5.4

CVSS3.1

CVE-2025-5256 - Open Redirect vulnerability on user unlock path

SummaryThis advisory addresses an Open Redirection vulnerability in Mautic's user unlocking endpoint. This vulnerability could be exploited by an attacker to redirect legitimate users to malicious websites, potentially leading to phishing attacks or the delivery of exploit kits. Open Redirection v…

📅 Published: May 28, 2025, 5:47 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

4.3

CVSS3.1

CVE-2024-47055 - Segment cloning doesn't have a proper permission check

SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference (IDOR) / Missing Authorization: A missing authori…

📅 Published: May 28, 2025, 5:34 p.m. 🔄 Last Modified: Oct. 3, 2025, 2:11 p.m.

5.6

CVSS3.1

CVE-2025-1461 - Vuetify XSS through 'eventMoreText' prop of VCalendar

Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the…

📅 Published: May 28, 2025, 5:26 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.3

CVSS3.1

CVE-2024-47057 - User name enumeration possible due to response time difference on password reset form

SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Fo…

📅 Published: May 28, 2025, 5:23 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.1

CVSS3.1

CVE-2024-47056 - Mautic does not shield .env files from web traffic

SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configura…

📅 Published: May 28, 2025, 4:24 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.5

CVSS3.1

CVE-2025-5257 - Predictable Page Indexing Might Lead to Sensitive Data Exposure

SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search engines. This could lead to the unintended disclosure of draft content or sensitive information. Unauthorized Access to Unp…

📅 Published: May 28, 2025, 4:17 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.5

CVSS3.1

CVE-2025-36572 -

Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with the knowledge of the hard-coded credentials, could potentially exploit this vulnerability to gain unauthorized access based…

📅 Published: May 28, 2025, 4:14 p.m. 🔄 Last Modified: June 9, 2025, 6:58 p.m.

4.3

CVSS3.1

CVE-2024-51453 - IBM Sterling Secure Proxy directory traversal

IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.

📅 Published: May 28, 2025, 3:22 p.m. 🔄 Last Modified: Aug. 15, 2025, 2:35 p.m.

5.9

CVSS3.1

CVE-2024-38341 - IBM Sterling Secure Proxy information disclosure

IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 through 6.1.0.0, and 6.2.0.0 through 6.2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.

📅 Published: May 28, 2025, 3:21 p.m. 🔄 Last Modified: Aug. 16, 2025, 11:41 p.m.

9.8

CVSS3.1

CVE-2025-3357 - IBM Tivoli Monitoring code execution

IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary code due to improper validation of an index value of a dynamically allocated array.

📅 Published: May 28, 2025, 2:51 p.m. 🔄 Last Modified: Feb. 26, 2026, 6:27 p.m.
Total resulsts: 347728
Page 5088 of 34,773
« previous page » next page
Filters