PoC Year: 2025
The most featured CVEs in this year’s security newsletters, with public Proof-of-Concepts, ordered by mention count.
For the most up-to-date and accurate info, visit the NIST links. Always audit PoCs thoroughly before running them. Follow links with caution.
CVE-2025-53770
- Severity: 8.8 HIGH
- Impacted Products: Microsoft SharePoint Server (Subscription Edition, 2016, 2019)
- Description: Microsoft SharePoint Server is affected by a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution. This flaw can be chained with an authentication bypass to enable full system compromise.
- Remediation:
- More Info: NVD - CVE-2025-53770
- PoC:
CVE-2025-31324
- Severity: 10.0 CRITICAL
- Impacted Products: SAP NetWeaver Visual Composer, VCFRAMEWORK version 7.50
- Description: SAP NetWeaver Visual Composer contains an improper authorization vulnerability in its Metadata Uploader component, allowing unauthenticated attackers to upload arbitrary files. This flaw can lead to unauthorized access and potentially remote code execution.
- Remediation:
- More Info: NVD - CVE-2025-31324
- PoC:
CVE-2025-59287
- Severity: 9.8 CRITICAL
- Impacted Products: Microsoft Windows Server Update Services (WSUS) 2012, Microsoft Windows Server Update Services (WSUS) 2016, Microsoft Windows Server Update Services (WSUS) 2019, Microsoft Windows Server Update Services (WSUS) 2022, Microsoft Windows Server Update Services (WSUS) 2025
- Description: Microsoft Windows Server Update Services (WSUS) is affected by a deserialization vulnerability that allows for unauthenticated remote code execution. This issue occurs when the service processes specially crafted requests sent to its web service endpoints, such as those used for client authentication or event reporting.
- Remediation:
- More Info: NVD - CVE-2025-59287
- PoC:
CVE-2025-29824
- Severity: 7.8 HIGH
- Impacted Products: Microsoft Windows Common Log File System (CLFS) Driver
- Description: Microsoft Windows Common Log File System (CLFS) Driver is affected by a use-after-free vulnerability. An authorized local attacker can exploit this flaw to elevate privileges on the system.
- Remediation:
- Dell PowerMaxOS, Dell PowerMax EEM, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Unisphere 360, Dell Solutions Enabler and Dell Solutions Enabler Virtual Appliance Security Update for Multiple Vulnerabilit
- Windows Common Log File System Driver Elevation of Privilege Vulnerability
- Microsoft KB 5055518
- More Info: NVD - CVE-2025-29824
- PoC:
CVE-2025-53771
- Severity: 6.5 MEDIUM
- Impacted Products: Microsoft SharePoint Server Subscription Edition, Microsoft SharePoint Server 2019, Microsoft SharePoint Server 2016
- Description: Microsoft SharePoint Server is affected by a path traversal and spoofing vulnerability (CVE-2025-53771) that acts as a patch bypass for CVE-2025-49706, enabling unauthenticated remote code execution when chained with other vulnerabilities. This flaw allows an attacker to bypass authentication mechanisms.
- Remediation:
- More Info: NVD - CVE-2025-53771
- PoC:
CVE-2025-32433
- Severity: 10.0 CRITICAL
- Impacted Products: Erlang/OTP 27.3.3, Erlang/OTP 26.2.5.11, Erlang/OTP 25.3.2.20
- Description: Erlang/OTP is affected by a vulnerability in its SSH server implementation that allows for unauthenticated remote code execution. This issue stems from the improper handling of SSH protocol messages during the initial handshake phase.
- Remediation:
- More Info: NVD - CVE-2025-32433
- PoC:
CVE-2025-42999
- Severity: 9.1 CRITICAL
- Impacted Products: SAP NetWeaver Visual Composer Metadata Uploader
- Description: SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
- Remediation:
- More Info: NVD - CVE-2025-42999
- PoC:
CVE-2024-55591
- Severity: 9.8 CRITICAL
- Impacted Products: FortiOS 7.0.0 through 7.0.16, FortiProxy 7.0.0 through 7.0.19, FortiProxy 7.2.0 through 7.2.12
- Description: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
- Remediation:
- More Info: NVD - CVE-2024-55591
- PoC:
CVE-2025-55182
- Severity: 10.0 CRITICAL
- Impacted Products: React Server Components (RSC) 19.0.0, React Server Components (RSC) 19.1.0, React Server Components (RSC) 19.1.1, React Server Components (RSC) 19.2.0
- Description: React Server Components (RSC) versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 are affected by a deserialization of untrusted data vulnerability. This flaw allows an unauthenticated, remote attacker to achieve arbitrary code execution on affected systems.
- Remediation:
- More Info: NVD - CVE-2025-55182
- PoC:
CVE-2025-43300
- Severity: 8.8 HIGH
- Impacted Products: Apple iOS, Apple iPadOS, Apple macOS
- Description: Apple iOS, iPadOS, and macOS are affected by an out-of-bounds write vulnerability in the Image I/O framework. Processing a specially crafted image file can lead to memory corruption and arbitrary code execution.
- Remediation:
- More Info: NVD - CVE-2025-43300
- PoC:
CVE-2025-5777
- Severity: 10.0 CRITICAL
- Impacted Products: Citrix NetScaler ADC, Citrix NetScaler Gateway
- Description: Citrix NetScaler ADC and Gateway are affected by an out-of-bounds read vulnerability due to insufficient input validation. This flaw can lead to memory overread, allowing an attacker to bypass security mechanisms by disclosing sensitive information.
- Remediation:
- More Info: NVD - CVE-2025-5777
- PoC:
CVE-2021-20016
- Severity: 9.8 CRITICAL
- Impacted Products: SonicWall SSLVPN SMA100 build version 10.x
- Description: A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.
- Remediation:
- More Info: NVD - CVE-2021-20016
- PoC:
CVE-2025-21298
- Severity: 8.8 HIGH
- Impacted Products: Microsoft Office Word
- Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of RTF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition.
- Remediation:
- Dell PowerMaxOS, Dell PowerMax EEM, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Unisphere 360, Dell Solutions Enabler, Dell Solutions Enabler Virtual Appliance Security Update for Multiple Vulnerabilities
- Windows OLE Remote Code Execution Vulnerability
- Microsoft KB 5049981
- More Info: NVD - CVE-2025-21298
- PoC:
CVE-2025-0282
- Severity: 9.0 CRITICAL
- Impacted Products: Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, Ivanti Neurons for ZTA gateways before version 22.7R2.3
- Description: Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 are affected by a stack-based buffer overflow that allows a remote unauthenticated attacker to achieve arbitrary code execution. This vulnerability stems from improper handling of the
clientCapabilitiesparameter in IF-T/TLS GET requests. - Remediation:
- More Info: NVD - CVE-2025-0282
- PoC:
CVE-2025-53766
- Severity: 9.8 CRITICAL
- Impacted Products: Windows GDI+
- Description: Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.
- Remediation:
- More Info: NVD - CVE-2025-53766
- PoC:
CVE-2025-50165
- Severity: 9.8 CRITICAL
- Impacted Products: Microsoft Windows Graphics Component, windowscodecs.dll
- Description: The Microsoft Windows Graphics Component is affected by an untrusted pointer dereference vulnerability. This flaw allows an unauthorized attacker to execute arbitrary code remotely by enticing a user to view a specially crafted image.
- Remediation:
- More Info: NVD - CVE-2025-50165
- PoC:
CVE-2025-26633
- Severity: 7.0 HIGH
- Impacted Products: Microsoft Windows Management Console (MMC)
- Description: Microsoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows remote attackers to execute arbitrary code. This flaw enables an attacker to bypass security features by convincing a user to open a malicious file or visit a malicious web page.
- Remediation:
- More Info: NVD - CVE-2025-26633
- PoC:
CVE-2025-22457
- Severity: 9.0 CRITICAL
- Impacted Products: Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, Ivanti ZTA Gateways before version 22.8R2.2, Pulse Connect Secure 9.1x
- Description: Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti ZTA Gateways are affected by a stack-based buffer overflow vulnerability that allows a remote, unauthenticated attacker to achieve remote code execution. This flaw exists due to improper handling of input that can corrupt memory.
- Remediation:
- More Info: NVD - CVE-2025-22457
- PoC:
- https://labs.watchtowr.com/is-the-sofistication-in-the-room-with-us-x-forwarded-for-and-ivanti-connect-secure-cve-2025-22457
- https://github.com/securekomodo/CVE-2025-22457
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/ivanti_connect_secure_stack_overflow_rce_cve_2025_22457.rb
CVE-2025-21333
- Severity: 7.8 HIGH
- Impacted Products: Windows Hyper-V
- Description: Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
- Remediation:
- Dell PowerMaxOS, Dell PowerMax EEM, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Unisphere 360, Dell Solutions Enabler, Dell Solutions Enabler Virtual Appliance Security Update for Multiple Vulnerabilities
- Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
- Microsoft KB 5049981
- More Info: NVD - CVE-2025-21333
- PoC:
CVE-2025-61884
- Severity: 10.0 CRITICAL
- Impacted Products: Oracle Configurator 12.2.3 through 12.2.14
- Description: Oracle Configurator, a component of Oracle E-Business Suite, contains a Server-Side Request Forgery (SSRF) vulnerability that allows an unauthenticated attacker to gain unauthorized access to data or achieve remote code execution. This flaw affects supported versions 12.2.3 through 12.2.14.
- Remediation:
- More Info: NVD - CVE-2025-61884
- PoC:
- https://www.virustotal.com/gui/file/76b6d36e04e367a2334c445b51e1ecce97e4c614e88dfb4f72b104ca0f31235d
- https://github.com/Zhert-lab/CVE-2025-61882-CVE-2025-61884
- https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882/blob/main/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882.py
CVE-2025-59718
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiOS, Fortinet FortiProxy, Fortinet FortiSwitchManager
- Description: Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an improper verification of cryptographic signature vulnerability that allows an unauthenticated attacker to bypass FortiCloud SSO login authentication. This flaw can be exploited by sending a specially crafted SAML response message.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59718
- PoC:
CVE-2025-49704
- Severity: 8.8 HIGH
- Impacted Products: Microsoft SharePoint Server 2016, Microsoft SharePoint Server 2019, Microsoft SharePoint Server Subscription Edition
- Description: Microsoft SharePoint Server is affected by a code injection and insecure deserialization vulnerability that allows an authenticated attacker to achieve remote code execution. This flaw can be chained with other vulnerabilities to bypass authentication.
- Remediation:
- More Info: NVD - CVE-2025-49704
- PoC:
CVE-2025-62215
- Severity: 7.0 HIGH
- Impacted Products: Microsoft Windows
- Description: Microsoft Windows is affected by a race condition vulnerability in the kernel that allows a local, authenticated attacker to elevate their privileges to SYSTEM. This flaw stems from improper synchronization during concurrent execution when multiple processes or threads access shared resources.
- Remediation:
- More Info: NVD - CVE-2025-62215
- PoC:
CVE-2025-57819
- Severity: 9.8 CRITICAL
- Impacted Products: FreePBX 15, FreePBX 16, FreePBX 17
- Description: FreePBX is an open-source web-based graphical user interface. FreePBX 15, 16, and 17 endpoints are vulnerable due to insufficiently sanitized user-supplied data allowing unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. This issue has been patched in endpoint versions 15.0.66, 16.0.89, and 17.0.3.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57819
- PoC:
CVE-2025-48828
- Severity: 9.0 CRITICAL
- Impacted Products: vBulletin
- Description: Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the “var_dump”(“test”) syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-48828
- PoC:
CVE-2025-48827
- Severity: 9.1 CRITICAL
- Impacted Products: vBulletin 5.0.0 through 5.7.5, vBulletin 6.0.0 through 6.0.3
- Description: vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern, as exploited in the wild in May 2025.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-48827
- PoC:
CVE-2025-48384
- Severity: 8.0 HIGH
- Impacted Products: Git v2.43.7, Git v2.44.4, Git v2.45.4, Git v2.46.4, Git v2.47.3
- Description: Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read.
- Remediation:
- More Info: NVD - CVE-2025-48384
- PoC:
CVE-2025-33073
- Severity: 8.8 HIGH
- Impacted Products: Windows SMB
- Description: Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.
- Remediation:
- More Info: NVD - CVE-2025-33073
- PoC:
CVE-2025-33053
- Severity: 8.8 HIGH
- Impacted Products: Microsoft Windows, versions prior to 6.0.6003.23351
- Description: Microsoft Windows is affected by an external control of file name or path vulnerability in Internet Shortcut Files (
.urlfiles) that allows for remote code execution. This flaw enables an unauthorized attacker to execute arbitrary code by manipulating the working directory of a legitimate application. - Remediation:
- More Info: NVD - CVE-2025-33053
- PoC:
CVE-2025-30397
- Severity: 7.5 HIGH
- Impacted Products: Microsoft Scripting Engine
- Description: Access of resource using incompatible type (‘type confusion’) in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
- Remediation:
- More Info: NVD - CVE-2025-30397
- PoC:
CVE-2025-29927
- Severity: 9.1 CRITICAL
- Impacted Products: Next.js 12.3.5, Next.js 13.5.9, Next.js 14.2.25, Next.js 15.2.3
- Description: Next.js is affected by an improper authorization vulnerability that allows attackers to bypass security checks implemented within the application’s middleware. This flaw arises because the framework improperly trusts the
x-middleware-subrequestinternal HTTP header when provided by external clients. - Remediation:
- More Info: NVD - CVE-2025-29927
- PoC:
CVE-2025-2783
- Severity: 8.3 HIGH
- Impacted Products: Google Chrome 134.0.6998.177
- Description: Google Chrome on Windows is affected by a sandbox escape vulnerability in its Mojo inter-process communication (IPC) component. This flaw allows a remote attacker to bypass the browser’s sandbox protection via a malicious file or website.
- Remediation:
- More Info: NVD - CVE-2025-2783
- PoC:
CVE-2025-27363
- Severity: 8.1 HIGH
- Impacted Products: FreeType 2.13.0 and below
- Description: FreeType versions 2.13.0 and below are affected by an out-of-bounds write vulnerability when parsing font subglyph structures, which can lead to arbitrary code execution. This flaw occurs due to an integer wrap-around during buffer allocation for font data.
- Remediation:
- More Info: NVD - CVE-2025-27363
- PoC:
CVE-2018-0171
- Severity: 9.8 CRITICAL
- Impacted Products: Cisco IOS
- Description: Cisco IOS is an operating system used in most Cisco routers, network switches, and appliances. A vulnerability exists within the Smart Install feature in IOS because it does not perform proper input validation of packet data. This vulnerability can only be triggered by traffic that is destined to the affected device that is listening on TCP 4786.
- Remediation:
- More Info: NVD - CVE-2018-0171
- PoC:
CVE-2025-7775
- Severity: 9.8 CRITICAL
- Impacted Products: NetScaler ADC 13.1, NetScaler ADC 14.1, NetScaler ADC 13.1-FIPS, NetScaler ADC NDcPP, NetScaler Gateway 13.1
- Description: Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
- Remediation:
- More Info: NVD - CVE-2025-7775
- PoC:
CVE-2025-64446
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiWeb 8.0.0 through 8.0.1, Fortinet FortiWeb 7.6.0 through 7.6.4, Fortinet FortiWeb 7.4.0 through 7.4.9, Fortinet FortiWeb 7.2.0 through 7.2.11, Fortinet FortiWeb 7.0.0 through 7.0.11
- Description: Fortinet FortiWeb is affected by a relative path traversal vulnerability combined with an authentication bypass that allows an unauthenticated attacker to execute administrative commands. This flaw permits the creation of new administrative user accounts on the system via crafted HTTP or HTTPS requests.
- Remediation:
- More Info: NVD - CVE-2025-64446
- PoC:
CVE-2025-61757
- Severity: 9.8 CRITICAL
- Impacted Products: Oracle Fusion Middleware Identity Manager 12.2.1.4.0, Oracle Fusion Middleware Identity Manager 14.1.2.1.0
- Description: Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager.
- Remediation:
- More Info: NVD - CVE-2025-61757
- PoC:
CVE-2025-25257
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiWeb 7.6.0 through 7.6.3, Fortinet FortiWeb 7.4.0 through 7.4.7, Fortinet FortiWeb 7.2.0 through 7.2.10, Fortinet FortiWeb below 7.0.10
- Description: Fortinet FortiWeb is affected by an SQL Injection vulnerability that allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPS requests, which can be escalated to remote code execution. This flaw exists due to improper neutralization of special elements in SQL commands.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-25257
- PoC:
CVE-2025-24990
- Severity: 7.8 HIGH
- Impacted Products: Agere Modem driver, Windows (supported versions)
- Description: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware.
- Remediation:
- More Info: NVD - CVE-2025-24990
- PoC:
CVE-2025-20352
- Severity: 9.1 CRITICAL
- Impacted Products: Cisco IOS Software, Cisco IOS XE Software
- Description: A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low privileges could cause a denial of service (DoS) condition on an affected device that is running Cisco IOS Software or Cisco IOS XE Software.
- Remediation:
- More Info: NVD - CVE-2025-20352
- PoC:
CVE-2025-1974
- Severity: 10.0 CRITICAL
- Impacted Products: Kubernetes, ingress-nginx controller
- Description: A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
- Remediation:
- More Info: NVD - CVE-2025-1974
- PoC:
CVE-2024-50603
- Severity: 10.0 CRITICAL
- Impacted Products: Aviatrix Controller before 7.1.4191, Aviatrix Controller 7.2.x before 7.2.4996
- Description: An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
- Remediation:
- More Info: NVD - CVE-2024-50603
- PoC:
CVE-2024-3721
- Severity: 9.8 CRITICAL
- Impacted Products: TBK DVR-4104, TBK DVR-4216, up to version 20240412
- Description: TBK DVR-4104 and DVR-4216 devices are affected by an OS command injection vulnerability in the
/device.rspendpoint. This flaw allows a remote attacker to execute arbitrary operating system commands by manipulating specific parameters in an HTTP request. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-3721
- PoC:
CVE-2025-6558
- Severity: 8.8 HIGH
- Impacted Products: Google Chrome prior to version 138.0.7204.157
- Description: Google Chrome, and other browsers utilizing Chromium’s ANGLE and GPU components, are affected by an improper input validation vulnerability that can lead to a sandbox escape. This flaw can be triggered by a remote attacker via a crafted HTML page.
- Remediation:
- More Info: NVD - CVE-2025-6558
- PoC:
CVE-2025-61882
- Severity: 9.8 CRITICAL
- Impacted Products: Oracle E-Business Suite Concurrent Processing 12.2.3, Oracle E-Business Suite Concurrent Processing 12.2.4, Oracle E-Business Suite Concurrent Processing 12.2.5, Oracle E-Business Suite Concurrent Processing 12.2.6, Oracle E-Business Suite Concurrent Processing 12.2.7
- Description: Oracle E-Business Suite Concurrent Processing versions 12.2.3 through 12.2.14 are affected by an improper authentication vulnerability within the BI Publisher Integration component. This flaw allows an unauthenticated, remote attacker with network access via HTTP to achieve arbitrary code execution.
- Remediation:
- More Info: NVD - CVE-2025-61882
- PoC:
CVE-2025-54236
- Severity: 9.1 CRITICAL
- Impacted Products: Adobe Commerce, Magento Open Source
- Description: Adobe Commerce and Magento Open Source are affected by an improper input validation vulnerability that can lead to session takeover and, under specific conditions, unauthenticated remote code execution. This flaw exists due to insufficient validation of input within the Commerce REST API.
- Remediation:
- More Info: NVD - CVE-2025-54236
- PoC:
CVE-2025-32756
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiVoice 7.2.0, Fortinet FortiVoice 7.0.0 through 7.0.6, Fortinet FortiVoice 6.4.0 through 6.4.10, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5
- Description: A stack-based buffer overflow vulnerability.
- Remediation:
- More Info: NVD - CVE-2025-32756
- PoC:
CVE-2025-31200
- Severity: 7.5 HIGH
- Impacted Products: tvOS 18.4.1, visionOS 2.4.1, iOS 18.4.1, iPadOS 18.4.1, macOS Sequoia 15.4.1
- Description: A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.
- Remediation:
- More Info: NVD - CVE-2025-31200
- PoC:
CVE-2025-20337
- Severity: 10.0 CRITICAL
- Impacted Products: Cisco ISE, Cisco ISE-PIC
- Description: Multiple vulnerabilities in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit these vulnerabilities.
- Remediation:
- More Info: NVD - CVE-2025-20337
- PoC:
CVE-2025-10035
- Severity: 10.0 CRITICAL
- Impacted Products: Fortra GoAnywhere MFT < 7.6.3, Fortra GoAnywhere MFT 7.7.0 - 7.8.3
- Description: Fortra GoAnywhere MFT contains a deserialization vulnerability in its License Servlet that allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object. This flaw can lead to command injection and remote code execution.
- Remediation:
- More Info: NVD - CVE-2025-10035
- PoC:
CVE-2024-7399
- Severity: 9.8 CRITICAL
- Impacted Products: Samsung MagicInfo Server
- Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung MagicInfo Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getFileFromMultipartFile method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-7399
- PoC:
CVE-2024-12847
- Severity: 9.8 CRITICAL
- Impacted Products: NETGEAR DGN1000 (prior to firmware version 1.1.00.48), NETGEAR DGN2000 v1
- Description: NETGEAR DGN1000 and DGN2000 routers are affected by an authentication bypass and OS command injection vulnerability in the setup.cgi component. This flaw allows a remote, unauthenticated attacker to execute arbitrary commands on the device with root privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-12847
- PoC:
CVE-2025-59489
- Severity: 7.4 HIGH
- Impacted Products: Unity Runtime before 2025-10-02, Unity Editor
- Description: Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running.
- Remediation:
- More Info: NVD - CVE-2025-59489
- PoC:
CVE-2025-55315
- Severity: 9.9 CRITICAL
- Impacted Products: ASP.NET Core Kestrel
- Description: ASP.NET Core’s Kestrel web server is affected by an HTTP request smuggling vulnerability that allows an authenticated attacker to bypass security features. This flaw stems from inconsistent interpretation of HTTP requests, leading to desynchronization between proxy servers and the Kestrel backend.
- Remediation:
- More Info: NVD - CVE-2025-55315
- PoC:
CVE-2025-5086
- Severity: 9.0 CRITICAL
- Impacted Products: DELMIA Apriso Release 2020, DELMIA Apriso Release 2021, DELMIA Apriso Release 2022, DELMIA Apriso Release 2023, DELMIA Apriso Release 2024
- Description: A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5086
- PoC:
CVE-2025-50154
- Severity: 7.1 HIGH
- Impacted Products: Microsoft Windows
- Description: Microsoft Windows is affected by a security bypass vulnerability in File Explorer related to LNK file parsing. This flaw allows for the relay or disclosure of NTLM credentials when a user interacts with a specially crafted LNK file.
- Remediation:
- More Info: NVD - CVE-2025-50154
- PoC:
CVE-2025-4428
- Severity: 7.2 HIGH
- Impacted Products: Ivanti Endpoint Manager Mobile (EPMM) 12.5.0.0 and prior
- Description: Ivanti Endpoint Manager Mobile (EPMM) versions 12.5.0.0 and prior are affected by a remote code execution vulnerability in its API component. This flaw allows an authenticated attacker to execute arbitrary code via crafted API requests, and can lead to unauthenticated remote code execution when chained with an authentication bypass.
- Remediation:
- More Info: NVD - CVE-2025-4428
- PoC:
CVE-2025-4427
- Severity: 5.3 MEDIUM
- Impacted Products: Ivanti Endpoint Manager Mobile 12.5.0.0 and prior
- Description: An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API.
- Remediation:
- More Info: NVD - CVE-2025-4427
- PoC:
CVE-2025-34028
- Severity: 10.0 CRITICAL
- Impacted Products: Commvault Command Center Innovation Release: 11.38.0 to 11.38.20, Commvault Command Center Innovation Release: 11.38.20, Commvault Command Center Innovation Release: 11.38.25
- Description: The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
- Remediation:
- More Info: NVD - CVE-2025-34028
- PoC:
CVE-2025-3248
- Severity: 9.8 CRITICAL
- Impacted Products: Langflow < 1.3.0
- Description: Langflow versions prior to 1.3.0 are susceptible to unauthenticated remote code execution through a code injection vulnerability in the
/api/v1/validate/codeendpoint. This flaw allows a remote attacker to execute arbitrary code by sending crafted HTTP requests. - Remediation:
- More Info: NVD - CVE-2025-3248
- PoC:
CVE-2025-30400
- Severity: 7.8 HIGH
- Impacted Products: Information not available
- Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
- Remediation:
- More Info: NVD - CVE-2025-30400
- PoC:
CVE-2025-26399
- Severity: 9.8 CRITICAL
- Impacted Products: SolarWinds Web Help Desk
- Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Web Help Desk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the AjaxProxy class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
- Remediation:
- More Info: NVD - CVE-2025-26399
- PoC:
CVE-2025-25256
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiSIEM 7.3.0 through 7.3.1, Fortinet FortiSIEM 7.2.0 through 7.2.5, Fortinet FortiSIEM 7.1.0 through 7.1.7, Fortinet FortiSIEM 7.0.0 through 7.0.3, Fortinet FortiSIEM before 6.7.9
- Description: An improper neutralization of special elements used in an OS command (‘OS Command Injection’) vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-25256
- PoC:
CVE-2025-24893
- Severity: 9.8 CRITICAL
- Impacted Products: XWiki Platform 15.10.11, XWiki Platform 16.4.1, XWiki Platform 16.5.0RC1
- Description: XWiki Platform contains an eval injection vulnerability in its
SolrSearchcomponent that allows any unauthenticated guest to perform arbitrary remote code execution. This flaw exists due to improper neutralization of directives in dynamically evaluated code. - Remediation:
- More Info: NVD - CVE-2025-24893
- PoC:
CVE-2025-24252
- Severity: 6.5 MEDIUM
- Impacted Products: macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5
- Description: A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to corrupt process memory.
