7.8

CVSS3.1

CVE-2023-53145 - Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition In btsdio_probe, the data->work is bound with btsdio_work. It will be started in btsdio_send_frame. If the btsdio_remove runs with a unfinished wor…

πŸ“… Published: May 10, 2025, midnight πŸ”„ Last Modified: Jan. 5, 2026, 10:18 a.m.

4.5

CVSS3.1

CVE-2025-47814 -

libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from spv_read_xml_member) in zip-reader.c.

πŸ“… Published: May 10, 2025, midnight πŸ”„ Last Modified: June 12, 2025, 4:16 p.m.

4.5

CVSS3.1

CVE-2025-47815 -

libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from zip_member_read_all) in zip-reader.c.

πŸ“… Published: May 10, 2025, midnight πŸ”„ Last Modified: June 12, 2025, 4:13 p.m.

2.9

CVSS3.1

CVE-2025-47816 -

libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause an spvxml-helpers.c spvxml_parse_attributes out-of-bounds read, related to extra content at the end of a document.

πŸ“… Published: May 10, 2025, midnight πŸ”„ Last Modified: June 16, 2025, 6:36 p.m.

5.4

CVSS3.1

CVE-2025-3794 - WPForms Lite <= 1.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'start_timesta…

The WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the start_timestamp parameter in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping. T…

πŸ“… Published: May 9, 2025, 10:22 p.m. πŸ”„ Last Modified: May 12, 2025, 5:32 p.m.

6.9

CVSS4.0

CVE-2025-4494 - JAdmin-JAVA JAdmin Admin Backend NoNeedLoginController.java toLogin improper authentication

A vulnerability, which was classified as critical, was found in JAdmin-JAVA JAdmin 1.0. Affected is the function toLogin of the file NoNeedLoginController.java of the component Admin Backend. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploi…

πŸ“… Published: May 9, 2025, 9:31 p.m. πŸ”„ Last Modified: Oct. 10, 2025, 6 p.m.

6.9

CVSS4.0

CVE-2025-4492 - Campcodes Online Food Ordering System ticket-message.php sql injection

A vulnerability, which was classified as critical, has been found in Campcodes Online Food Ordering System 1.0. This issue affects some unknown processing of the file /routers/ticket-message.php. The manipulation of the argument ticket_id leads to sql injection. The attack may be initiated remotely…

πŸ“… Published: May 9, 2025, 9:31 p.m. πŸ”„ Last Modified: May 13, 2025, 6:57 p.m.

6.9

CVSS4.0

CVE-2025-4491 - Campcodes Online Food Ordering System ticket-status.php sql injection

A vulnerability classified as critical was found in Campcodes Online Food Ordering System 1.0. This vulnerability affects unknown code of the file /routers/ticket-status.php. The manipulation of the argument ticket_id leads to sql injection. The attack can be initiated remotely. The exploit has bee…

πŸ“… Published: May 9, 2025, 9 p.m. πŸ”„ Last Modified: May 13, 2025, 6:57 p.m.

6.9

CVSS4.0

CVE-2025-4490 - Campcodes Online Food Ordering System view-ticket-admin.php sql injection

A vulnerability classified as critical has been found in Campcodes Online Food Ordering System 1.0. This affects an unknown part of the file /view-ticket-admin.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been discl…

πŸ“… Published: May 9, 2025, 9 p.m. πŸ”„ Last Modified: May 13, 2025, 6:57 p.m.

8.3

CVSS3.1

CVE-2025-47269 - code-server session cookie can be extracted by having user visit specially crafted proxy URL

code-server runs VS Code on any machine anywhere through browser access. Prior to version 4.99.4, a maliciously crafted URL using the proxy subpath can result in the attacker gaining access to the session token. Failure to properly validate the port for a proxy request can result in proxying to an …

πŸ“… Published: May 9, 2025, 8:59 p.m. πŸ”„ Last Modified: June 23, 2025, 7:31 p.m.
Total resulsts: 342650
Page 4818 of 34,265
Β« previous page Β» next page
Filters