8.7

CVSS4.0

CVE-2025-2875 -

CWE-610: Externally Controlled Reference to a Resource in Another Sphere vulnerability exists that could cause a loss of confidentiality when an unauthenticated attacker manipulates controller’s webserver URL to access resources.

📅 Published: May 14, 2025, 8:46 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.3

CVSS3.1

CVE-2024-8988 - PeepSo Core: File Uploads <= 6.4.6.0 - Insecure Direct Object Reference to Unauthenticated Sensitiv…

The PeepSo Core: File Uploads plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.6.0 via the file_download REST API endpoint due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to down…

📅 Published: May 14, 2025, 8:22 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2024-13940 - Ninja Forms Webhooks <= 3.0.7 - Authenticated (Admin+) Server-Side Request Forgery via Form Webhook

The Ninja Forms Webhooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.0.7 via the form webhook functionality. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary…

📅 Published: May 14, 2025, 8:22 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

0.0

CVE-2025-0020 -

“This CVE ID is Rejected and will not be used. As the CNA of record ESRI has rejected this CVE as it is not a vulnerability”

📅 Published: May 14, 2025, 7:54 a.m. 🔄 Last Modified: May 19, 2025, 7:15 p.m.

6.3

CVSS3.1

CVE-2024-52290 - Stored XSS in Configuration Key Functionality

LF Edge eKuiper is a lightweight internet of things (IoT) data analytics and stream processing engine. Prior to version 2.1.0 user with rights to modificate the service (e.g. kuiperUser role) can inject a cross-site scripting payload into Connection Configuration key `Name` (`confKey`) parameter. A…

📅 Published: May 14, 2025, 7:19 a.m. 🔄 Last Modified: July 11, 2025, 4:20 p.m.

5.4

CVSS3.1

CVE-2025-4520 - Uncanny Automator <= 6.4.0.2 - Missing Authorization to Authenticated (Subscriber+) Plugin Settings…

The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to upd…

📅 Published: May 14, 2025, 2:23 a.m. 🔄 Last Modified: April 21, 2026, 9 p.m.

9.1

CVSS3.1

CVE-2025-3623 - Uncanny Automator <= 6.4.0.1 - Unauthenticated PHP Object Injection in automator_api_decode_message…

The Uncanny Automator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.4.0.1 via deserialization of untrusted input in the automator_api_decode_message() function. This makes it possible for unauthenticated to inject a PHP Object. The additional pre…

📅 Published: May 14, 2025, 2:23 a.m. 🔄 Last Modified: April 22, 2026, 5:30 p.m.

7.8

CVSS3.1

CVE-2025-3931 - Yggdrasil: local privilege escalation in yggdrasil

A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowin…

📅 Published: May 14, 2025, midnight 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.1

CVSS3.1

CVE-2024-45516 -

An issue was discovered in Zimbra Collaboration (ZCS) 9.0.0 before Patch 43, 10.0.x before 10.0.12, 10.1.x before 10.1.4, and 8.8.15 before Patch 47. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, poten…

📅 Published: May 14, 2025, midnight 🔄 Last Modified: June 11, 2025, 9:20 p.m.

6.1

CVSS3.1

CVE-2025-44024 -

Cross-Site Scripting (XSS) vulnerability was discovered in the Pichome system v2.1.0 and before. The vulnerability exists due to insufficient sanitization of user input in the login form. An attacker can inject malicious JavaScript code into the username or password fields during the login process

📅 Published: May 14, 2025, midnight 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 5416 of 34,919
« previous page » next page
Filters