6.4

CVSS3.1

CVE-2025-8146 - Qi Addons for Elementor <= 1.9.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Typ…

The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TypeOut Text widget in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authentic…

πŸ“… Published: Aug. 2, 2025, 4:24 a.m. πŸ”„ Last Modified: Aug. 2, 2025, 5:15 a.m.

6.8

CVSS3.1

CVE-2025-7694 - Woffice Core <= 5.4.26 - Authenticated (Contributor+) Arbitrary File Deletion

The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with Contributor-level access and a…

πŸ“… Published: Aug. 2, 2025, 3:28 a.m. πŸ”„ Last Modified: Aug. 2, 2025, 4:15 a.m.

0.0

CVE-2025-6078 - CVE-2025-6078

Partner Software's Partner Software application and Partner Web application allows an authenticated user to add notes on the 'Notes' page when viewing a job but does not completely sanitize input, making it possible to add notes with HTML tags and JavaScript, enabling an attacker to add a note cont…

πŸ“… Published: Aug. 2, 2025, 2:15 a.m. πŸ”„ Last Modified: Aug. 2, 2025, 3:15 a.m.

0.0

CVE-2025-6077 - CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

πŸ“… Published: Aug. 2, 2025, 2:15 a.m. πŸ”„ Last Modified: Aug. 2, 2025, 3:15 a.m.

0.0

CVE-2025-6076 - CVE-2025-6076

Partner Software's Partner Software application and Partner Web application do not sanitize files uploaded on the "reports" tab, allowing an authenticated attacker to upload a malicious file and compromise the device. By default, the software runs as SYSTEM, heightening the severity of the vulnerab…

πŸ“… Published: Aug. 2, 2025, 2:15 a.m. πŸ”„ Last Modified: Aug. 2, 2025, 3:15 a.m.

8.1

CVSS3.1

CVE-2025-54955 -

OpenNebula Community Edition (CE) before 7.0.0 and Enterprise Edition (EE) before 6.10.3 have a critical FireEdge race condition that can lead to full account takeover. By exploiting this, an unauthenticated attacker can obtain a valid JSON Web Token (JWT) belonging to a legitimate user without kno…

πŸ“… Published: Aug. 2, 2025, midnight πŸ”„ Last Modified: Aug. 3, 2025, 12:15 a.m.

7.5

CVSS3.1

CVE-2025-54796 - Copyparty is vulnerable to Regex Denial of Service (ReDoS) attacks through "Recent Uploads" page

Copyparty is a portable file server. Versions prior to 1.18.9, the filter parameter for the "Recent Uploads" page allows arbitrary RegExes. If this feature is enabled (which is the default), an attacker can craft a filter which deadlocks the server. This is fixed in version 1.18.9.

πŸ“… Published: Aug. 1, 2025, 11:38 p.m. πŸ”„ Last Modified: Aug. 2, 2025, 12:15 a.m.

9.2

CVSS4.0

CVE-2025-54790 - Files: Potential for SQL Injection through File Browse and List Operations

Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, Files does not have logic to prevent the exploitation of backend SQL queries without direct output, potentially allowing unauthorized data access. This is fixed in version 0.16.10.

πŸ“… Published: Aug. 1, 2025, 11:37 p.m. πŸ”„ Last Modified: Aug. 2, 2025, 12:15 a.m.

9.4

CVSS4.0

CVE-2025-54782 - @nestjs/devtools-integration's CSRF to Sandbox Escape Allows for RCE against JS Developers

Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API end…

πŸ“… Published: Aug. 1, 2025, 11:36 p.m. πŸ”„ Last Modified: Aug. 2, 2025, 12:15 a.m.

2.8

CVSS3.1

CVE-2025-54781 - Himmelblau leaks an Intune service access token in its logs

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. When debugging is enabled for Himmelblau in version 1.0.0, the himmelblaud_tasks service leaks an Intune service access token to the system journal. This short-lived token can be used to detect the host's Intune compli…

πŸ“… Published: Aug. 1, 2025, 11:35 p.m. πŸ”„ Last Modified: Aug. 2, 2025, 12:15 a.m.
Total resulsts: 304049
Page 6 of 30,405
Β« previous page Β» next page
Filters