- Remediation:
- More Info: NVD - CVE-2025-24252
- PoC:
CVE-2025-24201
- Severity: 8.8 HIGH
- Impacted Products: visionOS, iOS, iPadOS, macOS, Safari
- Description: WebKit, the browser engine used in Apple products and other software, contains an out-of-bounds write vulnerability. This flaw allows maliciously crafted web content to break out of the Web Content sandbox.
- Remediation:
- More Info: NVD - CVE-2025-24201
- PoC:
CVE-2025-24016
- Severity: 9.9 CRITICAL
- Impacted Products: Wazuh 4.4.0, Wazuh 4.9.0
- Description: Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using
as\_wazuh\_object(inframework/wazuh/core/cluster/common.py). - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-24016
- PoC:
CVE-2025-20281
- Severity: 10.0 CRITICAL
- Impacted Products: Cisco Identity Services Engine (ISE) 3.3, Cisco Identity Services Engine (ISE) 3.4, Cisco ISE Passive Identity Connector (ISE-PIC) 3.3, Cisco ISE Passive Identity Connector (ISE-PIC) 3.4
- Description: Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) are affected by multiple vulnerabilities in a specific API that allow an unauthenticated, remote attacker to execute arbitrary code with root privileges on the underlying operating system. This flaw is due to insufficient validation of user-supplied input.
- Remediation:
- More Info: NVD - CVE-2025-20281
- PoC:
CVE-2024-54794
- Severity: 9.1 CRITICAL
- Impacted Products: SpagoBI 3.5.1
- Description: The script input feature of SpagoBI 3.5.1 allows arbitrary code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-54794
- PoC:
CVE-2024-48887
- Severity: 9.8 CRITICAL
- Impacted Products: Fortinet FortiSwitch GUI
- Description: A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request
- Remediation:
- More Info: NVD - CVE-2024-48887
- PoC:
CVE-2024-3400
- Severity: 10.0 CRITICAL
- Impacted Products: Palo Alto Networks PAN-OS
- Description: A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
- Remediation:
- More Info: NVD - CVE-2024-3400
- PoC:
CVE-2017-11882
- Severity: 7.8 HIGH
- Impacted Products: Microsoft Office
- Description: Microsoft Office is a suite of productivity tools, applications and services. A vulnerability exists within the Microsoft Equation Editor when parsing certain files in Office where the software does not properly handle objects in memory, leading to memory corruption.
- Remediation:
- More Info: NVD - CVE-2017-11882
- PoC:
CVE-2025-54336
- Severity: 9.8 CRITICAL
- Impacted Products: Plesk Obsidian 18.0.70
- Description: In Plesk Obsidian 18.0.70, _isAdminPasswordValid uses an == comparison. Thus, if the correct password is “0e” followed by any digit string, then an attacker can login with any other string that evaluates to 0.0 (such as the 0e0 string). This occurs in admin/plib/LoginManager.php.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-54336
- PoC:
CVE-2025-54100
- Severity: 7.8 HIGH
- Impacted Products: Microsoft Windows PowerShell 5.1
- Description: Microsoft Windows PowerShell 5.1 contains a command injection vulnerability in the
Invoke-WebRequestcmdlet that allows for security bypass and remote code execution. This flaw enables an attacker to execute arbitrary code by crafting malicious web content that is processed byInvoke-WebRequest. - Remediation:
- More Info: NVD - CVE-2025-54100
- PoC:
CVE-2025-53690
- Severity: 9.8 CRITICAL
- Impacted Products: Sitecore Experience Manager (XM): through 9.0, Sitecore Experience Platform (XP): through 9.0
- Description: Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-53690
- PoC:
CVE-2025-52376
- Severity: 9.8 CRITICAL
- Impacted Products: Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below
- Description: An authentication bypass vulnerability in the /web/um_open_telnet.cgi endpoint in Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below, allowing an attacker to remotely enable the Telnet service without authentication, bypassing security controls. The Telnet server is then accessible with hard-coded credentials, allowing attackers to gain administrative shell access and execute arbitrary commands on the device.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-52376
- PoC:
CVE-2025-49844
- Severity: 9.8 CRITICAL
- Impacted Products: Redis 8.2.1 and below, Redis earlier versions with Lua scripting enabled
- Description: Redis is affected by a use-after-free vulnerability in its embedded Lua interpreter, allowing remote attackers to execute arbitrary code without requiring authentication. This flaw exists due to improper handling of certain string values by the Lua interpreter.
- Remediation:
- More Info: NVD - CVE-2025-49844
- PoC:
CVE-2025-49706
- Severity: 6.5 MEDIUM
- Impacted Products: Microsoft SharePoint Server 14, Microsoft SharePoint Server 15
- Description: Microsoft SharePoint Server contains an improper authentication vulnerability that allows an unauthorized attacker to bypass authentication mechanisms. This flaw enables spoofing and can be chained with other vulnerabilities to achieve remote code execution.
- Remediation:
- More Info: NVD - CVE-2025-49706
- PoC:
CVE-2025-44148
- Severity: 9.8 CRITICAL
- Impacted Products: MailEnable 10
- Description: MailEnable versions prior to 10 contain a Cross-Site Scripting (XSS) vulnerability in the
failure.aspxcomponent. This flaw allows a remote attacker to execute arbitrary code in the context of a victim’s browser session. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44148
- PoC:
CVE-2025-4404
- Severity: 9.1 CRITICAL
- Impacted Products: FreeIPA
- Description: A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the
krbCanonicalNamefor the admin account by default, allowing users to create services with the same canonical name as the REALM admin. - Remediation:
- More Info: NVD - CVE-2025-4404
- PoC:
CVE-2025-32711
- Severity: 9.3 CRITICAL
- Impacted Products: M365 Copilot
- Description: Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32711
- PoC:
CVE-2025-32710
- Severity: 8.1 HIGH
- Impacted Products: Windows Remote Desktop Services
- Description: Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
- Remediation:
- More Info: NVD - CVE-2025-32710
- PoC:
CVE-2025-31161
- Severity: 10.0 CRITICAL
- Impacted Products: CrushFTP 10.0.0 through 10.8.3, CrushFTP 11.0.0 through 11.3.0
- Description: CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability in the S3 authorization header processing that allows authentication bypass. Remote and unauthenticated HTTP requests to CrushFTP with known usernames can be used to impersonate a user and conduct actions on their behalf, including administrative actions and data retrieval.
- Remediation:
- More Info: NVD - CVE-2025-31161
- PoC:
CVE-2025-27480
- Severity: 8.1 HIGH
- Impacted Products: Remote Desktop Gateway Service
- Description: Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
- Remediation:
- More Info: NVD - CVE-2025-27480
- PoC:
CVE-2025-27218
- Severity: 5.3 MEDIUM
- Impacted Products: Sitecore Experience Manager (XM) 10.4, Sitecore Experience Platform (XP) 10.4
- Description: Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-27218
- PoC:
CVE-2024-53704
- Severity: 8.2 HIGH
- Impacted Products: SonicWALL NSv
- Description: This vulnerability allows remote attackers to bypass authentication on affected installations of SonicWALL NSv. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of Base64-encoded session cookies. The issue results from an incorrect implementation of an authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system.
- Remediation:
- More Info: NVD - CVE-2024-53704
- PoC:
CVE-2024-40891
- Severity: 9.8 CRITICAL
- Impacted Products: Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615
- Description: **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-40891
- PoC:
CVE-2017-17761
- Severity: 9.8 CRITICAL
- Impacted Products: Google Nexus, Google Pixel
- Description: Google devices are a line of mobile devices that run the Android operating system including Nexus and Pixel. A vulnerability exists within the WLan component in Google devices. Limited information exists about this vulnerability. FireEye iSIGHT Intelligence will update this report when more information becomes available.
- Remediation:
- More Info: NVD - CVE-2017-17761
- PoC:
CVE-2025-8723
- Severity: 9.8 CRITICAL
- Impacted Products: Cloudflare Image Resizing plugin for WordPress, 1.5.6
- Description: The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8723
- PoC:
CVE-2025-8356
- Severity: 9.8 CRITICAL
- Impacted Products: Xerox FreeFlow Core 8.0.4
- Description: In Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the attacker to run arbitrary commands on the system.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8356
- PoC:
CVE-2025-7340
- Severity: 9.8 CRITICAL
- Impacted Products: HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder plugin for WordPress, 2.2.1
- Description: The HT Contact Form Widget For Elementor Page Builder &amp; Gutenberg Blocks &amp; Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation:
- More Info: NVD - CVE-2025-7340
- PoC:
CVE-2025-6758
- Severity: 9.8 CRITICAL
- Impacted Products: Real Spaces - WordPress Properties Directory Theme, 3.6
- Description: The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the ‘imic_agent_register’ function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6758
- PoC:
CVE-2025-67506
- Severity: 9.8 CRITICAL
- Impacted Products: PipesHub 0.1.0-beta
- Description: PipesHub is a fully extensible workplace AI platform for enterprise search and workflow automation. Versions prior to 0.1.0-beta expose POST /api/v1/record/buffer/convert through missing authentication. The endpoint accepts a file upload and converts it to PDF via LibreOffice by uploading payload to os.path.join(tmpdir, file.filename) without normalizing the filename.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-67506
- PoC:
CVE-2025-67494
- Severity: 9.3 CRITICAL
- Impacted Products: ZITADEL 4.7.0 and below
- Description: ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances.
- Remediation:
- More Info: NVD - CVE-2025-67494
- PoC:
CVE-2025-67489
- Severity: 9.8 CRITICAL
- Impacted Products: @vitejs/plugin-rs 0.5.5 and below
- Description: @vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Versions 0.5.5 and below are vulnerable to arbitrary remote code execution on the development server through unsafe dynamic imports in server function APIs (loadServerAction, decodeReply, decodeAction) when integrated into RSC applications that expose server function endpoints. Attackers with network access to the development server can read/modify files, exfiltrate sensitive data etc.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-67489
- PoC:
CVE-2025-64095
- Severity: 10.0 CRITICAL
- Impacted Products: DNN (formerly DotNetNuke) versions prior to 10.1.1
- Description: DNN (formerly DotNetNuke) versions prior to 10.1.1 contain an unrestricted file upload vulnerability in the default HTML editor provider. This flaw allows an unauthenticated user to upload arbitrary files and overwrite existing ones.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-64095
- PoC:
CVE-2025-62481
- Severity: 9.8 CRITICAL
- Impacted Products: Oracle Marketing, Oracle E-Business Suite 12.2.3-12.2.14
- Description: Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in takeover of Oracle Marketing.
- Remediation:
- More Info: NVD - CVE-2025-62481
- PoC:
CVE-2025-59528
- Severity: 10.0 CRITICAL
- Impacted Products: Flowise 3.0.5, Flowise 3.0.6
- Description: Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59528
- PoC:
CVE-2025-59434
- Severity: 9.6 CRITICAL
- Impacted Products: Cloud-Hosted Flowise, August 2025
- Description: Flowise is a drag & drop user interface to build a customized large language model flow. Prior to August 2025 Cloud-Hosted Flowise, an authenticated vulnerability in Flowise Cloud allows any user on the free tier to access sensitive environment variables from other tenants via the Custom JavaScript Function node. This includes secrets such as OpenAI API keys, AWS credentials, Supabase tokens, and Google Cloud secrets — resulting in a full cross-tenant data exposure.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59434
- PoC:
CVE-2025-59046
- Severity: 9.8 CRITICAL
- Impacted Products: interactive-git-checkout 1.1.4
- Description: The npm package
interactive-git-checkoutis an interactive command-line tool that allows users to checkout a git branch while it prompts for the branch name on the command-line. It is available as an npm package and can be installed vianpm install -g interactive-git-checkout. Versions up to and including 1.1.4 of theinteractive-git-checkouttool are vulnerable to a command injection vulnerability. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59046
- PoC:
CVE-2025-58768
- Severity: 9.6 CRITICAL
- Impacted Products: DeepChat 0.3.5
- Description: DeepChat is a smart assistant uses artificial intelligence. Prior to version 0.3.5, in the Mermaid chart rendering component, there is a risky operation of directly using
innerHTMLto set user content. Therefore, any malicious content rendered via Mermaid will directly trigger the exploit chain, leading to command execution. This vulnerability is primarily caused by a failure to fully address the existing XSS issue in the project, leading to another exploit chain. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-58768
- PoC:
CVE-2025-58762
- Severity: 9.1 CRITICAL
- Impacted Products: Tautulli v2.15.3 and earlier, Tautulli v2.16.0
- Description: Tautulli is a Python based monitoring and tracking tool for Plex Media Server. In Tautulli v2.15.3 and earlier, an attacker with administrative access can use the
pms\_image\_proxyendpoint to write arbitrary python scripts into the application filesystem. This leads to remote code execution when combined with theScriptnotification agent. - Remediation:
- More Info: NVD - CVE-2025-58762
- PoC:
CVE-2025-58034
- Severity: 7.2 HIGH
- Impacted Products: Fortinet FortiWeb 7.0.0 through 7.0.11, Fortinet FortiWeb 7.2.0 through 7.2.11, Fortinet FortiWeb 7.4.0 through 7.4.10, Fortinet FortiWeb 7.6.0 through 7.6.5, Fortinet FortiWeb 8.0.0 through 8.0.1
- Description: Fortinet FortiWeb contains an OS Command Injection vulnerability that allows an authenticated attacker to execute arbitrary code on the underlying system. This flaw stems from improper validation of user-supplied input before it is used in a system call.
- Remediation:
- More Info: NVD - CVE-2025-58034
- PoC:
CVE-2025-57441
- Severity: 9.8 CRITICAL
- Impacted Products: Blackmagic ATEM Mini Pro 2.7
- Description: The Blackmagic ATEM Mini Pro 2.7 exposes sensitive device and stream configuration information via an unauthenticated Telnet service on port 9990. Upon connection, the attacker can access a protocol preamble that leaks the video mode, routing configuration, input/output labels, device model, and even internal identifiers such as the unique ID. This can be used for reconnaissance and planning further attacks.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57441
- PoC:
CVE-2025-57437
- Severity: 9.8 CRITICAL
- Impacted Products: Blackmagic Web Presenter HD firmware version 3.3
- Description: The Blackmagic Web Presenter HD firmware version 3.3 exposes sensitive information via an unauthenticated Telnet service on port 9977. When connected, the service reveals extensive device configuration data including: - Model, version, and unique identifiers - Network settings including IP, MAC, DNS - Current stream platform, stream key, and streaming URL - Audio/video configuration This data can be used to hijack live streams or perform network reconnaissance.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57437
- PoC:
CVE-2025-57432
- Severity: 7.3 HIGH
- Impacted Products: Blackmagic Web Presenter version 3.3
- Description: Blackmagic Web Presenter version 3.3 exposes a Telnet service on port 9977 that accepts unauthenticated commands. This service allows remote attackers to manipulate stream settings, including changing video modes and possibly altering device functionality. No credentials or authentication mechanisms are required to interact with the Telnet interface.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57432
- PoC:
CVE-2025-56074
- Severity: 9.8 CRITICAL
- Impacted Products: PHPGurukul Park Ticketing Management System v2.0
- Description: A SQL Injection vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the fromdate parameter in a POST request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56074
- PoC:
CVE-2025-55730
- Severity: 10.0 CRITICAL
- Impacted Products: XWiki Remote Macros 1.0, XWiki Remote Macros 1.26.5
- Description: XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the title in the confluence paste code macro allows remote code execution for any user who can edit any page. The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-55730
- PoC:
CVE-2025-55727
- Severity: 9.8 CRITICAL
- Impacted Products: XWiki Remote Macros 1.0, XWiki Remote Macros 1.26.5
- Description: XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the width parameter in the column macro allows remote code execution for any user who can edit any page or who can access the CKEditor converter.
- Remediation:
- More Info: NVD - CVE-2025-55727
- PoC:
CVE-2025-54802
- Severity: 9.8 CRITICAL
- Impacted Products: pyLoad 0.5.0b3.dev89 and below, pyLoad-ng 0.5.0b3.dev89 and below
- Description: pyLoad is the free and open-source Download Manager written in pure Python. In versions 0.5.0b3.dev89 and below, there is an opportunity for path traversal in pyLoad-ng CNL Blueprint via package parameter, allowing Arbitrary File Write which leads to Remote Code Execution (RCE). The addcrypted endpoint in pyload-ng suffers from an unsafe path construction vulnerability, allowing unauthenticated attackers to write arbitrary files outside the designated storage directory.
- Remediation:
- More Info: NVD - CVE-2025-54802
- PoC:
CVE-2025-54381
- Severity: 9.9 CRITICAL
- Impacted Products: BentoML 1.4.0, BentoML 1.4.1, BentoML 1.4.2, BentoML 1.4.3, BentoML 1.4.4
- Description: BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests.
- Remediation:
- More Info: NVD - CVE-2025-54381
- PoC:
CVE-2025-54253
- Severity: 10.0 CRITICAL
- Impacted Products: Adobe Experience Manager Forms
- Description: An authentication bypass vulnerability in Adobe Experience Manager Forms allows for remote command execution. The ‘com.adobe.framework.SecurityFilter’ in the ‘adminui.war’ module can be bypassed by including ‘login.’ in the URL. This allows unauthenticated access to the ‘/adminui’ endpoints. Because Struts2 Devmode is enabled by default in this module, an attacker can execute OGNL expressions, leading to remote command execution.
- Remediation:
- More Info: NVD - CVE-2025-54253
- PoC:
CVE-2025-5394
- Severity: 9.8 CRITICAL
- Impacted Products: Alone – Charity Multipurpose Non-profit WordPress Theme, 7.8.3
- Description: The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5394
- PoC:
CVE-2025-53890
- Severity: 5.4 MEDIUM
- Impacted Products: pyload 0.5.0b3.dev89
- Description: pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system remote code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-53890
- PoC:
CVE-2025-53072
- Severity: 9.8 CRITICAL
- Impacted Products: Oracle Marketing, 12.2.3-12.2.14
- Description: Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in takeover of Oracle Marketing.
- Remediation:
- More Info: NVD - CVE-2025-53072
- PoC:
CVE-2025-50567
- Severity: 10.0 CRITICAL
- Impacted Products: Saurus CMS Community Edition 4.7.1
- Description: Saurus CMS Community Edition 4.7.1 contains a vulnerability in the custom DB::prepare() function, which uses preg_replace() with the deprecated /e (eval) modifier to interpolate SQL query parameters. This leads to injection of user-controlled SQL statements, potentially leading to arbitrary PHP code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50567
- PoC:
CVE-2025-4978
- Severity: 9.8 CRITICAL
- Impacted Products: Netgear DGND3700 1.1.00.15_1.00.15NA
- Description: A vulnerability, which was classified as very critical, was found in Netgear DGND3700 1.1.00.15_1.00.15NA. This affects an unknown part of the file /BRS_top.html of the component Basic Authentication. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other products might be affected as well. The vendor was contacted early about this disclosure.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4978
- PoC:
CVE-2025-49533
- Severity: 9.8 CRITICAL
- Impacted Products: Adobe Experience Manager Forms 6.5.23.0 and earlier
- Description: Adobe Experience Manager Forms versions 6.5.23.0 and earlier are affected by a deserialization of untrusted data vulnerability. This flaw allows an unauthenticated remote attacker to achieve arbitrary code execution without requiring user interaction.
- Remediation:
- Adobe Security Bulletin
- More Info: NVD - CVE-2025-49533
- PoC:
CVE-2025-48703
- Severity: 9.0 CRITICAL
- Impacted Products: CWP before 0.9.8.1205
- Description: CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1205 allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-48703
- PoC:
CVE-2025-46724
- Severity: 9.8 CRITICAL
- Impacted Products: Langroid 0.53.15
- Description: Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15,
TableChatAgentusespandas eval(). If fed by untrusted user input, like the case of a public-facing LLM application, it may be vulnerable to code injection. Langroid 0.53.15 sanitizes input toTableChatAgentby default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation. - Remediation:
- More Info: NVD - CVE-2025-46724
- PoC:
CVE-2025-4632
- Severity: 9.8 CRITICAL
- Impacted Products: Samsung MagicINFO 9 Server version before 21.1052
- Description: Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to write arbitrary file as system authority.
- Remediation:
- More Info: NVD - CVE-2025-4632
- PoC:
CVE-2025-46059
- Severity: 8.2 HIGH
- Impacted Products: langchain-ai v0.3.51
- Description: langchain-ai v0.3.51 was discovered to contain an indirect prompt injection vulnerability in the GmailToolkit component. This vulnerability allows attackers to execute arbitrary code and compromise the application via a crafted email message. NOTE: this is disputed by the Supplier because the code-execution issue was introduced by user-written code that does not adhere to the LangChain security practices.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-46059
- PoC:
CVE-2025-45854
- Severity: 10.0 CRITICAL
- Impacted Products: JEHC-BPM 2.0.1
- Description: /server/executeExec of JEHC-BPM 2.0.1 allows attackers to execute arbitrary code via execParams.
- Remediation:
- More Info: NVD - CVE-2025-45854
- PoC:
CVE-2025-44823
- Severity: 9.9 CRITICAL
- Impacted Products: Nagios Log Server before 2024R1.3.2
- Description: Nagios Log Server before 2024R1.3.2 allows authenticated users to retrieve cleartext administrative API keys via a /nagioslogserver/index.php/api/system/get_users call. This is GL:NLS#475.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44823
- PoC:
CVE-2025-44136
- Severity: 9.8 CRITICAL
- Impacted Products: MapTiler Tileserver-php v2.0
- Description: MapTiler Tileserver-php v2.0 is vulnerable to Cross Site Scripting (XSS). The GET parameter “layer” is reflected in an error message without html encoding. This leads to XSS and allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victim’s browser.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44136
- PoC:
CVE-2025-4322
- Severity: 9.8 CRITICAL
- Impacted Products: Motors theme for WordPress, 5.6.67
- Description: The Motors theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.6.67. This is due to the theme not properly validating a user’s identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user passwords, including those of administrators, and leverage that to gain access to their account.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4322
- PoC:
CVE-2025-42957
- Severity: 9.9 CRITICAL
- Impacted Products: SAP S/4HANA
- Description: SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-42957
- PoC:
CVE-2025-42944
- Severity: 10.0 CRITICAL
- Impacted Products: SAP NetWeaver
- Description: Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting malicious payload to an open port. The deserialization of such untrusted Java objects could lead to arbitrary OS command execution, posing a high impact to the application’s confidentiality, integrity, and availability.
- Remediation:
- More Info: NVD - CVE-2025-42944
- PoC:
CVE-2025-41744
- Severity: 9.1 CRITICAL
- Impacted Products: Sprecher Automations SPRECON-E series
- Description: Sprecher Automations SPRECON-E series uses default cryptographic keys that allow an unprivileged remote attacker to access all encrypted communications, thereby compromising confidentiality and integrity.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-41744
- PoC:
CVE-2025-30406
- Severity: 9.8 CRITICAL
- Impacted Products: Gladinet CentreStack 16.1.10296.56315
- Description: Gladinet CentreStack is affected by a deserialization vulnerability due to the use of a hardcoded
machineKeyin its portal configuration. This flaw allows an attacker to achieve remote code execution by crafting malicious serialized payloads. - Remediation:
- More Info: NVD - CVE-2025-30406
- PoC:
CVE-2025-30216
- Severity: 9.4 CRITICAL
- Impacted Products: CryptoLib 1.3.3 and prior
- Description: CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, a Heap Overflow vulnerability occurs in the
Crypto\_TM\_ProcessSecurityfunction (crypto\_tm.c:1735:8). - Remediation:
- More Info: NVD - CVE-2025-30216
- PoC:
CVE-2025-28915
- Severity: 9.1 CRITICAL
- Impacted Products: ThemeEgg ToolKit: from n/a through 1.2.9
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in Theme Egg ThemeEgg ToolKit allows Upload a Web Shell to a Web Server. This issue affects ThemeEgg ToolKit: from n/a through 1.2.9.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28915
- PoC:
CVE-2025-27364
- Severity: 10.0 CRITICAL
- Impacted Products: MITRE Caldera 4.2.0, MITRE Caldera 5.0.0
- Description: In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera’s Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-27364
- PoC:
CVE-2025-26410
- Severity: 9.8 CRITICAL
- Impacted Products: Wattsense Bridge devices, BSP >= 6.4.1
- Description: The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP >= 6.4.1.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-26410
- PoC:
CVE-2025-25014
- Severity: 9.1 CRITICAL
- Impacted Products: Kibana
- Description: A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints.
- Remediation:
- More Info: NVD - CVE-2025-25014
- PoC:
CVE-2025-24797
- Severity: 9.4 CRITICAL
- Impacted Products: Meshtastic 2.6.2
- Description: Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-24797
- PoC:
CVE-2025-24118
- Severity: 7.4 HIGH
- Impacted Products: iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3
- Description: The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory.
- Remediation:
- More Info: NVD - CVE-2025-24118
- PoC:
CVE-2025-23211
- Severity: 9.9 CRITICAL
- Impacted Products: Tandoor Recipes 1.5.24
- Description: Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24.
