0.0

CVE-2025-32936 -

Not used

πŸ“… Published: April 14, 2025, 8:15 p.m. πŸ”„ Last Modified: April 15, 2025, 3:15 a.m.

0.0

CVE-2025-32937 -

Not used

πŸ“… Published: April 14, 2025, 8:15 p.m. πŸ”„ Last Modified: April 15, 2025, 3:15 a.m.

0.0

CVE-2025-32938 -

Not used

πŸ“… Published: April 14, 2025, 8:15 p.m. πŸ”„ Last Modified: April 15, 2025, 3:15 a.m.

5.3

CVSS4.0

CVE-2025-3587 - ZeroWdd/code-projects studentmanager getTeacherList improper authorization

A vulnerability classified as critical was found in ZeroWdd/code-projects studentmanager 1.0. This vulnerability affects unknown code of the file /getTeacherList. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and…

πŸ“… Published: April 14, 2025, 8 p.m. πŸ”„ Last Modified: June 5, 2025, 7:28 p.m.

0.0

CVE-2025-1782 -

Red Hat Product Security has come to the conclusion that this CVE is not needed.

πŸ“… Published: April 14, 2025, 6:41 p.m. πŸ”„ Last Modified: April 30, 2025, 6:15 p.m.

5.3

CVSS4.0

CVE-2025-3585 - westboy CicadasCMS JSP Parser upload unrestricted upload

A vulnerability classified as critical has been found in westboy CicadasCMS 1.0. This affects an unknown part of the file /upload/ of the component JSP Parser. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been di…

πŸ“… Published: April 14, 2025, 6 p.m. πŸ”„ Last Modified: May 21, 2025, 8:01 p.m.

10

CVSS3.1

CVE-2025-32445 - Users can gain privileged access to the host system and cluster with EventSource and Sensor CR

Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CR…

πŸ“… Published: April 14, 2025, 5:47 p.m. πŸ”„ Last Modified: June 20, 2025, 3:42 p.m.

6.9

CVSS4.0

CVE-2025-3277 - SQLite: integer overflow in SQLite

An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be tr…

πŸ“… Published: April 14, 2025, 4:50 p.m. πŸ”„ Last Modified: Aug. 18, 2025, 9:28 p.m.

5.6

CVSS3.1

CVE-2025-2572 - WhatsUp Gold NmConfigurationManager.exe database manipulation vulnerability

In WhatsUp Gold versions released before 2024.0.3, a database manipulation vulnerability allows an unauthenticated attacker to modify the contents ofΒ WhatsUp.dbo.WrlsMacAddressGroup.

πŸ“… Published: April 14, 2025, 4:06 p.m. πŸ”„ Last Modified: July 17, 2025, 2:41 p.m.

9.3

CVSS4.0

CVE-2025-22371 - SQL-injection in admin_login_handler allows unauthenticated user to log in as an administrator in S…

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SicommNet BASEC (SaaS Service) login page allows an unauthenticated remote attacker to Bypass Authentication and execute arbitrary SQL commands.This issue at least affects BASEC for the date of 14 …

πŸ“… Published: April 14, 2025, 3:32 p.m. πŸ”„ Last Modified: April 21, 2025, 12:15 p.m.
Total resulsts: 342363
Page 5209 of 34,237
Β« previous page Β» next page
Filters