8.7

CVSS4.0

CVE-2025-3857 - Infinite loop condition in Amazon.IonDotnet

When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that โ€ฆ

๐Ÿ“… Published: April 21, 2025, 3:13 p.m. ๐Ÿ”„ Last Modified: Oct. 14, 2025, 7:15 p.m.

5.6

CVSS4.0

CVE-2024-12863 - Stored XSS in Discussions functionality

Stored XSS in Discussions in OpenText Content Management CE 20.2 to 25.1 on Windows and Linux allows authenticated malicious users to inject code into the system.

๐Ÿ“… Published: April 21, 2025, 3:13 p.m. ๐Ÿ”„ Last Modified: April 23, 2025, 2:08 p.m.

8.4

CVSS4.0

CVE-2025-2298 - Authenticated API Endpoint Allows Arbitrary File Deletion in Dremio Software

An improper authorization vulnerability in Dremio Software allows authenticated users to delete arbitrary files that the system has access to, including system files and files stored in remote locations such as S3, Azure Blob Storage, and local filesystems. This vulnerability exists due to insufficโ€ฆ

๐Ÿ“… Published: April 21, 2025, 3:12 p.m. ๐Ÿ”„ Last Modified: April 23, 2025, 2:08 p.m.

2.3

CVSS4.0

CVE-2025-2517 - Reference to Expired Domain Vulnerability in OpenTextโ„ข ArcSight Enterprise Security Manager

Reference to Expired Domain Vulnerability in OpenTextโ„ข ArcSight Enterprise Security Manager.

๐Ÿ“… Published: April 21, 2025, 2:26 p.m. ๐Ÿ”„ Last Modified: April 23, 2025, 2:08 p.m.

5.5

CVSS4.0

CVE-2024-12862 - REST API allows users without permissions to remove external collaborators

Incorrect Authorization vulnerability in the OpenText Content Server REST API on Windows, Linux allows users without the appropriate permissions to remove external collaborators.This issue affects Content Server: 20.2-24.4.

๐Ÿ“… Published: April 21, 2025, 2:22 p.m. ๐Ÿ”„ Last Modified: July 12, 2025, 10:09 p.m.

2.1

CVSS4.0

CVE-2025-3840 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

An improper neutralization of input vulnerability was identified in the End of Life (EOL) OVA based connect installer component which is deployed for installation purposes in a customer network. This EOL component was deprecated in September 2023 with end of support extended till January 2024. An aโ€ฆ

๐Ÿ“… Published: April 21, 2025, 9:39 a.m. ๐Ÿ”„ Last Modified: April 21, 2025, 2:23 p.m.

6.1

CVSS4.0

CVE-2025-3838 - Improper Authorization in the installer for the EOL OVA based connect component

An Improper Authorization vulnerability was identified in the EOL OVA based connect component which is deployed for installation purposes in the customer internal network. Under certain conditions, this could allow a bad actor to gain unauthorized access to the local db containing weakly hashed creโ€ฆ

๐Ÿ“… Published: April 21, 2025, 9:33 a.m. ๐Ÿ”„ Last Modified: April 21, 2025, 2:23 p.m.

6.1

CVSS4.0

CVE-2025-3837 - Improper Input Validation vulnerability in the End of Life (EOL) OVA based connect component

An improper input validation vulnerability is identified in the End of Life (EOL) OVA based connect component which is deployed for installation purposes in the customer internal network. This EOL component was deprecated in September 2023 with end of support extended till January 2024. Under certaโ€ฆ

๐Ÿ“… Published: April 21, 2025, 9:20 a.m. ๐Ÿ”„ Last Modified: April 21, 2025, 2:23 p.m.

3.8

CVSS3.1

CVE-2025-25228 - Extension - virtuemart.net - SQL injection in VirtueMart component 1.0.0 - 4.4.7 for Joomla

A SQL injection in VirtueMart component 1.0.0 - 4.4.7 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the product management area in backend.

๐Ÿ“… Published: April 21, 2025, 7:16 a.m. ๐Ÿ”„ Last Modified: May 28, 2025, 3:49 p.m.

9.2

CVSS4.0

CVE-2025-0632 - Local File Inclusion (LFI) leading to sensitive data exposure

Local File Inclusion (LFI) vulnerability in a Render function of Formulatrix Rock Maker Web (RMW) allows a remote attacker to obtain sensitive data via arbitrary code execution.ย A malicious actor could execute malicious scripts to automatically download configuration files in known locations to exfโ€ฆ

๐Ÿ“… Published: April 21, 2025, 5:27 a.m. ๐Ÿ”„ Last Modified: April 28, 2025, 3:15 a.m.
Total resulsts: 343975
Page 5187 of 34,398
ยซ previous page ยป next page
Filters