- Remediation:
- More Info: NVD - CVE-2025-23211
- PoC:
CVE-2025-23061
- Severity: 9.0 CRITICAL
- Impacted Products: Mongoose < 8.9.5
- Description: Mongoose versions prior to 8.9.5 are susceptible to a search injection vulnerability due to the improper handling of nested
$wherefilters within apopulate()match, which can lead to arbitrary code execution. This flaw represents an incomplete fix for a previously identified vulnerability, CVE-2024-53900. - Remediation:
- https://github.com/Automattic/mongoose/commit/64a9f9706f2428c49e0cfb8e223065acc645f7bc
- More Info: NVD - CVE-2025-23061
- PoC:
CVE-2025-1932
- Severity: 8.1 HIGH
- Impacted Products: Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, Thunderbird < 128.8
- Description: An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
- Remediation:
- More Info: NVD - CVE-2025-1932
- PoC:
CVE-2025-1307
- Severity: 9.8 CRITICAL
- Impacted Products: Newscrunch theme for WordPress, 1.8.4.1
- Description: The Newscrunch theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check in the newscrunch_install_and_activate_plugin() function in all versions up to, and including, 1.8.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation:
- More Info: NVD - CVE-2025-1307
- PoC:
CVE-2025-12539
- Severity: 10.0 CRITICAL
- Impacted Products: TNC Toolbox: Web Performance plugin for WordPress, 1.4.2
- Description: The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the “Tnc_Wp_Toolbox_Settings::save_settings” function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-12539
- PoC:
CVE-2025-11423
- Severity: 9.8 CRITICAL
- Impacted Products: Tenda CH22 1.0.0.1
- Description: A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. Performing manipulation of the argument page results in memory corruption. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11423
- PoC:
CVE-2025-11418
- Severity: 9.8 CRITICAL
- Impacted Products: Tenda CH22 up to 1.0.0.1
- Description: A security vulnerability has been detected in Tenda CH22 up to 1.0.0.1. This issue affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset of the component HTTP Request Handler. The manipulation of the argument mit_ssid_index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11418
- PoC:
CVE-2025-11170
- Severity: 9.8 CRITICAL
- Impacted Products: WP移行専用プラグイン for CPI, 1.0.2
- Description: The WP移行専用プラグイン for CPI plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Cpiwm_Import_Controller::import function in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11170
- PoC:
CVE-2025-1094
- Severity: 10.0 CRITICAL
- Impacted Products: PostgreSQL before 17.3, PostgreSQL 16.7, PostgreSQL 15.11, PostgreSQL 14.16, PostgreSQL 13.19
- Description: PostgreSQL is affected by an SQL injection vulnerability in its
libpqfunctions and command-line utilities due to improper neutralization of quoting syntax. This flaw can allow a database input provider to achieve SQL injection and, in certain configurations, arbitrary command execution. - Remediation:
- More Info: NVD - CVE-2025-1094
- PoC:
CVE-2025-10916
- Severity: 9.1 CRITICAL
- Impacted Products: FormGent WordPress plugin before 1.0.4
- Description: The FormGent WordPress plugin before 1.0.4 is vulnerable to arbitrary file deletion due to insufficient file path validation. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-10916
- PoC:
CVE-2025-10183
- Severity: 9.1 CRITICAL
- Impacted Products: TecCom TecConnect 4.1, TecCom Connect 5
- Description: A blind XML External Entity (XXE) injection in the OpenMessaging webservice in TecCom TecConnect 4.1 allows an unauthenticated attacker to exfiltrate arbitrary files to an attacker-controlled server. TecConnect 4.1 is considered end-of-life as of December 2023. Users are advised to upgrade to TecCom Connect 5.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-10183
- PoC:
CVE-2024-57595
- Severity: 7.2 HIGH
- Impacted Products: DLINK DIR-825 REVB 2.03
- Description: DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter “wps_pin” passed to the apc_client_pin.cgi binary through a POST request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57595
- PoC:
CVE-2024-53944
- Severity: 9.8 CRITICAL
- Impacted Products: Tuoshi/Dionlink LT15D 4G Wi-Fi M7628NNxlSPv2xUI_v1.0.1802.10.08_P4, LT21B M7628xUSAxUIv2_v1.0.1481.15.02_P0
- Description: An issue was discovered on Tuoshi/Dionlink LT15D 4G Wi-Fi devices through M7628NNxlSPv2xUI_v1.0.1802.10.08_P4 and LT21B devices through M7628xUSAxUIv2_v1.0.1481.15.02_P0. A unauthenticated remote attacker with network access can exploit a command injection vulnerability. The /goform/formJsonAjaxReq endpoint fails to sanitize shell metacharacters sent via JSON parameters, thus allowing attackers to execute arbitrary OS commands with root privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-53944
- PoC:
CVE-2024-51978
- Severity: 8.6 HIGH
- Impacted Products: No specific product names or version numbers are mentioned in the CVE description provided.
- Description: An unauthenticated attacker who knows the target device’s serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device’s serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-51978
- PoC:
CVE-2024-48841
- Severity: 10.0 CRITICAL
- Impacted Products: FLXEON 9.3.4 and older
- Description: Network access can be used to execute arbitrary code with elevated privileges. This issue affects FLXEON 9.3.4 and older.
- Remediation:
- More Info: NVD - CVE-2024-48841
- PoC:
CVE-2024-46506
- Severity: 10.0 CRITICAL
- Impacted Products: NetAlertX 23.01.14 through 24.x prior to 24.10.12
- Description: NetAlertX is affected by an unauthenticated command injection vulnerability within its settings management component. This flaw allows a remote attacker to execute arbitrary commands on the host system by modifying application configurations without providing credentials.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-46506
- PoC:
CVE-2024-21413
- Severity: 9.8 CRITICAL
- Impacted Products: Microsoft Outlook
- Description: Microsoft Outlook Remote Code Execution Vulnerability
- Remediation:
- More Info: NVD - CVE-2024-21413
- PoC:
CVE-2024-13161
- Severity: 9.8 CRITICAL
- Impacted Products: Ivanti EPM before the 2024 January-2025 Security Update, Ivanti EPM 2022 SU6 January-2025 Security Update
- Description: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
- Remediation:
- More Info: NVD - CVE-2024-13161
- PoC:
CVE-2024-13160
- Severity: 9.8 CRITICAL
- Impacted Products: Ivanti EPM before the 2024 January-2025 Security Update, Ivanti EPM 2022 SU6 January-2025 Security Update
- Description: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
- Remediation:
- More Info: NVD - CVE-2024-13160
- PoC:
CVE-2024-13159
- Severity: 9.8 CRITICAL
- Impacted Products: Ivanti EPM before the 2024 January-2025 Security Update, Ivanti EPM 2022 SU6 January-2025 Security Update
- Description: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
- Remediation:
- More Info: NVD - CVE-2024-13159
- PoC:
CVE-2024-10811
- Severity: 9.8 CRITICAL
- Impacted Products: Ivanti EPM before the 2024 January-2025 Security Update, Ivanti EPM 2022 SU6 January-2025 Security Update
- Description: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
- Remediation:
- More Info: NVD - CVE-2024-10811
- PoC:
CVE-2022-3365
- Severity: 9.8 CRITICAL
- Impacted Products: Remote Mouse Server 4.110
- Description: Due to reliance on a trivial substitution cipher, sent in cleartext, and the reliance on a default password when the user does not set a password, the Remote Mouse Server by Emote Interactive can be abused by attackers to inject OS commands over theproduct’s custom control protocol. A Metasploit module was written and tested against version 4.110, the current version when this CVE was reserved.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2022-3365
- PoC:
CVE-2019-0211
- Severity: 7.8 HIGH
- Impacted Products: Apache HTTP Server
- Description: A vulnerability exists within Apache HTTP Server because it does not check for worker processes with low privileges to be executed, that could allow the user to obtain root privileges.
- Remediation:
- More Info: NVD - CVE-2019-0211
- PoC:
CVE-2015-10137
- Severity: 9.8 CRITICAL
- Impacted Products: Website Contact Form With File Upload plugin for WordPress 1.3.4
- Description: The Website Contact Form With File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘upload_file()’ function in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2015-10137
- PoC:
CVE-2013-3893
- Severity: 8.8 HIGH
- Impacted Products: Microsoft Internet Explorer
- Description: Microsoft Internet Explorer is Microsoft’s web browser that ships by default with the Windows operating system. A vulnerability exists in the CDoc::SetMouseCapture(long,CElement *,int,int,int) method in the mshtml.dll library. The method does not properly check specific flags in the CElement object structure.
- Remediation:
- More Info: NVD - CVE-2013-3893
- PoC:
CVE-2025-9242
- Severity: 9.8 CRITICAL
- Impacted Products: WatchGuard Fireware OS 11.10.2 through 11.12.4_Update1, WatchGuard Fireware OS 12.0 through 12.11.3, WatchGuard Fireware OS 2025.1
- Description: WatchGuard Fireware OS is affected by an out-of-bounds write vulnerability in the
ikedprocess that allows remote, unauthenticated attackers to execute arbitrary code. This flaw occurs during the processing of IKEv2 VPN negotiation packets. - Remediation:
- More Info: NVD - CVE-2025-9242
- PoC:
CVE-2025-8943
- Severity: 7.3 HIGH
- Impacted Products: Flowise < 3.0.1
- Description: The Custom MCPs feature is designed to execute OS commands, for instance, using tools like
npxto spin up local MCP Servers. However, Flowise’s inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8943
- PoC:
CVE-2025-8088
- Severity: 8.8 HIGH
- Impacted Products: WinRAR
- Description: A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
- Remediation:
- More Info: NVD - CVE-2025-8088
- PoC:
CVE-2025-6543
- Severity: 9.8 CRITICAL
- Impacted Products: NetScaler ADC, NetScaler Gateway
- Description: Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
- Remediation:
- More Info: NVD - CVE-2025-6543
- PoC:
CVE-2025-64459
- Severity: 9.1 CRITICAL
- Impacted Products: Django 5.1 before 5.1.14, Django 4.2 before 4.2.26, Django 5.2 before 5.2.8, Django 5.0.x, Django 4.1.x
- Description: Django is affected by a SQL injection vulnerability in its
QuerySetmethods andQ()class, which can be exploited to manipulate data and bypass authorization. This flaw arises when a crafted dictionary with dictionary expansion is used for the\_connectorargument. - Remediation:
- More Info: NVD - CVE-2025-64459
- PoC:
CVE-2025-55346
- Severity: 9.8 CRITICAL
- Impacted Products: No specific product names or versions are mentioned in the CVE description provided.
- Description: User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-55346
- PoC:
CVE-2025-49113
- Severity: 9.9 CRITICAL
- Impacted Products: Roundcube Webmail
- Description: Roundcube Webmail is affected by a PHP object deserialization vulnerability that allows authenticated users to execute arbitrary code. This flaw exists because the application fails to properly validate the
_fromURL parameter within theprogram/actions/settings/upload.phpcomponent. - Remediation:
- More Info: NVD - CVE-2025-49113
- PoC:
CVE-2025-47812
- Severity: 10.0 CRITICAL
- Impacted Products: Wing FTP Server before 7.4.4
- Description: In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle ‘\0’ bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-47812
- PoC:
CVE-2025-4123
- Severity: 8.8 HIGH
- Impacted Products: Grafana, Grafana Image Renderer plugin
- Description: A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.
- Remediation:
- More Info: NVD - CVE-2025-4123
- PoC:
CVE-2025-34033
- Severity: 8.8 HIGH
- Impacted Products: Blue Angel Software Suite
- Description: An OS command injection vulnerability exists in the Blue Angel Software Suite running on embedded Linux devices via the ping_addr parameter in the webctrl.cgi script. The application fails to properly sanitize input before passing it to the system-level ping command. An authenticated attacker can inject arbitrary commands by appending shell metacharacters to the ping_addr parameter in a crafted GET request to /cgi-bin/webctrl.cgi?action=pingtest_update.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-34033
- PoC:
CVE-2025-2776
- Severity: 9.3 CRITICAL
- Impacted Products: SysAid On-Prem <= 23.3.40
- Description: SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2776
- PoC:
CVE-2025-26319
- Severity: 9.8 CRITICAL
- Impacted Products: FlowiseAI Flowise v2.2.6
- Description: FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.
- Remediation:
- More Info: NVD - CVE-2025-26319
- PoC:
CVE-2025-24085
- Severity: 10.0 CRITICAL
- Impacted Products: visionOS 2.3, iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3
- Description: A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
- Remediation:
- More Info: NVD - CVE-2025-24085
- PoC:
CVE-2025-23266
- Severity: 8.8 HIGH
- Impacted Products: NVIDIA Container Toolkit
- Description: This vulnerability allows local attackers to escalate privileges on affected installations of NVIDIA Container Toolkit. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of hooks. The issue results from the lack of restrictions on environment variables prior to spawning a hook process.
- Remediation:
- More Info: NVD - CVE-2025-23266
- PoC:
CVE-2025-13486
- Severity: 9.8 CRITICAL
- Impacted Products: Advanced Custom Fields: Extended plugin for WordPress 0.9.0.5 through 0.9.1.1
- Description: The Advanced Custom Fields: Extended plugin for WordPress versions 0.9.0.5 through 0.9.1.1 is vulnerable to remote code execution. This flaw allows unauthenticated attackers to execute arbitrary code on the server due to improper handling of user-supplied input.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-13486
- PoC:
CVE-2024-8963
- Severity: 9.4 CRITICAL
- Impacted Products: Ivanti CSA before 4.6 Patch 519
- Description: Path Traversal in the Ivanti CSA before 4.6 Patch 519 allows a remote unauthenticated attacker to access restricted functionality.
- Remediation:
- More Info: NVD - CVE-2024-8963
- PoC:
CVE-2024-54820
- Severity: 9.8 CRITICAL
- Impacted Products: XOne Web Monitor v02.10.2024.530, framework 1.0.4.9
- Description: XOne Web Monitor v02.10.2024.530 framework 1.0.4.9 was discovered to contain a SQL injection vulnerability in the login page. This vulnerability allows attackers to extract all usernames and passwords via a crafted input.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-54820
- PoC:
CVE-2023-20198
- Severity: 10.0 CRITICAL
- Impacted Products: Cisco IOS XE Software
- Description: Multiple vulnerabilities in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges on an affected device.
- Remediation:
- More Info: NVD - CVE-2023-20198
- PoC:
CVE-2025-6554
- Severity: 8.1 HIGH
- Impacted Products: Google Chrome prior to version 138.0.7204.96
- Description: Google Chrome’s V8 JavaScript engine contains a type confusion vulnerability that allows a remote attacker to achieve arbitrary read/write capabilities and arbitrary code execution. This can be triggered by a specially crafted HTML page.
- Remediation:
- More Info: NVD - CVE-2025-6554
- PoC:
CVE-2025-63666
- Severity: 9.8 CRITICAL
- Impacted Products: Tenda AC15 v15.03.05.18_multi
- Description: Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63666
- PoC:
CVE-2025-61303
- Severity: 5.3 MEDIUM
- Impacted Products: Hatching Triage Sandbox Windows 10 build 2004 (2025-08-14), Hatching Triage Sandbox Windows 10 LTSC 2021 (2025-08-14)
- Description: Hatching Triage Sandbox Windows 10 build 2004 (2025-08-14) and Windows 10 LTSC 2021(2025-08-14) contains a vulnerability in its Windows behavioral analysis engine that allows a submitted malware sample to evade detection and cause denial-of-analysis. The vulnerability is triggered when a sample recursively spawns a large number of child processes, generating high log volume and exhausting system resources.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61303
- PoC:
CVE-2025-60736
- Severity: 9.8 CRITICAL
- Impacted Products: code-projects Online Medicine Guide 1.0
- Description: code-projects Online Medicine Guide 1.0 is vulnerable to SQL Injection in /login.php via the upass parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-60736
- PoC:
CVE-2025-55729
- Severity: 10.0 CRITICAL
- Impacted Products: XWiki Remote Macros 1.0, XWiki Remote Macros 1.26.5
- Description: XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the ac:type in the ConfluenceLayoutSection macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 has a fix for the issue.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-55729
- PoC:
CVE-2025-55728
- Severity: 10.0 CRITICAL
- Impacted Products: XWiki Remote Macros 1.0, XWiki Remote Macros 1.26.5
- Description: XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Starting in version 1.0 and prior to version 1.26.5, missing escaping of the classes parameter in the panel macro allows remote code execution for any user who can edit any page The classes parameter is used without escaping in XWiki syntax, thus allowing XWiki syntax injection which enables remote code execution. Version 1.26.5 contains a patch for the issue.
- Remediation:
- More Info: NVD - CVE-2025-55728
- PoC:
CVE-2025-54914
- Severity: 10.0 CRITICAL
- Impacted Products: Azure Networking
- Description: Azure Networking Elevation of Privilege Vulnerability
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-54914
- PoC:
CVE-2025-45746
- Severity: 6.5 MEDIUM
- Impacted Products: ZKT ZKBio CVSecurity 6.4.1_R
- Description: In ZKT ZKBio CVSecurity 6.4.1_R an unauthenticated attacker can craft JWT token using the hardcoded secret to authenticate to the service console. NOTE: the Supplier disputes the significance of this report because the service console is typically only accessible from a local area network, and because access to the service console does not result in login access or data access in the context of the application software platform.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45746
- PoC:
CVE-2025-40547
- Severity: 9.1 CRITICAL
- Impacted Products: Serv-U
- Description: A logic error vulnerability exists in Serv-U which when abused could give a malicious actor with access to admin privileges the ability to execute code. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-40547
- PoC:
CVE-2025-29891
- Severity: 4.8 MEDIUM
- Impacted Products: Apache Camel: 4.10.0 before 4.10.2, 4.8.0 before 4.8.5, 3.10.0 before 3.22.4
- Description: Bypass/Injection vulnerability in Apache Camel.
- Remediation:
- More Info: NVD - CVE-2025-29891
- PoC:
CVE-2025-28242
- Severity: 9.8 CRITICAL
- Impacted Products: DAEnetIP4 METO v1.25
- Description: Improper session management in the /login_ok.htm endpoint of DAEnetIP4 METO v1.25 allows attackers to execute a session hijacking attack.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28242
- PoC:
CVE-2025-28238
- Severity: 9.8 CRITICAL
- Impacted Products: Elber REBLE310 Firmware v5.5.1.R
- Description: Improper session management in Elber REBLE310 Firmware v5.5.1.R , Equipment Model: REBLE310/RX10/4ASI allows attackers to execute a session hijacking attack.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28238
- PoC:
CVE-2025-28236
- Severity: 9.8 CRITICAL
- Impacted Products: Nautel VX Series transmitters VX SW v6.4.0 and below
- Description: Nautel VX Series transmitters VX SW v6.4.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the firmware update process. This vulnerability allows attackers to execute arbitrary code via supplying a crafted update package to the /#/software/upgrades endpoint.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28236
- PoC:
CVE-2025-28233
- Severity: 9.1 CRITICAL
- Impacted Products: BW Broadcast TX600 (14980), BW Broadcast TX300 (32990) (31448), BW Broadcast TX150, BW Broadcast TX1000, BW Broadcast TX30
- Description: Incorrect access control in BW Broadcast TX600 (14980), TX300 (32990) (31448), TX150, TX1000, TX30, and TX50 Hardware Version: 2, Software Version: 1.6.0, Control Version: 1.0, AIO Firmware Version: 1.7 allows attackers to access log files and extract session identifiers to execute a session hijacking attack.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28233
- PoC:
CVE-2025-28232
- Severity: 9.1 CRITICAL
- Impacted Products: JMBroadcast JMB0150 Firmware v1.0
- Description: Incorrect access control in the HOME.php endpoint of JMBroadcast JMB0150 Firmware v1.0 allows attackers to access the Admin panel without authentication.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28232
- PoC:
CVE-2025-28231
- Severity: 9.1 CRITICAL
- Impacted Products: Itel Electronics IP Stream v1.7.0.6
- Description: Incorrect access control in Itel Electronics IP Stream v1.7.0.6 allows unauthorized attackers to execute arbitrary commands with Administrator privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28231
- PoC:
CVE-2025-28230
- Severity: 9.1 CRITICAL
- Impacted Products: JMBroadcast JMB0150 Firmware v1.0
- Description: Incorrect access control in JMBroadcast JMB0150 Firmware v1.0 allows attackers to access hardcoded administrator credentials.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28230
- PoC:
CVE-2025-28229
- Severity: 9.8 CRITICAL
- Impacted Products: Orban OPTIMOD 5950 Firmware v1.0.0.2, Orban OPTIMOD System v2.2.15
- Description: Incorrect access control in Orban OPTIMOD 5950 Firmware v1.0.0.2 and System v2.2.15 allows attackers to bypass authentication and gain Administrator privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28229
- PoC:
CVE-2025-28009
- Severity: 9.8 CRITICAL
- Impacted Products: Dietiqa App v1.0.20
- Description: A SQL Injection vulnerability exists in the
uparameter of the progress-body-weight.php endpoint of Dietiqa App v1.0.20. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28009
- PoC:
CVE-2025-27636
- Severity: 6.3 MEDIUM
- Impacted Products: Apache Camel 4.10.0, Apache Camel 4.10.1, Apache Camel 4.8.0, Apache Camel 4.8.1, Apache Camel 4.8.2
- Description: Apache Camel contains a security bypass and injection vulnerability due to improper case-sensitive handling in its default header filter, allowing attackers to inject malicious headers and alter application behavior. This flaw can lead to unauthorized method invocation, message redirection, or arbitrary command execution under specific component usage.
- Remediation:
- More Info: NVD - CVE-2025-27636
- PoC:
CVE-2025-26794
- Severity: 7.5 HIGH
- Impacted Products: Exim 4.98, Exim 4.98.1
- Description: Exim 4.98 before 4.98.1 is susceptible to a remote SQL injection vulnerability when configured to use SQLite hints and ETRN serialization, which can lead to a denial-of-service condition. This flaw allows an attacker to inject malicious SQL queries into the application’s database interactions.
- Remediation:
- exim-4.98.1-1.fc41
- exim-4.98.1-1.fc40
- CVE 2025-26794
- More Info: NVD - CVE-2025-26794
- PoC:
CVE-2025-24132
- Severity: 6.5 MEDIUM
- Impacted Products: AirPlay audio SDK 2.7.1, AirPlay video SDK 3.6.0.126, CarPlay Communication Plug-in R18.1
- Description: The issue was addressed with improved memory handling. This issue is fixed in AirPlay audio SDK 2.7.1, AirPlay video SDK 3.6.0.126, CarPlay Communication Plug-in R18.1. An attacker on the local network may cause an unexpected app termination.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-24132
- PoC:
CVE-2025-24076
- Severity: 7.3 HIGH
- Impacted Products: Windows Cross Device Service
- Description: Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.
- Remediation:
- More Info: NVD - CVE-2025-24076
- PoC:
CVE-2025-24071
- Severity: 6.5 MEDIUM
- Impacted Products: Microsoft Windows File Explorer
- Description: Microsoft Windows File Explorer contains an information disclosure vulnerability that allows an unauthorized attacker to obtain sensitive NTLM hashes. This flaw exists due to the way File Explorer processes specially crafted
.library-msfiles. - Remediation:
- More Info: NVD - CVE-2025-24071
- PoC:
CVE-2025-21420
- Severity: 7.8 HIGH
- Impacted Products: Windows Disk Cleanup Tool
- Description: Windows Disk Cleanup Tool Elevation of Privilege Vulnerability
- Remediation:
- More Info: NVD - CVE-2025-21420
- PoC:
CVE-2025-20682
- Severity: 9.8 CRITICAL
- Impacted Products: wlan AP driver
- Description: In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445.
- Remediation:
- More Info: NVD - CVE-2025-20682
- PoC:
CVE-2025-14611
- Severity: 10.0 CRITICAL
- Impacted Products: Gladinet CentreStack prior to version 16.12.10420.56791, Triofox prior to version 16.12.10420.56791
- Description: Gladinet CentreStack and Triofox products contain a hardcoded cryptographic key vulnerability in their AES implementation, which can lead to information disclosure and potentially arbitrary local file inclusion or remote code execution. This flaw stems from the use of static, predictable keys for cryptographic operations.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-14611
- PoC:
CVE-2024-57430
- Severity: 9.8 CRITICAL
- Impacted Products: PHPJabbers Cinema Booking System v2.0
- Description: An SQL injection vulnerability in the pjActionGetUser function of PHPJabbers Cinema Booking System v2.0 allows attackers to manipulate database queries via the column parameter. Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57430
- PoC:
CVE-2024-57428
- Severity: 9.3 CRITICAL
- Impacted Products: PHPJabbers Cinema Booking System v2.0
- Description: A stored cross-site scripting (XSS) vulnerability in PHPJabbers Cinema Booking System v2.0 exists due to unsanitized input in file upload fields (event_img, seat_maps) and seat number configurations (number[new_X] in pjActionCreate). Attackers can inject persistent JavaScript, leading to phishing, malware injection, and session hijacking.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57428
- PoC:
CVE-2024-57401
- Severity: 9.8 CRITICAL
- Impacted Products: Uniclare Student portal v.2 and before
- Description: SQL Injection vulnerability in Uniclare Student portal v.2 and before allows a remote attacker to execute arbitrary code via the Forgot Password function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57401
- PoC:
CVE-2024-57032
- Severity: 9.8 CRITICAL
- Impacted Products: WeGIA < 3.2.0
- Description: WeGIA < 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57032
- PoC:
CVE-2024-55460
- Severity: 9.8 CRITICAL
- Impacted Products: BoardRoom Limited Dividend Distribution Tax Election System v2.0
- Description: A time-based SQL injection vulnerability in the login page of BoardRoom Limited Dividend Distribution Tax Election System Version v2.0 allows attackers to execute arbitrary code via a crafted input.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-55460
- PoC:
CVE-2024-4577
- Severity: 9.8 CRITICAL
- Impacted Products: PHP 8.1., PHP 8.2., PHP 8.3.*
- Description: PHP installations on Windows using CGI configurations are vulnerable to an argument injection flaw that allows for remote code execution. This vulnerability arises from how Windows' “Best-Fit” character replacement interacts with the PHP-CGI module, enabling attackers to inject PHP options.
