Search

Search Results (310688 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59220 1 Microsoft 7 Windows, Windows 10, Windows 11 and 4 more 2025-09-19 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.
CVE-2025-10035 1 Fortra 1 Goanywhere Managed File Transfer 2025-09-19 10 Critical
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
CVE-2025-10650 1 Softiron 1 Hypercloud 2025-09-19 N/A
SoftIron HyperCloud 2.5.0 through 2.6.3 may incorrectly add user SSH keys to the administrator-level authorized keys under certain conditions, allowing unauthorized privilege escalation to admin via SSH.
CVE-2025-54807 1 Doverfuelingsolutions 1 Progauge Maglink Lx Console 2025-09-19 9.8 Critical
The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.
CVE-2025-54497 1 Cognex 2 In-sight Camera Firmware, In-sight Explorer 2025-09-19 8.1 High
Cognex In-Sight Explorer and In-Sight Camera Firmware expose a telnet-based service on port 23 to allow management operations such as firmware upgrades and device reboots, which require authentication. A user with protected privileges can successfully invoke the SetSerialPort functionality to modify relevant device properties (such as serial interface settings), contradicting the security model proposed in the user manual.
CVE-2025-54860 1 Cognex 2 In-sight Camera Firmware, In Sight Explorer 2025-09-19 7.7 High
Cognex In-Sight Explorer and In-Sight Camera Firmware expose a telnet-based service on port 23 in order to allow management operations on the device such as firmware upgrades and device reboot requiring an authentication. A wrong management of login failures of the service allows a denial-of-service attack, leaving the telnet service into an unreachable state.
CVE-2025-52873 1 Cognex 2 In-sight Camera Firmware, In-sight Explorer 2025-09-19 8.1 High
Cognex In-Sight Explorer and In-Sight Camera Firmware expose a telnet-based service on port 23 to allow management operations such as firmware upgrades and device reboots, which require authentication. A user with protected privileges can successfully invoke the SetSystemConfig functionality to modify relevant device properties (such as network settings), contradicting the security model proposed in the user manual.
CVE-2025-59717 1 Digitalocean 1 Do-markdownit 2025-09-19 5.4 Medium
In the @digitalocean/do-markdownit package through 1.16.1 (in npm), the callout and fence_environment plugins perform .includes substring matching if allowedClasses or allowedEnvironments is a string (instead of an array).
CVE-2025-30755 1 Oracle 1 Opengrok 2025-09-19 6.1 Medium
OpenGrok 1.14.1 has a reflected Cross-Site Scripting (XSS) issue when producing the cross reference page. This happens through improper handling of the revision parameter. The application reflects unsanitized user input into the HTML output.
CVE-2025-59712 1 Snipeitapp 1 Snipe-it 2025-09-19 6.4 Medium
Snipe-IT before 8.1.18 allows XSS.
CVE-2025-10690 2 Bearsthemes, Wordpress 2 Goza Nonprofit Charity Wordpress Theme, Wordpress 2025-09-19 9.8 Critical
The Goza - Nonprofit Charity WordPress Theme theme for WordPress is vulnerable to unauthorized arbitrary file uploads due to a missing capability check on the 'beplus_import_pack_install_plugin' function in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution.
CVE-2025-59715 1 Smseagle 1 Smseagle 2025-09-19 4.8 Medium
SMSEagle before 6.11 allows reflected XSS via a username or contact phone number.
CVE-2025-10146 2 Codename065, Wordpress 2 Download Manager Plugin, Wordpress 2025-09-19 6.1 Medium
The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘user_ids’ parameter in all versions up to, and including, 3.3.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVE-2025-59714 1 Internet2 1 Grouper 2025-09-19 6.5 Medium
In Internet2 Grouper 5.17.1 before 5.20.5, group admins who are not Grouper sysadmins can configure loader jobs.
CVE-2025-6198 1 Supermicro 1 Mbd-x13sem-f 2025-09-19 6.4 Medium
There is a vulnerability in the Supermicro BMC firmware validation logic at Supermicro MBD-X13SEM-F . An attacker can update the system firmware with a specially crafted image.
CVE-2025-7937 1 Supermicro 1 Mbd-x12stw 2025-09-19 6.6 Medium
There is a vulnerability in the Supermicro BMC firmware validation logic at Supermicro MBD-X12STW . An attacker can update the system firmware with a specially crafted image.
CVE-2025-47698 1 Cognex 1 In-sight Explorer 2025-09-19 N/A
An adjacent attacker without authentication can exploit this vulnerability to retrieve a set of user-privileged credentials. These credentials are present during the firmware upgrade procedure.
CVE-2025-59713 1 Snipeitapp 1 Snipe-it 2025-09-19 6.8 Medium
Snipe-IT before 8.1.18 allows unsafe deserialization.
CVE-2025-5955 2 Aonetheme, Wordpress 2 Service Finder Sms System, Wordpress 2025-09-19 8.1 High
The Service Finder SMS System plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.0. This is due to the plugin not verifying a user's phone number before logging them in. This makes it possible for unauthenticated attackers to login as arbitrary users.
CVE-2025-8487 2 Extendthemes, Wordpress 2 Kubio Ai Page Builder, Wordpress 2025-09-19 5.4 Medium
The Kubio AI Page Builder plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the kubio-image-hub-install-plugin AJAX action in all versions up to, and including, 2.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Image Hub plugin.