6.4

CVSS3.1

CVE-2025-7354 - WP Shortcodes Plugin — Shortcodes Ultimate <= 7.4.2 - Authenticated (Contributor+) Stored Cross-Sit…

The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for…

📅 Published: July 21, 2025, 7:23 a.m. 🔄 Last Modified: April 21, 2026, 4 a.m.

6.1

CVSS3.1

CVE-2025-7369 - Shortcodes Ultimate <= 7.4.2 - Cross-Site Request Forgery to Arbitrary Shortcode Execution

The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.4.2. This is due to missing or incorrect nonce validation on the preview function. This makes it possible for unauthenticated attackers to execute …

📅 Published: July 21, 2025, 7:23 a.m. 🔄 Last Modified: April 21, 2026, 4 a.m.

6.4

CVSS3.1

CVE-2025-4685 - Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor <= 3.4.8 - Authenticated (Contribut…

The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML data attributes of multiple widgets, in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping. This makes …

📅 Published: July 21, 2025, 7:23 a.m. 🔄 Last Modified: April 22, 2026, 2:45 p.m.

6.7

CVSS4.0

CVE-2025-0664 -

A locally authenticated, privileged user can craft a malicious OpenSSL configuration file, potentially leading the agent to load an arbitrary local library. This may impair endpoint defenses and allow the attacker to achieve code execution with SYSTEM-level privileges.

📅 Published: July 21, 2025, 7:08 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.1

CVSS3.1

CVE-2025-7920 - Simopro Technology|WinMatrix3 Web package - Reflected Cross-Site Scripting

WinMatrix3 Web package developed by Simopro Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.

📅 Published: July 21, 2025, 6:59 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.7

CVSS4.0

CVE-2025-7344 - Digiwin|EAI - Privilege Escalation

The EAI developed by Digiwin has a Privilege Escalation vulnerability, allowing remote attackers with regular privileges to elevate their privileges to administrator level via a specific API.

📅 Published: July 21, 2025, 6:55 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

9.3

CVSS4.0

CVE-2025-7343 - Digiwin|SFT - SQL Injection

The SFT developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

📅 Published: July 21, 2025, 6:48 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

9.3

CVSS4.0

CVE-2025-7921 - ASKEY|modem - Stack-based Buffer Overflow

Certain modem models developed by Askey has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and potentially execute arbitrary code.

📅 Published: July 21, 2025, 6:41 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.4

CVSS3.1

CVE-2025-24938 - Insufficient Validation of Input while user creation

The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver. The vulnerabl…

📅 Published: July 21, 2025, 6:33 a.m. 🔄 Last Modified: Aug. 11, 2025, 2:52 p.m.

9

CVSS3.1

CVE-2025-24937 - Access to local file system and its content

File contents could be read from the local file system by an attacker. Additionally, malicious code could be inserted in the file, leading to a full compromise of the web application and the container it is running on. The vulnerable component is bound to the network stack and the set of possible …

📅 Published: July 21, 2025, 6:31 a.m. 🔄 Last Modified: Aug. 11, 2025, 2:52 p.m.
Total resulsts: 346624
Page 4320 of 34,663
« previous page » next page
Filters