6.5

CVSS3.1

CVE-2025-37730 - Logstash Improper Certificate Validation in TCP output

Improper certificate validation in Logstash's TCP output could lead to a man-in-the-middle (MitM) attack in โ€œclientโ€ mode, as hostname verification in TCP output was not being performed when the ssl_verification_mode => full was set.

๐Ÿ“… Published: May 6, 2025, 5:29 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8

CVSS3.1

CVE-2025-46815 - ZITADEL Allows IdP Intent Token Reuse

The identity infrastructure software ZITADEL offers developers the ability to manage user sessions using the Session API. This API enables the use of IdPs for authentication, known as idp intents. Following a successful idp intent, the client receives an id and token on a predefined URI. These id aโ€ฆ

๐Ÿ“… Published: May 6, 2025, 5:13 p.m. ๐Ÿ”„ Last Modified: Aug. 26, 2025, 4:02 p.m.

5.3

CVSS3.1

CVE-2025-46736 - Umbraco Makes User Enumeration Feasible Based on Timing of Login Response

Umbraco is a free and open source .NET content management system. Prior to versions 10.8.10 and 13.8.1, based on an analysis of the timing of post login API responses, it's possible to determine whether an account exists. The issue is patched in versions 10.8.10 and 13.8.1. No known workarounds areโ€ฆ

๐Ÿ“… Published: May 6, 2025, 5:08 p.m. ๐Ÿ”„ Last Modified: Sept. 3, 2025, 5:59 p.m.

1.1

CVSS4.0

CVE-2025-46735 - Terraform WinDNS Provider improperly sanitizes input variables in `windns_record`

Terraform WinDNS Provider allows users to manage their Windows DNS server resources through Terraform. A security issue has been found in Terraform WinDNS Provider before version `1.0.5`. The `windns_record` resource did not sanitize the input variables. This could lead to authenticated command injโ€ฆ

๐Ÿ“… Published: May 6, 2025, 5 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

4.6

CVSS3.1

CVE-2025-32022 - Finit has heap based buffer overwrite in urandom.so plugin

Finit provides fast init for Linux systems. Finit's urandom plugin has a heap buffer overwrite vulnerability at boot which leads to it overwriting other parts of the heap, possibly causing random instabilities and undefined behavior. The urandom plugin is enabled by default, so this bug affects eveโ€ฆ

๐Ÿ“… Published: May 6, 2025, 4:57 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

9.3

CVSS4.0

CVE-2025-4041 - Use of Hard-coded Credentials Optigo Networks ONS NC600

In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions.

๐Ÿ“… Published: May 6, 2025, 4:35 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2025-22476 -

Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to Remote exeโ€ฆ

๐Ÿ“… Published: May 6, 2025, 4:08 p.m. ๐Ÿ”„ Last Modified: Nov. 4, 2025, 5:07 p.m.

8.3

CVSS3.1

CVE-2025-22477 -

Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Elevation of privileges.

๐Ÿ“… Published: May 6, 2025, 4:03 p.m. ๐Ÿ”„ Last Modified: Feb. 26, 2026, 6:28 p.m.

6

CVSS4.0

CVE-2025-4384 - Certificate validity not properly verified

The MQTT add-on of PcVue fails to verify that a remote deviceโ€™s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly. The use of a client certificate reduces the risk for random devices to take advantaโ€ฆ

๐Ÿ“… Published: May 6, 2025, 3:59 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.1

CVSS3.1

CVE-2025-22478 -

Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Restriction of XML External Entity Reference vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Information disclosure and Informationโ€ฆ

๐Ÿ“… Published: May 6, 2025, 3:55 p.m. ๐Ÿ”„ Last Modified: Feb. 26, 2026, 6:28 p.m.
Total resulsts: 347398
Page 5353 of 34,740
ยซ previous page ยป next page
Filters