- Remediation:
- More Info: NVD - CVE-2024-4577
- PoC:
CVE-2024-38193
- Severity: 7.8 HIGH
- Impacted Products: Windows Ancillary Function Driver for WinSock
- Description: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
- Remediation:
- Dell PowerMaxOS 5978.714.714, Dell PowerMax OS 10.1.0.5, Dell Unisphere 360, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Solutions Enabler Virtual Appliance, and Dell PowerMax EEM Security Update for Mult
- Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
- Microsoft KB 5041160
- More Info: NVD - CVE-2024-38193
- PoC:
CVE-2024-12084
- Severity: 9.8 CRITICAL
- Impacted Products: rsync
- Description: A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer.
- Remediation:
- More Info: NVD - CVE-2024-12084
- PoC:
CVE-2022-40684
- Severity: 9.8 CRITICAL
- Impacted Products: FortiOS, FortiProxy, FortiSwitchManager
- Description: An authentication bypass using an alternate path or channel vulnerability [CWE-288] in FortiOS, FortiProxy and FortiSwitchManager exists in the handling of HTTP or HTTPS requests.
- Remediation:
- More Info: NVD - CVE-2022-40684
- PoC:
CVE-2018-4063
- Severity: 9.9 CRITICAL
- Impacted Products: ACEManager
- Description: A vulnerability exists within the upload.cgi in the ACEManager webserver which allows template file uploads without the need for authorization. The ACEManager webserver runs as root and therefore, so will executables.
- Remediation:
- More Info: NVD - CVE-2018-4063
- PoC:
CVE-2025-9697
- Severity: 9.8 CRITICAL
- Impacted Products: Ajax WooSearch WordPress plugin through 1.0.0
- Description: The Ajax WooSearch WordPress plugin through 1.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-9697
- PoC:
CVE-2025-9286
- Severity: 9.8 CRITICAL
- Impacted Products: Appy Pie Connect for WooCommerce 1.1.2
- Description: The Appy Pie Connect for WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the reset_user_password() REST handler in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to to reset the password of arbitrary users, including administrators, thereby gaining administrative access.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-9286
- PoC:
CVE-2025-9209
- Severity: 9.8 CRITICAL
- Impacted Products: RestroPress – Online Food Ordering System plugin for WordPress 3.0.0 to 3.1.9.2
- Description: The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-9209
- PoC:
CVE-2025-9083
- Severity: 9.8 CRITICAL
- Impacted Products: Ninja Forms WordPress plugin before 3.11.1
- Description: The Ninja Forms WordPress plugin before 3.11.1 unserializes user input via form field, which could allow Unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-9083
- PoC:
CVE-2025-9074
- Severity: Unknown
- Impacted Products: Docker Desktop prior to version 4.44.3
- Description: Docker Desktop is affected by an exposure of resource to wrong sphere vulnerability that allows locally running containers to access the Docker Engine API. This unintended access enables command execution and potential host system compromise from within a container.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-9074
- PoC:
CVE-2025-8942
- Severity: 9.1 CRITICAL
- Impacted Products: WP Hotel Booking WordPress plugin before 2.2.3
- Description: The WP Hotel Booking WordPress plugin before 2.2.3 lacks proper server-side validation for review ratings, allowing an attacker to manipulate the rating value (e.g., sending negative or out-of-range values) by intercepting and modifying requests.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8942
- PoC:
CVE-2025-8876
- Severity: 9.9 CRITICAL
- Impacted Products: N-able N-central: before 2025.3.1
- Description: Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8876
- PoC:
CVE-2025-8875
- Severity: 7.8 HIGH
- Impacted Products: N-able N-central: before 2025.3.1
- Description: Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8875
- PoC:
CVE-2025-8730
- Severity: 9.8 CRITICAL
- Impacted Products: Belkin F9K1009 2.00.04, Belkin F9K1010 2.00.09
- Description: A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to hard-coded credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8730
- PoC:
CVE-2025-8699
- Severity: 9.1 CRITICAL
- Impacted Products: KioSoft “Stored Value” Unattended Payment Solutions
- Description: The account balance is stored on an insecure MiFare Classic NFC card in some KioSoft “Stored Value” Unattended Payment Solutions. This means the cards can be read and written back. By manipulating the right field, one can “create money out of thin air” and use it to pay for goods.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8699
- PoC:
CVE-2025-8625
- Severity: 9.8 CRITICAL
- Impacted Products: Copypress Rest API plugin for WordPress 1.1 to 1.2
- Description: The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8625
- PoC:
CVE-2025-8570
- Severity: 9.8 CRITICAL
- Impacted Products: BeyondCart Connector plugin for WordPress, 1.4.2 through 2.1.0
- Description: The BeyondCart Connector plugin for WordPress is vulnerable to Privilege Escalation due to improper JWT secret management and authorization within the determine_current_user filter in versions 1.4.2 through 2.1.0. This makes it possible for unauthenticated attackers to craft valid tokens and assume any user’s identity.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8570
- PoC:
CVE-2025-8359
- Severity: 9.8 CRITICAL
- Impacted Products: AdForest theme for WordPress, 6.0.9
- Description: The AdForest theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 6.0.9. This is due to the plugin not properly verifying a user’s identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as other users, including administrators, without access to a password.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8359
- PoC:
CVE-2025-8355
- Severity: 7.5 HIGH
- Impacted Products: Xerox FreeFlow Core 8.0.4
- Description: In Xerox FreeFlow Core version 8.0.4, improper handling of XML input allows injection of external entities. An attacker can craft malicious XML containing references to internal URLs, this results in a Server-Side Request Forgery (SSRF).
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8355
- PoC:
CVE-2025-7851
- Severity: 9.8 CRITICAL
- Impacted Products: Omada gateways
- Description: An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-7851
- PoC:
CVE-2025-7441
- Severity: 9.8 CRITICAL
- Impacted Products: StoryChief plugin for WordPress, 1.0.42
- Description: The StoryChief plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.0.42. This vulnerability occurs through the /wp-json/storychief/webhook REST-API endpoint that does not have sufficient filetype validation. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-7441
- PoC:
CVE-2025-7401
- Severity: 9.8 CRITICAL
- Impacted Products: Premium Age Verification / Restriction for WordPress plugin, 3.0.2
- Description: The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support functionality in remote_tunnel.php in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to read from or write to arbitrary files on the affected site’s server which may make the exposure of sensitive information or remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-7401
- PoC:
CVE-2025-6934
- Severity: 9.8 CRITICAL
- Impacted Products: Opal Estate Pro – Property Management and Submission plugin for WordPress, FullHouse - Real Estate Responsive WordPress Theme, 1.7.5
- Description: The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the ‘on_regiser_user’ function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6934
- PoC:
CVE-2025-6715
- Severity: 9.8 CRITICAL
- Impacted Products: LatePoint WordPress plugin before 5.1.94
- Description: The LatePoint WordPress plugin before 5.1.94 is vulnerable to Local File Inclusion via the layout parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6715
- PoC:
CVE-2025-66438
- Severity: 9.8 CRITICAL
- Impacted Products: Frappe ERPNext through 15.89.0
- Description: A Server-Side Template Injection (SSTI) vulnerability exists in the Frappe ERPNext through 15.89.0 Print Format rendering mechanism. Specifically, the API frappe.www.printview.get_html_and_style() triggers the rendering of the html field inside a Print Format document using frappe.render_template(template, doc) via the get_rendered_template() call chain.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-66438
- PoC:
CVE-2025-66434
- Severity: 8.8 HIGH
- Impacted Products: Frappe ERPNext through 15.89.0
- Description: An SSTI (Server-Side Template Injection) vulnerability exists in the get_dunning_letter_text method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (body_text) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals().
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-66434
- PoC:
CVE-2025-66401
- Severity: 9.8 CRITICAL
- Impacted Products: MCP Watch 0.1.2 and earlier
- Description: MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-66401
- PoC:
CVE-2025-65741
- Severity: 9.8 CRITICAL
- Impacted Products: Sublime Text 3 Build 3208 or prior
- Description: Sublime Text 3 Build 3208 or prior for MacOS is vulnerable to Dylib Injection. An attacker could compile a .dylib file and force the execution of this library in the context of the Sublime Text application.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-65741
- PoC:
CVE-2025-64522
- Severity: 9.1 CRITICAL
- Impacted Products: Soft Serve < 0.11.1
- Description: Soft Serve is a self-hostable Git server for the command line. Versions prior to 0.11.1 have a SSRF vulnerability where webhook URLs are not validated, allowing repository administrators to create webhooks targeting internal services, private networks, and cloud metadata endpoints. Version 0.11.1 fixes the vulnerability.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-64522
- PoC:
CVE-2025-6440
- Severity: 9.8 CRITICAL
- Impacted Products: WooCommerce Designer Pro plugin for WordPress, 1.9.26
- Description: The WooCommerce Designer Pro plugin for WordPress, used by the Pricom - Printing Company &amp; Design Services WordPress theme, is vulnerable to arbitrary file uploads due to missing file type validation in the ‘wcdp_save_canvas_design_ajax’ function in all versions up to, and including, 1.9.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6440
- PoC:
CVE-2025-64180
- Severity: 9.0 CRITICAL
- Impacted Products: Manager Desktop 25.11.1.3085 and below, Manager Server 25.11.1.3085 and below
- Description: Manager-io/Manager is accounting software. In Manager Desktop and Server versions 25.11.1.3085 and below, a critical vulnerability permits unauthorized access to internal network resources. The flaw lies in the fundamental design of the DNS validation mechanism. A Time-of-Check Time-of-Use (TOCTOU) condition that allows attackers to bypass network isolation and access internal services, cloud metadata endpoints, and protected network segments.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-64180
- PoC:
CVE-2025-64164
- Severity: 9.8 CRITICAL
- Impacted Products: Dataease 2.10.14 and below, Dataease 2.10.15
- Description: Dataease is an open source data visualization analysis tool. In versions 2.10.14 and below, DataEase did not properly filter when establishing JDBC connections to Oracle, resulting in a risk of JNDI injection (Java Naming and Directory Interface injection). This issue is fixed in version 2.10.15.
- Remediation:
- More Info: NVD - CVE-2025-64164
- PoC:
CVE-2025-64163
- Severity: 9.8 CRITICAL
- Impacted Products: DataEase 2.10.14 and below, DataEase 2.10.15
- Description: DataEase is an open source data visualization analysis tool. In versions 2.10.14 and below, the vendor added a blacklist to filter ldap:// and ldaps://. However, omission of protection for the dns:// protocol results in an SSRF vulnerability. This issue is fixed in version 2.10.15.
- Remediation:
- More Info: NVD - CVE-2025-64163
- PoC:
CVE-2025-6389
- Severity: 9.8 CRITICAL
- Impacted Products: Sneeit Framework plugin for WordPress, 8.3
- Description: The Sneeit Framework plugin for WordPress, in all versions up to and including 8.3, is susceptible to a remote code execution vulnerability. This flaw allows unauthenticated attackers to execute arbitrary code on the server due to improper handling of user-supplied input.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6389
- PoC:
CVE-2025-63747
- Severity: 9.8 CRITICAL
- Impacted Products: QaTraq 6.9.2
- Description: QaTraq 6.9.2 ships with administrative account credentials which are enabled in default installations and permit immediate login via the web application login page. Because the account provides administrative privileges in the default configuration, an attacker who can reach the login page can gain administrative access.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63747
- PoC:
CVE-2025-63691
- Severity: 9.6 CRITICAL
- Impacted Products: pig-mesh In Pig version 3.8.2 and below
- Description: In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63691
- PoC:
CVE-2025-63690
- Severity: 9.1 CRITICAL
- Impacted Products: pig-mesh Pig 3.8.2 and below, Tomcat
- Description: In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat’s built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63690
- PoC:
CVE-2025-63689
- Severity: 8.8 HIGH
- Impacted Products: ycf1998 money-pos system before commit 11f276bd20a41f089298d804e43cb1c39d041e59
- Description: Multiple SQL injection vulnerabilitites in ycf1998 money-pos system before commit 11f276bd20a41f089298d804e43cb1c39d041e59 (2025-09-14) allows a remote attacker to execute arbitrary code via the orderby parameter
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63689
- PoC:
CVE-2025-63679
- Severity: 5.3 MEDIUM
- Impacted Products: free5gc v4.1.0 and before
- Description: free5gc v4.1.0 and before is vulnerable to Buffer Overflow. When AMF receives an UplinkRANConfigurationTransfer NGAP message from a gNB, the AMF process crashes.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63679
- PoC:
CVE-2025-63622
- Severity: 9.8 CRITICAL
- Impacted Products: code-projects Online Complaint Site 1.0
- Description: A vulnerability was found in code-projects Online Complaint Site 1.0. This issue affects some unknown processing of the file /cms/admin/subcategory.php. This manipulation of the argument category causes SQL injection.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63622
- PoC:
CVE-2025-63453
- Severity: 9.8 CRITICAL
- Impacted Products: Car-Booking-System-PHP v.1.0
- Description: Car-Booking-System-PHP v.1.0 is vulnerable to SQL Injection in /carlux/contact.php.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63453
- PoC:
CVE-2025-63452
- Severity: 9.4 CRITICAL
- Impacted Products: Car-Booking-System-PHP v.1.0
- Description: Car-Booking-System-PHP v.1.0 is vulnerable to SQL Injection in /carlux/forgot-pass.php.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63452
- PoC:
CVE-2025-63451
- Severity: 9.8 CRITICAL
- Impacted Products: Car-Booking-System-PHP v.1.0
- Description: Car-Booking-System-PHP v.1.0 is vulnerable to SQL Injection in /carlux/sign-in.php.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63451
- PoC:
CVE-2025-63416
- Severity: 9.1 CRITICAL
- Impacted Products: SelfBest platform 2023.3
- Description: ** exclusively-hosted-service ** A Stored Cross-Site Scripting (XSS) vulnerability in the chat functionality of the SelfBest platform 2023.3 allows authenticated low-privileged attackers to execute arbitrary JavaScript in the context of other users' sessions.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63416
- PoC:
CVE-2025-63353
- Severity: 6.3 MEDIUM
- Impacted Products: FiberHome GPON ONU HG6145F1 RP4423
- Description: A vulnerability in FiberHome GPON ONU HG6145F1 RP4423 allows the device’s factory default Wi-Fi password (WPA/WPA2 pre-shared key) to be predicted from the SSID. The device generates default passwords using a deterministic algorithm that derives the router passphrase from the SSID, enabling an attacker who can observe the SSID to predict the default password without authentication or user interaction.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63353
- PoC:
CVE-2025-63334
- Severity: 9.8 CRITICAL
- Impacted Products: PocketVJ CP PocketVJ-CP-v3 pvj version 3.9.1
- Description: PocketVJ CP PocketVJ-CP-v3 pvj version 3.9.1 contains an unauthenticated remote code execution vulnerability in the submit_opacity.php component. The application fails to sanitize user input in the opacityValue POST parameter before passing it to a shell command, allowing remote attackers to execute arbitrary commands with root privileges on the underlying system.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-63334
- PoC:
CVE-2025-62515
- Severity: 9.8 CRITICAL
- Impacted Products: pyquokka 0.3.1 and prior
- Description: pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads().
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-62515
- PoC:
CVE-2025-62353
- Severity: 9.8 CRITICAL
- Impacted Products: Windsurf IDE
- Description: A path traversal vulnerability in all versions of the Windsurf IDE enables a threat actor to read and write arbitrary local files in and outside of current projects on an end user’s system. The vulnerability can be reached directly and through indirect prompt injection.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-62353
- PoC:
CVE-2025-6218
- Severity: 7.8 HIGH
- Impacted Products: RARLAB WinRAR 7.11 and earlier
- Description: RARLAB WinRAR versions 7.11 and earlier contain a path traversal vulnerability that allows for arbitrary code execution. This flaw enables a specially crafted archive to write files to unintended directories during extraction.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6218
- PoC:
CVE-2025-62168
- Severity: 10.0 CRITICAL
- Impacted Products: Squid < 7.2
- Description: Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing.
- Remediation:
- More Info: NVD - CVE-2025-62168
- PoC:
CVE-2025-6205
- Severity: 9.1 CRITICAL
- Impacted Products: Dassault Systèmes DELMIA Apriso
- Description: Dassault Systèmes DELMIA Apriso is affected by a missing authorization vulnerability in its SOAP message processor component. This flaw allows an unauthenticated remote attacker to create new accounts with administrative privileges by sending specially crafted XML requests.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6205
- PoC:
CVE-2025-61913
- Severity: 9.9 CRITICAL
- Impacted Products: Flowise prior to 3.0.8
- Description: Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability.
- Remediation:
- More Info: NVD - CVE-2025-61913
- PoC:
CVE-2025-6179
- Severity: 4.4 MEDIUM
- Impacted Products: Google ChromeOS 16181.27.0
- Description: Permissions Bypass in Extension Management in Google ChromeOS 16181.27.0 on managed Chrome devices allows a local attacker to disable extensions and access Developer Mode, including loading additional extensions via exploiting vulnerabilities using the ExtHang3r and ExtPrint3r tools.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6179
- PoC:
CVE-2025-6169
- Severity: 9.8 CRITICAL
- Impacted Products: WIMP website co-construction management platform
- Description: The WIMP website co-construction management platform from HAMASTAR Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6169
- PoC:
CVE-2025-61622
- Severity: 9.8 CRITICAL
- Impacted Products: pyfory 0.12.0 through 0.12.2, pyfury 0.1.0 through 0.10.3
- Description: Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of
pickle.loads, which is vulnerable to remote code execution. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61622
- PoC:
CVE-2025-61605
- Severity: 9.8 CRITICAL
- Impacted Products: WeGIA 3.4.12 and below, WeGIA 3.5.0
- Description: WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an SQL Injection vulnerability which was identified in the /pet/profile_pet.php endpoint, specifically in the id_pet parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
- Remediation:
- More Info: NVD - CVE-2025-61605
- PoC:
CVE-2025-61603
- Severity: 9.8 CRITICAL
- Impacted Products: WeGIA 3.4.12 and below, WeGIA 3.5.0
- Description: WeGIA is a Web manager for charitable institutions. Versions 3.4.12 and below include an SQL Injection vulnerability which was identified in the /controle/control.php endpoint, specifically in the descricao parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue is fixed in version 3.5.0.
- Remediation:
- More Info: NVD - CVE-2025-61603
- PoC:
CVE-2025-61481
- Severity: 10.0 CRITICAL
- Impacted Products: MikroTik RouterOS v.7.14.2, SwOS v.2.18
- Description: An issue in MikroTik RouterOS v.7.14.2 and SwOS v.2.18 exposes the WebFig management interface over cleartext HTTP by default, allowing an on-path attacker to execute injected JavaScript in the administrator’s browser and intercept credentials.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61481
- PoC:
CVE-2025-61455
- Severity: 9.8 CRITICAL
- Impacted Products: Bhabishya-123 E-commerce 1.0
- Description: SQL Injection vulnerability exists in Bhabishya-123 E-commerce 1.0, specifically within the signup.inc.php endpoint. The application directly incorporates unsanitized user inputs into SQL queries, allowing unauthenticated attackers to bypass authentication and gain full access.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61455
- PoC:
CVE-2025-61304
- Severity: 8.8 HIGH
- Impacted Products: Dynatrace ActiveGate ping extension up to 1.016
- Description: OS command injection vulnerability in Dynatrace ActiveGate ping extension up to 1.016 via crafted ip address.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61304
- PoC:
CVE-2025-61128
- Severity: 9.1 CRITICAL
- Impacted Products: WAVLINK QUANTUM D3G/WL-WN530HG3 firmware M30HG3_V240730
- Description: Stack-based buffer overflow vulnerability in WAVLINK QUANTUM D3G/WL-WN530HG3 firmware M30HG3_V240730, and possibly other wavlink models allows attackers to execute arbitrary code via crafted referrer value POST to login.cgi.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61128
- PoC:
CVE-2025-61043
- Severity: 9.1 CRITICAL
- Impacted Products: Monkey’s Audio 11.31
- Description: An out-of-bounds read vulnerability has been discovered in Monkey’s Audio 11.31, specifically in the CAPECharacterHelper::GetUTF16FromUTF8 function. The issue arises from improper handling of the length of the input UTF-8 string, causing the function to read past the memory boundary. This vulnerability may result in a crash or expose sensitive data.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-61043
- PoC:
CVE-2025-60854
- Severity: 9.8 CRITICAL
- Impacted Products: D-Link R15 (AX1500) 1.20.01 and below
- Description: A vulnerability has been found in D-Link R15 (AX1500) 1.20.01 and below. By manipulating the model name parameter during a password change request in the web administrator page, it is possible to trigger a command injection in httpd.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-60854
- PoC:
CVE-2025-60803
- Severity: 9.8 CRITICAL
- Impacted Products: Antabot White-Jotter up to commit 9bcadc
- Description: Antabot White-Jotter up to commit 9bcadc was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the component /api/aaa;/../register.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-60803
- PoC:
CVE-2025-6065
- Severity: 9.1 CRITICAL
- Impacted Products: Image Resizer On The Fly plugin for WordPress, 1.1
- Description: The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ‘delete’ task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-6065
- PoC:
CVE-2025-59934
- Severity: 9.4 CRITICAL
- Impacted Products: Formbricks < 4.0.1
- Description: Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59934
- PoC:
CVE-2025-59834
- Severity: 9.8 CRITICAL
- Impacted Products: ADB MCP Server 0.1.0 and prior
- Description: ADB MCP Server is a MCP (Model Context Protocol) server for interacting with Android devices through ADB. In versions 0.1.0 and prior, the MCP Server is written in a way that is vulnerable to command injection vulnerability attacks as part of some of its MCP Server tool definition and implementation. This issue has been patched via commit 041729c.
- Remediation:
- More Info: NVD - CVE-2025-59834
- PoC:
CVE-2025-59832
- Severity: 9.9 CRITICAL
- Impacted Products: Horilla, prior to version 1.4.0
- Description: Horilla is a free and open source Human Resource Management System (HRMS). Prior to version 1.4.0, there is a stored XSS vulnerability in the ticket comment editor. A low-privilege authenticated user could run arbitrary JavaScript in an admin’s browser, exfiltrate the admin’s cookies/CSRF token, and hijack their session. This issue has been patched in version 1.4.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59832
- PoC:
CVE-2025-5947
- Severity: 9.8 CRITICAL
- Impacted Products: Service Finder Bookings plugin for WordPress, 6.0
- Description: The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via authentication bypass in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user’s cookie value prior to logging them in through the service_finder_switch_back() function. This makes it possible for unauthenticated attackers to login as any user including admins.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5947
- PoC:
CVE-2025-59407
- Severity: 9.8 CRITICAL
- Impacted Products: Flock Safety DetectionProcessing 6.35.33
- Description: The Flock Safety DetectionProcessing com.flocksafety.android.objects application 6.35.33 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) bundles a Java Keystore (flock_rye.bks) along with its hardcoded password (flockhibiki17) in its code. The keystore contains a private key.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59407
- PoC:
CVE-2025-59396
- Severity: 9.8 CRITICAL
- Impacted Products: WatchGuard Firebox
- Description: The default configuration of WatchGuard Firebox devices through 2025-09-10 allows administrative access via SSH on port 4118 with the readwrite password for the admin account.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59396
- PoC:
CVE-2025-59390
- Severity: 9.8 CRITICAL
- Impacted Products: Apache Druid 34.0.0
- Description: Apache Druid’s Kerberos authenticator, when not explicitly configured with
druid.auth.authenticator.kerberos.cookieSignatureSecret, generates a weak fallback secret usingThreadLocalRandom, enabling potential authentication bypass or token forgery. This also causes authentication failures in distributed deployments due to inconsistent secrets across nodes. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59390
- PoC:
CVE-2025-59359
- Severity: 9.8 CRITICAL
- Impacted Products: Chaos Controller Manager
- Description: The cleanTcs mutation in Chaos Controller Manager is vulnerable to OS command injection. In conjunction with CVE-2025-59358, this allows unauthenticated in-cluster attackers to perform remote code execution across the cluster.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59359
- PoC:
CVE-2025-59352
- Severity: 8.8 HIGH
- Impacted Products: Dragonfly, prior to 2.1.0
- Description: Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the gRPC API and HTTP APIs allow peers to send requests that force the recipient peer to create files in arbitrary file system locations, and to read arbitrary files. This allows peers to steal other peers’ secret data and to gain remote code execution (RCE) capabilities on the peer’s machine.This vulnerability is fixed in 2.1.0.
