with local access could cause incorrect authorization to modify the configuration. A successful exploit of this vulnerability might lead to denial of service, escalation of privileges, information disclosure, and data tampering. | 2025-09-04 | 6.3 | CVE-2025-23262 |
| NVIDIA–HGX, DGX Hopper | NVIDIA HGX and DGX contain a vulnerability where a misconfiguration of the VBIOS could enable an attacker to set an unsafe debug access level. A successful exploit of this vulnerability might lead to denial of service. | 2025-09-04 | 4.2 | CVE-2025-23301 |
| NVIDIA–HGX, DGX Hopper | NVIDIA HGX and DGX contain a vulnerability where a misconfiguration of the LS10 could enable an attacker to set an unsafe debug access level. A successful exploit of this vulnerability might lead to denial of service. | 2025-09-04 | 4.2 | CVE-2025-23302 |
| NVIDIA–Mellanox DPDK 22.11 | NVIDIA Mellanox DPDK contains a vulnerability in Poll Mode Driver (PMD), where an attacker on a VM in the system might be able to cause information disclosure and denial of service on the network interface. | 2025-09-04 | 6.5 | CVE-2025-23259 |
| NVIDIA–NVOS | NVIDIA Cumulus Linux and NVOS products contain a vulnerability, where hashed user passwords are not properly suppressed in log files, potentially disclosing information to unauthorized users. | 2025-09-04 | 5.5 | CVE-2025-23261 |
| optio–Optio Dentistry | The Optio Dentistry plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘optio-lightbox’ shortcode in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-9853 |
| OTWthemes–Widgetize Pages Light | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in OTWthemes Widgetize Pages Light allows Stored XSS. This issue affects Widgetize Pages Light: from n/a through 3.0. | 2025-09-05 | 5.9 | CVE-2025-58805 |
| outline–outline | Outline is a service that allows for collaborative documentation. In versions 0.72.0 through 0.83.0, Outline introduced a feature which facilitates local file system storage capabilities as an optional file storage strategy. This feature allowed a CSP bypass as well as a ContentType bypass that might facilitate further attacks. In the case of self-hosting and using Outline FILE_STORAGE=local on the same domain as the Outline application, a malicious payload can be uploaded as a file attachment and bypass those CSP restrictions, allowing script execution within the context of another user. This is fixed in version 0.84.0. | 2025-09-03 | 6.8 | CVE-2025-58351 |
| PalsCode–Support Genix | Missing Authorization vulnerability in PalsCode Support Genix allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Support Genix: from n/a through 1.4.23. | 2025-09-03 | 5.3 | CVE-2025-58635 |
| Payoneer Checkout–Payoneer Checkout | Missing Authorization vulnerability in Payoneer Checkout Payoneer Checkout allows Content Spoofing. This issue affects Payoneer Checkout: from n/a through 3.4.0. | 2025-09-05 | 5.3 | CVE-2025-58795 |
| peachpay–PeachPay Payments | Missing Authorization vulnerability in peachpay PeachPay Payments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PeachPay Payments: from n/a through 1.117.4. | 2025-09-03 | 5.3 | CVE-2025-58634 |
| PHPGurukul–User Management System | A vulnerability was found in PHPGurukul User Management System 1.0. This impacts an unknown function of the file /admin/change-emailid.php. The manipulation of the argument uid results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used. | 2025-09-01 | 6.3 | CVE-2025-9756 |
| Portabilis–i-Educar | A weakness has been identified in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /module/TabelaArredondamento/edit. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. | 2025-09-05 | 6.3 | CVE-2025-10011 |
| Portabilis–i-Educar | A security vulnerability has been detected in Portabilis i-Educar up to 2.10. The impacted element is an unknown function of the file educar_historico_escolar_lst.php. Such manipulation of the argument ref_cod_aluno leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. | 2025-09-05 | 6.3 | CVE-2025-10012 |
| Portabilis–i-Educar | A vulnerability was detected in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /exportacao-para-o-seb. Performing manipulation results in improper access controls. The attack is possible to be carried out remotely. The exploit is now public and may be used. | 2025-09-05 | 6.3 | CVE-2025-10013 |
| Portabilis–i-Educar | A flaw has been found in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /enturmacao-em-lote/. This manipulation causes improper access controls. The attack is possible to be carried out remotely. The exploit has been published and may be used. | 2025-09-07 | 6.3 | CVE-2025-10070 |
| Portabilis–i-Educar | A vulnerability has been found in Portabilis i-Educar up to 2.10. This vulnerability affects unknown code of the file /cancelar-enturmacao-em-lote/. Such manipulation leads to improper access controls. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. | 2025-09-07 | 6.3 | CVE-2025-10071 |
| Portabilis–i-Educar | A vulnerability was found in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /matricula/[ID_STUDENT]/enturmar/. Performing manipulation results in improper access controls. It is possible to initiate the attack remotely. The exploit has been made public and could be used. | 2025-09-07 | 6.3 | CVE-2025-10072 |
| Portabilis–i-Educar | A weakness has been identified in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /module/Api/aluno of the component Matricula API. Executing manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. | 2025-09-01 | 6.3 | CVE-2025-9760 |
| Portabilis–i-Educar | A vulnerability was determined in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/Api/turma. Executing manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-07 | 4.3 | CVE-2025-10073 |
| premiumbizthemes–Simple Price Calculator | Insertion of Sensitive Information Into Sent Data vulnerability in premiumbizthemes Simple Price Calculator allows Retrieve Embedded Sensitive Data. This issue affects Simple Price Calculator: from n/a through 1.3. | 2025-09-05 | 6.5 | CVE-2025-58872 |
| PriceListo–Best Restaurant Menu by PriceListo | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in PriceListo Best Restaurant Menu by PriceListo allows Stored XSS. This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.3. | 2025-09-05 | 6.5 | CVE-2025-58812 |
| properfraction–MailOptin | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in properfraction MailOptin allows Stored XSS. This issue affects MailOptin: from n/a through 1.2.75.0. | 2025-09-03 | 5.9 | CVE-2025-58596 |
| Property Hive–PropertyHive | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Property Hive PropertyHive allows Stored XSS. This issue affects PropertyHive: from n/a through 2.1.5. | 2025-09-03 | 6.5 | CVE-2025-58612 |
| pt-guy–Content Views Post Grid & Filter, Recent Posts, Category Posts (Shortcode, Blocks, and Elementor Widgets) | The Content Views plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Grid and List widgets in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-8722 |
| pusheco–Pushe Web Push Notification | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in pusheco Pushe Web Push Notification allows Stored XSS. This issue affects Pushe Web Push Notification: from n/a through 0.5.0. | 2025-09-05 | 5.9 | CVE-2025-58873 |
| RadiusTheme–Classified Listing | Missing Authorization vulnerability in RadiusTheme Classified Listing allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Classified Listing: from n/a through 5.0.6. | 2025-09-03 | 4.3 | CVE-2025-58601 |
| rainafarai–Notification for Telegram | Cross-Site Request Forgery (CSRF) vulnerability in rainafarai Notification for Telegram allows Cross Site Request Forgery. This issue affects Notification for Telegram: from n/a through 3.4.6. | 2025-09-05 | 4.3 | CVE-2025-58794 |
| Ram Ratan Maurya–Stagtools | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Ram Ratan Maurya Stagtools allows Stored XSS. This issue affects Stagtools: from n/a through 2.3.8. | 2025-09-05 | 6.5 | CVE-2025-58814 |
| rbaer–Simple Matomo Tracking Code | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in rbaer Simple Matomo Tracking Code allows Stored XSS. This issue affects Simple Matomo Tracking Code: from n/a through 1.1.0. | 2025-09-03 | 5.9 | CVE-2025-58630 |
| Red Hat–Red Hat Build of Keycloak | A flaw was found in Keycloak. Keycloak’s account console and other pages accept arbitrary text in the error_description query parameter. This text is directly rendered in error pages without validation or sanitization. While HTML encoding prevents XSS, an attacker can craft URLs with misleading messages (e.g., fake support phone numbers or URLs), which are displayed within the trusted Keycloak UI. This creates a phishing vector, potentially tricking users into contacting malicious actors. | 2025-09-05 | 4.3 | CVE-2025-10044 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in libsoup’s caching mechanism, SoupCache, where the HTTP Vary header is ignored when evaluating cached responses. This header ensures that responses vary appropriately based on request headers such as language or authentication. Without this check, cached content can be incorrectly reused across different requests, potentially exposing sensitive user information. While the issue is unlikely to affect everyday desktop use, it could result in confidentiality breaches in proxy or multi-user environments. | 2025-09-03 | 5.9 | CVE-2025-9901 |
| reimund–Compact Admin | Cross-Site Request Forgery (CSRF) vulnerability in reimund Compact Admin allows Cross Site Request Forgery. This issue affects Compact Admin: from n/a through 1.3.0. | 2025-09-05 | 4.3 | CVE-2025-58865 |
| Remi Corson–Easy Download Media Counter | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Remi Corson Easy Download Media Counter allows Stored XSS. This issue affects Easy Download Media Counter: from n/a through 1.2. | 2025-09-05 | 6.5 | CVE-2025-58867 |
| reubenthiessen–Translate This gTranslate Shortcode | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in reubenthiessen Translate This gTranslate Shortcode allows Stored XSS. This issue affects Translate This gTranslate Shortcode: from n/a through 1.0. | 2025-09-05 | 6.5 | CVE-2025-58880 |
| RooCodeInc–Roo-Code | Roo Code is an AI-powered autonomous coding agent that lives in users’ editors. Versions 3.25.23 and below contain a vulnerability where .rooignore protections could be bypassed using symlinks. This allows an attacker with write access to the workspace to trick the extension into reading files that were intended to be excluded. As a result, sensitive files such as .env or configuration files could be exposed. An attacker able to modify files within the workspace could gain unauthorized access to sensitive information by bypassing .rooignore rules. This could include secrets, configuration details, or other excluded project data. This is fixed in version 3.26.0. | 2025-09-05 | 5.5 | CVE-2025-58373 |
| RumbleTalk–RumbleTalk Live Group Chat | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in RumbleTalk RumbleTalk Live Group Chat allows Stored XSS. This issue affects RumbleTalk Live Group Chat: from n/a through 6.3.5. | 2025-09-03 | 6.5 | CVE-2025-58626 |
| saadiqbal–Post SMTP WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more | The Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘update_post_smtp_pro_option_callback’ function in all versions up to, and including, 3.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable pro extensions. | 2025-09-03 | 4.3 | CVE-2025-9219 |
| Samsung Mobile–Galaxy Store | Improper Access Control vulnerability in Galaxy Store prior to version 4.5.53.6 allows local attacker to access protected data using exported service. | 2025-09-03 | 6.4 | CVE-2023-21483 |
| Samsung Mobile–S Assistant | Improper verification of intent by SamsungExceptionalBroadcastReceiver in S Assistant prior to version 9.3.2 allows local attackers to modify itinerary information. | 2025-09-03 | 5.1 | CVE-2025-21038 |
| Samsung Mobile–S Assistant | Improper verification of intent by SystemExceptionalBroadcastReceiver in S Assistant prior to version 9.3.2 allows local attackers to modify itinerary information. | 2025-09-03 | 5.1 | CVE-2025-21039 |
| Samsung Mobile–S Assistant | Improper verification of intent by ExternalBroadcastReceiver in S Assistant prior to version 9.3.2 allows local attackers to modify itinerary information. | 2025-09-03 | 5.1 | CVE-2025-21040 |
| Samsung Mobile–Samsung Account | Improper URL input validation vulnerability in Samsung Account application prior to version 14.1.0.0 allows remote attackers to get sensitive information. | 2025-09-03 | 5.4 | CVE-2023-21481 |
| Samsung Mobile–Samsung Calendar | Improper access control in Samsung Calendar prior to version 12.5.06.5 in Android 14 and 12.6.01.12 in Android 15 allows physical attackers to access data across multiple user profiles. | 2025-09-03 | 4.6 | CVE-2025-21035 |
| Samsung Mobile–Samsung Camera | Missing authorization vulnerability in Camera prior to versions 11.1.02.18 in Android 11, 12.1.03.8 in Android 12 and 13.1.01.4 in Android 13 allows physical attackers to install package through Galaxy store before completion of Setup wizard. | 2025-09-03 | 6.1 | CVE-2023-21482 |
| Samsung Mobile–Samsung Mobile Devices | Improper input validation with Exynos Fastboot USB Interface prior to SMR Apr-2023 Release 1 allows a physical attacker to execute arbitrary code in bootloader. | 2025-09-03 | 6.8 | CVE-2023-21472 |
| Samsung Mobile–Samsung Mobile Devices | Improper input validation with Exynos Fastboot USB Interface prior to SMR Apr-2023 Release 1 allows a physical attacker to execute arbitrary code in bootloader. | 2025-09-03 | 6.8 | CVE-2023-21473 |
| Samsung Mobile–Samsung Mobile Devices | Intent redirection vulnerability in SecSettings prior to SMR Apr-2022 Release 1 allows attackers to access arbitrary file with system privilege. | 2025-09-03 | 6.3 | CVE-2023-21474 |
| Samsung Mobile–Samsung Mobile Devices | Improper input validation vulnerability in TIGERF trustlet prior to SMR Apr-2023 Release 1 allows local attackers to access protected data. | 2025-09-03 | 6 | CVE-2023-21478 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to use the privileged APIs. | 2025-09-03 | 6.8 | CVE-2025-21031 |
| Samsung Mobile–Samsung Mobile Devices | PendingIntent hijacking vulnerability in CertificatePolicy in framework prior to SMR Apr-2023 Release 1 allows local attackers to access contentProvider without proper permission. | 2025-09-03 | 5.3 | CVE-2023-21466 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control vulnerability in Telephony prior to SMR Apr-2023 Release 1 allows attackers to access files with escalated permission. | 2025-09-03 | 5.9 | CVE-2023-21468 |
| Samsung Mobile–Samsung Mobile Devices | Improper authorization in Smart suggestions prior to SMR Apr-2023 Release 1 in Android 13 and 4.1.01.0 in Android 12 allows remote attackers to register a schedule. | 2025-09-03 | 5.3 | CVE-2023-21479 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control in MARsExemptionManager prior to SMR Sep-2025 Release 1 allows local attackers to be excluded from background execution management. | 2025-09-03 | 5.1 | CVE-2025-21025 |
| Samsung Mobile–Samsung Mobile Devices | Improper verification of intent by broadcast receiver in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to temporarily disable the SIM. | 2025-09-03 | 5.1 | CVE-2025-21027 |
| Samsung Mobile–Samsung Mobile Devices | Improper privilege management in ThemeManager prior to SMR Sep-2025 Release 1 allows local privileged attackers to reuse trial items. | 2025-09-03 | 5.5 | CVE-2025-21028 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control in One UI Home prior to SMR Sep-2025 Release 1 allows physical attackers to bypass Kiosk mode under limited conditions. | 2025-09-03 | 5.9 | CVE-2025-21032 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control vulnerability in retrieveExternalProxy in MiscPolicy prior to SMR Nov-2022 Release 1 allows local attacker to access to Proxy information. | 2025-09-04 | 4.3 | CVE-2022-39888 |
