7.5

CVSS3.1

CVE-2025-26864 - Apache IoTDB: Exposure of Sensitive Information in IoTDB OpenID Authentication

Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Information into Log File vulnerability in the OpenIdAuthorizer of Apache IoTDB. This issue affects Apache IoTDB: from 0.10.0 through 1.3.3, from 2.0.1-beta before 2.0.2. Users are recommended to upgrade to version…

📅 Published: May 14, 2025, 10:44 a.m. 🔄 Last Modified: July 1, 2025, 7:23 p.m.

7.5

CVSS3.1

CVE-2025-26795 - Apache IoTDB JDBC driver: Exposure of Sensitive Information in IoTDB JDBC driver

Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Information into Log File vulnerability in Apache IoTDB JDBC driver. This issue affects iotdb-jdbc: from 0.10.0 through 1.3.3, from 2.0.1-beta before 2.0.2. Users are recommended to upgrade to version 2.0.2 and 1.3…

📅 Published: May 14, 2025, 10:43 a.m. 🔄 Last Modified: July 11, 2025, 4:16 p.m.

9.8

CVSS3.1

CVE-2024-24780 - Apache IoTDB: Remote Code Execution with untrusted URI of User-defined function

Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attacker who has privilege to create UDF can register malicious function from untrusted URI. This issue affects Apache IoTDB: from 1.0.0 before 1.3.4. Users are recommended to upgrade to version 1.3.4, which fixes …

📅 Published: May 14, 2025, 10:42 a.m. 🔄 Last Modified: Feb. 26, 2026, 6:28 p.m.

8.6

CVSS4.0

CVE-2025-4430 - Unauthorized file manipulation in EZD RP

Unauthorized access to "/api/Token/gettoken" endpoint in EZD RP allows file manipulation.This issue affects EZD RP in versions before 20.19 (published on 22nd August 2024).

📅 Published: May 14, 2025, 10:36 a.m. 🔄 Last Modified: May 16, 2025, 2:43 p.m.

8.7

CVSS4.0

CVE-2025-2875 -

CWE-610: Externally Controlled Reference to a Resource in Another Sphere vulnerability exists that could cause a loss of confidentiality when an unauthenticated attacker manipulates controller’s webserver URL to access resources.

📅 Published: May 14, 2025, 8:46 a.m. 🔄 Last Modified: May 16, 2025, 2:43 p.m.

5.3

CVSS3.1

CVE-2024-8988 - PeepSo Core: File Uploads <= 6.4.6.0 - Insecure Direct Object Reference to Unauthenticated Sensitiv…

The PeepSo Core: File Uploads plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.6.0 via the file_download REST API endpoint due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to down…

📅 Published: May 14, 2025, 8:22 a.m. 🔄 Last Modified: April 8, 2026, 5:25 p.m.

5.5

CVSS3.1

CVE-2024-13940 - Ninja Forms Webhooks <= 3.0.7 - Authenticated (Admin+) Server-Side Request Forgery via Form Webhook

The Ninja Forms Webhooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.0.7 via the form webhook functionality. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary…

📅 Published: May 14, 2025, 8:22 a.m. 🔄 Last Modified: April 8, 2026, 4:51 p.m.

0.0

CVE-2025-0020 -

“This CVE ID is Rejected and will not be used. As the CNA of record ESRI has rejected this CVE as it is not a vulnerability”

📅 Published: May 14, 2025, 7:54 a.m. 🔄 Last Modified: May 19, 2025, 7:15 p.m.

6.3

CVSS3.1

CVE-2024-52290 - Stored XSS in Configuration Key Functionality

LF Edge eKuiper is a lightweight internet of things (IoT) data analytics and stream processing engine. Prior to version 2.1.0 user with rights to modificate the service (e.g. kuiperUser role) can inject a cross-site scripting payload into Connection Configuration key `Name` (`confKey`) parameter. A…

📅 Published: May 14, 2025, 7:19 a.m. 🔄 Last Modified: July 11, 2025, 4:20 p.m.

5.4

CVSS3.1

CVE-2025-4520 - Uncanny Automator <= 6.4.0.2 - Missing Authorization to Authenticated (Subscriber+) Plugin Settings…

The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to upd…

📅 Published: May 14, 2025, 2:23 a.m. 🔄 Last Modified: April 8, 2026, 5:27 p.m.
Total resulsts: 344676
Page 4965 of 34,468
« previous page » next page
Filters