- Remediation:
- More Info: NVD - CVE-2025-59352
- PoC:
CVE-2025-59340
- Severity: 9.8 CRITICAL
- Impacted Products: jinjava, 2.8.1
- Description: jinjava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Priori to 2.8.1, by using mapper.getTypeFactory().constructFromCanonical(), it is possible to instruct the underlying ObjectMapper to deserialize attacker-controlled input into arbitrary classes. This enables the creation of semi-arbitrary class instances without directly invoking restricted methods or class literals.
- Remediation:
- More Info: NVD - CVE-2025-59340
- PoC:
CVE-2025-59304
- Severity: 9.8 CRITICAL
- Impacted Products: Swetrix Web Analytics API 3.1.1
- Description: A directory traversal issue in Swetrix Web Analytics API 3.1.1 before 7d8b972 allows a remote attacker to achieve Remote Code Execution via a crafted HTTP request.
- Remediation:
- More Info: NVD - CVE-2025-59304
- PoC:
CVE-2025-59159
- Severity: 9.6 CRITICAL
- Impacted Products: SillyTavern < 1.13.4
- Description: SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.13.4, the web user interface for SillyTavern is susceptible to DNS rebinding, allowing attackers to perform actions like install malicious extensions, read chats, inject arbitrary HTML for phishing attacks, etc.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59159
- PoC:
CVE-2025-59053
- Severity: 9.6 CRITICAL
- Impacted Products: AIRI v0.7.2-beta.2, AIRI v0.7.2-beta.3
- Description: AIRI is a self-hosted, artificial intelligence based Grok Companion. In v0.7.2-beta.2 in the
packages/stage-ui/src/components/MarkdownRenderer.vuepath, the Markdown content is processed using the useMarkdown composable, and the processed HTML is rendered directly into the DOM using v-html. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-59053
- PoC:
CVE-2025-58746
- Severity: 9.0 CRITICAL
- Impacted Products: Volkov Labs Business Links panel for Grafana, prior to version 2.4.0
- Description: The Volkov Labs Business Links panel for Grafana provides an interface to navigate using external links, internal dashboards, time pickers, and dropdown menus. Prior to version 2.4.0, a malicious actor with Editor privileges can escalate their privileges to Administrator and perform arbitrary administrative actions. This is possible because the plugin allows arbitrary JavaScript code injection in the [Layout] → [Link] → [URL] field. Version 2.4.0 contains a fix for the issue.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-58746
- PoC:
CVE-2025-58434
- Severity: 9.8 CRITICAL
- Impacted Products: Flowise 3.0.5 and earlier, Flowise 3.0.6
- Description: Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5 and earlier, the
forgot-passwordendpoint in Flowise returns sensitive information including a valid password resettempTokenwithout authentication or verification. This enables any attacker to generate a reset token for arbitrary users and directly reset their password, leading to a complete account takeover (ATO). - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-58434
- PoC:
CVE-2025-58360
- Severity: 8.2 HIGH
- Impacted Products: GeoServer 2.26.0 to before 2.26.2, GeoServer before 2.25.6
- Description: GeoServer versions 2.26.0 to before 2.26.2 and before 2.25.6 are affected by an XML External Entity (XXE) vulnerability in the
/geoserver/wmsendpoint’sGetMapoperation, allowing an attacker to define external entities within XML requests. This flaw stems from insufficient sanitization of XML input. - Remediation:
- More Info: NVD - CVE-2025-58360
- PoC:
CVE-2025-5821
- Severity: 9.8 CRITICAL
- Impacted Products: Case Theme User plugin for WordPress, 1.0.3
- Description: The Case Theme User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.3. This is due to the plugin not properly logging a user in with the data that was previously verified through the facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user’s email.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5821
- PoC:
CVE-2025-57631
- Severity: 9.8 CRITICAL
- Impacted Products: TDuckCloud v.5.1
- Description: SQL Injection vulnerability in TDuckCloud v.5.1 allows a remote attacker to execute arbitrary code via the Add a file upload module
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57631
- PoC:
CVE-2025-57347
- Severity: 9.8 CRITICAL
- Impacted Products: dagre-d3-es 7.0.9, dagre-d3-es < 7.0.11
- Description: A vulnerability exists in the ‘dagre-d3-es’ Node.js package version 7.0.9, specifically within the ‘bk’ module’s addConflict function, which fails to properly sanitize user-supplied input during property assignment operations. This flaw allows attackers to exploit prototype pollution vulnerabilities by injecting malicious input values (e.g., “__proto__"), enabling unauthorized modification of the JavaScript Object prototype chain.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57347
- PoC:
CVE-2025-57321
- Severity: 9.8 CRITICAL
- Impacted Products: magix-combine-ex versions thru 1.2.10
- Description: A Prototype Pollution vulnerability in the util-deps.addFileDepend function of magix-combine-ex versions thru 1.2.10 allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57321
- PoC:
CVE-2025-57285
- Severity: 9.8 CRITICAL
- Impacted Products: codeceptjs 3.7.3
- Description: codeceptjs 3.7.3 contains a command injection vulnerability in the emptyFolder function (lib/utils.js). The execSync command directly concatenates the user-controlled directoryPath parameter without sanitization or escaping, allowing attackers to execute arbitrary commands.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57285
- PoC:
CVE-2025-57266
- Severity: 7.5 HIGH
- Impacted Products: ThriveX Blogging Framework 2.5.9, ThriveX Blogging Framework 3.1.3
- Description: An issue was discovered in file AssistantController.java in ThriveX Blogging Framework 2.5.9 thru 3.1.3 allowing unauthenticated attackers to gain sensitive information such as API Keys via the /api/assistant/list endpoint.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57266
- PoC:
CVE-2025-57247
- Severity: 9.1 CRITICAL
- Impacted Products: BATBToken, Compiler Version v0.8.26+commit.8a97fa7a
- Description: The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() functions in the base ERC20 contract are declared as public without proper access control modifiers, allowing any user to bypass transfer restrictions and manipulate special address settings.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57247
- PoC:
CVE-2025-57174
- Severity: 9.8 CRITICAL
- Impacted Products: Siklu Communications Etherhaul 8010TX, Siklu Communications Etherhaul 1200FX, Firmware 7.4.0 through 10.7.3
- Description: An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 which uses static AES encryption keys hardcoded in the binary. These keys are identical across all devices, allowing attackers to craft encrypted packets that execute arbitrary commands without authentication.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57174
- PoC:
CVE-2025-57141
- Severity: 9.8 CRITICAL
- Impacted Products: rsbi-os 4.7
- Description: rsbi-os 4.7 is vulnerable to Remote Code Execution (RCE) in sqlite-jdbc.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57141
- PoC:
CVE-2025-57119
- Severity: 9.8 CRITICAL
- Impacted Products: Online Library Management System v.3.0
- Description: An issue in Online Library Management System v.3.0 allows an attacker to escalate privileges via the adminlogin.php component and the Login function
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57119
- PoC:
CVE-2025-57108
- Severity: 9.8 CRITICAL
- Impacted Products: Kitware VTK 9.5.0
- Description: Kitware VTK (Visualization Toolkit) through 9.5.0 contains a heap use-after-free vulnerability in vtkGLTFDocumentLoader. The vulnerability manifests during mesh object copy operations where vector members are accessed after the underlying memory has been freed, specifically when handling GLTF files with corrupted or invalid mesh reference structures.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57108
- PoC:
CVE-2025-57105
- Severity: 9.8 CRITICAL
- Impacted Products: D-Link DI-7400G+
- Description: The D-Link DI-7400G+ router is affected by a command injection vulnerability in its jhttpd web server component. This flaw allows an attacker to execute arbitrary commands on the device by manipulating parameters processed by the administrative web interface.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57105
- PoC:
CVE-2025-57085
- Severity: 9.8 CRITICAL
- Impacted Products: Tenda W30E V16.01.0.19
- Description: Tenda W30E V16.01.0.19 (5037) was discovered to contain a stack overflow in the v17 parameter in the UploadCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-57085
- PoC:
CVE-2025-5701
- Severity: 9.8 CRITICAL
- Impacted Products: HyperComments plugin for WordPress, 1.2.2
- Description: The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5701
- PoC:
CVE-2025-56819
- Severity: 9.8 CRITICAL
- Impacted Products: Datart v.1.0.0-rc.3
- Description: Datart v.1.0.0-rc.3 is susceptible to a remote code execution vulnerability stemming from improper neutralization of special elements in the
INITconnection parameter of H2 JDBC URLs. This flaw allows a remote attacker to execute arbitrary operating system commands on the server. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56819
- PoC:
CVE-2025-56749
- Severity: 9.4 CRITICAL
- Impacted Products: Creativeitem Academy LMS 6.14
- Description: Creativeitem Academy LMS up to and including 6.14 uses a hardcoded default JWT secret for token signing. This predictable secret allows attackers to forge valid JWT tokens, leading to authentication bypass and unauthorized access to any user account.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56749
- PoC:
CVE-2025-56683
- Severity: 9.6 CRITICAL
- Impacted Products: Logseq v0.10.9
- Description: A cross-site scripting (XSS) vulnerability in the component /app/marketplace.html of Logseq v0.10.9 allows attackers to execute arbitrary code via injecting arbitrary Javascript into a crafted README.md file.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56683
- PoC:
CVE-2025-56513
- Severity: 9.8 CRITICAL
- Impacted Products: NiceHash QuickMiner 6.12.0
- Description: NiceHash QuickMiner 6.12.0 perform software updates over HTTP without validating digital signatures or hash checks. An attacker capable of intercepting or redirecting traffic to the update url and can hijack the update process and deliver arbitrary executables that are automatically executed, resulting in full remote code execution. This constitutes a critical supply chain attack vector.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56513
- PoC:
CVE-2025-56447
- Severity: 9.8 CRITICAL
- Impacted Products: TM2 Monitoring v3.04
- Description: TM2 Monitoring v3.04 contains an authentication bypass and plaintext credential disclosure.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56447
- PoC:
CVE-2025-56231
- Severity: 9.1 CRITICAL
- Impacted Products: Tonec Internet Download Manager 6.42.41.1
- Description: Tonec Internet Download Manager 6.42.41.1 and earlier suffers from Missing SSL Certificate Validation, which allows attackers to bypass update protections.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-56231
- PoC:
CVE-2025-55835
- Severity: 9.8 CRITICAL
- Impacted Products: SueamCMS v.0.1.2
- Description: File Upload vulnerability in SueamCMS v.0.1.2 allows a remote attacker to execute arbitrary code via the lack of filtering.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-55835
- PoC:
CVE-2025-55575
- Severity: 9.8 CRITICAL
- Impacted Products: SMM Panel 3.1
- Description: SQL Injection vulnerability in SMM Panel 3.1 allowing remote attackers to gain sensitive information via a crafted HTTP request with action=service_detail.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-55575
- PoC:
CVE-2025-54988
- Severity: 8.4 HIGH
- Impacted Products: Apache Tika 1.13, Apache Tika 1.14, Apache Tika 1.15, Apache Tika 1.16, Apache Tika 1.17
- Description: Apache Tika versions 1.13 through 3.2.1 are vulnerable to an XML External Entity (XXE) injection flaw. This allows an attacker to supply a specially crafted PDF containing an XFA file to read sensitive data, trigger requests to internal or external resources, and potentially achieve arbitrary code execution.
- Remediation:
- More Info: NVD - CVE-2025-54988
- PoC:
CVE-2025-54875
- Severity: 9.8 CRITICAL
- Impacted Products: FreshRSS 1.16.0, FreshRSS 1.17.0, FreshRSS 1.18.0, FreshRSS 1.19.0, FreshRSS 1.20.0
- Description: FreshRSS is a free, self-hostable RSS aggregator. In versions 1.16.0 and above through 1.26.3, an unprivileged attacker can create a new admin user when registration is enabled through the use of a hidden field used only in the user management admin page, new_user_is_admin. This is fixed in version 1.27.0.
- Remediation:
- More Info: NVD - CVE-2025-54875
- PoC:
CVE-2025-54726
- Severity: 9.3 CRITICAL
- Impacted Products: JS Archive List: from n/a through n/a
- Description: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Miguel Useche JS Archive List allows SQL Injection. This issue affects JS Archive List: from n/a through n/a.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-54726
- PoC:
CVE-2025-54309
- Severity: 9.0 CRITICAL
- Impacted Products: CrushFTP 10 before 10.8.5, CrushFTP 11 before 11.3.4_23
- Description: CrushFTP is affected by an unprotected alternate channel vulnerability that allows remote attackers to obtain administrative access. This flaw stems from mishandled AS2 validation when the DMZ proxy feature is not in use.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-54309
- PoC:
CVE-2025-5419
- Severity: 8.8 HIGH
- Impacted Products: Google Chrome prior to version 137.0.7151.68
- Description: Google Chrome prior to version 137.0.7151.68 is affected by an out-of-bounds read and write vulnerability in its V8 JavaScript engine. This flaw allows a remote attacker to potentially exploit heap corruption via a specially crafted HTML page.
- Remediation:
- More Info: NVD - CVE-2025-5419
- PoC:
CVE-2025-54123
- Severity: 9.8 CRITICAL
- Impacted Products: Hoverfly 1.11.3 and prior, Hoverfly 1.12.0
- Description: Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, the middleware functionality in Hoverfly is vulnerable to command injection vulnerability at
/api/v2/hoverfly/middlewareendpoint due to insufficient validation and sanitization in user input. The vulnerability exists in the middleware management API endpoint/api/v2/hoverfly/middleware. - Remediation:
- More Info: NVD - CVE-2025-54123
- PoC:
CVE-2025-54122
- Severity: 10.0 CRITICAL
- Impacted Products: Manager-io/Manager Desktop 25.7.18.2519, Manager-io/Manager Server 25.7.18.2519
- Description: Manager-io/Manager is accounting software. A critical unauthenticated full read Server-Side Request Forgery (SSRF) vulnerability has been identified in the proxy handler component of both manager Desktop and Server edition versions up to and including 25.7.18.2519.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-54122
- PoC:
CVE-2025-53693
- Severity: 9.8 CRITICAL
- Impacted Products: Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4, Sitecore Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4
- Description: Use of Externally-Controlled Input to Select Classes or Code (‘Unsafe Reflection’) vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-53693
- PoC:
CVE-2025-5305
- Severity: 9.8 CRITICAL
- Impacted Products: Password Reset with Code for WordPress REST API, before 0.0.17
- Description: The Password Reset with Code for WordPress REST API WordPress plugin before 0.0.17 does not use cryptographically sound algorithms to generate OTP codes, potentially leading to account takeovers.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5305
- PoC:
CVE-2025-5288
- Severity: 9.8 CRITICAL
- Impacted Products: The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress, versions 1.0.0 to 2.0.3
- Description: The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() function in versions 1.0.0 to 2.0.3. This makes it possible for unauthenticated attackers to POST an arbitrary import_api URL, import specially crafted JSON, and thereby create a new user with full Administrator privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5288
- PoC:
CVE-2025-52688
- Severity: 9.8 CRITICAL
- Impacted Products: No specific product names or versions are mentioned in the CVE description provided.
- Description: Successful exploitation of the vulnerability could allow an attacker to inject commands with root privileges on the access point, potentially leading to the loss of confidentiality, integrity, availability, and full control of the access point.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-52688
- PoC:
CVE-2025-52385
- Severity: 9.8 CRITICAL
- Impacted Products: Studio 3T v.2025.1.0 and before
- Description: An issue in Studio 3T v.2025.1.0 and before allows a remote attacker to execute arbitrary code via a crafted payload to the child_process module
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-52385
- PoC:
CVE-2025-52053
- Severity: 9.8 CRITICAL
- Impacted Products: TOTOLINK X6000R V9.4.0cu.1360_B20241207
- Description: TOTOLINK X6000R V9.4.0cu.1360_B20241207 was found to contain a command injection vulnerability in the sub_417D74 function via the file_name parameter. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-52053
- PoC:
CVE-2025-52046
- Severity: 9.8 CRITICAL
- Impacted Products: Totolink A3300R V17.0.0cu.596_B20250515
- Description: Totolink A3300R V17.0.0cu.596_B20250515 was found to contain a command injection vulnerability in the sub_4197C0 function via the mac and desc parameters. This vulnerability allows unauthenticated attackers to execute arbitrary commands via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-52046
- PoC:
CVE-2025-52021
- Severity: 9.8 CRITICAL
- Impacted Products: PuneethReddyHC Online Shopping System Advanced 1.0
- Description: A SQL Injection vulnerability exists in the edit_product.php file of PuneethReddyHC Online Shopping System Advanced 1.0. The product_id GET parameter is unsafely passed to a SQL query without proper validation or parameterization.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-52021
- PoC:
CVE-2025-51682
- Severity: 9.8 CRITICAL
- Impacted Products: mJobtime 15.7.2
- Description: mJobtime 15.7.2 handles authorization on the client side, which allows an attacker to modify the client-side code and gain access to administrative features. Additionally, they can craft requests based on the client-side code to call these administrative functions directly.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-51682
- PoC:
CVE-2025-51390
- Severity: 9.8 CRITICAL
- Impacted Products: TOTOLINK N600R V4.3.0cu.7647_B20210106
- Description: TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vulnerability via the pin parameter in the setWiFiWpsConfig function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-51390
- PoC:
CVE-2025-5099
- Severity: 8.1 HIGH
- Impacted Products: No specific product names or versions are mentioned in the provided CVE description.
- Description: An Out of Bounds Write occurs when the native library attempts PDF rendering, which can be exploited to achieve memory corruption and potentially arbitrary code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5099
- PoC:
CVE-2025-5095
- Severity: 9.8 CRITICAL
- Impacted Products: Burk Technology ARC Solo
- Description: Burk Technology ARC Solo’s password change mechanism can be utilized without proper authentication procedures, allowing an attacker to take over the device. A password change request can be sent directly to the device’s HTTP endpoint without providing valid credentials. The system does not enforce proper authentication or session validation, allowing the password change to proceed without verifying the request’s legitimacy.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-5095
- PoC:
CVE-2025-50904
- Severity: 9.8 CRITICAL
- Impacted Products: WinterChenS my-site
- Description: There is an authentication bypass vulnerability in WinterChenS my-site thru commit 6c79286 (2025-06-11). An attacker can exploit this vulnerability to access /admin/ API without any token.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50904
- PoC:
CVE-2025-50756
- Severity: 9.8 CRITICAL
- Impacted Products: Wavlink WN535K3 20191010
- Description: Wavlink WN535K3 20191010 was found to contain a command injection vulnerability in the set_sys_adm function via the newpass parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50756
- PoC:
CVE-2025-50754
- Severity: 9.6 CRITICAL
- Impacted Products: Unisite CMS 5.0
- Description: Unisite CMS version 5.0 contains a stored Cross-Site Scripting (XSS) vulnerability in the “Report” functionality. A malicious script submitted by an attacker is rendered in the admin panel when viewed by an administrator. This allows attackers to hijack the admin session and, by leveraging the template editor, upload and execute a PHP web shell on the server, leading to full remote code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50754
- PoC:
CVE-2025-50722
- Severity: 9.8 CRITICAL
- Impacted Products: sparkshop v.1.1.7
- Description: Insecure Permissions vulnerability in sparkshop v.1.1.7 allows a remote attacker to execute arbitrary code via the Common.php component
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50722
- PoC:
CVE-2025-50692
- Severity: 9.8 CRITICAL
- Impacted Products: FoxCMS <=v1.2.5
- Description: FoxCMS <=v1.2.5 is vulnerable to Code Execution in admin/template_file/editFile.html.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50692
- PoC:
CVE-2025-50578
- Severity: 6.3 MEDIUM
- Impacted Products: LinuxServer.io heimdall 2.6.3-ls307
- Description: LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically
X-Forwarded-HostandReferer. An unauthenticated remote attacker can manipulate these headers to perform Host Header Injection and Open Redirect attacks. This allows the loading of external resources from attacker-controlled domains and unintended redirection of users, potentially enabling phishing, UI redress, and session theft. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50578
- PoC:
CVE-2025-50475
- Severity: 9.8 CRITICAL
- Impacted Products: Russound MBX-PRE-D67F firmware version 3.1.6
- Description: An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vulnerability stems from improper neutralization of special elements used in an OS command within the network configuration handler, enabling remote code execution with the highest privileges.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50475
- PoC:
CVE-2025-50472
- Severity: 9.8 CRITICAL
- Impacted Products: modelscope/ms-swift thru 2.6.1
- Description: The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary code execution through deserialization of untrusted data within the
load\_model\_meta()function of theModelFileSystemCache()class. Attackers can execute arbitrary code and commands by crafting a malicious serialized.mdlpayload, exploiting the use ofpickle.load()on data from potentially untrusted sources. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50472
- PoC:
CVE-2025-50460
- Severity: 9.8 CRITICAL
- Impacted Products: ms-swift 3.3.0, PyYAML 5.3.1
- Description: A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the –run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50460
- PoC:
CVE-2025-50428
- Severity: 7.2 HIGH
- Impacted Products: RaspAP raspap-webgui 3.3.2
- Description: In RaspAP raspap-webgui 3.3.2 and earlier, a command injection vulnerability exists in the includes/hostapd.php script. The vulnerability is due to improper sanitizing of user input passed via the interface parameter.
- Remediation:
- More Info: NVD - CVE-2025-50428
- PoC:
CVE-2025-50341
- Severity: 9.8 CRITICAL
- Impacted Products: Axelor 5.2.4
- Description: A Boolean-based SQL injection vulnerability was discovered in Axelor 5.2.4 via the _domain parameter. An attacker can manipulate the SQL query logic and determine true/false conditions, potentially leading to data exposure or further exploitation.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-50341
- PoC:
CVE-2025-50201
- Severity: 9.8 CRITICAL
- Impacted Products: WeGIA, prior to version 3.4.2
- Description: WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, an OS Command Injection vulnerability was identified in the /html/configuracao/debug_info.php endpoint. The branch parameter is not properly sanitized before being concatenated and executed in a shell command on the server’s operating system. This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user (www-data).
- Remediation:
- More Info: NVD - CVE-2025-50201
- PoC:
CVE-2025-49655
- Severity: 9.8 CRITICAL
- Impacted Products: Keras 3.11.0, Keras 3.11.1, Keras 3.11.2
- Description: Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49655
- PoC:
CVE-2025-49388
- Severity: 9.8 CRITICAL
- Impacted Products: Miraculous Core Plugin: from n/a through 2.0.7
- Description: Incorrect Privilege Assignment vulnerability in kamleshyadav Miraculous Core Plugin allows Privilege Escalation. This issue affects Miraculous Core Plugin: from n/a through 2.0.7.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49388
- PoC:
CVE-2025-49223
- Severity: 9.8 CRITICAL
- Impacted Products: billboard.js < 3.15.1
- Description: billboard.js before 3.15.1 was discovered to contain a prototype pollution via the function generate, which could allow attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49223
- PoC:
CVE-2025-49136
- Severity: 9.0 CRITICAL
- Impacted Products: listmonk 4.0.0, listmonk < 5.0.2
- Description: listmonk is a standalone, self-hosted, newsletter and mailing list manager. Starting in version 4.0.0 and prior to version 5.0.2, the
envandexpandenvtemplate functions which is enabled by default in Sprig enables capturing of env variables on host. - Remediation:
- More Info: NVD - CVE-2025-49136
- PoC:
CVE-2025-49132
- Severity: 10.0 CRITICAL
- Impacted Products: Pterodactyl < 1.11.11
- Description: Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel’s server, read credentials from the Panel’s config, extract sensitive information from the database, access files of servers managed by the panel, etc.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49132
- PoC:
CVE-2025-49029
- Severity: 9.1 CRITICAL
- Impacted Products: Custom Login And Signup Widget: from n/a through 1.0
- Description: Improper Control of Generation of Code (‘Code Injection’) vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49029
- PoC:
CVE-2025-49002
- Severity: 9.8 CRITICAL
- Impacted Products: DataEase v2.10.10
- Description: DataEase is an open source business intelligence and data visualization tool. Versions prior to version 2.10.10 have a flaw in the patch for CVE-2025-32966 that allow the patch to be bypassed through case insensitivity because INIT and RUNSCRIPT are prohibited. The vulnerability has been fixed in v2.10.10. No known workarounds are available.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49002
- PoC:
CVE-2025-48543
- Severity: 8.8 HIGH
- Impacted Products: Google Android ART
- Description: Google Android ART is susceptible to a use-after-free vulnerability that enables a malicious application to escape the Chrome sandbox and attack the Android
system\_server. This can lead to local privilege escalation without requiring user interaction. - Remediation:
- More Info: NVD - CVE-2025-48543
- PoC:
CVE-2025-48129
- Severity: 9.8 CRITICAL
- Impacted Products: Spreadsheet Price Changer for WooCommerce, WP E-commerce – Light: from n/a through 2.4.37
- Description: Incorrect Privilege Assignment vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Privilege Escalation. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-48129
- PoC:
CVE-2025-47916
- Severity: 10.0 CRITICAL
- Impacted Products: Invision Community 5.0.0, Invision Community 5.0.1, Invision Community 5.0.2, Invision Community 5.0.3, Invision Community 5.0.4
- Description: Invision Community 5.0.0 before 5.0.7 allows remote code execution via crafted template strings to themeeditor.php. The issue lies within the themeeditor controller (file: /applications/core/modules/front/system/themeeditor.php), where a protected method named customCss can be invoked by unauthenticated users. This method passes the value of the content parameter to the Theme::makeProcessFunction() method; hence it is evaluated by the template engine.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-47916
- PoC:
CVE-2025-47776
- Severity: 9.1 CRITICAL
- Impacted Products: Mantis Bug Tracker (MantisBT) 2.27.1 and below, Mantis Bug Tracker (MantisBT) 2.27.2
- Description: Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers.