| Samsung Mobile–Samsung Mobile Devices | Error in 3GPP specification implementation in Exynos baseband prior to SMR Apr-2023 Release 1 allows incorrect handling of unencrypted message. | 2025-09-03 | 4.6 | CVE-2023-21467 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control vulnerability in SLocation prior to SMR Apr-2022 Release 1 allows local attackers to get device location information using com.samsung.android.wifi.GEOFENCE action. | 2025-09-03 | 4 | CVE-2023-21469 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control vulnerability in SLocation prior to SMR Apr-2022 Release 1 allows local attackers to get device location information using com.samsung.android.wifi.NETWORK_LOCATION action. | 2025-09-03 | 4 | CVE-2023-21470 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control vulnerability in SemClipboard prior to SMR Apr-2023 Release 1 allows attackers to read arbitrary files with system permission. | 2025-09-03 | 4 | CVE-2023-21471 |
| Samsung Mobile–Samsung Mobile Devices | Improper handling of insufficient permission in ImsService prior to SMR Sep-2025 Release 1 allows local attackers to interrupt the call. | 2025-09-03 | 4 | CVE-2025-21026 |
| Samsung Mobile–Samsung Mobile Devices | Improper handling of insufficient permission in System UI prior to SMR Sep-2025 Release 1 allows local attackers to send arbitrary replies to messages from the cover display. | 2025-09-03 | 4 | CVE-2025-21029 |
| Samsung Mobile–Samsung Mobile Devices | Improper handling of insufficient permission in AppPrelaunchManagerService prior to SMR Sep-2025 Release 1 in Chinese Android 15 allows local attackers to execute arbitrary application in the background. | 2025-09-03 | 4.3 | CVE-2025-21030 |
| Samsung Mobile–Samsung Mobile Devices | Improper access control in ContactProvider prior to SMR Sep-2025 Release 1 allows local attackers to access sensitive information. | 2025-09-03 | 4 | CVE-2025-21033 |
| Samsung Mobile–Samsung Mobile Devices | Out-of-bounds write in libsavsvc.so prior to SMR Sep-2025 Release 1 allows local attackers to potentially execute arbitrary code. | 2025-09-03 | 4 | CVE-2025-21034 |
| Samsung Mobile–Samsung Notes | Improper access control in Samsung Notes prior to version 4.4.30.63 allows local privileged attackers to access exported note files. User interaction is required for triggering this vulnerability. | 2025-09-03 | 5 | CVE-2025-21036 |
| Samsung Mobile–SamsungNotes | Improper access control in Samsung Notes prior to version 4.4.30.63 allows physical attackers to access data across multiple user profiles. User interaction is required for triggering this vulnerability. | 2025-09-03 | 4.1 | CVE-2025-21037 |
| Samsung Mobile–Secure Folder | Insecure Storage of Sensitive Information in Secure Folder prior to Android 16 allows local attackers to access sensitive information. | 2025-09-03 | 6.2 | CVE-2025-21041 |
| ScriptAndTools–Real Estate Management System | A weakness has been identified in ScriptAndTools Real Estate Management System 1.0. Impacted is an unknown function of the file register.php. This manipulation of the argument uimage causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. | 2025-09-03 | 6.3 | CVE-2025-9847 |
| SdeWijs–Zoomify embed for WP | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in SdeWijs Zoomify embed for WP allows Stored XSS. This issue affects Zoomify embed for WP: from n/a through 1.5.2. | 2025-09-05 | 6.5 | CVE-2025-58863 |
| Shiful H–SS Font Awesome Icon | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Shiful H SS Font Awesome Icon allows Stored XSS. This issue affects SS Font Awesome Icon: from n/a through 4.1.3. | 2025-09-05 | 6.5 | CVE-2025-58837 |
| Simasicher–SimaCookie | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Simasicher SimaCookie allows Stored XSS. This issue affects SimaCookie: from n/a through 1.3.2. | 2025-09-05 | 6.5 | CVE-2025-58868 |
| Simasicher–SimaCookie | Cross-Site Request Forgery (CSRF) vulnerability in Simasicher SimaCookie allows Stored XSS. This issue affects SimaCookie: from n/a through 1.3.2. | 2025-09-05 | 6.5 | CVE-2025-58869 |
| SimStudioAI–sim | A weakness has been identified in SimStudioAI sim up to ed9b9ad83f1a7c61f4392787fb51837d34eeb0af. Affected by this issue is the function Import of the file apps/sim/app/api/files/upload/route.ts of the component HTML File Parser. Executing manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. This patch is called 45372aece5e05e04b417442417416a52e90ba174. A patch should be applied to remediate this issue. | 2025-09-01 | 6.3 | CVE-2025-9800 |
| SimStudioAI–sim | A vulnerability was found in SimStudioAI sim up to 51b1e97fa22c48d144aef75f8ca31a74ad2cfed2. This issue affects some unknown processing of the file apps/sim/app/api/proxy/image/route.ts. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The patch is identified as 3424a338b763115f0269b209e777608e4cd31785. Applying a patch is advised to resolve this issue. | 2025-09-02 | 6.3 | CVE-2025-9805 |
| SimStudioAI–sim | A security vulnerability has been detected in SimStudioAI sim up to ed9b9ad83f1a7c61f4392787fb51837d34eeb0af. This affects an unknown part. The manipulation of the argument filePath leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The identifier of the patch is 45372aece5e05e04b417442417416a52e90ba174. To fix this issue, it is recommended to deploy a patch. | 2025-09-01 | 5.4 | CVE-2025-9801 |
| sizam–REHub – Price Comparison, Multi Vendor Marketplace WordPress Theme | The REHub – Price Comparison, Multi Vendor Marketplace WordPress Theme theme for WordPress is vulnerable to Information Exposure in all versions up to, and including, 19.9.7 via the ‘ajax_action_re_getfullcontent’ function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected posts that they should not have access to. | 2025-09-06 | 5.3 | CVE-2025-7368 |
| sjaved–Easy Social Feed Social Photos Gallery Post Feed Like Box | The Easy Social Feed – Social Photos Gallery – Post Feed – Like Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `data-caption` and `data-linktext` parameters in all versions up to, and including, 6.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-6067 |
| smub–aThemes Addons for Elementor | The aThemes Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s Countdown widget in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-8149 |
| snagysandor–Parallax Scrolling Enllax.js | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in snagysandor Parallax Scrolling Enllax.js allows Stored XSS. This issue affects Parallax Scrolling Enllax.js: from n/a through 0.0.6. | 2025-09-05 | 6.5 | CVE-2025-58830 |
| snagysandor–Parallax Scrolling Enllax.js | Cross-Site Request Forgery (CSRF) vulnerability in snagysandor Parallax Scrolling Enllax.js allows Cross Site Request Forgery. This issue affects Parallax Scrolling Enllax.js: from n/a through 0.0.6. | 2025-09-05 | 4.3 | CVE-2025-58831 |
| sonalsinha21–SKT Addons for Elementor | The SKT Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-8564 |
| Spiffy Plugins–WP Flow Plus | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Spiffy Plugins WP Flow Plus allows Stored XSS. This issue affects WP Flow Plus: from n/a through 5.2.5. | 2025-09-03 | 5.9 | CVE-2025-58625 |
| Steve Truman–WP Email Template | Cross-Site Request Forgery (CSRF) vulnerability in Steve Truman WP Email Template allows Cross Site Request Forgery. This issue affects WP Email Template: from n/a through 2.8.3. | 2025-09-05 | 4.3 | CVE-2025-58800 |
| stiofansisland–UsersWP Front-end login form, User Registration, User Profile & Members Directory plugin for WP | The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘upload_file_remove’ function and ‘htmlvar’ parameter in all versions up to, and including, 1.2.44 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2025-09-06 | 6.5 | CVE-2025-10003 |
| streamweasels–StreamWeasels Kick Integration | The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘vodsChannel’ parameter in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-9442 |
| Stylemix–MasterStudy LMS | Missing Authorization vulnerability in Stylemix MasterStudy LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MasterStudy LMS: from n/a through 3.6.15. | 2025-09-05 | 6.5 | CVE-2025-54744 |
| Sudar Muthu–WP Github Gist | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Sudar Muthu WP Github Gist allows Stored XSS. This issue affects WP Github Gist: from n/a through 0.5. | 2025-09-05 | 6.5 | CVE-2025-58875 |
| Sunnet–eHRD CTMS | The eHRD developed by Sunnet has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user’s browser through phishing attacks. | 2025-09-01 | 6.1 | CVE-2025-9567 |
| Sunnet–eHRD CTMS | The eHRD developed by Sunnet has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user’s browser through phishing attacks. | 2025-09-01 | 6.1 | CVE-2025-9568 |
| Sunnet–eHRD CTMS | The eHRD developed by Sunnet has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user’s browser through phishing attacks. | 2025-09-01 | 6.1 | CVE-2025-9569 |
| Sunnet–eHRD CTMS | The eHRD CTMS developed by Sunnet has an Arbitrary File Reading vulnerability, allowing remote attackers with administrator privileges to exploit Relative Path Traversal to download arbitrary system files. | 2025-09-01 | 4.9 | CVE-2025-9570 |
| Surfer–Surfer | Missing Authorization vulnerability in Surfer Surfer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Surfer: from n/a through 1.6.4.574. | 2025-09-03 | 5.3 | CVE-2025-58603 |
| SwiftNinjaPro–Developer Tools Blocker | Cross-Site Request Forgery (CSRF) vulnerability in SwiftNinjaPro Developer Tools Blocker allows Cross Site Request Forgery. This issue affects Developer Tools Blocker: from n/a through 3.2.1. | 2025-09-05 | 5.4 | CVE-2025-58818 |
| Tan Nguyen–Instant Locations | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Tan Nguyen Instant Locations allows Stored XSS. This issue affects Instant Locations: from n/a through 1.0. | 2025-09-05 | 5.9 | CVE-2025-58886 |
| techjewel–Fluent Forms Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder | The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to PHP Object Injection in versions 5.1.16 to 6.1.1 via deserialization of untrusted input in the parseUserProperties function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to read arbitrary files. If allow_url_include is enabled on the server, remote code execution is possible. While the vendor patched this issue in version 6.1.0, the patch caused a fatal error in the vulnerable code, due to a missing class import, so we consider 6.1.2 to be the most complete and best patched version | 2025-09-02 | 6.5 | CVE-2025-9260 |
| The African Boss–Get Cash | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in The African Boss Get Cash allows Stored XSS. This issue affects Get Cash: from n/a through 3.2.2. | 2025-09-05 | 6.5 | CVE-2025-58823 |
| ThemeArile–Consultstreet | Missing Authorization vulnerability in ThemeArile Consultstreet allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Consultstreet: from n/a through 3.0.0. | 2025-09-05 | 4.3 | CVE-2025-58813 |
| themefusecom–Brizy | Missing Authorization vulnerability in themefusecom Brizy allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Brizy: from n/a through 2.7.12. | 2025-09-03 | 4.3 | CVE-2025-58594 |
| themehunk–Vayu Blocks Website Builder for the Block Editor | The Vayu Blocks – Website Builder for the Block Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple attributes in the Lottie block in all versions up to, and including, 1.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-03 | 6.4 | CVE-2025-9378 |
| Themeisle–Orbit Fox by ThemeIsle | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Themeisle Orbit Fox by ThemeIsle allows Stored XSS. This issue affects Orbit Fox by ThemeIsle: from n/a through 3.0.0. | 2025-09-03 | 6.5 | CVE-2025-58593 |
| themejunkie–Recent Posts Widget Extended | The Recent Posts Widget Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘rpwe’ shortcode in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-6757 |
| themelocation–Custom WooCommerce Checkout Fields Editor | Cross-Site Request Forgery (CSRF) vulnerability in themelocation Custom WooCommerce Checkout Fields Editor allows Cross Site Request Forgery. This issue affects Custom WooCommerce Checkout Fields Editor: from n/a through 1.3.4. | 2025-09-05 | 4.3 | CVE-2025-58799 |
| ThemeMove–Makeaholic | Missing Authorization vulnerability in ThemeMove Makeaholic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Makeaholic: from n/a through 1.8.5. | 2025-09-03 | 5.3 | CVE-2025-58210 |
| Themepoints–Carousel Ultimate | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Themepoints Carousel Ultimate allows Stored XSS. This issue affects Carousel Ultimate: from n/a through 1.8. | 2025-09-05 | 5.9 | CVE-2025-58820 |
| themifyme–Themify Popup | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in themifyme Themify Popup allows Stored XSS. This issue affects Themify Popup: from n/a through 1.4.4. | 2025-09-05 | 6.5 | CVE-2025-58787 |
| Thomas Harris–Search Cloud One | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Thomas Harris Search Cloud One allows Stored XSS. This issue affects Search Cloud One: from n/a through 2.2.5. | 2025-09-05 | 5.9 | CVE-2025-58883 |
| Tickera–Tickera | Cross-Site Request Forgery (CSRF) vulnerability in Tickera Tickera allows Cross Site Request Forgery. This issue affects Tickera: from n/a through 3.5.5.6. | 2025-09-03 | 4.3 | CVE-2025-58611 |
| tigroumeow–AI Engine | The AI Engine plugin for WordPress is vulnerable to unauthorized access and loss of data due to a missing capability check on the rest_list and delete_files functions in all versions up to, and including, 2.9.5. This makes it possible for unauthenticated attackers to list and delete files uploaded by other users. | 2025-09-03 | 6.5 | CVE-2025-8268 |
| Tikolan–FW Anker | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Tikolan FW Anker allows Stored XSS. This issue affects FW Anker: from n/a through 1.2.6. | 2025-09-05 | 6.5 | CVE-2025-58836 |
| Tomdever–wpForo Forum | Authorization Bypass Through User-Controlled Key vulnerability in Tomdever wpForo Forum allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects wpForo Forum: from n/a through 2.4.6. | 2025-09-03 | 4.3 | CVE-2025-58597 |
| TOTOLINK–X5000R | A vulnerability was found in TOTOLINK X5000R 9.1.0cu.2415_B20250515. This affects the function sub_410C34 of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument pid results in command injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. | 2025-09-03 | 6.3 | CVE-2025-9934 |
| tychesoftwares–Order Delivery Date for WooCommerce | Missing Authorization vulnerability in tychesoftwares Order Delivery Date for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Order Delivery Date for WooCommerce: from n/a through 4.1.0. | 2025-09-03 | 4.3 | CVE-2025-58599 |
| typelevel–fs2 | fs2 is a compositional, streaming I/O library for Scala. Versions 3.12.2 and lower and 3.13.0-M1 through 3.13.0-M6 is vulnerable to denial of service attacks though TLS sessions using fs2-io on the JVM using the fs2.io.net.tls package. When establishing a TLS session, if one side of the connection shuts down `write` while the peer side is awaiting more data to progress the TLS handshake, the peer side will spin loop on the socket read, fully utilizing a CPU. The CPU is consumed until the overall connection is closed, potentially shutting down a fs2-io powered server. This issue is fixed in versions 3.12.1 and 3.13.0-M7. | 2025-09-05 | 5.3 | CVE-2025-58369 |
| usamafarooq–Woocommerce Gifts Product | Cross-Site Request Forgery (CSRF) vulnerability in usamafarooq Woocommerce Gifts Product allows Cross Site Request Forgery. This issue affects Woocommerce Gifts Product: from n/a through 1.0.0. | 2025-09-05 | 6.5 | CVE-2025-58878 |
| ux-themes–Flatsome | The Flatsome Theme for WordPress is vulnerable to Stored Cross-Site Scripting via the theme’s shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-05 | 6.4 | CVE-2025-8684 |
| VillaTheme–HAPPY | Missing Authorization vulnerability in VillaTheme HAPPY allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HAPPY: from n/a through 1.0.6. | 2025-09-05 | 6.5 | CVE-2025-53571 |
| Vincent Boiardt–Easy Flash Embed | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Vincent Boiardt Easy Flash Embed allows Stored XSS. This issue affects Easy Flash Embed: from n/a through 1.0. | 2025-09-05 | 6.5 | CVE-2025-48105 |
| VW THEMES–Ibtana Ecommerce Product Addons | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in VW THEMES Ibtana – Ecommerce Product Addons allows DOM-Based XSS. This issue affects Ibtana – Ecommerce Product Addons: from n/a through 0.4.7.4. | 2025-09-05 | 6.5 | CVE-2025-58786 |
| w1zzard–Simple Text Slider | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in w1zzard Simple Text Slider allows Stored XSS. This issue affects Simple Text Slider: from n/a through 1.0.5. | 2025-09-05 | 6.5 | CVE-2025-58882 |
