6.4

CVSS3.1

CVE-2025-3862 - Contest Gallery <= 26.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Paramet…

Contest Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 26.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and abo…

📅 Published: May 8, 2025, 11:13 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

6.3

CVSS3.1

CVE-2025-4208 - NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.9.1 - Authenticated (Custom) L…

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Limited Code Execution in all versions up to, and including, 8.9.1 via the get_table_records function. This is due to the unsanitized use of user-supplied input in call_user_func(). This makes …

📅 Published: May 8, 2025, 11:13 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

8.7

CVSS4.0

CVE-2025-3759 - Missing Authentication for Changing Device Configuration in WF2220

Endpoint /cgi-bin-igd/netcore_set.cgi which is used for changing device configuration is accessible without authentication. This poses a significant security threat allowing for e.g: administrator account hijacking or AP password changing. The vendor was contacted early about this disclosure but di…

📅 Published: May 8, 2025, 10:05 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

8.7

CVSS4.0

CVE-2025-3758 - Exposure of Device Configuration without Authentication in WF2220

WF2220 exposes endpoint /cgi-bin-igd/netcore_get.cgi that returns configuration of the device to unauthorized users. Returned configuration includes cleartext password. The vendor was contacted early about this disclosure but did not respond in any way.

📅 Published: May 8, 2025, 10:05 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

8.2

CVSS3.1

CVE-2025-41450 - Authentication bypass with privileged access in Danfoss AK-SM 8xxA Series prior to version 4.2

Improper Authentication vulnerability in Danfoss AKSM8xxA Series.This issue affects Danfoss AK-SM 8xxA Series prior to version 4.2

📅 Published: May 8, 2025, 9:41 a.m. 🔄 Last Modified: May 12, 2025, 6:04 a.m.

7.3

CVSS4.0

CVE-2025-1254 - Potential out-of-bounds read and write in Recording Service while using file rollover

Out-of-bounds Read, Out-of-bounds Write vulnerability in RTI Connext Professional (Core Libraries) allows Overread Buffers, Overflow Buffers.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.0.0 before 6.1.2.23.

📅 Published: May 8, 2025, 8:32 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

6.9

CVSS4.0

CVE-2025-1253 - Potential stack buffer write overflow in license-managed Core Libraries when setting RTI_LICENSE_FI…

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 4.5 before 6.1.2.23.

📅 Published: May 8, 2025, 8:32 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

6.9

CVSS4.0

CVE-2025-1252 - Potential buffer write overflow in Connext applications while parsing malicious license file

Heap-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 4.4 before 6.1.2.23.

📅 Published: May 8, 2025, 8:31 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

7.1

CVSS4.0

CVE-2025-40846 - HaloITSM open redirect via the returnUrl

Improper Input Validation, the returnUrl parameter in Account Security Settings lacks proper input validation, allowing attackers to redirect users to malicious websites (Open Redirect) and inject JavaScript code to perform cross site scripting attack. The vulnerability affects Halo versions up to…

📅 Published: May 8, 2025, 8:15 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.

6.4

CVSS3.1

CVE-2025-4127 - WP SEO Structured Data Schema <= 2.7.11 - Authenticated (Contributor+) Stored Cross-Site Scripting …

The WP SEO Structured Data Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Price Range’ parameter in all versions up to, and including, 2.7.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contr…

📅 Published: May 8, 2025, 6:39 a.m. 🔄 Last Modified: May 8, 2025, 2:39 p.m.
Total resulsts: 293450
Page 28 of 29,345
« previous page » next page
Filters