- Remediation:
- More Info: NVD - CVE-2025-47776
- PoC:
CVE-2025-47646
- Severity: 9.8 CRITICAL
- Impacted Products: Gilblas Ngunte Possi PSW Front-end Login & Registration: n/a, 1.13
- Description: Weak Password Recovery Mechanism for Forgotten Password vulnerability in Gilblas Ngunte Possi PSW Front-end Login & Registration allows Password Recovery Exploitation. This issue affects PSW Front-end Login & Registration: from n/a through 1.13.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-47646
- PoC:
CVE-2025-47577
- Severity: 10.0 CRITICAL
- Impacted Products: TI WooCommerce Wishlist: from n/a before 2.10.0
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in TemplateInvaders TI WooCommerce Wishlist allows Upload a Web Shell to a Web Server.This issue affects TI WooCommerce Wishlist: from n/a before 2.10.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-47577
- PoC:
CVE-2025-47539
- Severity: 9.8 CRITICAL
- Impacted Products: Eventin: from n/a through 4.0.26
- Description: Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue affects Eventin: from n/a through 4.0.26.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-47539
- PoC:
CVE-2025-47151
- Severity: 9.8 CRITICAL
- Impacted Products: Entr’ouvert Lasso 2.5.1, Entr’ouvert Lasso 2.8.2
- Description: Entr’ouvert Lasso versions 2.5.1 and 2.8.2 are affected by a type confusion vulnerability in the
lasso\_node\_impl\_init\_from\_xmlfunction. This flaw allows a remote attacker to achieve arbitrary code execution by sending a specially crafted SAML response. - Remediation:
- More Info: NVD - CVE-2025-47151
- PoC:
CVE-2025-4664
- Severity: 4.3 MEDIUM
- Impacted Products: Google Chrome prior to version 136.0.7103.113
- Description: Google Chrome prior to version 136.0.7103.113 contains an insufficient policy enforcement vulnerability in its Loader component. This flaw allows a remote attacker to leak cross-origin data by crafting a malicious HTML page.
- Remediation:
- More Info: NVD - CVE-2025-4664
- PoC:
CVE-2025-4631
- Severity: 9.8 CRITICAL
- Impacted Products: Profitori plugin for WordPress 2.0.6.0 to 2.1.1.3
- Description: The Profitori plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the stocktend_object endpoint in versions 2.0.6.0 to 2.1.1.3. This makes it possible to trigger the save_object_as_user() function for objects whose ‘_datatype’ is set to ‘users’,.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4631
- PoC:
CVE-2025-46271
- Severity: 9.1 CRITICAL
- Impacted Products: UNI-NMS-Lite
- Description: UNI-NMS-Lite is vulnerable to a command injection attack that could allow an unauthenticated attacker to read or manipulate device data.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-46271
- PoC:
CVE-2025-46157
- Severity: 9.9 CRITICAL
- Impacted Products: EfroTech Time Trax v.1.0
- Description: An issue in EfroTech Time Trax v.1.0 allows a remote attacker to execute arbitrary code via the file attachment function in the leave request form
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-46157
- PoC:
CVE-2025-4606
- Severity: 9.8 CRITICAL
- Impacted Products: Sala - Startup & SaaS WordPress Theme, 1.1.4
- Description: The Sala - Startup & SaaS WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.4. This is due to the theme not properly validating a user’s identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user’s passwords, including administrators, and leverage that to gain access to their account.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4606
- PoC:
CVE-2025-45988
- Severity: 9.8 CRITICAL
- Impacted Products: BL-WR9000 V2.4.9, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5, BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0
- Description: Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the cmd parameter in the bs_SetCmd function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45988
- PoC:
CVE-2025-45984
- Severity: 9.6 CRITICAL
- Impacted Products: BL-WR9000 V2.4.9, BL-AC1900 V1.0.2, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 V1.0.5, BL-LTE300 V1.2.3
- Description: Blink routers BL-WR9000 V2.4.9, BL-AC1900 V1.0.2, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 V1.0.5, BL-LTE300 V1.2.3, BL-F1200_AT1 V1.0.0, BL-X26_AC8 V1.2.8, BLAC450M_AE4 V4.0.0 and BL-X26_DA3 V1.2.7 were discovered to contain a command injection vulnerability via the routepwd parameter in the sub_45B238 function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45984
- PoC:
CVE-2025-45890
- Severity: 7.2 HIGH
- Impacted Products: novel plus before v.5.1.0
- Description: Directory Traversal vulnerability in novel plus before v.5.1.0 allows a remote attacker to execute arbitrary code via the filePath parameter
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45890
- PoC:
CVE-2025-45857
- Severity: 9.8 CRITICAL
- Impacted Products: EDIMAX CV7428NS v1.20
- Description: EDIMAX CV7428NS v1.20 was discovered to contain a remote code execution (RCE) vulnerability via the command parameter in the mp function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45857
- PoC:
CVE-2025-45814
- Severity: 9.8 CRITICAL
- Impacted Products: NS3000 v8.1.1.125110, NS3000 v7.2.8.124852, NS3000 v7.x, NS2000 v7.02.08
- Description: Missing authentication checks in the query.fcgi endpoint of NS3000 v8.1.1.125110 , v7.2.8.124852 , and v7.x and NS2000 v7.02.08 allows attackers to execute a session hijacking attack.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45814
- PoC:
CVE-2025-45813
- Severity: 9.8 CRITICAL
- Impacted Products: ENENSYS IPGuard v2 2.10.0
- Description: ENENSYS IPGuard v2 2.10.0 was discovered to contain hardcoded credentials.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45813
- PoC:
CVE-2025-4578
- Severity: 9.8 CRITICAL
- Impacted Products: File Provider WordPress plugin, 1.2.3
- Description: The File Provider WordPress plugin through 1.2.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4578
- PoC:
CVE-2025-45777
- Severity: 9.8 CRITICAL
- Impacted Products: Chavara Family Welfare Centre Chavara Matrimony Site v2.0
- Description: An issue in the OTP mechanism of Chavara Family Welfare Centre Chavara Matrimony Site v2.0 allows attackers to bypass authentication via supplying a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45777
- PoC:
CVE-2025-45616
- Severity: 9.8 CRITICAL
- Impacted Products: brcc v1.2.0
- Description: Incorrect access control in the /admin/** API of brcc v1.2.0 allows attackers to gain access to Admin rights via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45616
- PoC:
CVE-2025-45615
- Severity: 9.8 CRITICAL
- Impacted Products: yaoqishan v0.0.1-SNAPSHOT
- Description: Incorrect access control in the /admin/ API of yaoqishan v0.0.1-SNAPSHOT allows attackers to gain access to Admin rights via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45615
- PoC:
CVE-2025-45611
- Severity: 9.8 CRITICAL
- Impacted Products: hope-boot v1.0.0
- Description: Incorrect access control in the /user/edit/ component of hope-boot v1.0.0 allows attackers to bypass authentication via a crafted GET request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45611
- PoC:
CVE-2025-45583
- Severity: 9.1 CRITICAL
- Impacted Products: Audi UTR 2.0 Universal Traffic Recorder 2.0
- Description: Incorrect access control in the FTP protocol of Audi UTR 2.0 Universal Traffic Recorder 2.0 allows attackers to authenticate into the service using any combination of username and password.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45583
- PoC:
CVE-2025-45018
- Severity: 6.5 MEDIUM
- Impacted Products: PHPGurukul Park Ticketing Management System v2.0
- Description: A SQL Injection vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the todate parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45018
- PoC:
CVE-2025-44894
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radDftParamKey parameter in the web_radiusSrv_dftParam_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44894
- PoC:
CVE-2025-44893
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the ruleNamekey parameter in the web_acl_mgmt_Rules_Apply_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44893
- PoC:
CVE-2025-44891
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip parameter in the web_snmp_v3host_add_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44891
- PoC:
CVE-2025-44890
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip parameter in the web_snmp_notifyv3_add_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44890
- PoC:
CVE-2025-44888
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the stp_conf_name parameter in the web_stp_globalSetting_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44888
- PoC:
CVE-2025-44883
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the tacIp parameter in the web_tacplus_serverEdit_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44883
- PoC:
CVE-2025-44881
- Severity: 9.8 CRITICAL
- Impacted Products: Wavlink WL-WN579A3 v1.0
- Description: A command injection vulnerability in the component /cgi-bin/qos.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44881
- PoC:
CVE-2025-44880
- Severity: 9.6 CRITICAL
- Impacted Products: Wavlink WL-WN579A3 v1.0
- Description: A command injection vulnerability in the component /cgi-bin/adm.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44880
- PoC:
CVE-2025-44868
- Severity: 9.8 CRITICAL
- Impacted Products: Wavlink WL-WN530H4 20220801
- Description: Wavlink WL-WN530H4 20220801 was found to contain a command injection vulnerability in the ping_test function of the adm.cgi via the pingIp parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44868
- PoC:
CVE-2025-4403
- Severity: 9.8 CRITICAL
- Impacted Products: Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress, 1.1.6
- Description: The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.1.6 due to accepting a user‐supplied supported_type string and the uploaded filename without enforcing real extension or MIME checks within the upload() function. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4403
- PoC:
CVE-2025-4389
- Severity: 9.8 CRITICAL
- Impacted Products: Crawlomatic Multipage Scraper Post Generator plugin for WordPress, 2.6.8.1
- Description: The Crawlomatic Multipage Scraper Post Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the crawlomatic_generate_featured_image() function in all versions up to, and including, 2.6.8.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4389
- PoC:
CVE-2025-41646
- Severity: 9.8 CRITICAL
- Impacted Products: No specific product names or versions are mentioned in the provided CVE description.
- Description: An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
- Remediation:
- More Info: NVD - CVE-2025-41646
- PoC:
CVE-2025-4094
- Severity: 9.8 CRITICAL
- Impacted Products: DIGITS: WordPress Mobile Number Signup and Login WordPress plugin before 8.4.6.1
- Description: The DIGITS: WordPress Mobile Number Signup and Login WordPress plugin before 8.4.6.1 does not rate limit OTP validation attempts, making it straightforward for attackers to bruteforce them.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4094
- PoC:
CVE-2025-4009
- Severity: 9.8 CRITICAL
- Impacted Products: Evertz SDVN 3080ipx-10G
- Description: The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-4009
- PoC:
CVE-2025-39601
- Severity: 9.6 CRITICAL
- Impacted Products: WPFactory Custom CSS, JS & PHP: from n/a through 2.4.1
- Description: Cross-Site Request Forgery (CSRF) vulnerability in WPFactory Custom CSS, JS & PHP allows Remote Code Inclusion. This issue affects Custom CSS, JS & PHP: from n/a through 2.4.1.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-39601
- PoC:
CVE-2025-39596
- Severity: 9.8 CRITICAL
- Impacted Products: Quentn WP: from n/a through 1.2.8
- Description: Weak Authentication vulnerability in Quentn.com GmbH Quentn WP allows Privilege Escalation. This issue affects Quentn WP: from n/a through 1.2.8.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-39596
- PoC:
CVE-2025-39436
- Severity: 9.1 CRITICAL
- Impacted Products: I Draw: from n/a through 1.0
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in aidraw I Draw allows Using Malicious Files. This issue affects I Draw: from n/a through 1.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-39436
- PoC:
CVE-2025-39401
- Severity: 10.0 CRITICAL
- Impacted Products: WPAMS: from n/a through 44.0
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through 44.0 (17-08-2023).
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-39401
- PoC:
CVE-2025-36846
- Severity: 9.8 CRITICAL
- Impacted Products: Eveo URVE Web Manager 27.02.2025
- Description: An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-36846
- PoC:
CVE-2025-3605
- Severity: 9.8 CRITICAL
- Impacted Products: Frontend Login and Registration Blocks plugin for WordPress, 1.0.7
- Description: The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.7. This is due to the plugin not properly validating a user’s identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-3605
- PoC:
CVE-2025-3604
- Severity: 9.8 CRITICAL
- Impacted Products: Flynax Bridge plugin for WordPress, 2.2.0
- Description: The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user’s identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user’s email addresses, including administrators, and leverage that to reset the user’s password and gain access to their account.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-3604
- PoC:
CVE-2025-32682
- Severity: 9.9 CRITICAL
- Impacted Products: MapSVG Lite: from n/a through 8.5.34
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in RomanCode MapSVG Lite allows Upload a Web Shell to a Web Server. This issue affects MapSVG Lite: from n/a through 8.5.34.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32682
- PoC:
CVE-2025-32641
- Severity: 9.6 CRITICAL
- Impacted Products: Anant Addons for Elementor: from n/a through 1.1.5
- Description: Cross-Site Request Forgery (CSRF) vulnerability in anantaddons Anant Addons for Elementor allows Cross Site Request Forgery. This issue affects Anant Addons for Elementor: from n/a through 1.1.5.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32641
- PoC:
CVE-2025-32583
- Severity: 9.9 CRITICAL
- Impacted Products: PDF 2 Post: from n/a through 2.4.0
- Description: Improper Control of Generation of Code (‘Code Injection’) vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post: from n/a through 2.4.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32583
- PoC:
CVE-2025-32579
- Severity: 9.9 CRITICAL
- Impacted Products: Sync Posts: from n/a through 1.0
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in SoftClever Limited Sync Posts allows Upload a Web Shell to a Web Server. This issue affects Sync Posts: from n/a through 1.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32579
- PoC:
CVE-2025-32432
- Severity: 10.0 CRITICAL
- Impacted Products: Craft 3.0.0-RC1 to before 3.9.15, Craft 4.0.0-RC1 to before 4.14.15, Craft 5.0.0-RC1 to before 5.6.17
- Description: Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892.
- Remediation:
- More Info: NVD - CVE-2025-32432
- PoC:
CVE-2025-32375
- Severity: 9.8 CRITICAL
- Impacted Products: BentoML, <1.4.8
- Description: BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML’s runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32375
- PoC:
CVE-2025-32206
- Severity: 9.1 CRITICAL
- Impacted Products: Processing Projects: from n/a through 1.0.2
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in LABCAT Processing Projects allows Upload a Web Shell to a Web Server. This issue affects Processing Projects: from n/a through 1.0.2.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32206
- PoC:
CVE-2025-32140
- Severity: 9.9 CRITICAL
- Impacted Products: WP Remote Thumbnail: from n/a through 1.3.1
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in Nirmal Kumar Ram WP Remote Thumbnail allows Upload a Web Shell to a Web Server. This issue affects WP Remote Thumbnail: from n/a through 1.3.1.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32140
- PoC:
CVE-2025-32118
- Severity: 9.1 CRITICAL
- Impacted Products: CMP – Coming Soon & Maintenance: from n/a through 4.1.13
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in NiteoThemes CMP – Coming Soon & Maintenance allows Using Malicious Files. This issue affects CMP – Coming Soon & Maintenance: from n/a through 4.1.13.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-32118
- PoC:
CVE-2025-31033
- Severity: 9.8 CRITICAL
- Impacted Products: Buddypress Humanity: from n/a through 1.2
- Description: Cross-Site Request Forgery (CSRF) vulnerability in Adam Nowak Buddypress Humanity allows Cross Site Request Forgery. This issue affects Buddypress Humanity: from n/a through 1.2.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-31033
- PoC:
CVE-2025-30911
- Severity: 9.9 CRITICAL
- Impacted Products: Rometheme RomethemeKit For Elementor: from n/a through 1.5.4
- Description: Improper Control of Generation of Code (‘Code Injection’) vulnerability in Rometheme RomethemeKit For Elementor allows Command Injection. This issue affects RomethemeKit For Elementor: from n/a through 1.5.4.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-30911
- PoC:
CVE-2025-30154
- Severity: 8.6 HIGH
- Impacted Products: reviewdog/action-setup@v1, reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep
- Description: reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs.
- Remediation:
- More Info: NVD - CVE-2025-30154
- PoC:
CVE-2025-30135
- Severity: 9.4 CRITICAL
- Impacted Products: IROAD Dashcam FX2
- Description: An issue was discovered on IROAD Dashcam FX2 devices. Dumping Files Over HTTP and RTSP Without Authentication can occur. It lacks authentication controls on its HTTP and RTSP interfaces, allowing attackers to retrieve sensitive files and video recordings. By connecting to http://192.168.10.1/mnt/extsd/event/, an attacker can download all stored video recordings in an unencrypted manner.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-30135
- PoC:
CVE-2025-30066
- Severity: 8.6 HIGH
- Impacted Products: tj-actions changed-files v1 through v45.0.7
- Description: tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)
- Remediation:
- More Info: NVD - CVE-2025-30066
- PoC:
CVE-2025-29662
- Severity: 9.8 CRITICAL
- Impacted Products: LandChat 3.25.12.18
- Description: A RCE vulnerability in the core application in LandChat 3.25.12.18 allows an unauthenticated attacker to execute system code via remote network access.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29662
- PoC:
CVE-2025-29631
- Severity: 9.8 CRITICAL
- Impacted Products: Gardyn 4
- Description: An issue in Gardyn 4 allows a remote attacker execute arbitrary code
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29631
- PoC:
CVE-2025-2945
- Severity: 9.9 CRITICAL
- Impacted Products: pgAdmin 4: before 9.2
- Description: Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules). The vulnerability is associated with the 2 POST endpoints; /sqleditor/query_tool/download, where the query_commited parameter and /cloud/deploy endpoint, where the high_availability parameter is unsafely passed to the Python eval() function, allowing arbitrary code execution. This issue affects pgAdmin 4: before 9.2.
- Remediation:
- More Info: NVD - CVE-2025-2945
- PoC:
CVE-2025-29384
- Severity: 9.8 CRITICAL
- Impacted Products: Tenda AC9 v1.0 V15.03.05.14_multi
- Description: In Tenda AC9 v1.0 V15.03.05.14_multi, the wanMTU parameter of /goform/AdvSetMacMtuWan has a stack overflow vulnerability, which can lead to remote arbitrary code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29384
- PoC:
CVE-2025-29269
- Severity: 9.8 CRITICAL
- Impacted Products: ALLNET ALL-RUT22GW v3.3.8
- Description: ALLNET ALL-RUT22GW v3.3.8 was discovered to contain an OS command injection vulnerability via the command parameter in the popen.cgi endpoint.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29269
- PoC:
CVE-2025-2907
- Severity: 9.8 CRITICAL
- Impacted Products: Order Delivery Date WordPress plugin before 12.3.1
- Description: The Order Delivery Date WordPress plugin before 12.3.1 does not have authorization and CSRF checks when importing settings. Furthermore it also lacks proper checks to only update options relevant to the Order Delivery Date WordPress plugin before 12.3.1. This leads to attackers being able to modify the default_user_role to administrator and users_can_register, allowing them to register as an administrator of the site for complete site takeover.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2907
- PoC:
CVE-2025-29063
- Severity: 9.8 CRITICAL
- Impacted Products: BL-AC2100 V1.0.4 and before
- Description: An issue in BL-AC2100 V1.0.4 and before allows a remote attacker to execute arbitrary code via the enable parameter passed to /goform/set_hidessid_cfg is not handled properly.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29063
- PoC:
CVE-2025-29062
- Severity: 9.8 CRITICAL
- Impacted Products: BL-AC2100 <=V1.0.4
- Description: An issue in BL-AC2100 <=V1.0.4 allows a remote attacker to execute arbitrary code via the time1 and time2 parameters in the set_LimitClient_cfg of the goahead webservice.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29062
- PoC:
CVE-2025-29047
- Severity: 9.8 CRITICAL
- Impacted Products: ALFA WiFi CampPro router ALFA_CAMPRO-co-2.29
- Description: Buffer Overflow vulnerability inALFA WiFi CampPro router ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the hiddenIndex in the function StorageEditUser
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29047
- PoC:
CVE-2025-29044
- Severity: 9.8 CRITICAL
- Impacted Products: Netgear R61 router V1.0.1.28
- Description: Buffer Overflow vulnerability in Netgear- R61 router V1.0.1.28 allows a remote attacker to execute arbitrary code via the QUERY_STRING key value
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29044
- PoC:
CVE-2025-29009
- Severity: 10.0 CRITICAL
- Impacted Products: Medical Prescription Attachment Plugin for WooCommerce: from n/a through 1.2.3
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in Webkul Medical Prescription Attachment Plugin for WooCommerce allows Upload a Web Shell to a Web Server. This issue affects Medical Prescription Attachment Plugin for WooCommerce: from n/a through 1.2.3.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29009
- PoC:
CVE-2025-2825
- Severity: 9.8 CRITICAL
- Impacted Products: bioql
- Description: Malicious code in bioql (PyPI)
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2825
- PoC:
CVE-2025-28146
- Severity: 9.8 CRITICAL
- Impacted Products: Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15
- Description: Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via fota_url in /boafrm/formLtefotaUpgradeQuectel
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28146
- PoC:
CVE-2025-2812
- Severity: 9.8 CRITICAL
- Impacted Products: Ticket Sales Automation: before 03.04.2025
- Description: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Mydata Informatics Ticket Sales Automation allows Blind SQL Injection.This issue affects Ticket Sales Automation: before 03.04.2025 (DD.MM.YYYY).
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2812
- PoC:
CVE-2025-28100
- Severity: 9.8 CRITICAL
- Impacted Products: dingfanzuCMS v.1.0
- Description: A SQL Injection vulnerability in dingfanzuCMS v.1.0 allows a attacker to execute arbitrary code via not filtering the content correctly at the “operateOrder.php” id parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-28100
- PoC:
CVE-2025-27920
- Severity: 8.8 HIGH
- Impacted Products: Output Messenger before 2.0.63
- Description: Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
- Remediation:
- More Info: NVD - CVE-2025-27920
- PoC:
CVE-2025-27832
- Severity: 9.8 CRITICAL
- Impacted Products: Artifex Ghostscript versions prior to 10.05.0
- Description: Artifex Ghostscript versions prior to 10.05.0 are affected by a compression buffer overflow in the NPDL device, which can be triggered by specially crafted input and lead to arbitrary code execution.
- Remediation:
- Moderate: ghostscript security update
- Moderate: ghostscript security update
- Moderate: ghostscript security update
- More Info: NVD - CVE-2025-27832
- PoC:
CVE-2025-2775
- Severity: 9.3 CRITICAL
- Impacted Products: SysAid On-Prem <= 23.3.40
- Description: SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2775
- PoC:
CVE-2025-27590
- Severity: 9.0 CRITICAL
- Impacted Products: oxidized-web < 0.15.0
- Description: In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web.
- Remediation:
- More Info: NVD - CVE-2025-27590
- PoC:
CVE-2025-27520
- Severity: 9.8 CRITICAL
- Impacted Products: BentoML v1.4.2, BentoML v1.4.3
- Description: BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3.
- Remediation:
- More Info: NVD - CVE-2025-27520
- PoC:
CVE-2025-2747
- Severity: 9.8 CRITICAL
- Impacted Products: Kentico Xperience 13.0.178, Kentico Xperience 13.0.173 to 13.0.177, Kentico Xperience 13.0.172 and below
- Description: Kentico Xperience through version 13.0.178 is affected by an authentication bypass vulnerability in its Staging Sync Server component, which allows an attacker to gain unauthorized access to the system. This flaw stems from improper password handling for the “None” server type, enabling control over administrative objects.
- Remediation:
- More Info: NVD - CVE-2025-2747
- PoC:
CVE-2025-2746
- Severity: 9.8 CRITICAL
- Impacted Products: Kentico Xperience 13.0.172
- Description: An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.
- Remediation:
- More Info: NVD - CVE-2025-2746
- PoC:
CVE-2025-27224
- Severity: 9.8 CRITICAL
- Impacted Products: TRUfusion Enterprise 7.10.4.0
- Description: TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn’t properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to write to any filename with any file type at any location on the local server, ultimately allowing execution of arbitrary code.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-27224
- PoC:
CVE-2025-27007
- Severity: 9.8 CRITICAL
- Impacted Products: OttoKit plugin
- Description: An unauthenticated privilege escalation vulnerability exists in the create_wp_connection() function of the OttoKit plugin. A logic error incorrectly handles the response from wp_authenticate_application_password().