| webriti–Shk Corporate | Missing Authorization vulnerability in webriti Shk Corporate allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Shk Corporate: from n/a through 2.4.1.1. | 2025-09-05 | 4.3 | CVE-2025-58824 |
| webvitaly–Search by Google | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in webvitaly Search by Google allows Stored XSS. This issue affects Search by Google: from n/a through 1.9. | 2025-09-05 | 5.9 | CVE-2025-58832 |
| whiteshadow–Admin Menu Editor | The Admin Menu Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder’ parameter in all versions up to, and including, 1.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2025-09-06 | 6.4 | CVE-2025-9493 |
| WP Chill–Gallery PhotoBlocks | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in WP Chill Gallery PhotoBlocks allows Stored XSS. This issue affects Gallery PhotoBlocks: from n/a through 1.3.1. | 2025-09-03 | 6.5 | CVE-2025-58610 |
| WP CodeUs–Ultimate Client Dash | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in WP CodeUs Ultimate Client Dash allows Stored XSS. This issue affects Ultimate Client Dash: from n/a through 4.6. | 2025-09-05 | 5.9 | CVE-2025-58811 |
| WP Delicious–WP Delicious | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in WP Delicious WP Delicious allows Stored XSS. This issue affects WP Delicious: from n/a through 1.8.7. | 2025-09-03 | 6.5 | CVE-2025-58605 |
| WPBean–WPB Elementor Addons | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in WPBean WPB Elementor Addons allows Stored XSS. This issue affects WPB Elementor Addons: from n/a through 1.6. | 2025-09-05 | 6.5 | CVE-2025-58793 |
| WPBean–WPB Image Widget | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in WPBean WPB Image Widget allows Stored XSS. This issue affects WPB Image Widget: from n/a through 1.1. | 2025-09-05 | 6.5 | CVE-2025-58858 |
| wpdever–WP Notification Bell | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in wpdever WP Notification Bell allows Stored XSS. This issue affects WP Notification Bell: from n/a through 1.4.5. | 2025-09-05 | 5.9 | CVE-2025-58821 |
| wpeverest–User Registration & Membership Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin | The User Registration & Membership plugin for WordPress is vulnerable to SQL Injection via the ‘s’ parameter in version 4.3.0. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2025-09-06 | 4.9 | CVE-2025-9085 |
| WPKube–Authors List | Cross-Site Request Forgery (CSRF) vulnerability in WPKube Authors List allows Cross Site Request Forgery. This issue affects Authors List: from n/a through 2.0.6.1. | 2025-09-05 | 4.3 | CVE-2025-58792 |
| WPKube–Kiwi | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in WPKube Kiwi allows Stored XSS. This issue affects Kiwi: from n/a through 2.1.8. | 2025-09-05 | 6.5 | CVE-2025-58790 |
| xujeff–tianti | A vulnerability has been found in xujeff tianti 天梯 up to 2.3. The impacted element is the function ajaxUploadFile of the file src/main/java/com/jeff/tianti/controller/UploadController.java. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | 2025-09-01 | 6.3 | CVE-2025-9795 |
| yydevelopment–Mobile Contact Line | Missing Authorization vulnerability in yydevelopment Mobile Contact Line allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Mobile Contact Line: from n/a through 2.4.0. | 2025-09-03 | 4.3 | CVE-2025-58622 |
| Zakir–Smooth Accordion | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Zakir Smooth Accordion allows Stored XSS. This issue affects Smooth Accordion: from n/a through 2.1. | 2025-09-05 | 6.5 | CVE-2025-58838 |
| ZEEN101–IssueM | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in ZEEN101 IssueM allows DOM-Based XSS. This issue affects IssueM: from n/a through 2.9.0. | 2025-09-03 | 5.9 | CVE-2025-58631 |
Low Vulnerabilities
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info |
|---|---|---|---|---|
| AMD–AMD Athlon 3000 Series Mobile Processors with Radeon Graphics | Failure to validate the address and size in TEE (Trusted Execution Environment) may allow a malicious x86 attacker to send malformed messages to the graphics mailbox resulting in an overlap of a TMR (Trusted Memory Region) that was previously allocated by the ASP bootloader leading to a potential loss of integrity. | 2025-09-06 | 3 | CVE-2021-46750 |
| AMD–AMD EPYC 7003 Series Processors | Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests. | 2025-09-05 | 3.2 | CVE-2024-21977 |
| AMD–AMD EPYC 9004 Series Processors | Improper initialization of CPU cache memory could allow a privileged attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity. | 2025-09-06 | 3.2 | CVE-2024-36331 |
| AMD–AMD Instinct MI250 | Improper handling of insufficiency privileges in the ASP could allow a privileged attacker to modify Translation Map Registers (TMRs) potentially resulting in loss of confidentiality or integrity. | 2025-09-06 | 3.3 | CVE-2023-20516 |
| AMD–AMD Radeon RX 5000 Series Graphics Products | Improper validation of an array index in the AMD graphics driver software could allow an attacker to pass malformed arguments to the dynamic power management (DPM) functions resulting in an out of bounds read and loss of availability. | 2025-09-06 | 3.3 | CVE-2023-31306 |
| AMD–AMD Radeon RX 7000 Series Graphics Products | An integer overflow in the SMU could allow a privileged attacker to potentially write memory beyond the end of the reserved dRAM area resulting in loss of integrity or availability. | 2025-09-06 | 3.9 | CVE-2023-31365 |
| AMD–AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics | Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a trusted execution environment (TEE) driver, potentially leading to loss of confidentiality. | 2025-09-06 | 2.8 | CVE-2023-31326 |
| AMD–AMD Ryzen 8000 Series Desktop Processors | Improper removal of sensitive information before storage or transfer in AMD Crash Defender could allow an attacker to obtain kernel address information potentially resulting in loss of confidentiality. | 2025-09-06 | 3.3 | CVE-2025-0011 |
| AMD–AMD Ryzen Threadripper 3000 Processors | An out-of-bounds read in the ASP could allow a privileged attacker with access to a malicious bootloader to potentially read sensitive memory resulting in loss of confidentiality. | 2025-09-06 | 2.5 | CVE-2023-31330 |
| Campcodes–Online Hospital Management System | A flaw has been found in Campcodes Online Hospital Management System 1.0. The impacted element is an unknown function of the file /edit-profile.php of the component Edit Profile Page. Executing manipulation of the argument Username can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used. | 2025-09-01 | 3.5 | CVE-2025-9754 |
| Campcodes–Online Hospital Management System | A vulnerability was detected in Campcodes Online Hospital Management System 1.0. The affected element is an unknown function of the file /admin/patient-search.php of the component Patient Search Module. Performing manipulation of the argument Search by Name Mobile No results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used. | 2025-09-01 | 2.4 | CVE-2025-9753 |
| code-projects–Fruit Shop Management System | A vulnerability has been found in code-projects Fruit Shop Management System 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. Such manipulation of the argument product_code/gen_name/product_name/supplier leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | 2025-09-03 | 3.5 | CVE-2025-9845 |
| code-projects–POS Pharmacy System | A weakness has been identified in code-projects POS Pharmacy System 1.0. Affected is an unknown function of the file /main/products.php. This manipulation of the argument product_code/gen_name/product_name/supplier causes cross site scripting. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. | 2025-09-03 | 2.4 | CVE-2025-9921 |
| code-projects–Responsive Blog Site | A weakness has been identified in code-projects Responsive Blog Site 1.0. This affects an unknown function of the file blogs_view.php. Executing manipulation of the argument product_code/gen_name/product_name/supplier can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. | 2025-09-03 | 2.4 | CVE-2025-9929 |
| CodeAstro–Real Estate Management System | A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. The impacted element is an unknown function of the file /propertyview.php. Such manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. | 2025-09-04 | 3.5 | CVE-2025-9939 |
| CodeAstro–Real Estate Management System | A vulnerability was detected in CodeAstro Real Estate Management System 1.0. This affects an unknown function of the file /feature.php. Performing manipulation of the argument msg results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. | 2025-09-04 | 3.5 | CVE-2025-9940 |
| elunez–eladmin | A flaw has been found in elunez eladmin up to 2.7. This impacts the function updateUserEmail of the file /api/users/updateEmail/ of the component Email Address Handler. Executing manipulation of the argument id/email can lead to improper authorization. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is said to be difficult. The exploit has been published and may be used. It is required to know the RSA-encrypted password of the attacked user account. | 2025-09-05 | 3.1 | CVE-2025-10014 |
| IBM–Sterling B2B Integrator | IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7_1 and 6.2.0.0 through 6.2.0.4 could disclose sensitive system information about the server to a privileged user that could aid in further attacks against the system. | 2025-09-04 | 2.7 | CVE-2025-2667 |
| ImageMagick–ImageMagick | ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increasing capacity, and WriteBlob(), which then expands by quantum + length (amortized) instead of offset + length, and copies to data + offset. When offset ≫ extent, the copy targets memory beyond the allocation, producing a deterministic heap write on 64-bit builds. No 2â¶â´ arithmetic wrap, external delegates, or policy settings are required. This is fixed in version 14.8.2. | 2025-09-05 | 3.8 | CVE-2025-57807 |
| itsourcecode–POS Point of Sale System | A vulnerability was found in itsourcecode POS Point of Sale System 1.0. Affected by this vulnerability is an unknown functionality of the file /inventory/main/vendors/datatables/unit_testing/templates/-complex_header.php. The manipulation of the argument scripts results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. | 2025-09-05 | 3.5 | CVE-2025-10026 |
| itsourcecode–POS Point of Sale System | A vulnerability was determined in itsourcecode POS Point of Sale System 1.0. Affected by this issue is some unknown functionality of the file /inventory/main/vendors/datatables/unit_testing/templates/2512.php. This manipulation of the argument scripts causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. | 2025-09-05 | 3.5 | CVE-2025-10027 |
| itsourcecode–POS Point of Sale System | A vulnerability was identified in itsourcecode POS Point of Sale System 1.0. This affects an unknown part of the file /inventory/main/vendors/datatables/unit_testing/templates/6776.php. Such manipulation of the argument scripts leads to cross site scripting. The attack can be launched remotely. The exploit is publicly available and might be used. | 2025-09-06 | 3.5 | CVE-2025-10028 |
| itsourcecode–POS Point of Sale System | A security flaw has been discovered in itsourcecode POS Point of Sale System 1.0. This vulnerability affects unknown code of the file /inventory/main/vendors/datatables/unit_testing/templates/complex_header_2.php. Performing manipulation of the argument scripts results in cross site scripting. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. | 2025-09-06 | 3.5 | CVE-2025-10029 |
| KnowageLabs–Knowage-Server | Knowage is an open source analytics and business intelligence suite. Prior to version 8.1.37, Knowage is vulnerable to server-side request forgery. The vulnerability allows attackers to send requests to arbitrary hosts/paths. Since the attacker is not able to read the response, the impact of this vulnerability is limited. However, an attacker could be able to leverage this vulnerability to scan the internal network. This issue has been patched in version 8.1.37. | 2025-09-01 | 3.5 | CVE-2025-55007 |
| Mautic–Mautic | SummaryUsers with webhook permissions can conduct SSRF via webhooks. If they have permission to view the webhook logs, the (partial) request response is also disclosed DetailsWhen sending webhooks, the destination is not validated, causing SSRF. ImpactBypass of firewalls to interact with internal services. See https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/ for more potential impact. Resources https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html for more information on SSRF and its fix. | 2025-09-03 | 2.7 | CVE-2025-9821 |
| mrvautin–expressCart | A vulnerability was determined in mrvautin expressCart up to b31302f4e99c3293bd742c6d076a721e168118b0. This impacts an unknown function of the file /admin/product/edit/ of the component Edit Product Page. This manipulation causes injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. | 2025-09-01 | 2.4 | CVE-2025-9797 |
| PHPGurukul–Small CRM | A flaw has been found in PHPGurukul Small CRM 4.0. Affected by this issue is some unknown functionality of the file /registration.php. Executing manipulation of the argument Username can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used. | 2025-09-02 | 3.5 | CVE-2025-9834 |
| PickPlugins–Job Board Manager | Improper Control of Generation of Code (‘Code Injection’) vulnerability in PickPlugins Job Board Manager allows Code Injection. This issue affects Job Board Manager: from n/a through 2.1.61. | 2025-09-05 | 3.8 | CVE-2025-58827 |
| Plugin Devs–Product Carousel Slider for Elementor | Missing Authorization vulnerability in Plugin Devs Product Carousel Slider for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Product Carousel Slider for Elementor: from n/a through 2.1.3. | 2025-09-05 | 3.5 | CVE-2025-58816 |
| Rami Yushuvaev–Site Info | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Rami Yushuvaev Site Info allows Retrieve Embedded Sensitive Data. This issue affects Site Info: from n/a through 1.1. | 2025-09-05 | 2.7 | CVE-2025-58866 |
| Red Hat–Red Hat Build of Keycloak | A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492. | 2025-09-05 | 2.7 | CVE-2025-10043 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations. | 2025-09-03 | 3.7 | CVE-2025-7039 |
| Tenda–CP6 | A vulnerability was determined in Tenda CP6 11.10.00.243. The affected element is the function sub_2B7D04 of the component uhttp. Executing manipulation can lead to risky cryptographic algorithm. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been publicly disclosed and may be utilized. | 2025-09-02 | 3.7 | CVE-2025-9828 |
| Tenda–F1202 | A vulnerability was determined in Tenda F1202 1.2.0.9/1.2.0.14/1.2.0.20. Impacted is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation with the input Fireitup causes hard-coded credentials. The attack can only be executed locally. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. | 2025-09-02 | 1.9 | CVE-2025-9806 |
| Tenda–W12 | A security vulnerability has been detected in Tenda W12 up to 3.0.0.6(3948). Affected is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. The manipulation leads to hard-coded credentials. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed publicly and may be used. | 2025-09-01 | 1.9 | CVE-2025-9778 |
| thinkgem–JeeSite | A vulnerability was found in thinkgem JeeSite up to 5.12.1. This affects the function decodeUrl2 of the file common/src/main/java/com/jeesite/common/codec/EncodeUtils.java. The manipulation results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 5.13.0 mitigates this issue. The patch is identified as 63773c97a56bdb3649510e83b66c16db4754965b. Upgrading the affected component is recommended. | 2025-09-01 | 3.5 | CVE-2025-9796 |
Severity Not Yet Assigned
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info |
|---|---|---|---|---|
| AATF–Asian Arts Talents Foundation Website | Asian Arts Talents Foundation (AATF) Website v5.1.x and Docker version 2024.12.8.1 are vulnerable to Cross Site Scripting (XSS). The vulnerability exists in the /ip.php endpoint, which processes and displays the X-Forwarded-For HTTP header without proper sanitization or output encoding. This allows an attacker to inject malicious JavaScript code that will execute in visitor browsers. | 2025-09-02 | not yet calculated | CVE-2025-55473 |
