5.1

CVSS4.0

CVE-2025-55209 - FreePBX UCP is Vulnerable to Stored XSS Through its User Control Panel

contactmanager is a module for FreePBX@, which is an open source GUI that controls and manages Asteriskยฉ (PBX). In versions 15.0.14 and below, 16.0.0 through 16.0.26.4 and 17.0.0 through 17.0.5, a stored cross-site scripting (XSS) vulnerability in FreePBX allows a low-privileged User Control Panelโ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 10:50 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 10:50 p.m.

10

CVSS3.1

CVE-2025-55190 - Argo CD: Project API Token Exposes Repository Credentials

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. In versions 2.13.0 through 2.13.8, 2.14.0 through 2.14.15, 3.0.0 through 3.0.12 and 3.1.0-rc1 through 3.1.1, API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwordโ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 10:37 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 10:37 p.m.

9.3

CVSS3.1

CVE-2025-58361 - Promptcraft Forge Studio's incomplete URL check is vulnerable to XSS via SVG

Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions contain an non-exhaustive URL scheme check that does not protect against XSS. User-controlled URLs pass through src/utils/validation.ts, but the check only strips `javascript:` โ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 7:43 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 7:43 p.m.

0.0

CVE-2025-32322 -

In onCreate of MediaProjectionPermissionActivity.java , there is a possible way to grant a malicious app a token enabling unauthorized screen recording capabilities due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. Useโ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 7:39 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 7:39 p.m.

8.2

CVSS3.1

CVE-2025-58353 - Promptcraft Forge Studio: Complete Sanitizer Bypass Enables XSS via Overlapping Patterns

Promptcraft Forge Studio is a toolkit for evaluating, optimizing, and maintaining LLM-powered applications. All versions of Promptcraft Forge Studio sanitize user input using regex blacklists such as r`eplace(/javascript:/gi, '')`. Because the package uses multi-character tokens and each replacemeโ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 7:39 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 7:39 p.m.

0.0

CVE-2025-26439 -

In getComponentName of AccessibilitySettingsUtils.java, there is a possible way to for a malicious Talkback service to be enabled instead of the system component due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User iโ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 7:28 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 7:28 p.m.

0.0

CVE-2025-26431 -

In setupAccessibilityServices of AccessibilityFragment.java, there is a possible way to hide an enabled accessibility service due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitโ€ฆ

๐Ÿ“… Published: Sept. 4, 2025, 7:28 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 7:28 p.m.

0.0

CVE-2025-26419 -

In initPhoneSwitch of SystemSettingsFragment.java, there is a possible FRP bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

๐Ÿ“… Published: Sept. 4, 2025, 7:28 p.m. ๐Ÿ”„ Last Modified: Sept. 4, 2025, 7:28 p.m.

6.2

CVSS3.1

CVE-2024-40664 -

In setupAccessibilityServices of AccessibilityFragment.java , there is a possible way to hide an enabled accessibility service due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

๐Ÿ“… Published: Sept. 4, 2025, 7:28 p.m. ๐Ÿ”„ Last Modified: Sept. 8, 2025, 2:03 p.m.

4

CVSS3.1

CVE-2025-22415 -

In android_app of Android.bp, there is a possible way to launch any activity as a system user. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

๐Ÿ“… Published: Sept. 4, 2025, 7:23 p.m. ๐Ÿ”„ Last Modified: Sept. 9, 2025, 3:55 a.m.
Total resulsts: 309333
Page 103 of 30,934
ยซ previous page ยป next page
Filters