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-27007
- PoC:
CVE-2025-26892
- Severity: 9.9 CRITICAL
- Impacted Products: Celestial Aura: from n/a through 2.2
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in dkszone Celestial Aura allows Using Malicious Files.This issue affects Celestial Aura: from n/a through 2.2.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-26892
- PoC:
CVE-2025-26615
- Severity: 10.0 CRITICAL
- Impacted Products: WeGIA 3.2.14
- Description: WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application,
examples.phpendpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored inconfig.php.config.phpcontains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-26615
- PoC:
CVE-2025-26199
- Severity: 7.4 HIGH
- Impacted Products: CloudClassroom-PHP-Project v1.0
- Description: CloudClassroom-PHP-Project v1.0 is vulnerable to insecure transmission of user credentials. During the authentication process, passwords are submitted over unencrypted HTTP rather than HTTPS. This exposes sensitive information (i.e., usernames and passwords) to interception by network-based attackers using packet sniffing or Man-in-the-Middle (MitM) attacks.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-26199
- PoC:
CVE-2025-26198
- Severity: 9.8 CRITICAL
- Impacted Products: CloudClassroom-PHP-Project v1.0
- Description: A critical SQL Injection vulnerability exists in CloudClassroom-PHP-Project v1.0, specifically within the loginlinkadmin.php endpoint. Unsanitized input directly embedded into SQL queries allows attackers to manipulate query logic, bypass authentication, and gain unauthorized access.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-26198
- PoC:
CVE-2025-26063
- Severity: 6.3 MEDIUM
- Impacted Products: Intelbras RX1500 v2.2.9, Intelbras RX3000 v1.0.11
- Description: An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into the ESSID name when creating a network.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-26063
- PoC:
CVE-2025-25388
- Severity: 9.8 CRITICAL
- Impacted Products: PHPGurukul Land Record System v1.0
- Description: A SQL Injection vulnerability was found in /admin/edit-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the editid GET request parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-25388
- PoC:
CVE-2025-25279
- Severity: 9.9 CRITICAL
- Impacted Products: Mattermost 10.4.x <= 10.4.1, Mattermost 9.11.x <= 9.11.7, Mattermost 10.3.x <= 10.3.2, Mattermost 10.2.x <= 10.2.2
- Description: Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate board blocks when importing boards which allows an attacker could read any arbitrary file on the system via importing and exporting a specially crafted import archive in Boards.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-25279
- PoC:
CVE-2025-24964
- Severity: 9.6 CRITICAL
- Impacted Products: Vitest 1.6.1, Vitest 2.1.9, Vitest 3.0.5
- Description: Vitest is a testing framework powered by Vite. Affected versions are subject to arbitrary remote Code Execution when accessing a malicious website while Vitest API server is listening by Cross-site WebSocket hijacking (CSWSH) attacks. When
apioption is enabled (Vitest UI enables it), Vitest starts a WebSocket server. This WebSocket server did not check Origin header and did not have any authorization mechanism and was vulnerable to CSWSH attacks. - Remediation:
- More Info: NVD - CVE-2025-24964
- PoC:
CVE-2025-24865
- Severity: 10.0 CRITICAL
- Impacted Products: mySCADA myPRO Manager
- Description: The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-24865
- PoC:
CVE-2025-24813
- Severity: 8.1 HIGH
- Impacted Products: Apache Tomcat
- Description: Apache Tomcat is affected by a path equivalence vulnerability in its partial PUT implementation that can lead to remote code execution, information disclosure, or file corruption. This flaw arises from the improper handling of file paths where path separators are replaced with dots during the creation of temporary files.
- Remediation:
- More Info: NVD - CVE-2025-24813
- PoC:
CVE-2025-23942
- Severity: 9.1 CRITICAL
- Impacted Products: WP Load Gallery: from n/a through 2.1.6
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in NgocCode WP Load Gallery allows Upload a Web Shell to a Web Server. This issue affects WP Load Gallery: from n/a through 2.1.6.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-23942
- PoC:
CVE-2025-23922
- Severity: 7.3 HIGH
- Impacted Products: iSpring Embedder: from n/a through 1.0
- Description: Cross-Site Request Forgery (CSRF) vulnerability in Harsh iSpring Embedder allows Upload a Web Shell to a Web Server.This issue affects iSpring Embedder: from n/a through 1.0.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-23922
- PoC:
CVE-2025-2345
- Severity: 9.8 CRITICAL
- Impacted Products: IROAD Dash Cam X5 up to 20250308, IROAD Dash Cam X6 up to 20250308
- Description: A vulnerability, which was classified as very critical, was found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. This affects an unknown part. The manipulation leads to improper authorization. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2345
- PoC:
CVE-2025-23048
- Severity: 9.1 CRITICAL
- Impacted Products: Apache HTTP Server 2.4.35, Apache HTTP Server 2.4.36, Apache HTTP Server 2.4.37, Apache HTTP Server 2.4.38, Apache HTTP Server 2.4.39
- Description: Apache HTTP Server’s
mod\_sslmodule is susceptible to an access control bypass via TLS 1.3 session resumption in specific multi-virtual host configurations. This flaw allows a client trusted for one virtual host to gain unauthorized access to another virtual host. - Remediation:
- More Info: NVD - CVE-2025-23048
- PoC:
CVE-2025-22954
- Severity: 10.0 CRITICAL
- Impacted Products: Koha before 24.11.02
- Description: GetLateOrMissingIssues in C4/Serials.pm in Koha before 24.11.02 allows SQL Injection in /serials/lateissues-export.pl via the supplierid or serialid parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22954
- PoC:
CVE-2025-22916
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a stack overflow via the pppUserName parameter in the formPPPoESetup function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22916
- PoC:
CVE-2025-22913
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formStaDrvSetup function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22913
- PoC:
- RE11S_1.11-formStaDrvSetup-StackOverflow
CVE-2025-22912
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a command injection vulnerability via the component /goform/formAccept.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22912
- PoC:
CVE-2025-22907
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a stack overflow via the selSSID parameter in the formWlSiteSurvey function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22907
- PoC:
CVE-2025-22906
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a command injection vulnerability via the L2TPUserName parameter at /goform/setWAN.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22906
- PoC:
CVE-2025-22905
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22905
- PoC:
CVE-2025-22904
- Severity: 9.8 CRITICAL
- Impacted Products: RE11S v1.11
- Description: RE11S v1.11 was discovered to contain a stack overflow via the pptpUserName parameter in the setWAN function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-22904
- PoC:
CVE-2025-21756
- Severity: 7.8 HIGH
- Impacted Products: Linux kernel
- Description: The Linux kernel contains a use-after-free vulnerability in its virtual socket (vsock) implementation due to incorrect handling of socket bindings during transport reassignment. This flaw can allow a local attacker to achieve arbitrary code execution or cause a denial of service.
- Remediation:
- More Info: NVD - CVE-2025-21756
- PoC:
CVE-2025-20265
- Severity: 10.0 CRITICAL
- Impacted Products: Cisco Secure Firewall Management Center (FMC) Software
- Description: A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device. This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-20265
- PoC:
CVE-2025-20260
- Severity: 9.8 CRITICAL
- Impacted Products: ClamAV
- Description: ClamAV is affected by a heap-based buffer overflow vulnerability in its PDF scanning processes due to incorrect memory buffer allocation. This flaw can be triggered by a crafted PDF file, potentially leading to a denial of service or arbitrary code execution.
- Remediation:
- More Info: NVD - CVE-2025-20260
- PoC:
CVE-2025-20125
- Severity: 9.1 CRITICAL
- Impacted Products: Cisco ISE
- Description: A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node. This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data.
- Remediation:
- More Info: NVD - CVE-2025-20125
- PoC:
CVE-2025-20124
- Severity: 9.9 CRITICAL
- Impacted Products: Cisco ISE
- Description: A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device. This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges.
- Remediation:
- More Info: NVD - CVE-2025-20124
- PoC:
CVE-2025-2005
- Severity: 9.8 CRITICAL
- Impacted Products: Front End Users plugin for WordPress, versions up to and including 3.2.32
- Description: The Front End Users plugin for WordPress is affected by an arbitrary file upload vulnerability in its registration form. This flaw allows unauthenticated attackers to upload malicious files to the server, which can lead to remote code execution.
- Remediation:
- More Info: NVD - CVE-2025-2005
- PoC:
CVE-2025-1661
- Severity: 9.8 CRITICAL
- Impacted Products: HUSKY – Products Filter Professional for WooCommerce plugin for WordPress, 1.3.6.5
- Description: The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the ‘template’ parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files.
- Remediation:
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249621%40woocommerce-products-filter&new=3249621%40woocommerce-products-filter&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253169%40woocommerce-products-filter&new=3253169%40woocommerce-products-filter&sfp_email=&sfph_mail=
- More Info: NVD - CVE-2025-1661
- PoC:
CVE-2025-1562
- Severity: 9.8 CRITICAL
- Impacted Products: Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress, 3.5.3
- Description: The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.
- Remediation:
- https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/admin/class-bwfan-admin.php
- https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/abstracts/class-bwfan-api-base.php
- https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/class-bwfan-api-loader.php
- More Info: NVD - CVE-2025-1562
- PoC:
CVE-2025-14709
- Severity: 9.8 CRITICAL
- Impacted Products: Shiguangwu sgwbox N3 2.0.25
- Description: A security vulnerability has been detected in Shiguangwu sgwbox N3 2.0.25. Affected by this issue is some unknown functionality of the file /usr/sbin/http_eshell_server of the component WIRELESSCFGGET Interface. The manipulation of the argument params leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-14709
- PoC:
CVE-2025-14708
- Severity: 9.8 CRITICAL
- Impacted Products: Shiguangwu sgwbox N3 2.0.25
- Description: A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-14708
- PoC:
CVE-2025-14707
- Severity: 9.8 CRITICAL
- Impacted Products: Shiguangwu sgwbox N3 2.0.25
- Description: A security flaw has been discovered in Shiguangwu sgwbox N3 2.0.25. Affected is an unknown function of the file /usr/sbin/http_eshell_server of the component DOCKER Feature. Performing manipulation of the argument params results in command injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-14707
- PoC:
CVE-2025-14705
- Severity: 9.8 CRITICAL
- Impacted Products: Shiguangwu sgwbox N3 2.0.25
- Description: A vulnerability was determined in Shiguangwu sgwbox N3 2.0.25. This affects an unknown function of the component SHARESERVER Feature. This manipulation of the argument params causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-14705
- PoC:
CVE-2025-13780
- Severity: 9.1 CRITICAL
- Impacted Products: pgAdmin 4, pgAdmin up to 9.10
- Description: pgAdmin versions up to 9.10 are affected by a remote code execution vulnerability when operating in server mode and performing restores from PLAIN-format dump files. This flaw allows an attacker to inject and execute arbitrary commands on the server hosting pgAdmin.
- Remediation:
- More Info: NVD - CVE-2025-13780
- PoC:
CVE-2025-13595
- Severity: 9.8 CRITICAL
- Impacted Products: CIBELES AI plugin for WordPress, 1.10.8
- Description: The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the ‘actualizador_git.php’ file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-13595
- PoC:
CVE-2025-13342
- Severity: 9.8 CRITICAL
- Impacted Products: Frontend Admin by DynamiApps plugin for WordPress, 3.28.20
- Description: The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to unauthorized modification of arbitrary WordPress options in all versions up to, and including, 3.28.20. This is due to insufficient capability checks and input validation in the ActionOptions::run() save handler. This makes it possible for unauthenticated attackers to modify critical WordPress options such as users_can_register, default_role, and admin_email via submitting crafted form data to public frontend forms.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-13342
- PoC:
CVE-2025-1302
- Severity: 9.8 CRITICAL
- Impacted Products: jsonpath-plus < 10.3.0
- Description: Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval=‘safe’ mode. **Note:** This is caused by an incomplete fix for [CVE-2024-21534](
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-1302
- PoC:
CVE-2025-12762
- Severity: 9.1 CRITICAL
- Impacted Products: pgAdmin 9.9
- Description: pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-12762
- PoC:
CVE-2025-12735
- Severity: 8.4 HIGH
- Impacted Products: expr-eval
- Description: The
expr-evalJavaScript library is vulnerable to arbitrary code execution due to insufficient input validation when processing thecontextorvariablesobject passed to itsevaluate()function. An attacker can craft this object to inject and execute malicious code. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-12735
- PoC:
CVE-2025-12463
- Severity: 9.8 CRITICAL
- Impacted Products: Geutebruck G-Cam E-Series Cameras EFD-2130 firmware version 1.12.0.19
- Description: An unauthenticated SQL Injection was discovered within the Geutebruck G-Cam E-Series Cameras through the
Groupparameter in the/uapi-cgi/viewer/Param.cgiscript. This has been confirmed on the EFD-2130 camera running firmware version 1.12.0.19. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-12463
- PoC:
CVE-2025-11953
- Severity: 9.8 CRITICAL
- Impacted Products: Metro Development Server
- Description: The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11953
- PoC:
CVE-2025-11849
- Severity: 9.3 CRITICAL
- Impacted Products: mammoth 0.3.25, mammoth before 1.11.0, org.zwobble.mammoth:mammoth before 1.11.0
- Description: Versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth from 0.3.25 and before 1.11.0; versions of the package mammoth before 1.11.0; versions of the package org.zwobble.mammoth:mammoth before 1.11.0 are vulnerable to Directory Traversal due to the lack of path or file type validation when processing a docx file containing an image with an external link (r:link attribute instead of embedded r:embed).
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11849
- PoC:
CVE-2025-11833
- Severity: 9.8 CRITICAL
- Impacted Products: Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress, versions up to 3.6.0
- Description: The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is affected by a missing authorization vulnerability in versions up to 3.6.0. This flaw allows unauthenticated attackers to read arbitrary logged emails, including password reset emails.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11833
- PoC:
CVE-2025-11749
- Severity: 9.8 CRITICAL
- Impacted Products: AI Engine plugin for WordPress, 3.1.3
- Description: The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the ‘Bearer Token’ value when ‘No-Auth URL’ is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11749
- PoC:
CVE-2025-11533
- Severity: 9.8 CRITICAL
- Impacted Products: WP Freeio plugin for WordPress, 1.2.21
- Description: The WP Freeio plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.21. This is due to the process_register() function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the ‘administrator’ role during registration and gain administrator access to the site.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11533
- PoC:
CVE-2025-11391
- Severity: 9.8 CRITICAL
- Impacted Products: PPOM – Product Addons & Custom Fields for WooCommerce, 33.0.15
- Description: The PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image cropper functionality in all versions up to, and including, 33.0.15. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11391
- PoC:
CVE-2025-11371
- Severity: 7.5 HIGH
- Impacted Products: Gladinet CentreStack, TrioFox
- Description: Gladinet CentreStack and TrioFox products are affected by an unauthenticated Local File Inclusion vulnerability that allows for the disclosure of system files. This flaw stems from improper input validation in a specific handler, enabling directory traversal.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11371
- PoC:
CVE-2025-11148
- Severity: 9.8 CRITICAL
- Impacted Products: check-branches
- Description: All versions of the package check-branches are vulnerable to Command Injection check-branches is a command-line tool that is interacted with locally, or via CI, to confirm no conflicts exist in git branches.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-11148
- PoC:
CVE-2025-10894
- Severity: 9.6 CRITICAL
- Impacted Products: Nx (build system)
- Description: Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user’s accounts.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-10894
- PoC:
CVE-2025-10432
- Severity: 9.8 CRITICAL
- Impacted Products: Tenda AC1206 15.03.06.23
- Description: A vulnerability was found in Tenda AC1206 15.03.06.23. This vulnerability affects the function check_param_changed of the file /goform/AdvSetMacMtuWa of the component HTTP Request Handler. Performing manipulation of the argument wanMTU results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-10432
- PoC:
CVE-2025-10230
- Severity: 10.0 CRITICAL
- Impacted Products: Samba
- Description: Samba is affected by a command injection vulnerability in its WINS hook handling, which allows an unauthenticated network attacker to achieve remote command execution. This flaw occurs because NetBIOS names from WINS registration packets are passed to a shell without proper validation or escaping.
- Remediation:
- More Info: NVD - CVE-2025-10230
- PoC:
CVE-2025-1009
- Severity: 9.8 CRITICAL
- Impacted Products: Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, Thunderbird < 135
- Description: An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135.
- Remediation:
- More Info: NVD - CVE-2025-1009
- PoC:
CVE-2025-10041
- Severity: 9.8 CRITICAL
- Impacted Products: Flex QR Code Generator plugin for WordPress, 1.2.5
- Description: The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-10041
- PoC:
CVE-2025-0851
- Severity: 8.8 HIGH
- Impacted Products: Deep Java Library (DJL)
- Description: A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.
- Remediation:
- More Info: NVD - CVE-2025-0851
- PoC:
CVE-2025-0411
- Severity: 7.0 HIGH
- Impacted Products: 7-Zip
- Description: This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files.
- Remediation:
- More Info: NVD - CVE-2025-0411
- PoC:
CVE-2025-0364
- Severity: 9.8 CRITICAL
- Impacted Products: BigAntSoft BigAnt Server, up to and including version 5.6.06
- Description: BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the “Cloud Storage Addin,” leading to unauthenticated code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-0364
- PoC:
CVE-2025-0316
- Severity: 9.8 CRITICAL
- Impacted Products: WP Directorybox Manager plugin for WordPress, 2.5
- Description: The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the ‘wp_dp_enquiry_agent_contact_form_submit_callback’ function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-0316
- PoC:
CVE-2024-8425
- Severity: 9.8 CRITICAL
- Impacted Products: WooCommerce Ultimate Gift Card plugin for WordPress, 2.6.0
- Description: The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the ‘mwb_wgm_preview_mail’ and ‘mwb_wgm_woocommerce_add_cart_item_data’ functions in all versions up to, and including, 2.6.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-8425
- PoC:
CVE-2024-7344
- Severity: 8.2 HIGH
- Impacted Products: Howyar UEFI Application “Reloader” 32-bit, Howyar UEFI Application “Reloader” 64-bit
- Description: Howyar UEFI Application “Reloader” (32-bit and 64-bit) is vulnerable to execution of unsigned software in a hardcoded path.
- Remediation:
- HPESBHF04830 rev.2 - HPE Superdome Flex, Flex 280 and Compute Scale-up Server 3200 platforms, Multiple Vulnerabilities
- Dell PowerMaxOS, Dell PowerMax EEM, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Unisphere 360, Dell Solutions Enabler, Dell Solutions Enabler Virtual Appliance Security Update for Multiple Vulnerabilities
- Cert CC: CVE-2024-7344 Howyar Taiwan Secure Boot Bypass
- More Info: NVD - CVE-2024-7344
- PoC:
CVE-2024-6387
- Severity: 8.1 HIGH
- Impacted Products: OpenSSH 8.5p1, OpenSSH 8.6p1, OpenSSH 8.7p1, OpenSSH 8.8p1, OpenSSH 8.9p1
- Description: OpenSSH is affected by a signal handler race condition that allows a remote, unauthenticated attacker to execute arbitrary code with root privileges on glibc-based Linux systems. This vulnerability is a regression of a previously patched issue.
- Remediation:
- Security Bulletin: AIX is vulnerable to arbitrary code execution (CVE-2024-6387) due to OpenSSH
- Security Bulletin: Vulnerabilities in Node.js and packages affect IBM Voice Gateway
- IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data v4.8.5 is affected by a arbitrary code execution in OpenSSH server [CVE-2024-6387]
- More Info: NVD - CVE-2024-6387
- PoC:
CVE-2024-58299
- Severity: 9.8 CRITICAL
- Impacted Products: PCMan FTP Server 2.0
- Description: PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the ‘pwd’ command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-58299
- PoC:
CVE-2024-57823
- Severity: 9.3 CRITICAL
- Impacted Products: Raptor RDF Syntax Library 2.0.16
- Description: In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
- Remediation:
- More Info: NVD - CVE-2024-57823
- PoC:
CVE-2024-57707
- Severity: 8.8 HIGH
- Impacted Products: DataEase v1
- Description: An issue in DataEase v1 allows an attacker to execute arbitrary code via the user account and password components.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57707
- PoC:
CVE-2024-57687
- Severity: 8.8 HIGH
- Impacted Products: PHPGurukul Land Record System v1.0
- Description: An OS Command Injection vulnerability was found in /landrecordsys/admin/dashboard.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the “Cookie” GET request parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57687
- PoC:
CVE-2024-57225
- Severity: 9.8 CRITICAL
- Impacted Products: Linksys E7350 1.1.00.032
- Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57225
- PoC:
CVE-2024-57224
- Severity: 8.8 HIGH
- Impacted Products: Linksys E7350 1.1.00.032
- Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pin_wps function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57224
- PoC:
CVE-2024-57223
- Severity: 8.8 HIGH
- Impacted Products: Linksys E7350 1.1.00.032
- Description: Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_wps_gen_pincode function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57223
- PoC:
CVE-2024-57040
- Severity: 9.8 CRITICAL
- Impacted Products: TL-WR845N(UN)_V4_200909, TL-WR845N(UN)_V4_190219
- Description: TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 was discovered to contain a hardcoded password for the root account which can be obtained by analyzing downloaded firmware or via a brute force attack through physical access to the router.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-57040
- PoC:
CVE-2024-56249
- Severity: 9.1 CRITICAL
- Impacted Products: WPMasterToolKit: from n/a through 1.13.1
- Description: Unrestricted Upload of File with Dangerous Type vulnerability in Webdeclic WPMasterToolKit allows Upload a Web Shell to a Web Server.This issue affects WPMasterToolKit: from n/a through 1.13.1.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-56249
- PoC:
CVE-2024-55556
- Severity: 9.8 CRITICAL
- Impacted Products: Crater Invoice
- Description: A vulnerability in Crater Invoice allows an unauthenticated attacker with knowledge of the APP_KEY to achieve remote command execution on the server by manipulating the laravel_session cookie, exploiting arbitrary deserialization through the encrypted session data. The exploitation vector of this vulnerability relies on an attacker obtaining Laravel’s secret APP_KEY, which would allow them to decrypt and manipulate session cookies (laravel_session) containing serialized data.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-55556
- PoC:
CVE-2024-55194
- Severity: 8.1 HIGH
- Impacted Products: OpenImageIO v3.1.0.0dev
- Description: OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h.
- Remediation:
- More Info: NVD - CVE-2024-55194
- PoC:
CVE-2024-54879
- Severity: 9.1 CRITICAL
- Impacted Products: SeaCMS V13.1
- Description: SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-54879
- PoC:
CVE-2024-54819
- Severity: 9.1 CRITICAL
- Impacted Products: I, Librarian 5.11.1
- Description: I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to improper input validation in classes/security/validation.php
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-54819
- PoC:
CVE-2024-54502
- Severity: 6.5 MEDIUM
- Impacted Products: watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2
- Description: The issue was addressed with improved checks. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to an unexpected process crash.
- Remediation:
- More Info: NVD - CVE-2024-54502
- PoC:
CVE-2024-53924
- Severity: 9.8 CRITICAL
- Impacted Products: Pycel 1.0b30
- Description: Pycel through 1.0b30, when operating on an untrusted spreadsheet, allows code execution via a crafted formula in a cell, such as one beginning with the =IF(A1=200, eval("__import__(‘os’).system( substring.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-53924
- PoC:
CVE-2024-53584
- Severity: 9.8 CRITICAL
- Impacted Products: OpenPanel v0.3.4
- Description: OpenPanel v0.3.4 was discovered to contain an OS command injection vulnerability via the timezone parameter.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-53584
- PoC:
CVE-2024-52786
- Severity: 9.8 CRITICAL
- Impacted Products: anji-plus AJ-Report up to v1.4.2
- Description: An authentication bypass vulnerability in anji-plus AJ-Report up to v1.4.2 allows unauthenticated attackers to execute arbitrary code via a crafted URL.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-52786
- PoC:
CVE-2024-50660
- Severity: 9.8 CRITICAL
- Impacted Products: AdPortal 3.0.39
- Description: File Upload Bypass was found in AdPortal 3.0.39 allows a remote attacker to execute arbitrary code via the file upload functionality
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-50660
- PoC:
CVE-2024-50644
- Severity: 9.8 CRITICAL
- Impacted Products: blog
- Description: There is an authentication bypass vulnerability in blog. An attacker can exploit this vulnerability to access
/admin/API without any token. The problem lies in usingrequest.getRequestURI()to obtain the request path. The path obtained by this function will not parse special symbols, but will be passed on directly, so you can use../to bypass it. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-50644
- PoC:
CVE-2024-48852
- Severity: 9.4 CRITICAL
- Impacted Products: FLXEON 9.3.4 and prior
- Description: Some information may be improperly disclosed through HTTPS access. This issue affects FLXEON version 9.3.4 and prior.
- Remediation:
- More Info: NVD - CVE-2024-48852
- PoC:
CVE-2024-48849
- Severity: 9.4 CRITICAL
- Impacted Products: FLXEON: through <= 9.3.4
- Description: Missing Origin Validation in WebSockets vulnerability in FLXEON. Session management was not sufficient to prevent unauthorized HTTPS requests. This issue affects FLXEON: through <= 9.3.4.
- Remediation:
- More Info: NVD - CVE-2024-48849
- PoC:
CVE-2024-48445
- Severity: 9.8 CRITICAL
- Impacted Products: compop.ca ONLINE MALL v.3.5.3
- Description: An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-48445
- PoC:
CVE-2024-46982
- Severity: 7.5 HIGH
- Impacted Products: Vercel Next.js
- Description: Vercel Next.js is vulnerable to a denial of service, caused by a use-after-free flaw in the AF_PACKET implementation. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to poison the cache of a non-dynamic server-side rendered route in the pages router.
- Remediation:
- More Info: NVD - CVE-2024-46982
- PoC:
CVE-2024-45438
- Severity: 9.1 CRITICAL
- Impacted Products: TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101, TitanHQ SpamTitan Email Security Gateway 8.01.x before 8.01.14
- Description: An issue was discovered in TitanHQ SpamTitan Email Security Gateway 8.00.x before 8.00.101 and 8.01.x before 8.01.14. The file quarantine.php within the SpamTitan interface allows unauthenticated users to trigger account-level actions using a crafted GET request. Notably, when a non-existent email address is provided as part of the email parameter, SpamTitan will automatically create a user record and associate quarantine settings with it - all without requiring authentication.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-45438
- PoC:
CVE-2024-32640
- Severity: 9.8 CRITICAL
- Impacted Products: MASA CMS 7.4.6, MASA CMS 7.3.13, MASA CMS 7.2.8
- Description: MASA CMS (also known as Mura CMS) versions prior to 7.4.6, 7.3.13, and 7.2.8 are affected by a SQL injection vulnerability in the
processAsyncObjectmethod that can lead to remote code execution. This flaw allows an attacker to inject malicious SQL queries into the application’s database interactions. - Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-32640
- PoC:
CVE-2024-13513
- Severity: 9.8 CRITICAL
- Impacted Products: Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress, 2.4.2.3
- Description: The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality. This makes it possible for unauthenticated attackers to extract sensitive data including the plugin’s clientToken, which in turn can be used to change user account information including emails and account type.