| Adacore–Ada Web Server | Adacore Ada Web Server (AWS) before 25.2 is vulnerable to a denial-of-service (DoS) condition due to improper handling of SSL handshakes during connection initialization. When a client initiates an HTTPS connection, the server performs the SSL handshake before assigning the connection to a processing slot. However, there is no specific timeout set for this phase, and the server uses the default socket timeout, which is effectively infinite. An attacker can exploit this by sending a malformed TLS ClientHello message with incorrect length values. This causes the server to wait indefinitely for data that never arrives, blocking the worker thread (Line) handling the connection. By opening multiple such connections, up to the server’s maximum limit, the attacker can exhaust all available working threads, preventing the server from handling new, legitimate requests. | 2025-09-03 | not yet calculated | CVE-2025-52494 |
| Anritsu–ShockLine | Anritsu ShockLine CHX File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-26913. | 2025-09-02 | not yet calculated | CVE-2025-7975 |
| Anritsu–ShockLine | Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26882. | 2025-09-02 | not yet calculated | CVE-2025-7976 |
| Apache Software Foundation–Apache DolphinScheduler | Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can execute any shell script server by alert script. This issue affects Apache DolphinScheduler: before 3.2.2. Users are recommended to upgrade to version 3.3.1, which fixes the issue. | 2025-09-03 | not yet calculated | CVE-2024-43115 |
| Apache Software Foundation–Apache DolphinScheduler | Incorrect Default Permissions vulnerability in Apache DolphinScheduler. This issue affects Apache DolphinScheduler: before 3.2.2. Users are recommended to upgrade to version 3.3.1, which fixes the issue. | 2025-09-03 | not yet calculated | CVE-2024-43166 |
| appRain–appRain CMF | An SQL injection vulnerability has been found in appRain CMF 4.0.5. This vulnerability allows an attacker to retrieve, create, update, and delete the database, through the ‘data%5BAdmin%5D%5Busername%5D’ parameter in /apprain/admin/manage/add/. | 2025-09-04 | not yet calculated | CVE-2025-41032 |
| appRain–appRain CMF | An SQL injection vulnerability has been found in appRain CMF 4.0.5. This vulnerability allows an attacker to retrieve, create, update, and delete the database, through the ‘data%5BPage%5D%5Bname%5D’ parameter in /apprain/page/manage-dynamic-pages/create. | 2025-09-04 | not yet calculated | CVE-2025-41033 |
| appRain–appRain CMF | An SQL injection vulnerability has been found in appRain CMF 4.0.5. This vulnerability allows an attacker to retrieve, create, update, and delete the database, through the ‘data%5BPage%5D%5Bname%5D’ parameter in /apprain/page/manage-static-pages/create/. | 2025-09-04 | not yet calculated | CVE-2025-41034 |
| appRain–appRain CMF | A problem has been discovered in appRain CMF 4.0.5. An authenticated Path Traversal vulnerability in /apprain/common/download/ allows remote users to bypass the intended SecurityManager restrictions and download any file if they have adequate permissions outside the document root configured on the server via the base64 path after /download/. | 2025-09-04 | not yet calculated | CVE-2025-41035 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Admin][description]’, ‘data[Admin][f_name]’ and ‘data[Admin][l_name]’ parameters in /apprain/admin/account/edit. | 2025-09-04 | not yet calculated | CVE-2025-41036 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[FileManager][search]’ parameter in /apprain/admin/filemanager. | 2025-09-04 | not yet calculated | CVE-2025-41037 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Group][name]’ parameter in /apprain/admin/managegroup/add/. | 2025-09-04 | not yet calculated | CVE-2025-41038 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[sconfig][admin_landing_page]’, ‘data[sconfig][currency]’, ‘data[sconfig][db_version]’, ‘data[sconfig][default_pagination]’, ‘data[sconfig][emailsetup_from_email]’, ‘data[sconfig][emailsetup_host]’, ‘data[sconfig][emailsetup_password]’, ‘data[sconfig][emailsetup_port]’, ‘data[sconfig][emailsetup_username]’, ‘data[sconfig][fileresource_id]’, ‘data[sconfig][large_image_height]’, ‘data[sconfig][large_image_width]’ and ‘data[sconfig][time_zone_padding]’ parameters in /apprain/admin/config/opts. | 2025-09-04 | not yet calculated | CVE-2025-41039 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[code]’, ‘data[lang][0][key]’, ‘data[lang][0][value]’, ‘data[lang][1][key]’ and ‘data[title]’ parameters in /apprain/developer/language/lipsum.xml. | 2025-09-04 | not yet calculated | CVE-2025-41040 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[code]’, ‘data[lang][0][key]’, ‘data[lang][0][value]’, ‘data[lang][1][key]’ and ‘data[title]’ parameters in /apprain/developer/language/default.xml. | 2025-09-04 | not yet calculated | CVE-2025-41041 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Option][message]’, ‘data[Option][subject]’ and ‘data[Option][templatetype]’ parameters in /apprain/information/manage/emailtemplate/add. | 2025-09-04 | not yet calculated | CVE-2025-41042 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[AppReportCode][id]’ and ‘data[AppReportCode][name]’ parameters in /apprain/appreport/manage/. | 2025-09-04 | not yet calculated | CVE-2025-41043 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Page][name]’ parameter in /apprain/page/manage-static-pages/create. | 2025-09-04 | not yet calculated | CVE-2025-41044 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[sconfig][ethical_licensekey]’ parameter in /apprain/admin/config/ethical. | 2025-09-04 | not yet calculated | CVE-2025-41045 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/960grid. | 2025-09-04 | not yet calculated | CVE-2025-41046 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/ace. | 2025-09-04 | not yet calculated | CVE-2025-41047 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/admin. | 2025-09-04 | not yet calculated | CVE-2025-41048 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/appform. | 2025-09-04 | not yet calculated | CVE-2025-41049 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/base_libs. | 2025-09-04 | not yet calculated | CVE-2025-41050 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/bootstrap. | 2025-09-04 | not yet calculated | CVE-2025-41051 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/canvasjs. | 2025-09-04 | not yet calculated | CVE-2025-41052 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/commonresource. | 2025-09-04 | not yet calculated | CVE-2025-41053 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/cycle. | 2025-09-04 | not yet calculated | CVE-2025-41054 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/dialogs. | 2025-09-04 | not yet calculated | CVE-2025-41055 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/hysontable. | 2025-09-04 | not yet calculated | CVE-2025-41056 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/rich_text_editor. | 2025-09-04 | not yet calculated | CVE-2025-41057 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/row_manager. | 2025-09-04 | not yet calculated | CVE-2025-41058 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/tablesorter. | 2025-09-04 | not yet calculated | CVE-2025-41059 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/tree. | 2025-09-04 | not yet calculated | CVE-2025-41060 |
| appRain–appRain CMF | A vulnerability has been discovered in appRain CMF version 4.0.5, consisting of a stored authenticated XSS due to a lack of proper validation of user input, through the ‘data[Addon][layouts]’ and ‘data[Addon][layouts_except]’ parameters in /apprain/developer/addons/update/uploadify. | 2025-09-04 | not yet calculated | CVE-2025-41061 |
| appRain–appRain CMF | A vulnerability has been discovered in version 4.0.5 of appRain CMF, consisting of an authenticated reflected XSS due to a lack of proper validation of user input, through the ‘page’ parameter in /apprain/developer/addons. | 2025-09-04 | not yet calculated | CVE-2025-41062 |
| appRain–appRain CMF | A vulnerability has been discovered in version 4.0.5 of appRain CMF, consisting of an authenticated reflected XSS due to a lack of proper validation of user input, through the ‘s’ parameter in /apprain/developer/debug-log/db. | 2025-09-04 | not yet calculated | CVE-2025-41063 |
| arcinfo–PcVue | The sequence of packets received by a Networking server are not correctly checked. An attacker could exploit this vulnerability to send specially crafted messages to force the application to stop. | 2025-09-05 | not yet calculated | CVE-2025-9998 |
| arcinfo–PcVue | Some payload elements of the messages sent between two stations in a networking architecture are not properly checked on the receiving station allowing an attacker to execute unauthorized commands in the application. | 2025-09-05 | not yet calculated | CVE-2025-9999 |
| ash-project–ash | Incorrect Authorization vulnerability in ash-project ash allows Exploiting Incorrectly Configured Access Control Security Levels. This vulnerability is associated with program files lib/ash/actions/create/bulk.ex, lib/ash/actions/destroy/bulk.ex, lib/ash/actions/update/bulk.ex and program routines ‘Elixir.Ash.Actions.Create.Bulk’:run/5, ‘Elixir.Ash.Actions.Destroy.Bulk’:run/6, ‘Elixir.Ash.Actions.Update.Bulk:run’/6. This issue affects ash: from pkg:hex/ash before pkg:hex/ash@3.5.39, before 3.5.39, before 5d1b6a5d00771fd468a509778637527b5218be9a. | 2025-09-07 | not yet calculated | CVE-2025-48042 |
| ATEN–eco DC | ATEN eco DC Missing Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of ATEN eco DC. Authentication is required to exploit this vulnerability. The specific flaw exists within the web-based interface. The issue results from the lack of validating the assigned user role when handling requests. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-26647. | 2025-09-02 | not yet calculated | CVE-2025-6685 |
| Beakon–Beakon Application | An arbitrary file upload vulnerability in Beakon Application before v5.4.3 allows attackers to execute arbitrary code via uploading a crafted file. | 2025-09-02 | not yet calculated | CVE-2025-55372 |
| Beakon–Beakon Application | Incorrect access control in Beakon Application before v5.4.3 allows authenticated attackers with low-level privileges to escalate privileges and execute commands with Administrator rights. | 2025-09-02 | not yet calculated | CVE-2025-55373 |
| BoomCMS–BoomCMS | Cross-Frame Scripting (XFS) vulnerability in BoomCMS v9.1.4 from UXB London. XFS is a web attack technique that exploits specific browser bugs to spy on users via JavaScript. This type of attack is based on social engineering and depends entirely on the browser chosen by the user, so it is perceived as a minor threat to web application security. This vulnerability only works in older browsers. | 2025-09-03 | not yet calculated | CVE-2025-41000 |
| CData–API Server | CData API Server MySQL Misconfiguration Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of CData API Server. Authentication is required to exploit this vulnerability. The specific flaw exists within the usage of MySQL connections. When connecting to a MySQL server, the product enables an option that gives the MySQL server permission to request local files from the MySQL client. An attacker can leverage this vulnerability to disclose information in the context of NETWORK SERVICE. Was ZDI-CAN-23950. | 2025-09-02 | not yet calculated | CVE-2025-9273 |
| ckeditor–ckeditor5 | CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. ckeditor5 and ckeditor5-clipboard versions 46.0.0 through 46.0.2 and 44.2.0 through 45.2.1 contain a Cross-Site Scripting (XSS) vulnerability. Ability to exploit could be triggered by a specific user action (leading to unauthorized JavaScript code execution) if the attacker managed to insert a malicious content into the editor, which might happen with a very specific editor configuration. This vulnerability affects installations where the editor configuration meets one of the following criteria: the HTML embed plugin is enabled, or there is a custom plugin introducing an editable element where view RawElement is enabled. This issue is fixed in versions 45.2.2 and 46.0.3 of both ckeditor5 and ckeditor5-clipboard. | 2025-09-03 | not yet calculated | CVE-2025-58064 |
| Cockroach Labs–cockroach-k8s-request-cert | Cockroach Labs cockroach-k8s-request-cert Empty Root Password Authentication Bypass Vulnerability. This vulnerability could allow remote attackers to bypass authentication on systems that use the affected version of the Cockroach Labs cockroach-k8s-request-cert container image. The specific flaw exists within the configuration of the system shadow file. The issue results from a blank password setting for the root user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-22195. | 2025-09-02 | not yet calculated | CVE-2025-9276 |
| Concept Intermedia–GOV CMS | Input from search query parameter in GOV CMS is not sanitized properly, leading to a Blind SQL injection vulnerability, which might be exploited by an unauthenticated remote attacker. Versions 4.0 and above are not affected. | 2025-09-04 | not yet calculated | CVE-2025-7385 |
| Copeland LP–E2 Facility Management System | E2 Facility Management Systems use a proprietary protocol that allows for unauthenticated file operations on any file in the file system. | 2025-09-02 | not yet calculated | CVE-2025-52551 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) application services (MGW and RCI) uses client side hashing for authentication. An attacker can authenticate by obtaining only the password hash. | 2025-09-02 | not yet calculated | CVE-2025-52543 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) has a floor plan feature that allows for an unauthenticated attacker to upload floor plan files. By uploading a specially crafted floor plan file, an attacker can access any file from the E3 file system. | 2025-09-02 | not yet calculated | CVE-2025-52544 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) RCI service contains an API call to read users info, which returns all usernames and password hashes for the application services. | 2025-09-02 | not yet calculated | CVE-2025-52545 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) has a floor plan feature that allows for an unauthenticated attacker to upload floor plan files. By uploading a specially crafted floor plan file, an attacker can inject a stored XSS to the floorplan web page. | 2025-09-02 | not yet calculated | CVE-2025-52546 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) MGW contains an API call that lacks input validation. An attacker can use this command to continuously crash the application services. | 2025-09-02 | not yet calculated | CVE-2025-52547 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) contains a hidden API call in the application services that enables SSH and Shellinabox, which exist but are disabled by default. An attacker with admin access to the application services can utilize this API to enable remote access to the underlying OS. | 2025-09-02 | not yet calculated | CVE-2025-52548 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) generates the root linux password on each boot. An attacker can generate the root linux password for a vulnerable device based on known or easy to fetch parameters. | 2025-09-02 | not yet calculated | CVE-2025-52549 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor Control (firmware version < 2.31F01) firmware upgrade packages are unsigned. An attacker can forge malicious firmware upgrade packages. An attacker with admin access to the application services can install a malicious firmware upgrade. | 2025-09-02 | not yet calculated | CVE-2025-52550 |
| Copeland LP–E3 Supervisory Control | E3 Site Supervisor (firmware version < 2.31F01) has a default admin user “ONEDAY” with a daily generated password. An attacker can predictably generate the password for ONEDAY. The oneday user cannot be deleted or modified by any user. | 2025-09-02 | not yet calculated | CVE-2025-6519 |
| CRESTRON–TOUCHSCREENS x70 | Improper Neutralization of Argument Delimiters in a Command (‘Argument Injection’) vulnerability in CRESTRON TOUCHSCREENS x70 allows Argument Injection.This issue affects TOUCHSCREENS x70: from 3.001.0031.001 through 3.001.0034.001. A specially crafted SCP command sent via SSH login string can lead a valid administrator user to gain Privileged Operating System access on the device. Following Products Models are affected: TSW-x70 TSW-x60 TST-1080 AM-3000/3100/3200 Soundbar VB70 HD-PS622/621/402 HD-TXU-RXU-4kZ-211 HD-MDNXM-4KZ-E *Note: additional firmware updates will be published once made available | 2025-09-03 | not yet calculated | CVE-2025-47421 |
