8.4

CVSS3.1

CVE-2025-4647 - A user with elevated privileges can bypass sanitization measures by replacing the content of an exi…

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon web allows Reflected XSS. A user with elevated privileges can bypass sanitization measures by replacing the content of an existing SVG. This issue affects web: from 24.10.0 before…

📅 Published: May 13, 2025, 9:31 a.m. 🔄 Last Modified: Oct. 22, 2025, 2:13 p.m.

7.2

CVSS3.1

CVE-2025-4646 - A high privilege user is able to create and use a valid admin API token in centreon-web

Incorrect Authorization vulnerability in Centreon web (API Token creation form modules) allows Privilege Escalation.This issue affects web: from 24.04.0 before 24.04.10, from 24.10.0 before 24.10.4.

📅 Published: May 13, 2025, 9:17 a.m. 🔄 Last Modified: Oct. 22, 2025, 2:13 p.m.

9.4

CVSS4.0

CVE-2025-22248 - [pgpool] Unauthenticated access to postgres through pgpool

The bitnami/pgpool Docker image, and the bitnami/postgres-ha k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster. The PGPOOL_SR_CHECK_USER is the user that Pgpool itself uses to perform streaming replication chec…

📅 Published: May 13, 2025, 9:13 a.m. 🔄 Last Modified: July 18, 2025, 6:58 p.m.

8.6

CVSS3.1

CVE-2025-41645 - SMA: Sunny Portal demo system privilege escalation

An unauthenticated remote attacker could use a demo account of the portal to hijack devices that were created in that account by mistake.

📅 Published: May 13, 2025, 8:47 a.m. 🔄 Last Modified: May 13, 2025, 7:35 p.m.

4.6

CVSS4.0

CVE-2025-3916 -

CWE-121: Stack-based Buffer Overflow vulnerability exists that could cause local attackers being able to exploit these issues to potentially execute arbitrary code while the end user opens a malicious project file (SSD file) provided by the attacker.

📅 Published: May 13, 2025, 8:35 a.m. 🔄 Last Modified: May 13, 2025, 7:35 p.m.

5.3

CVSS4.0

CVE-2025-27696 - Apache Superset: Incorrect authorization leading to resource ownership takeover

Incorrect Authorization vulnerability in Apache Superset allows ownership takeover of dashboards, charts or datasets by authenticated users with read permissions. This issue affects Apache Superset: through 4.1.1. Users are recommended to upgrade to version 4.1.2 or above, which fixes the issue.

📅 Published: May 13, 2025, 8:21 a.m. 🔄 Last Modified: Sept. 29, 2025, 9:49 p.m.

8.8

CVSS3.1

CVE-2025-4474 - Frontend Dashboard 1.0 - 2.2.7 - Missing Authorization to Authenticated (Subscriber+) Privilege Esc…

The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the fed_admin_setting_form_function() function in versions 1.0 to 2.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite th…

📅 Published: May 13, 2025, 6:40 a.m. 🔄 Last Modified: May 13, 2025, 7:35 p.m.

4.3

CVSS3.1

CVE-2025-4339 - TheGem <= 5.10.3 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Theme Options Upd…

The TheGem theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajaxApi() function in all versions up to, and including, 5.10.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary…

📅 Published: May 13, 2025, 6:40 a.m. 🔄 Last Modified: May 13, 2025, 7:35 p.m.

8.8

CVSS3.1

CVE-2025-4317 - TheGem <= 5.10.3 - Authenticated (Subscriber+) Arbitrary File Upload

The TheGem theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the thegem_get_logo_url() function in all versions up to, and including, 5.10.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitr…

📅 Published: May 13, 2025, 6:40 a.m. 🔄 Last Modified: May 13, 2025, 7:35 p.m.

6.5

CVSS3.1

CVE-2025-3107 - Newsletters <= 4.9.9.8 - Authenticated (Contributor+) SQL Injection orderby Parameter

The Newsletters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby' parameter in all versions up to, and including, 4.9.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible …

📅 Published: May 13, 2025, 6:40 a.m. 🔄 Last Modified: May 13, 2025, 7:35 p.m.
Total resulsts: 342810
Page 4809 of 34,281
« previous page » next page
Filters