- Remediation:
- More Info: NVD - CVE-2024-13513
- PoC:
CVE-2024-12877
- Severity: 9.8 CRITICAL
- Impacted Products: GiveWP – Donation Plugin and Fundraising Platform, 3.19.2
- Description: The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like ‘firstName’. This makes it possible for unauthenticated attackers to inject a PHP Object.
- Remediation:
- More Info: NVD - CVE-2024-12877
- PoC:
CVE-2024-12356
- Severity: 9.8 CRITICAL
- Impacted Products: Privileged Remote Access (PRA), Remote Support (RS)
- Description: A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user.
- Remediation:
- More Info: NVD - CVE-2024-12356
- PoC:
CVE-2024-12252
- Severity: 9.8 CRITICAL
- Impacted Products: SEO LAT Auto Post plugin for WordPress, 2.2.1
- Description: The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the remote_update AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the seo-beginner-auto-post.php file which can be leveraged to achieve remote code execution.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-12252
- PoC:
CVE-2024-11972
- Severity: 9.8 CRITICAL
- Impacted Products: Hunk Companion WordPress plugin before 1.9.0
- Description: The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-11972
- PoC:
CVE-2024-11613
- Severity: 9.8 CRITICAL
- Impacted Products: WordPress File Upload plugin for WordPress, 4.24.15
- Description: The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the ‘wfu_file_downloader.php’ file. This is due to lack of proper sanitization of the ‘source’ parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.
- Remediation:
- More Info: NVD - CVE-2024-11613
- PoC:
CVE-2023-44752
- Severity: 9.8 CRITICAL
- Impacted Products: Student Study Center Desk Management System v1.0
- Description: An issue in Student Study Center Desk Management System v1.0 allows attackers to bypass authentication via a crafted GET request to /php-sscdms/admin/login.php.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2023-44752
- PoC:
CVE-2023-44221
- Severity: 7.2 HIGH
- Impacted Products: SMA100 SSL-VPN
- Description: Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a ‘nobody’ user, potentially leading to OS Command Injection Vulnerability.
- Remediation:
- More Info: NVD - CVE-2023-44221
- PoC:
CVE-2023-25610
- Severity: 9.8 CRITICAL
- Impacted Products: FortiOS, FortiProxy
- Description: A buffer underwrite (‘buffer underflow’) vulnerability in FortiOS & FortiProxy administrative interface may allow a remote unauthenticated attacker to execute arbitrary code on the device and/or perform a DoS on the GUI, via specifically crafted requests.
- Remediation:
- More Info: NVD - CVE-2023-25610
- PoC:
CVE-2023-0386
- Severity: 7.8 HIGH
- Impacted Products: Linux kernel
- Description: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
- Remediation:
- More Info: NVD - CVE-2023-0386
- PoC:
CVE-2021-47667
- Severity: 10.0 CRITICAL
- Impacted Products: ZendTo 5.24-3, ZendTo 6.x before 6.10-7
- Description: An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2021-47667
- PoC:
CVE-2021-44790
- Severity: 9.8 CRITICAL
- Impacted Products: Apache HTTP Server 2.4.51 and earlier
- Description: A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
- Remediation:
- More Info: NVD - CVE-2021-44790
- PoC:
CVE-2021-34523
- Severity: 9.0 CRITICAL
- Impacted Products: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
- Description: The specific flaw exists within the Powershell service. The issue results from the lack of proper validation of a access token prior to executing the Exchange PowerShell command. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.
- Remediation:
- More Info: NVD - CVE-2021-34523
- PoC:
CVE-2021-34473
- Severity: 9.1 CRITICAL
- Impacted Products: Microsoft Exchange Server 2013, Microsoft Exchange Server 2016, Microsoft Exchange Server 2019
- Description: The specific flaw exists within the Autodiscover service. The issue results from the lack of proper validation of URI prior to accessing resources. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.
- Remediation:
- More Info: NVD - CVE-2021-34473
- PoC:
CVE-2021-31207
- Severity: 7.2 HIGH
- Impacted Products: Microsoft Exchange Server 2013, Microsoft Exchange Server 2016, Microsoft Exchange Server 2019
- Description: The specific flaw exists within the handling of mailbox export. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM.
- Remediation:
- More Info: NVD - CVE-2021-31207
- PoC:
CVE-2021-26828
- Severity: 8.8 HIGH
- Impacted Products: OpenPLC ScadaBR
- Description: OpenPLC ScadaBR contains an unrestricted upload of file with dangerous type vulnerability that allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
- Remediation:
- More Info: NVD - CVE-2021-26828
- PoC:
CVE-2021-26084
- Severity: 9.8 CRITICAL
- Impacted Products: Confluence Server
- Description: A vulnerability exists within the Webwork component in Confluence Server when handling object graph navigation library (ONGL) expressions.
- Remediation:
- More Info: NVD - CVE-2021-26084
- PoC:
CVE-2020-36849
- Severity: 9.8 CRITICAL
- Impacted Products: AIT CSV import/export plugin for WordPress, versions up to and including 3.0.3
- Description: The AIT CSV import/export plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the /wp-content/plugins/ait-csv-import-export/admin/upload-handler.php file in versions up to, and including, 3.0.3. This makes it possible for unauthorized attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2020-36849
- PoC:
CVE-2020-36847
- Severity: 9.8 CRITICAL
- Impacted Products: Simple-File-List Plugin for WordPress, 4.2.2
- Description: The Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.
- Remediation:
- More Info: NVD - CVE-2020-36847
- PoC:
CVE-2020-24363
- Severity: 8.8 HIGH
- Impacted Products: TP-Link TL-WA855RE V5 20200415-rel37464
- Description: TP-Link TL-WA855RE V5 20200415-rel37464 devices allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2020-24363
- PoC:
CVE-2019-19781
- Severity: 9.8 CRITICAL
- Impacted Products: Citrix ADC
- Description: A vulnerability exists in the /vpns/ path within Citrix ADC because it does not properly restrict access to certain directories, which allows unauthorized users to access a directory containing insecure Perl content.
- Remediation:
- More Info: NVD - CVE-2019-19781
- PoC:
CVE-2017-9798
- Severity: 7.5 HIGH
- Impacted Products: HP-UX Web Server Suite running Apache on HP-UX 11iv3
- Description: Potential security vulnerabilities have been identified with HP-UX Web Server Suite running Apache on HP-UX 11iv3. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS), unauthorized read access to Data and other impacts including, possible out of bound read access, possible write of after free and tampering of session data.
- Remediation:
- More Info: NVD - CVE-2017-9798
- PoC:
CVE-2017-3066
- Severity: 9.8 CRITICAL
- Impacted Products: Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier
- Description: Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution.
- Remediation:
- More Info: NVD - CVE-2017-3066
- PoC:
CVE-2016-15043
- Severity: 9.8 CRITICAL
- Impacted Products: WP Mobile Detector plugin for WordPress, versions up to, and including, 3.5
- Description: The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2016-15043
- PoC:
CVE-2015-2079
- Severity: 9.9 CRITICAL
- Impacted Products: Usermin 0.980, Usermin 1.x before 1.660
- Description: Usermin 0.980 through 1.x before 1.660 allows uconfig_save.cgi sig_file_free remote code execution because it uses the two argument (not three argument) form of Perl open.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2015-2079
- PoC:
CVE-2014-6278
- Severity: 8.8 HIGH
- Impacted Products: GNU Bash
- Description: GNU Bash is the GNU Project’s sh-compatible shell.
A vulnerability exists when handling environment variables in GNU Bash. The vulnerable component does not properly parse the values of environment variables.
- Remediation:
- More Info: NVD - CVE-2014-6278
- PoC:
CVE-2011-3607
- Severity: 6.6 MEDIUM
- Impacted Products: Apache HTTP Server
- Description: Apache HTTP Server is an open-source HTTP server for Windows and Linux-based systems. A vulnerability exists within the ap_pregsub() function in Apache HTTP server. When this function within “server/util.c” calculates the buffer size, the integer value “len” overflows and wraps around creating a smaller than expected value. This smaller value is then used to allocate the buffer.
- Remediation:
- More Info: NVD - CVE-2011-3607
- PoC:
CVE-2025-8110
- Severity: Unknown
- Impacted Products: Gogs
- Description: Gogs is affected by an improper symbolic link handling vulnerability in its PutContents API, allowing authenticated users to achieve arbitrary code execution. This flaw acts as a bypass for a previously patched path traversal vulnerability.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-8110
- PoC:
CVE-2025-6019
- Severity: 7.0 HIGH
- Impacted Products: libblockdev
- Description: libblockdev contains a local privilege escalation vulnerability exploitable via the udisks daemon, allowing an
allow\_activeuser to gain full root privileges. This flaw arises from improper handling of mount options during XFS filesystem resizing. - Remediation:
- More Info: NVD - CVE-2025-6019
- PoC:
CVE-2025-6018
- Severity: 7.8 HIGH
- Impacted Products: Linux Pluggable Authentication Modules (PAM), openSUSE Leap 15, SUSE Linux Enterprise 15
- Description: Linux Pluggable Authentication Modules (PAM) contains an incorrect authorization vulnerability, allowing an unprivileged local attacker to escalate privileges to those normally reserved for a physically present, “allow_active” user. This flaw stems from improper handling of user-controlled environment variables.
- Remediation:
- Security Update for Dell Data Protection Central Multiple Third-Party Component Vulnerabilities
- Security update for Dell Avamar, Dell Networker Virtual Edition (NVE) and Dell PowerProtect DP Series Appliance / Dell Integrated Data Protection Appliance (IDPA) Multiple Third-Party Vulnerabilities
- SUSE-SU-2025:02005-1: important: Security update for gdm
- More Info: NVD - CVE-2025-6018
- PoC:
CVE-2025-54957
- Severity: 6.5 MEDIUM
- Impacted Products: Dolby UDC 4.5, Dolby UDC 4.6, Dolby UDC 4.7, Dolby UDC 4.8, Dolby UDC 4.9
- Description: An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decoder process can occur when a malformed DD+ bitstream is processed. When Evolution data is processed by evo_priv.c from the DD+ bitstream, the decoder writes that data into a buffer. The length calculation for a write can overflow due to an integer wraparound. This can lead to the allocated buffer being too small, and the out-of-bounds check of the subsequent write to be ineffective, leading to an out-of-bounds write.
- Remediation:
- More Info: NVD - CVE-2025-54957
- PoC:
CVE-2025-49596
- Severity: Unknown
- Impacted Products: MCP Inspector < 0.14.1
- Description: The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-49596
- PoC:
CVE-2025-40778
- Severity: 8.6 HIGH
- Impacted Products: ISC BIND 9.11.0-9.16.50, ISC BIND 9.18.0-9.18.39, ISC BIND 9.20.0-9.20.13, ISC BIND 9.21.0-9.21.12, ISC BIND 9.11.3-S1-9.16.50-S1
- Description: ISC BIND 9 is vulnerable to a cache poisoning attack due to overly lenient acceptance of records in DNS answers, allowing an attacker to inject forged data into the resolver’s cache. This flaw can lead to the manipulation of DNS resolution for subsequent queries.
- Remediation:
- More Info: NVD - CVE-2025-40778
- PoC:
CVE-2025-24514
- Severity: 9.1 CRITICAL
- Impacted Products: ingress-nginx
- Description: A security issue was discovered in ingress-nginx
- Remediation:
- More Info: NVD - CVE-2025-24514
- PoC:
CVE-2025-23419
- Severity: 4.3 MEDIUM
- Impacted Products: NGINX 1.11.4 and newer
- Description: NGINX contains an improper authentication vulnerability that permits an attacker to bypass client certificate authentication requirements. This flaw is present when specific TLSv1.3 session resumption configurations are used across multiple virtual hosts sharing an IP address and port.
- Remediation:
- More Info: NVD - CVE-2025-23419
- PoC:
CVE-2025-20393
- Severity: 10.0 CRITICAL
- Impacted Products: Cisco AsyncOS Software for Cisco Secure Email Gateway, Cisco Secure Email and Web Manager
- Description: Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager contains an improper input validation vulnerability that allows remote attackers to execute arbitrary commands with root privileges on the underlying operating system. This flaw requires the Spam Quarantine feature to be enabled and reachable from the internet.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-20393
- PoC:
CVE-2025-12101
- Severity: Unknown
- Impacted Products: NetScaler ADC, NetScaler Gateway
- Description: Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
- Remediation:
- More Info: NVD - CVE-2025-12101
- PoC:
CVE-2025-11001
- Severity: 7.0 HIGH
- Impacted Products: 7-Zip
- Description: 7-Zip is affected by a directory traversal vulnerability in its ZIP file parsing component that can lead to remote code execution. This flaw exists due to the improper handling of symbolic links during the archive extraction process.
- Remediation:
- More Info: NVD - CVE-2025-11001
- PoC:
CVE-2025-1098
- Severity: 9.1 CRITICAL
- Impacted Products: ingress-nginx
- Description: A security issue was discovered in ingress-nginx
- Remediation:
- More Info: NVD - CVE-2025-1098
- PoC:
CVE-2025-1097
- Severity: 9.1 CRITICAL
- Impacted Products: ingress-nginx
- Description: A security issue was discovered in ingress-nginx
- Remediation:
- More Info: NVD - CVE-2025-1097
- PoC:
CVE-2025-0108
- Severity: 10.0 CRITICAL
- Impacted Products: Palo Alto Networks PAN-OS prior to 11.2.4 H4
- Description: Palo Alto Networks PAN-OS software contains an authentication bypass vulnerability in its management web interface. This flaw allows an unauthenticated attacker with network access to bypass authentication and invoke specific PHP scripts.
- Remediation:
- More Info: NVD - CVE-2025-0108
- PoC:
CVE-2024-6473
- Severity: 7.8 HIGH
- Impacted Products: Yandex Browser for Desktop before 24.7.1.380
- Description: Yandex Browser for Desktop before 24.7.1.380 has a DLL Hijacking Vulnerability because an untrusted search path is used.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-6473
- PoC:
CVE-2024-49113
- Severity: 7.5 HIGH
- Impacted Products: Windows Lightweight Directory Access Protocol (LDAP)
- Description: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
- Remediation:
- Dell PowerMaxOS, Dell PowerMax EEM, Dell Unisphere for PowerMax, Dell Unisphere for PowerMax Virtual Appliance, Dell Unisphere 360, Dell Solutions Enabler, Dell Solutions Enabler Virtual Appliance Security Update for Multiple Vulnerabilities
- Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
- Microsoft KB 5048652
- More Info: NVD - CVE-2024-49113
- PoC:
CVE-2024-44625
- Severity: 8.8 HIGH
- Impacted Products: Gogs <=0.13.0
- Description: Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-44625
- PoC:
CVE-2024-36401
- Severity: 9.8 CRITICAL
- Impacted Products: GeoServer 2.22.6, GeoServer 2.23.6, GeoServer 2.24.4, GeoServer 2.25.2
- Description: GeoServer, an open-source server for sharing and editing geospatial data, is affected by an improper neutralization of directives in dynamically evaluated code vulnerability. This flaw allows unauthenticated attackers to achieve remote code execution through specially crafted input against a default GeoServer installation.
- Remediation:
- More Info: NVD - CVE-2024-36401
- PoC:
CVE-2024-3393
- Severity: 7.5 HIGH
- Impacted Products: Palo Alto Networks PAN-OS
- Description: A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
- Remediation:
- More Info: NVD - CVE-2024-3393
- PoC:
CVE-2024-33452
- Severity: 7.7 HIGH
- Impacted Products: lua-nginx-module
- Description: When processing HTTP/1.1 requests, lua-nginx-module incorrectly parses HEAD requests with a body and treats the body as the new separate request. The vulnerability lives in src/ngx_http_lua_util.c file.
- Remediation:
- More Info: NVD - CVE-2024-33452
- PoC:
CVE-2024-30043
- Severity: 7.1 HIGH
- Impacted Products: Microsoft SharePoint
- Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the BaseXmlDataSource class. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing.
- Remediation:
- More Info: NVD - CVE-2024-30043
- PoC:
CVE-2024-27564
- Severity: 5.8 MEDIUM
- Impacted Products: dirk1983 mm1.ltd f9f4bbc
- Description: pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-27564
- PoC:
CVE-2024-21887
- Severity: 9.1 CRITICAL
- Impacted Products: Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x)
- Description: A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
- Remediation:
- More Info: NVD - CVE-2024-21887
- PoC:
CVE-2024-0132
- Severity: 9.0 CRITICAL
- Impacted Products: NVIDIA Container Toolkit 1.16.1 or earlier
- Description: NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
- Remediation:
- More Info: NVD - CVE-2024-0132
- PoC:
CVE-2023-4863
- Severity: 9.8 CRITICAL
- Impacted Products: libwebp
- Description: An out-of-bounds write vulnerability exists in the ReadHuffmanCodes() function in libwebp.
- Remediation:
- Security Bulletin: IBM App Connect Enterprise is vulnerable to a heap-based buffer overflow due to electron
- Security Bulletin: IBM Security Guardium is affected by multiple OS level vulnerabilities
- Security Bulletin: IBM Cognos Analytics Cartridge for IBM Cloud Pak for Data 4.8.0 has addressed a security vulnerability (CVE-2023-4863)
- More Info: NVD - CVE-2023-4863
- PoC:
CVE-2023-48022
- Severity: 9.8 CRITICAL
- Impacted Products: Anyscale Ray 2.6.3, Anyscale Ray 2.8.0
- Description: Anyscale Ray versions 2.6.3 and 2.8.0 are affected by a missing authentication vulnerability in the job submission API. This flaw allows a remote attacker to execute arbitrary code on instances where the API is accessible.
- Remediation:
- More Info: NVD - CVE-2023-48022
- PoC:
CVE-2023-46805
- Severity: 8.2 HIGH
- Impacted Products: Ivanti ICS 9.x, Ivanti ICS 22.x, Ivanti Policy Secure
- Description: An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.
- Remediation:
- More Info: NVD - CVE-2023-46805
- PoC:
CVE-2023-4357
- Severity: 6.3 MEDIUM
- Impacted Products: Google Chrome prior to 116.0.5845.96
- Description: Google Chrome prior to version 116.0.5845.96 contains an insufficient validation vulnerability in its XML processing. This flaw allows a remote attacker to bypass file access restrictions through a specially crafted HTML page.
- Remediation:
- Debian – Security Information – DSA-5479-1 chromium
- openSUSE-SU-2023:0234-1: important: Security update for chromium
- openSUSE-SU-2023:0251-1: important: Security update for opera
- More Info: NVD - CVE-2023-4357
- PoC:
CVE-2023-41892
- Severity: 10.0 CRITICAL
- Impacted Products: Craft CMS 4.4.15
- Description: Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
- Remediation:
- More Info: NVD - CVE-2023-41892
- PoC:
CVE-2023-2533
- Severity: 8.4 HIGH
- Impacted Products: PaperCut NG, PaperCut MF
- Description: A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2023-2533
- PoC:
CVE-2022-43939
- Severity: 8.6 HIGH
- Impacted Products: Hitachi Vantara Pentaho Business Analytics Server 9.4.0.1, Hitachi Vantara Pentaho Business Analytics Server 9.3.0.2, Hitachi Vantara Pentaho Business Analytics Server 8.3.x
- Description: Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2022-43939
- PoC:
CVE-2022-43769
- Severity: 8.8 HIGH
- Impacted Products: Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, 8.3.x
- Description: Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x allow certain web services to set property values which contain Spring templates that are interpreted downstream.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2022-43769
- PoC:
CVE-2021-43798
- Severity: 7.5 HIGH
- Impacted Products: Grafana 8.0.0-beta1 through 8.3.0
- Description: Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: ‘/public/plugins//,’ where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable.
- Remediation:
- More Info: NVD - CVE-2021-43798
- PoC:
CVE-2021-39793
- Severity: 7.8 HIGH
- Impacted Products: Arm Mali GPU drivers
- Description: An access control issues vulnerability affects Arm Mali GPU drivers that allows attackers to write to read-only pages in memory.
- Remediation:
- More Info: NVD - CVE-2021-39793
- PoC:
CVE-2021-35587
- Severity: 9.8 CRITICAL
- Impacted Products: Oracle Access Manager
- Description: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager.
- Remediation:
- More Info: NVD - CVE-2021-35587
- PoC:
CVE-2019-6693
- Severity: 6.5 MEDIUM
- Impacted Products: FortiOS
- Description: Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator’s password), private keys' passphrases and High Availability password (when set).
- Remediation:
- More Info: NVD - CVE-2019-6693
- PoC:
CVE-2019-11932
- Severity: 8.8 HIGH
- Impacted Products: android-gif-drawable before version 1.2.18, WhatsApp for Android before version 2.19.244
- Description: A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
- Remediation:
- More Info: NVD - CVE-2019-11932
- PoC:
CVE-2006-5051
- Severity: 8.1 HIGH
- Impacted Products: OpenSSH
- Description: OpenSSH is a set of computer programs providing encrypted communication sessions over a computer network using the ssh protocol.A vulnerability exists in GSSAPI authentication. A race condition caused by an unsafe signal handler may crash the system or allow memory overwrite.
- Remediation:
- More Info: NVD - CVE-2006-5051
- PoC:
CVE-2025-45987
- Severity: 9.8 CRITICAL
- Impacted Products: BL-WR9000 V2.4.9, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5, BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0
- Description: Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the dns1 and dns2 parameters in the bs_SetDNSInfo function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45987
- PoC:
CVE-2025-45986
- Severity: 9.8 CRITICAL
- Impacted Products: BL-WR9000 V2.4.9, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5, BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0
- Description: Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 werediscovered to contain a command injection vulnerability via the mac parameter in the bs_SetMacBlack function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45986
- PoC:
CVE-2025-45985
- Severity: 9.8 CRITICAL
- Impacted Products: BL-WR9000 V2.4.9, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5, BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0
- Description: Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain a command injection vulnerability via the bs_SetSSIDHide function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-45985
- PoC:
CVE-2025-44897
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the bytftp_srvip parameter in the web_tool_upgradeManager_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44897
- PoC:
CVE-2025-44887
- Severity: 9.6 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radIpkey parameter in the web_radiusSrv_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44887
- PoC:
CVE-2025-44886
- Severity: 9.6 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the byruleEditName parameter in the web_acl_mgmt_Rules_Edit_postcontains function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44886
- PoC:
CVE-2025-44885
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the remote_ip parameter in the web_snmpv3_remote_engineId_add_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44885
- PoC:
CVE-2025-44884
- Severity: 9.8 CRITICAL
- Impacted Products: FW-WGS-804HPT v1.305b241111
- Description: FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the web_sys_infoContact_post function.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-44884
- PoC:
CVE-2025-29042
- Severity: 8.8 HIGH
- Impacted Products: dlink DIR 832x 240802
- Description: An issue in dlink DIR 832x 240802 allows a remote attacker to execute arbitrary code via the macaddr key value to the function 0x42232c
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-29042
- PoC:
CVE-2025-2777
- Severity: 9.3 CRITICAL
- Impacted Products: SysAid On-Prem <= 23.3.40
- Description: SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the lshw processing functionality, allowing for administrator account takeover and file read primitives.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2777
- PoC:
CVE-2025-27651
- Severity: 7.5 HIGH
- Impacted Products: Vasion Print before Virtual Appliance Host 22.0.862, Application 20.0.2014, Elatec V-2023-014
- Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: Elatec V-2023-014.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-27651
- PoC:
CVE-2025-27646
- Severity: 8.1 HIGH
- Impacted Products: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913, Application 20.0.2253
- Description: Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.913 Application 20.0.2253 allows Edit User Account Exposure V-2024-001.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-27646
- PoC:
CVE-2025-2620
- Severity: 9.8 CRITICAL
- Impacted Products: D-Link DAP-1620 1.03
- Description: A vulnerability has been found in D-Link DAP-1620 1.03 and classified as critical. This vulnerability affects the function mod_graph_auth_uri_handler of the file /storage of the component Authentication Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-2620
- PoC:
CVE-2025-14706
- Severity: 9.8 CRITICAL
- Impacted Products: Shiguangwu sgwbox N3 2.0.25
- Description: A vulnerability was identified in Shiguangwu sgwbox N3 2.0.25. This impacts an unknown function of the file /usr/sbin/http_eshell_server of the component NETREBOOT Interface. Such manipulation leads to command injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2025-14706
- PoC:
CVE-2024-55557
- Severity: 9.8 CRITICAL
- Impacted Products: Weasis 4.5.1
- Description: ui/pref/ProxyPrefView.java in weasis-core in Weasis 4.5.1 has a hardcoded key for symmetric encryption of proxy credentials.
- Remediation: Follow vendor security advisories and apply the latest patches. Review affected systems and prioritize patching based on exploitability and business impact.
- More Info: NVD - CVE-2024-55557
- PoC:
References
This list was scraped from the quite amazing and highly recommended newsletters below:
Thanks for reading! For corrections, omissions (e.g. newsletter recs) feel free to get in touch.