| DeepSeek–DeepSeek R1 | DeepSeek R1 through V3.1 allows XSS, as demonstrated by JavaScript execution in the context of the run-html-chat.deepseeksvc.com domain. NOTE: some third parties have indicated that this is intended behavior. | 2025-09-03 | not yet calculated | CVE-2025-26210 |
| Delta Electronics–DIAView | Delta Electronics DIAView has an authentication bypass vulnerability. | 2025-09-01 | not yet calculated | CVE-2025-58318 |
| dotCMS–dotCMS Cloud Services (dCS) | dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys. The vulnerability was triggered via the sites parameter, which was directly concatenated into a SQL query without proper sanitization. Exploitation allowed an authenticated attacker with low privileges to extract data from database, perform privilege escalation, or trigger denial-of-service conditions. The vulnerability was verified using tools such as SQLMap and confirmed to allow full database exfiltration and potential denial-of-service conditions via crafted payloads. The vulnerability is fixed in the following versions of dotCMS stack: 25.08.14 / 25.07.10-1v2 LTS / 24.12.27v10 LTS / 24.04.24v21 LTS | 2025-09-04 | not yet calculated | CVE-2025-8311 |
| Figma, Inc.–Figma Desktop Application | Figma Desktop for Windows version 125.6.5 contains a command injection vulnerability in the local plugin loader. An attacker can execute arbitrary OS commands by setting a crafted build field in the plugin’s manifest.json. This field is passed to child_process.exec without validation, leading to possible RCE. | 2025-09-03 | not yet calculated | CVE-2025-56803 |
| FOGProject–fogproject | FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version. | 2025-09-06 | not yet calculated | CVE-2025-58443 |
| Foxit–PDF Reader | Foxit PDF Reader JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-27101. | 2025-09-02 | not yet calculated | CVE-2025-9323 |
| Foxit–PDF Reader | Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26802. | 2025-09-02 | not yet calculated | CVE-2025-9324 |
| Foxit–PDF Reader | Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26785. | 2025-09-02 | not yet calculated | CVE-2025-9325 |
| Foxit–PDF Reader | Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26784. | 2025-09-02 | not yet calculated | CVE-2025-9326 |
| Foxit–PDF Reader | Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26774. | 2025-09-02 | not yet calculated | CVE-2025-9327 |
| Foxit–PDF Reader | Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26773. | 2025-09-02 | not yet calculated | CVE-2025-9328 |
| Foxit–PDF Reader | Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26772. | 2025-09-02 | not yet calculated | CVE-2025-9329 |
| Foxit–PDF Reader | Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Foxit Reader Update Service. The product loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-25709. | 2025-09-02 | not yet calculated | CVE-2025-9330 |
| FreePBX–security-reporting | contactmanager is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions 15.0.14 and below, 16.0.0 through 16.0.26.4 and 17.0.0 through 17.0.5, a stored cross-site scripting (XSS) vulnerability in FreePBX allows a low-privileged User Control Panel (UCP) user to inject malicious JavaScript into the system. The malicious code executes in the context of an administrator when they interact with the affected component, leading to session hijacking and potential privilege escalation. This issue is fixed in versions 15.0.14, 16.0.27 and 17.0.6. | 2025-09-04 | not yet calculated | CVE-2025-55209 |
| FreePBX–security-reporting | api is a module for FreePBX@, which is an open source GUI that controls and manages Asterisk© (PBX). In versions lower than 15.0.13, 16.0.2 through 16.0.14, 17.0.1 and 17.0.2, there is an identical OAuth private key used across multiple systems that installed the same FreePBX RPM or DEB package. An attacker with access to the shared OAuth private key could forge JWT tokens, bypass authentication, and potentially gain full access to both REST and GraphQL APIs. Systems with the “api” module enabled, configured and previously activated by an administrator for remote inbound connections may be affected. This issue is fixed in versions 15.0.13, 16.0.15 and 17.0.3. | 2025-09-04 | not yet calculated | CVE-2025-55739 |
| freescout-help-desk–freescout | FreeScout is a free help desk and shared inbox built with PHP’s Laravel framework. Versions 1.8.185 and earlier contain a deserialization of untrusted data vulnerability that allows authenticated attackers with knowledge of the application’s APP_KEY to achieve remote code execution. The vulnerability is exploited via endpoint, e.g.: `/help/{mailbox_id}/auth/{customer_id}/{hash}/{timestamp}` where the `customer_id` and `timestamp` parameters are processed through the decrypt function in `app/Helper.php` without proper validation. The code decrypts using Laravel’s built-in encryption functions, which subsequently deserialize the decrypted payload without sanitization, allowing attackers to craft malicious serialized PHP objects using classes to trigger arbitrary command execution. This is fixed in version 1.8.186. | 2025-09-03 | not yet calculated | CVE-2025-58163 |
| Google–Android | In bta_av_config_ind of bta_av_aact.cc, there is a possible out of bounds read due to type confusion. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2023-35657 |
| Google–Android | In Audio Service, there is a possible way to obtain MAC addresses of nearby Bluetooth devices due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2024-0028 |
| Google–Android | In multiple functions of ConnectionServiceWrapper.java, there is a possible way to retain a permission forever in the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2024-40653 |
| Google–Android | In setupAccessibilityServices of AccessibilityFragment.java , there is a possible way to hide an enabled accessibility service due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2024-40664 |
| Google–Android | In avrc_vendor_msg of avrc_opt.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2024-49714 |
| Google–Android | In multiple functions of Permissions.java, there is a possible way to override the state of the user’s location permissions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2024-49720 |
| Google–Android | In showAvatarPicker of EditUserPhotoController.java, there is a possible cross user image leak due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2024-49722 |
| Google–Android | In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible cross user media disclosure due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2024-49728 |
| Google–Android | In FuseDaemon.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2024-49730 |
| Google–Android | In apk-versions.txt, there is a possible corruption of telemetry opt-in settings on other watches when setting up a new Pixel Watch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2024-49731 |
| Google–Android | In MMapVAccess of pmr_os.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2024-49739 |
| Google–Android | In SAEMM_DiscloseMsId of SAEMM_RadioMessageCodec.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure post authentication with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2024-56189 |
| Google–Android | In wl_update_hidden_ap_ie() of wl_cfgscan.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2024-56190 |
| Google–Android | In multiple locations, there is a possible way to view icons belonging to another user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-0076 |
| Google–Android | In multiple functions of UserController.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-0077 |
| Google–Android | In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user’s app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-0087 |
| Google–Android | In multiple locations, there is a possible way to hijack the Launcher app due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-0089 |
| Google–Android | In FrpBypassAlertActivity of FrpBypassAlertActivity.java, there is a possible way to bypass FRP due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-22414 |
| Google–Android | In android_app of Android.bp, there is a possible way to launch any activity as a system user. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-22415 |
| Google–Android | In onCreate of ChooserActivity.java , there is a possible way to view other users’ images due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22416 |
| Google–Android | In finishTransition of Transition.java, there is a possible way to bypass touch filtering restrictions due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22417 |
| Google–Android | In multiple locations, there is a possible confused deputy due to Intent Redirect. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22418 |
| Google–Android | In multiple locations, there is a possible way to mislead the user into enabling malicious phone calls forwarding due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22419 |
| Google–Android | In contentDescForNotification of NotificationContentDescription.kt, there is a possible notification content leak through the lockscreen due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22421 |
| Google–Android | In multiple locations, there is a possible way to mislead a user into approving an authentication prompt for one app when its result will be used in another due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22422 |
| Google–Android | In ParseTag of dng_ifd.cpp, there is a possible way to crash the image renderer due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22423 |
| Google–Android | In onCreate of InstallStart.java, there is a possible permissions bypass due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-22425 |
| Google–Android | In onCreate of NotificationAccessConfirmationActivity.java, there is a possible way to grant notification access above the lock screen due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22427 |
| Google–Android | In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible way to grant permissions to an app on the secondary user from the primary user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22428 |
| Google–Android | In multiple locations, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22429 |
| Google–Android | In isInSignificantPlace of multiple files, there is a possible way to access sensitive information due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22430 |
| Google–Android | In multiple locations, there is a possible method for a malicious app to prevent dialing emergency services under limited circumstances due to a logic error in the code. This could lead to local denial of service until the phone reboots with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22431 |
| Google–Android | In canForward of IntentForwarderActivity.java, there is a possible bypass of the cross profile intent filter most commonly used in Work Profile scenarios due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22433 |
| Google–Android | In handleKeyGestureEvent of PhoneWindowManager.java, there is a possible lock screen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22434 |
| Google–Android | In avdt_msg_ind of avdt_msg.cc, there is a possible memory corruption due to type confusion. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22435 |
| Google–Android | In setMediaButtonReceiver of multiple files, there is a possible way to launch arbitrary activities from background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22437 |
| Google–Android | In afterKeyEventLockedInterruptable of InputDispatcher.cpp, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22438 |
| Google–Android | In onLastAccessedStackLoaded of ActionHandler.java , there is a possible way to bypass storage restrictions across apps due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22439 |
| Google–Android | In getContextForResourcesEnsuringCorrectCachedApkPaths of RemoteViews.java, there is a possible way to load arbitrary java code in a privileged context due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-22441 |
| Google–Android | In multiple functions of DevicePolicyManagerService.java, there is a possible way to install unauthorized applications into a newly created work profile due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-22442 |
| Google–Android | In initializeSwizzler of SkBmpStandardCodec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-02 | not yet calculated | CVE-2025-26416 |
| Google–Android | In initPhoneSwitch of SystemSettingsFragment.java, there is a possible FRP bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26419 |
| Google–Android | In multiple functions of GrantPermissionsActivity.java , there is a possible way to trick the user into granting the incorrect permission due to permission overload. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26420 |
| Google–Android | In multiple locations, there is a possible lock screen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26421 |
| Google–Android | In dump of WindowManagerService.java, there is a possible way of running dumpsys without the required permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26422 |
| Google–Android | In validateIpConfiguration of WifiConfigurationUtil.java, there is a possible way to trigger a permanent DoS due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26423 |
| Google–Android | In multiple functions of VpnManager.java, there is a possible cross-user data leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26424 |
| Google–Android | In multiple functions of RoleService.java, there is a possible permission squatting vulnerability due to a logic error in the code. This could lead to local escalation of privilege on versions of Android where android.permission.MANAGE_DEFAULT_APPLICATIONS was not defined with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26425 |
| Google–Android | In BroadcastController.java of registerReceiverWithFeatureTraced, there is a possible way to receive broadcasts meant for the “android” package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26426 |
| Google–Android | In multiple locations, there is a possible Android/data access due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26427 |
| Google–Android | In startLockTaskMode of LockTaskController.java, there is a possible lock screen bypass due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26428 |
| Google–Android | In collectOps of AppOpsService.java, there is a possible way to cause permanent DoS due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26429 |
| Google–Android | In getDestinationForApp of SpaAppBridgeActivity, there is a possible cross-user file reveal due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26430 |
| Google–Android | In setupAccessibilityServices of AccessibilityFragment.java, there is a possible way to hide an enabled accessibility service due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26431 |
| Google–Android | In multiple locations, there is a possible way to persistently DoS the device due to a missing length check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26432 |
| Google–Android | In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2025-26434 |
| Google–Android | In updateState of ContentProtectionTogglePreferenceController.java, there is a possible way for a secondary user to disable the primary user’s deceptive app scanning setting due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26435 |
| Google–Android | In clearAllowBgActivityStarts of PendingIntentRecord.java, there is a possible way for an application to launch an activity from the background due to BAL Bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26436 |
| Google–Android | In CredentialManagerServiceStub of CredentialManagerService.java, there is a possible way to retrieve candidate credentials due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26437 |
| Google–Android | In smp_process_secure_connection_oob_data of smp_act.cc, there is a possible way to bypass SMP authentication due to Incorrect implementation of a protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26438 |
| Google–Android | In getComponentName of AccessibilitySettingsUtils.java, there is a possible way to for a malicious Talkback service to be enabled instead of the system component due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26439 |
