2.7

CVSS3.1

CVE-2024-45658 - IBM Security Verify Access information disclosure

IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system.

πŸ“… Published: Feb. 4, 2025, 8:37 p.m. πŸ”„ Last Modified: Aug. 8, 2025, 5:12 p.m.

6.1

CVSS3.1

CVE-2024-40700 - IBM Security Verify Access cross-site scripting

IBM Security Verify Access Appliance and Container 10.0.0 through 10.0.8 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosu…

πŸ“… Published: Feb. 4, 2025, 8:36 p.m. πŸ”„ Last Modified: Dec. 15, 2025, 8:01 p.m.

7.3

CVSS3.1

CVE-2025-0509 - Signing Checks Bypass

A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.

πŸ“… Published: Feb. 4, 2025, 8:01 p.m. πŸ”„ Last Modified: Aug. 5, 2025, 2:35 p.m.

6

CVSS4.0

CVE-2025-0630 - Western Telematic Inc NPS Series, DSM Series, CPM Series External Control of File Name or Path

Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem.

πŸ“… Published: Feb. 4, 2025, 7:43 p.m. πŸ”„ Last Modified: Feb. 12, 2025, 8:51 p.m.

5.9

CVSS3.1

CVE-2025-24963 - Browser mode serves arbitrary files in vitest

Vitest is a testing framework powered by Vite. The `__screenshot-error` handler on the browser mode HTTP server that responds any file on the file system. Especially if the server is exposed on the network by `browser.api.host: true`, an attacker can send a request to that handler from remote to ge…

πŸ“… Published: Feb. 4, 2025, 7:36 p.m. πŸ”„ Last Modified: Dec. 31, 2025, 2:44 p.m.

9.7

CVSS3.1

CVE-2025-24964 - Remote Code Execution when accessing a malicious website while Vitest API server is listening

Vitest is a testing framework powered by Vite. Affected versions are subject to arbitrary remote Code Execution when accessing a malicious website while Vitest API server is listening by Cross-site WebSocket hijacking (CSWSH) attacks. When `api` option is enabled (Vitest UI enables it), Vitest star…

πŸ“… Published: Feb. 4, 2025, 7:36 p.m. πŸ”„ Last Modified: Dec. 31, 2025, 2:50 p.m.

9.3

CVSS4.0

CVE-2025-0960 - AutomationDirect C-more EA9 HMI Classic Buffer Overflow

AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.

πŸ“… Published: Feb. 4, 2025, 7:34 p.m. πŸ”„ Last Modified: Feb. 4, 2025, 8:15 p.m.

8.8

CVSS3.1

CVE-2025-24968 - Business Logic And Unrestricted Project Deletion Lead To Take Over the System in reNgine

reNgine is an automated reconnaissance framework for web applications. An unrestricted project deletion vulnerability allows attackers with specific roles, such as `penetration_tester` or `auditor` to delete all projects in the system. This can lead to a complete system takeover by redirecting the …

πŸ“… Published: Feb. 4, 2025, 7:28 p.m. πŸ”„ Last Modified: May 13, 2025, 6:39 p.m.

7.4

CVSS4.0

CVE-2025-24967 - Stored XSS on Admin Panel When Deleting a User in reNgine

reNgine is an automated reconnaissance framework for web applications. A stored cross-site scripting (XSS) vulnerability exists in the admin panel's user management functionality. An attacker can exploit this issue by injecting malicious payloads into the username field during user creation. This v…

πŸ“… Published: Feb. 4, 2025, 7:28 p.m. πŸ”„ Last Modified: May 13, 2025, 6:43 p.m.

5.3

CVSS4.0

CVE-2025-24966 - HTML Injection in reNgine

reNgine is an automated reconnaissance framework for web applications. HTML Injection occurs when an application improperly validates or sanitizes user inputs, allowing attackers to inject arbitrary HTML code. In this scenario, the vulnerability exists in the "Add Target" functionality of the appli…

πŸ“… Published: Feb. 4, 2025, 7:26 p.m. πŸ”„ Last Modified: May 13, 2025, 6:46 p.m.
Total resulsts: 343996
Page 6331 of 34,400
Β« previous page Β» next page
Filters