| Google–Android | In multiple functions of CameraService.cpp, there is a possible way to use the camera from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26440 |
| Google–Android | In add_attr of sdp_discovery.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26441 |
| Google–Android | In onCreate of NotificationAccessConfirmationActivity.java, there is a possible incorrect verification of proper intent filters in NLS due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26442 |
| Google–Android | In parseHtml of HtmlToSpannedParser.java, there is a possible way to install apps without allowing installation from unknown sources due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26443 |
| Google–Android | In onHandleForceStop of VoiceInteractionManagerService.java, there is a bug that could cause the system to incorrectly revert to the default assistant application when a user-selected assistant is forcibly stopped due to a logic error in the code. This could lead to local escalation of privilege where the default assistant app is automatically granted ROLE_ASSISTANT with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26444 |
| Google–Android | In offerNetwork of ConnectivityService.java, there is a possible leak of sensitive data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26445 |
| Google–Android | In writeToParcel of CursorWindow.cpp, there is a possible out of bounds read due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26448 |
| Google–Android | In multiple locations, there is a possible permanent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26449 |
| Google–Android | In onInputEvent of IInputMethodSessionWrapper.java, there is a possible way for an untrusted app to inject key and motion events to the default IME due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26450 |
| Google–Android | In loadDrawableForCookie of ResourcesImpl.java, there is a possible way to access task snapshots of other apps due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26452 |
| Google–Android | In isContentUriForOtherUser of BluetoothOppSendFileInfo.java, there is a possible cross user data leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26453 |
| Google–Android | In validateUriSchemeAndPermission of DisclaimersParserImpl.java , there is a possible way to access data from another user due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26454 |
| Google–Android | In multiple functions of NdkMediaCodec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26455 |
| Google–Android | In multiple functions of DexUseManagerLocal.java, there is a possible way to crash system server due to a logic error in the code. This could lead to local permanent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26456 |
| Google–Android | In multiple functions of LocationProviderManager.java, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26458 |
| Google–Android | In Permission Manager, there is a possible way for the microphone privacy indicator to remain activated even after the user attempts to close the app due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2025-26461 |
| Google–Android | In AccessibilityServiceConnection.java, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26462 |
| Google–Android | In allowPackageAccess of multiple files, resource exhaustion is possible when repeatedly adding allowed packages. This could lead to a local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26463 |
| Google–Android | In executeAppFunction of AppSearchManagerService.java, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-26464 |
| Google–Android | In createIntentsList of PackageParser.java , there is a possible way to bypass lazy bundle hardening, allowing modified data to be passed to the next process due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32312 |
| Google–Android | In gralloc4, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2025-32316 |
| Google–Android | In App Widget, there is a possible Information Disclosure due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2025-32317 |
| Google–Android | In Skia, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2025-32318 |
| Google–Android | In System UI, there is a possible way to view other users’ images due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-05 | not yet calculated | CVE-2025-32320 |
| Google–Android | In isSafeIntent of AccountTypePreferenceLoader.java, there is a possible way to bypass an intent type check due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32321 |
| Google–Android | In onCreate of MediaProjectionPermissionActivity.java , there is a possible way to grant a malicious app a token enabling unauthorized screen recording capabilities due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32322 |
| Google–Android | In getCallingAppName of Shared.java, there is a possible way to trick users into granting file access via deceptive text in a permission popup due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32323 |
| Google–Android | In onCommand of ActivityManagerShellCommand.java, there is a possible arbitrary activity launch due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32324 |
| Google–Android | In appendFrom of Parcel.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32325 |
| Google–Android | In multiple functions of AppRestrictionsFragment.java, there is a possible way to bypass intent security check due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32326 |
| Google–Android | In multiple functions of PickerDbFacade.java, there is a possible unauthorized data access due to SQL injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32327 |
| Google–Android | In generateRandomPassword of LocalBluetoothLeBroadcast.java, there is a possible way to intercept the Auracast audio stream due to an insecure default value. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32330 |
| Google–Android | In showDismissibleKeyguard of KeyguardService.java, there is a possible way to bypass app pinning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32331 |
| Google–Android | In multiple locations, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32332 |
| Google–Android | In startSpaActivityForApp of SpaActivity.kt, there is a possible cross-user permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32333 |
| Google–Android | In updateState of ContentProtectionTogglePreferenceController.java, there is a possible way for a secondary user to disable the primary user’s deceptive app scanning setting due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32345 |
| Google–Android | In onActivityResult of VoicemailSettingsActivity.java, there is a possible work profile contact number leak due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32346 |
| Google–Android | In onStart of BiometricEnrollIntroduction.java, there is a possible way to determine the device’s location due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32347 |
| Google–Android | In multiple locations, there is a possible privilege escalation due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32349 |
| Google–Android | In maybeShowDialog of ControlsSettingsDialogManager.kt, there is a possible overlay of the ControlsSettingsDialog due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-32350 |
| Google–Android | In wl_cfgscan_update_v3_schedscan_results() of wl_cfgscan.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36887 |
| Google–Android | Elevation of Privilege | 2025-09-04 | not yet calculated | CVE-2025-36890 |
| Google–Android | Elevation of privilege | 2025-09-04 | not yet calculated | CVE-2025-36891 |
| Google–Android | Denial of service | 2025-09-04 | not yet calculated | CVE-2025-36892 |
| Google–Android | In ReadTachyonCommands of gxp_main_actor.cc, there is a possible information leak due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36893 |
| Google–Android | In TBD of TBD, there is a possible DoS due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36894 |
| Google–Android | Information disclosure | 2025-09-04 | not yet calculated | CVE-2025-36895 |
| Google–Android | WLAN in Android before 2025-09-05 on Google Pixel devices allows elevation of privilege, aka A-394765106. | 2025-09-04 | not yet calculated | CVE-2025-36896 |
| Google–Android | In unknown of cd_CnMsgCodecUserApi.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36897 |
| Google–Android | There is a possible escalation of privilege due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36898 |
| Google–Android | There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36899 |
| Google–Android | In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36900 |
| Google–Android | WLAN in Android before 2025-09-05 on Google Pixel devices allows elevation of privilege, aka A-396462223. | 2025-09-04 | not yet calculated | CVE-2025-36901 |
| Google–Android | In syna_cdev_ioctl_store_pid() of syna_tcm2_sysfs.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36902 |
| Google–Android | In lwis_io_buffer_write, there is a possible OOB read/write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36903 |
| Google–Android | WLAN in Android before 2025-09-05 on Google Pixel devices allows elevation of privilege, aka A-396458384. | 2025-09-04 | not yet calculated | CVE-2025-36904 |
| Google–Android | In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36905 |
| Google–Android | In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36906 |
| Google–Android | In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36907 |
| Google–Android | In lwis_top_register_io of lwis_device_top.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-36908 |
| Google–Android | Information disclosure | 2025-09-04 | not yet calculated | CVE-2025-36909 |
| Google–Android | In setDisplayName of AssociationRequest.java, there is a possible way for an app to retain CDM association due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48522 |
| Google–Android | In onCreate of SelectAccountActivity.java, there is a possible way to add contacts without permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48523 |
| Google–Android | In isSystem of WifiPermissionsUtil.java, there is a possible permission bypass due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48524 |
| Google–Android | In createMultiProfilePagerAdapter of ChooserActivity.java , there is a possible way for an app to launch the ChooserActivity in another profile due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48526 |
| Google–Android | In multiple locations, there is a possible way to leak hidden work profile notifications due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48527 |
| Google–Android | In multiple locations, there is a possible way to overlay biometrics due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48528 |
| Google–Android | In setRingtoneUri of VoicemailNotificationSettingsUtil.java , there is a possible cross user data leak due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48529 |
| Google–Android | In multiple locations, there is a possible condition that results in OOB accesses due to an incorrect bounds check. This could lead to remote code execution in combination with other bugs, with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48530 |
| Google–Android | In getCallingPackageName of CredentialStorage, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48531 |
| Google–Android | In markMediaAsFavorite of MediaProvider.java, there is a possible way to bypass the WRITE_EXTERNAL_STORAGE permission due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48532 |
| Google–Android | In multiple locations, there is a possible way to use apps linked from a context menu of a lockscreen app due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48533 |
| Google–Android | In getDefaultCBRPackageName of CellBroadcastHandler.java, there is a possible escalation of privilege due to a logic error in the code. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48534 |
| Google–Android | In assertSafeToStartCustomActivity of AppRestrictionsFragment.java , there is a possible way to exploit a parcel mismatch resulting in a launch anywhere vulnerability due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48535 |
| Google–Android | In multiple locations, there is a possible way to persistently DoS the device due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48537 |
| Google–Android | In setApplicationHiddenSettingAsUser of PackageManagerService.java, there is a possible way to hide a system critical package due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48538 |
| Google–Android | In SendPacketToPeer of acl_arbiter.cc, there is a possible out of bounds read due to a use after free. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48539 |
| Google–Android | In processTransactInternal of RpcState.cpp, there is a possible local out of memory write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48540 |
| Google–Android | In onCreate of FaceSettings.java, there is a possible way to remove biometric unlock across user profiles due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48541 |
| Google–Android | In multiple functions of AccountManagerService.java, there is a possible permanent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48542 |
| Google–Android | In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48543 |
| Google–Android | In multiple locations, there is a possible way to read files belonging to other apps due to SQL injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48544 |
| Google–Android | In isSystemUid of AccountManagerService.java, there is a possible way for an app to access privileged APIs due to a confused deputy. This could lead to local privilege escalation with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48545 |
| Google–Android | In checkPermissions of SafeActivityOptions.java, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48546 |
| Google–Android | In multiple locations, there is a possible one-time permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48547 |
| Google–Android | In multiple functions of AppOpsControllerImpl.java, there is a possible way to record audio without displaying the privacy indicator due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48548 |
| Google–Android | In multiple locations, there is a possible way to record audio via a background app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48549 |
| Google–Android | In testGrantSlicePermission of SliceManagerTest.java, there is a possible permanent denial of service due to a path traversal error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48550 |
| Google–Android | In multiple locations, there is a possible leak of an image across the Android User isolation boundary due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48551 |
| Google–Android | In saveGlobalProxyLocked of DevicePolicyManagerService.java, there is a possible way to desync from persistence due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48552 |
| Google–Android | In handlePackagesChanged of DevicePolicyManagerService.java, there is a possible DoS of a device admin due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48553 |
| Google–Android | In handlePackagesChanged of DevicePolicyManagerService.java, there is a possible persistent denial of service due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48554 |
| Google–Android | In multiple methods of NotificationChannel.java, there is a possible desynchronization from persistence due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48556 |
| Google–Android | In multiple functions of BatteryService.java, there is a possible way to hijack implicit intent intended for system app due to Implicit intent hijacking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48558 |
| Google–Android | In multiple functions of AppOpsService.java, there is a possible add a large amount of app ops due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48559 |
| Google–Android | In AndroidManifest.xml, there is a possible way for an app to monitor motion events due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48560 |
| Google–Android | In multiple locations, there is a possible way to access data displayed on the screen due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48561 |
| Google–Android | In writeContent of RemotePrintDocument.java, there is a possible information disclosure due to a logic error. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48562 |
| Google–Android | In onNullBinding of RemoteFillService.java, there is a possible background activity launch due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48563 |
| Google–Android | In VerifyNoOverlapInSessions of apexd.cpp, there is a possible way to block security updates through mainline installations due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2025-09-04 | not yet calculated | CVE-2025-48581 |
| Google–Chrome | Use after free in V8 in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2025-09-03 | not yet calculated | CVE-2025-9864 |
| Google–Chrome | Inappropriate implementation in Toolbar in Google Chrome on Android prior to 140.0.7339.80 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium) | 2025-09-03 | not yet calculated | CVE-2025-9865 |
| Google–Chrome | Inappropriate implementation in Extensions in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium) | 2025-09-03 | not yet calculated | CVE-2025-9866 |
| Google–Chrome | Inappropriate implementation in Downloads in Google Chrome on Android prior to 140.0.7339.80 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) | 2025-09-03 | not yet calculated | CVE-2025-9867 |
| Gunosy Inc.–“Gunosy” App for Android | “Gunosy” App contains a vulnerability where sensitive information may be included in the application’s outbound communication. If a user accesses a crafted URL, an attacker may obtain the JWT (JSON Web Token). | 2025-09-02 | not yet calculated | CVE-2025-44017 |
| h2oai–h2oai/h2o-3 | A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8. | 2025-09-02 | not yet calculated | CVE-2025-5662 |
| h2oai–h2oai/h2o-3 | A vulnerability in the h2oai/h2o-3 repository allows attackers to exploit deserialization of untrusted data, potentially leading to arbitrary code execution and reading of system files. This issue affects the latest master branch version 3.47.0.99999. The vulnerability arises from the ability to bypass regular expression filters intended to prevent malicious parameter injection in JDBC connections. Attackers can manipulate spaces between parameters to evade detection, allowing for unauthorized file access and code execution. The vulnerability is addressed in version 3.46.0.8. | 2025-09-01 | not yet calculated | CVE-2025-6507 |
| InseeFrLab–onyxia | Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories in the public (unauthenticated) /public/catalogs endpoint.vOnly instances using private helm repositories (i.e setting username & password in the catalogs configuration) are affected. This is fixed in version 4.9.0. | 2025-09-05 | not yet calculated | CVE-2025-58366 |
| Jenkins Project–Jenkins Git client Plugin | In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | 2025-09-03 | not yet calculated | CVE-2025-58458 |
| Jenkins Project–Jenkins global-build-stats Plugin | Jenkins global-build-stats Plugin 322.v22f4db_18e2dd and earlier does not perform permission checks in its REST API endpoints, allowing attackers with Overall/Read permission to enumerate graph IDs. | 2025-09-03 | not yet calculated | CVE-2025-58459 |
| Jenkins Project–Jenkins OpenTelemetry Plugin | A missing permission check in Jenkins OpenTelemetry Plugin 3.1543.v8446b_92b_cd64 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | 2025-09-03 | not yet calculated | CVE-2025-58460 |
| jjjake–internetarchive | internetarchive is a Python and Command-Line Interface to Archive.org In versions 5.5.0 and below, there is a directory traversal (path traversal) vulnerability in the File.download() method of the internetarchive library. The file.download() method does not properly sanitize user-supplied filenames or validate the final download path. A maliciously crafted filename could contain path traversal sequences (e.g., ../../../../windows/system32/file.txt) or illegal characters that, when processed, would cause the file to be written outside of the intended target directory. An attacker could potentially overwrite critical system files or application configuration files, leading to a denial of service, privilege escalation, or remote code execution, depending on the context in which the library is used. The vulnerability is particularly critical for users on Windows systems, but all operating systems are affected. This issue is fixed in version 5.5.1. | 2025-09-06 | not yet calculated | CVE-2025-58438 |
| kujirahand–TkEasyGUI | Improper neutralization of special elements used in an OS command (‘OS Command Injection’) issue exists in TkEasyGUI versions prior to v1.0.22. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote unauthenticated attacker if the settings are configured to construct messages from external sources. | 2025-09-05 | not yet calculated | CVE-2025-55037 |
| kujirahand–TkEasyGUI | Uncontrolled search path element issue exists in TkEasyGUI versions prior to v1.0.22. If this vulnerability is exploited, arbitrary code may be executed with the privilege of running the program. | 2025-09-05 | not yet calculated | CVE-2025-55671 |
| langchain-ai–langchain-ai/langchain | The langchain-ai/langchain project, specifically the EverNoteLoader component, is vulnerable to XML External Entity (XXE) attacks due to insecure XML parsing. The affected version is 0.3.63. The vulnerability arises from the use of etree.iterparse() without disabling external entity references, which can lead to sensitive information disclosure. An attacker could exploit this by crafting a malicious XML payload that references local files, potentially exposing sensitive data such as /etc/passwd. | 2025-09-04 | not yet calculated | CVE-2025-6984 |
| LearningCircuit–local-deep-research | Local Deep Research is an AI-powered research assistant for deep, iterative research. Versions 0.2.0 through 0.6.7 stored confidential information, including API keys, in a local SQLite database without encryption. This behavior was not clearly documented outside of the database architecture page. Users were not given the ability to configure the database location, allowing anyone with access to the container or host filesystem to retrieve sensitive data in plaintext by accessing the .db file. This is fixed in version 1.0.0. | 2025-09-03 | not yet calculated | CVE-2025-57806 |
| lemon8866–StreamVault | StreamVault is a multi-platform video parsing and downloading tool. Prior to version 250822, after logging into the StreamVault-system, an attacker can modify certain system parameters, construct malicious commands, execute command injection attacks against the system, and ultimately gain server privileges. Users of all versions of the StreamVault system to date who have not modified their background passwords or use weak passwords are at risk of having their systems taken over via remote command execution. This issue has been patched in version 250822. | 2025-09-01 | not yet calculated | CVE-2025-57799 |
| libretro–libretro-common | Out-of-bounds write in cdfs_open_cue_track in libretro libretro-common latest on all platforms allows remote attackers to execute arbitrary code via a crafted .cue file with a file path exceeding PATH_MAX_LENGTH that is copied using memcpy into a fixed-size buffer. | 2025-09-01 | not yet calculated | CVE-2025-9809 |
| Liferay–Portal | In Liferay Portal 7.4.3.27 through 7.4.3.42, and Liferay DXP 2024.Q1.1 through 2024.Q1.20, 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 27 through update 42 (Liferay PaaS, and Liferay Self-Hosted), the Objects module does not restrict the use of Groovy scripts in Object actions for Admin Users. This allows remote authenticated admin users with the Instance Administrator role to execute arbitrary Groovy scripts (i.e., remote code execution) through Object actions. In contrast, in Liferay DXP (Liferay SaaS), the use of Groovy in Object actions is not allowed due to the high security risks it poses. Starting from Liferay DXP 2024.Q2 and later, a new feature has been introduced in Instance Settings that allows administrators to configure whether Groovy scripts are allowed in their instances. | 2025-09-01 | not yet calculated | CVE-2025-3586 |
| Liferay–Portal | Kaleo Forms Admin in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 27, and older unsupported versions does not restrict the saving of request parameters in the portlet session, which allows remote attackers to consume system memory leading to denial-of-service (DoS) conditions via crafted HTTP request. | 2025-09-04 | not yet calculated | CVE-2025-43772 |
| LinkedIn–LinkedIn Mobile Application | LinkedIn Mobile Application for Android version 4.1.1087.2 fails to update link preview metadata (image, title, description) when a user replaces the original URL in a post or comment before publishing. As a result, the stale preview remains visible while the clickable link points to a different URL, which can be malicious. This UI misrepresentation enables attackers to deceive users by displaying trusted previews for harmful links, facilitating phishing attacks and user confusion. | 2025-09-03 | not yet calculated | CVE-2025-56139 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable update with duplicated devices in the same batch is possible. Unfortunately, netdev event path only removes the first device that is found, leaving unregistered the hook of the duplicated device. Check if a duplicated device exists in the transaction batch, bail out with EEXIST in such case. WARNING is hit when unregistering the hook: [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S 6.16.0+ #170 PREEMPT(full) […] [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150 | 2025-09-03 | not yet calculated | CVE-2025-38678 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: media: venus: Fix OOB read due to missing payload bound check Currently, The event_seq_changed() handler processes a variable number of properties sent by the firmware. The number of properties is indicated by the firmware and used to iterate over the payload. However, the payload size is not being validated against the actual message length. This can lead to out-of-bounds memory access if the firmware provides a property count that exceeds the data available in the payload. Such a condition can result in kernel crashes or potential information leaks if memory beyond the buffer is accessed. Fix this by properly validating the remaining size of the payload before each property access and updating bounds accordingly as properties are parsed. This ensures that property parsing is safely bounded within the received message buffer and protects against malformed or malicious firmware behavior. | 2025-09-04 | not yet calculated | CVE-2025-38679 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (buflen > 2), buf the function accesses buffer[3], requiring at least 4 bytes. This can lead to an out-of-bounds read if the buffer has exactly 3 bytes. Fix it by checking that the buffer has at least 4 bytes in uvc_parse_format(). | 2025-09-04 | not yet calculated | CVE-2025-38680 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() Memory hot remove unmaps and tears down various kernel page table regions as required. The ptdump code can race with concurrent modifications of the kernel page tables. When leaf entries are modified concurrently, the dump code may log stale or inconsistent information for a VA range, but this is otherwise not harmful. But when intermediate levels of kernel page table are freed, the dump code will continue to use memory that has been freed and potentially reallocated for another purpose. In such cases, the ptdump code may dereference bogus addresses, leading to a number of potential problems. To avoid the above mentioned race condition, platforms such as arm64, riscv and s390 take memory hotplug lock, while dumping kernel page table via the sysfs interface /sys/kernel/debug/kernel_page_tables. Similar race condition exists while checking for pages that might have been marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages which in turn calls ptdump_check_wx(). Instead of solving this race condition again, let’s just move the memory hotplug lock inside generic ptdump_check_wx() which will benefit both the scenarios. Drop get_online_mems() and put_online_mems() combination from all existing platform ptdump code paths. | 2025-09-04 | not yet calculated | CVE-2025-38681 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: i2c: core: Fix double-free of fwnode in i2c_unregister_device() Before commit df6d7277e552 (“i2c: core: Do not dereference fwnode in struct device”), i2c_unregister_device() only called fwnode_handle_put() on of_node-s in the form of calling of_node_put(client->dev.of_node). But after this commit the i2c_client’s fwnode now unconditionally gets fwnode_handle_put() on it. When the i2c_client has no primary (ACPI / OF) fwnode but it does have a software fwnode, the software-node will be the primary node and fwnode_handle_put() will put() it. But for the software fwnode device_remove_software_node() will also put() it leading to a double free: [ 82.665598] ————[ cut here ]———— [ 82.665609] refcount_t: underflow; use-after-free. [ 82.665808] WARNING: CPU: 3 PID: 1502 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x11 … [ 82.666830] RIP: 0010:refcount_warn_saturate+0xba/0x110 … [ 82.666962] <TASK> [ 82.666971] i2c_unregister_device+0x60/0x90 Fix this by not calling fwnode_handle_put() when the primary fwnode is a software-node. | 2025-09-04 | not yet calculated | CVE-2025-38682 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Fix panic during namespace deletion with VF The existing code move the VF NIC to new namespace when NETDEV_REGISTER is received on netvsc NIC. During deletion of the namespace, default_device_exit_batch() >> default_device_exit_net() is called. When netvsc NIC is moved back and registered to the default namespace, it automatically brings VF NIC back to the default namespace. This will cause the default_device_exit_net() >> for_each_netdev_safe loop unable to detect the list end, and hit NULL ptr: [ 231.449420] mana 7870:00:00.0 enP30832s1: Moved VF to namespace with: eth0 [ 231.449656] BUG: kernel NULL pointer dereference, address: 0000000000000010 [ 231.450246] #PF: supervisor read access in kernel mode [ 231.450579] #PF: error_code(0x0000) – not-present page [ 231.450916] PGD 17b8a8067 P4D 0 [ 231.451163] Oops: Oops: 0000 [#1] SMP NOPTI [ 231.451450] CPU: 82 UID: 0 PID: 1394 Comm: kworker/u768:1 Not tainted 6.16.0-rc4+ #3 VOLUNTARY [ 231.452042] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/21/2024 [ 231.452692] Workqueue: netns cleanup_net [ 231.452947] RIP: 0010:default_device_exit_batch+0x16c/0x3f0 [ 231.453326] Code: c0 0c f5 b3 e8 d5 db fe ff 48 85 c0 74 15 48 c7 c2 f8 fd ca b2 be 10 00 00 00 48 8d 7d c0 e8 7b 77 25 00 49 8b 86 28 01 00 00 <48> 8b 50 10 4c 8b 2a 4c 8d 62 f0 49 83 ed 10 4c 39 e0 0f 84 d6 00 [ 231.454294] RSP: 0018:ff75fc7c9bf9fd00 EFLAGS: 00010246 [ 231.454610] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 61c8864680b583eb [ 231.455094] RDX: ff1fa9f71462d800 RSI: ff75fc7c9bf9fd38 RDI: 0000000030766564 [ 231.455686] RBP: ff75fc7c9bf9fd78 R08: 0000000000000000 R09: 0000000000000000 [ 231.456126] R10: 0000000000000001 R11: 0000000000000004 R12: ff1fa9f70088e340 [ 231.456621] R13: ff1fa9f70088e340 R14: ffffffffb3f50c20 R15: ff1fa9f7103e6340 [ 231.457161] FS: 0000000000000000(0000) GS:ff1faa6783a08000(0000) knlGS:0000000000000000 [ 231.457707] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 231.458031] CR2: 0000000000000010 CR3: 0000000179ab2006 CR4: 0000000000b73ef0 [ 231.458434] Call Trace: [ 231.458600] <TASK> [ 231.458777] ops_undo_list+0x100/0x220 [ 231.459015] cleanup_net+0x1b8/0x300 [ 231.459285] process_one_work+0x184/0x340 To fix it, move the ns change to a workqueue, and take rtnl_lock to avoid changing the netdev list when default_device_exit_net() is using it. | 2025-09-04 | not yet calculated | CVE-2025-38683 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: use old ‘nbands’ while purging unused classes Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify() after recent changes from Lion [2]. The problem is: in ets_qdisc_change() we purge unused DWRR queues; the value of ‘q->nbands’ is the new one, and the cleanup should be done with the old one. The problem is here since my first attempts to fix ets_qdisc_change(), but it surfaced again after the recent qdisc len accounting fixes. Fix it purging idle DWRR queues before assigning a new value of ‘q->nbands’, so that all purge operations find a consistent configuration: – old ‘q->nbands’ because it’s needed by ets_class_find() – old ‘q->nstrict’ because it’s needed by ets_class_is_strict() BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) – not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary) Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021 RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80 Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa <48> 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab RSP: 0018:ffffba186009f400 EFLAGS: 00010202 RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004 RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004 R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000 R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000 FS: 00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <TASK> ets_class_qlen_notify+0x65/0x90 [sch_ets] qdisc_tree_reduce_backlog+0x74/0x110 ets_qdisc_change+0x630/0xa40 [sch_ets] __tc_modify_qdisc.constprop.0+0x216/0x7f0 tc_modify_qdisc+0x7c/0x120 rtnetlink_rcv_msg+0x145/0x3f0 netlink_rcv_skb+0x53/0x100 netlink_unicast+0x245/0x390 netlink_sendmsg+0x21b/0x470 ____sys_sendmsg+0x39d/0x3d0 ___sys_sendmsg+0x9a/0xe0 __sys_sendmsg+0x7a/0xd0 do_syscall_64+0x7d/0x160 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f2155114084 Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89 RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084 RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003 RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0 R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0 </TASK> [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/ [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/ | 2025-09-04 | not yet calculated | CVE-2025-38684 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit This issue triggers when a userspace program does an ioctl FBIOPUT_CON2FBMAP by passing console number and frame buffer number. Ideally this maps console to frame buffer and updates the screen if console is visible. As part of mapping it has to do resize of console according to frame buffer info. if this resize fails and returns from vc_do_resize() and continues further. At this point console and new frame buffer are mapped and sets display vars. Despite failure still it continue to proceed updating the screen at later stages where vc_data is related to previous frame buffer and frame buffer info and display vars are mapped to new frame buffer and eventully leading to out-of-bounds write in fast_imageblit(). This bheviour is excepted only when fg_console is equal to requested console which is a visible console and updates screen with invalid struct references in fbcon_putcs(). | 2025-09-04 | not yet calculated | CVE-2025-38685 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry When UFFDIO_MOVE encounters a migration PMD entry, it proceeds with obtaining a folio and accessing it even though the entry is swp_entry_t. Add the missing check and let split_huge_pmd() handle migration entries. While at it also remove unnecessary folio check. [surenb@google.com: remove extra folio check, per David] | 2025-09-04 | not yet calculated | CVE-2025-38686 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: comedi: fix race between polling and detaching syzbot reports a use-after-free in comedi in the below link, which is due to comedi gladly removing the allocated async area even though poll requests are still active on the wait_queue_head inside of it. This can cause a use-after-free when the poll entries are later triggered or removed, as the memory for the wait_queue_head has been freed. We need to check there are no tasks queued on any of the subdevices’ wait queues before allowing the device to be detached by the `COMEDI_DEVCONFIG` ioctl. Tasks will read-lock `dev->attach_lock` before adding themselves to the subdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl handler by write-locking `dev->attach_lock` before checking that all of the subdevices are safe to be deleted. This includes testing for any sleepers on the subdevices’ wait queues. It remains locked until the device has been detached. This requires the `comedi_device_detach()` function to be refactored slightly, moving the bulk of it into new function `comedi_device_detach_locked()`. Note that the refactor of `comedi_device_detach()` results in `comedi_device_cancel_all()` now being called while `dev->attach_lock` is write-locked, which wasn’t the case previously, but that does not matter. Thanks to Jens Axboe for diagnosing the problem and co-developing this patch. | 2025-09-04 | not yet calculated | CVE-2025-38687 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: iommufd: Prevent ALIGN() overflow When allocating IOVA the candidate range gets aligned to the target alignment. If the range is close to ULONG_MAX then the ALIGN() can wrap resulting in a corrupted iova. Open code the ALIGN() using get_add_overflow() to prevent this. This simplifies the checks as we don’t need to check for length earlier either. Consolidate the two copies of this code under a single helper. This bug would allow userspace to create a mapping that overlaps with some other mapping or a reserved range. | 2025-09-04 | not yet calculated | CVE-2025-38688 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Fix NULL dereference in avx512_status() Problem ——- With CONFIG_X86_DEBUG_FPU enabled, reading /proc/[kthread]/arch_status causes a warning and a NULL pointer dereference. This is because the AVX-512 timestamp code uses x86_task_fpu() but doesn’t check it for NULL. CONFIG_X86_DEBUG_FPU addles that function for kernel threads (PF_KTHREAD specifically), making it return NULL. The point of the warning was to ensure that kernel threads only access task->fpu after going through kernel_fpu_begin()/_end(). Note: all kernel tasks exposed in /proc have a valid task->fpu. Solution ——– One option is to silence the warning and check for NULL from x86_task_fpu(). However, that warning is fairly fresh and seems like a defense against misuse of the FPU state in kernel threads. Instead, stop outputting AVX-512_elapsed_ms for kernel threads altogether. The data was garbage anyway because avx512_timestamp is only updated for user threads, not kernel threads. If anyone ever wants to track kernel thread AVX-512 use, they can come back later and do it properly, separate from this bug fix. [ dhansen: mostly rewrite changelog ] | 2025-09-04 | not yet calculated | CVE-2025-38689 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: drm/xe/migrate: prevent infinite recursion If the buf + offset is not aligned to XE_CAHELINE_BYTES we fallback to using a bounce buffer. However the bounce buffer here is allocated on the stack, and the only alignment requirement here is that it’s naturally aligned to u8, and not XE_CACHELINE_BYTES. If the bounce buffer is also misaligned we then recurse back into the function again, however the new bounce buffer might also not be aligned, and might never be until we eventually blow through the stack, as we keep recursing. Instead of using the stack use kmalloc, which should respect the power-of-two alignment request here. Fixes a kernel panic when triggering this path through eudebug. v2 (Stuart): – Add build bug check for power-of-two restriction – s/EINVAL/ENOMEM/ (cherry picked from commit 38b34e928a08ba594c4bbf7118aa3aadacd62fff) | 2025-09-04 | not yet calculated | CVE-2025-38690 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix uninited ptr deref in block/scsi layout The error occurs on the third attempt to encode extents. When function ext_tree_prepare_commit() reallocates a larger buffer to retry encoding extents, the “layoutupdate_pages” page array is initialized only after the retry loop. But ext_tree_free_commitdata() is called on every iteration and tries to put pages in the array, thus dereferencing uninitialized pointers. An additional problem is that there is no limit on the maximum possible buffer_size. When there are too many extents, the client may create a layoutcommit that is larger than the maximum possible RPC size accepted by the server. During testing, we observed two typical scenarios. First, one memory page for extents is enough when we work with small files, append data to the end of the file, or preallocate extents before writing. But when we fill a new large file without preallocating, the number of extents can be huge, and counting the number of written extents in ext_tree_encode_commit() does not help much. Since this number increases even more between unlocking and locking of ext_tree, the reallocated buffer may not be large enough again and again. | 2025-09-04 | not yet calculated | CVE-2025-38691 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: exfat: add cluster chain loop check for dir An infinite loop may occur if the following conditions occur due to file system corruption. (1) Condition for exfat_count_dir_entries() to loop infinitely. – The cluster chain includes a loop. – There is no UNUSED entry in the cluster chain. (2) Condition for exfat_create_upcase_table() to loop infinitely. – The cluster chain of the root directory includes a loop. – There are no UNUSED entry and up-case table entry in the cluster chain of the root directory. (3) Condition for exfat_load_bitmap() to loop infinitely. – The cluster chain of the root directory includes a loop. – There are no UNUSED entry and bitmap entry in the cluster chain of the root directory. (4) Condition for exfat_find_dir_entry() to loop infinitely. – The cluster chain includes a loop. – The unused directory entries were exhausted by some operation. (5) Condition for exfat_check_dir_empty() to loop infinitely. – The cluster chain includes a loop. – The unused directory entries were exhausted by some operation. – All files and sub-directories under the directory are deleted. This commit adds checks to break the above infinite loop. | 2025-09-04 | not yet calculated | CVE-2025-38692 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar In w7090p_tuner_write_serpar, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity check, null pointer deref would happen. We add check on msg[0].len to prevent crash. Similar commit: commit 0ed554fd769a (“media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()”) | 2025-09-04 | not yet calculated | CVE-2025-38693 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() In dib7090p_rw_on_apb, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity check, null pointer deref would happen. We add check on msg[0].len to prevent crash. Similar issue occurs when access msg[1].buf[0] and msg[1].buf[1]. Similar commit: commit 0ed554fd769a (“media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()”) | 2025-09-04 | not yet calculated | CVE-2025-38694 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure If a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the resultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may occur before sli4_hba.hdwqs are allocated. This may result in a null pointer dereference when attempting to take the abts_io_buf_list_lock for the first hardware queue. Fix by adding a null ptr check on phba->sli4_hba.hdwq and early return because this situation means there must have been an error during port initialization. | 2025-09-04 | not yet calculated | CVE-2025-38695 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: MIPS: Don’t crash in stack_top() for tasks without ABI or vDSO Not all tasks have an ABI associated or vDSO mapped, for example kthreads never do. If such a task ever ends up calling stack_top(), it will derefence the NULL ABI pointer and crash. This can for example happen when using kunit: mips_stack_top+0x28/0xc0 arch_pick_mmap_layout+0x190/0x220 kunit_vm_mmap_init+0xf8/0x138 __kunit_add_resource+0x40/0xa8 kunit_vm_mmap+0x88/0xd8 usercopy_test_init+0xb8/0x240 kunit_try_run_case+0x5c/0x1a8 kunit_generic_run_threadfn_adapter+0x28/0x50 kthread+0x118/0x240 ret_from_kernel_thread+0x14/0x1c Only dereference the ABI point if it is set. The GIC page is also included as it is specific to the vDSO. Also move the randomization adjustment into the same conditional. | 2025-09-04 | not yet calculated | CVE-2025-38696 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: jfs: upper bound check of tree index in dbAllocAG When computing the tree index in dbAllocAG, we never check if we are out of bounds realative to the size of the stree. This could happen in a scenario where the filesystem metadata are corrupted. | 2025-09-04 | not yet calculated | CVE-2025-38697 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: jfs: Regular file corruption check The reproducer builds a corrupted file on disk with a negative i_size value. Add a check when opening this file to avoid subsequent operation failures. | 2025-09-04 | not yet calculated | CVE-2025-38698 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails. | 2025-09-04 | not yet calculated | CVE-2025-38699 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated In case of an ib_fast_reg_mr allocation failure during iSER setup, the machine hits a panic because iscsi_conn->dd_data is initialized unconditionally, even when no memory is allocated (dd_size == 0). This leads invalid pointer dereference during connection teardown. Fix by setting iscsi_conn->dd_data only if memory is actually allocated. Panic trace: ———— iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12 iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers BUG: unable to handle page fault for address: fffffffffffffff8 RIP: 0010:swake_up_locked.part.5+0xa/0x40 Call Trace: complete+0x31/0x40 iscsi_iser_conn_stop+0x88/0xb0 [ib_iser] iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi] iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi] iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi] ? netlink_lookup+0x12f/0x1b0 ? netlink_deliver_tap+0x2c/0x200 netlink_unicast+0x1ab/0x280 netlink_sendmsg+0x257/0x4f0 ? _copy_from_user+0x29/0x60 sock_sendmsg+0x5f/0x70 | 2025-09-04 | not yet calculated | CVE-2025-38700 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data() when an inode had the INLINE_DATA_FL flag set but was missing the system.data extended attribute. Since this can happen due to a maiciouly fuzzed file system, we shouldn’t BUG, but rather, report it as a corrupted file system. Add similar replacements of BUG_ON with EXT4_ERROR_INODE() ii ext4_create_inline_data() and ext4_inline_data_truncate(). | 2025-09-04 | not yet calculated | CVE-2025-38701 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: fbdev: fix potential buffer overflow in do_register_framebuffer() The current implementation may lead to buffer overflow when: 1. Unregistration creates NULL gaps in registered_fb[] 2. All array slots become occupied despite num_registered_fb < FB_MAX 3. The registration loop exceeds array bounds Add boundary check to prevent registered_fb[FB_MAX] access. | 2025-09-04 | not yet calculated | CVE-2025-38702 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if userspace closes the associated submit queue. At the same time the fence could have been exported to a third party (for example a sync_fence fd) which will then cause an use- after-free on subsequent access. To make this safe we need to make the driver compliant with the newly documented dma-fence rules. Driver has to ensure a RCU grace period between signalling a fence and freeing any data pointed to by said fence. For the timeline name we simply make the queue be freed via kfree_rcu and for the shared lock associated with multiple queues we add a RCU grace period before freeing the per GT structure holding the lock. | 2025-09-04 | not yet calculated | CVE-2025-38703 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix possible invalid rdp’s->nocb_cb_kthread pointer access In the preparation stage of CPU online, if the corresponding the rdp’s->nocb_cb_kthread does not exist, will be created, there is a situation where the rdp’s rcuop kthreads creation fails, and then de-offload this CPU’s rdp, does not assign this CPU’s rdp->nocb_cb_kthread pointer, but this rdp’s->nocb_gp_rdp and rdp’s->rdp_gp->nocb_gp_kthread is still valid. This will cause the subsequent re-offload operation of this offline CPU, which will pass the conditional check and the kthread_unpark() will access invalid rdp’s->nocb_cb_kthread pointer. This commit therefore use rdp’s->nocb_gp_kthread instead of rdp_gp’s->nocb_gp_kthread for safety check. | 2025-09-04 | not yet calculated | CVE-2025-38704 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix null pointer access Writing a string without delimiters (‘ ‘, ‘n’, ‘ |
