instruction
stringlengths
55
56
inputs
stringclasses
1 value
outputs
stringlengths
86
4.06k
Please provide detailed information about CVE-2025-32054
CVE:CVE-2025-32054 Description:In JetBrains IntelliJ IDEA before 2024.3, 2024.2.4 source code could be logged in the idea.log file published:2025-04-03T17:15:30.947
Please provide detailed information about CVE-2025-3166
CVE:CVE-2025-3166 Description:A vulnerability classified as critical was found in code-projects Product Management System 1.0. This vulnerability affects the function search_item of the component Search Product Menu. The manipulation of the argument target leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. published:2025-04-03T17:15:31.150
Please provide detailed information about CVE-2025-3167
CVE:CVE-2025-3167 Description:A vulnerability, which was classified as problematic, has been found in Tenda AC23 16.03.07.52. This issue affects some unknown processing of the file /goform/VerAPIMant of the component API Interface. The manipulation of the argument getuid leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T17:15:31.390
Please provide detailed information about CVE-2025-3168
CVE:CVE-2025-3168 Description:A vulnerability was found in PHPGurukul Time Table Generator System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit-class.php. The manipulation of the argument editid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T17:15:31.823
Please provide detailed information about CVE-2025-3169
CVE:CVE-2025-3169 Description:A vulnerability was found in Projeqtor up to 12.0.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /tool/saveAttachment.php. The manipulation of the argument attachmentFiles leads to unrestricted upload. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 12.0.3 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains, that "this vulnerability can be exploited only on not securely installed instances, as it is adviced during product install: attachment directory should be out of web reach, so that even if executable file can be uploaded, it cannot be executed through the web." published:2025-04-03T17:15:32.080
Please provide detailed information about CVE-2025-31126
CVE:CVE-2025-31126 Description:Element X iOS is a Matrix iOS Client provided by Element. In Element X iOS version between 1.6.13 and 25.03.7, the entity in control of the element.json well-known file is able, under certain conditions, to get access to the media encryption keys used for an Element Call call. This vulnerability is fixed in 25.03.8. published:2025-04-03T18:15:45.803
Please provide detailed information about CVE-2025-31127
CVE:CVE-2025-31127 Description:Element X Android is a Matrix Android Client provided by element.io. In Element X Android versions between 0.4.16 and 25.03.3, the entity in control of the element.json well-known file is able, under certain conditions, to get access to the media encryption keys used for an Element Call call. This vulnerability is fixed in 25.03.4. published:2025-04-03T18:15:46.037
Please provide detailed information about CVE-2025-31483
CVE:CVE-2025-31483 Description:Miniflux is a feed reader. Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window. To mitigate the vulnerability, the CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;. This vulnerability is fixed in 2.2.7. published:2025-04-03T18:15:47.270
Please provide detailed information about CVE-2025-3170
CVE:CVE-2025-3170 Description:A vulnerability classified as critical has been found in Project Worlds Online Lawyer Management System 1.0. This affects an unknown part of the file /admin_user.php. The manipulation of the argument block_id/unblock_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T18:15:48.360
Please provide detailed information about CVE-2025-3171
CVE:CVE-2025-3171 Description:A vulnerability classified as critical was found in Project Worlds Online Lawyer Management System 1.0. This vulnerability affects unknown code of the file /approve_lawyer.php. The manipulation of the argument unblock_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T18:15:48.540
Please provide detailed information about CVE-2025-3172
CVE:CVE-2025-3172 Description:A vulnerability, which was classified as critical, has been found in Project Worlds Online Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyer_booking.php. The manipulation of the argument unblock_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T18:15:48.723
Please provide detailed information about CVE-2025-29647
CVE:CVE-2025-29647 Description:SeaCMS v13.3 has a SQL injection vulnerability in the component admin_tempvideo.php. published:2025-04-03T19:15:39.580
Please provide detailed information about CVE-2025-31486
CVE:CVE-2025-31486 Description:Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 4.5.12, 5.4.17, 6.0.14, 6.1.4, and 6.2.5. published:2025-04-03T19:15:39.890
Please provide detailed information about CVE-2025-31487
CVE:CVE-2025-31487 Description:The XWiki JIRA extension provides various integration points between XWiki and JIRA (macros, UI, CKEditor plugin). If the JIRA macro is installed, any logged in XWiki user could edit his/her user profile wiki page and use that JIRA macro, specifying a fake JIRA URL that returns an XML specifying a DOCTYPE pointing to a local file on the XWiki server host and displaying that file's content in one of the returned JIRA fields (such as the summary or description for example). The vulnerability has been patched in the JIRA Extension v8.6.5. published:2025-04-03T19:15:40.047
Please provide detailed information about CVE-2025-3173
CVE:CVE-2025-3173 Description:A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T19:15:40.853
Please provide detailed information about CVE-2025-3174
CVE:CVE-2025-3174 Description:A vulnerability has been found in Project Worlds Online Lawyer Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /searchLawyer.php. The manipulation of the argument experience leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T19:15:41.060
Please provide detailed information about CVE-2025-3175
CVE:CVE-2025-3175 Description:A vulnerability was found in Project Worlds Online Lawyer Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /save_user_edit_profile.php. The manipulation of the argument first_Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T19:15:41.277
Please provide detailed information about CVE-2025-26817
CVE:CVE-2025-26817 Description:Netwrix Password Secure 9.2.0.32454 allows OS command injection. published:2025-04-03T20:15:23.837
Please provide detailed information about CVE-2025-26818
CVE:CVE-2025-26818 Description:Netwrix Password Secure through 9.2 allows command injection. published:2025-04-03T20:15:23.980
Please provide detailed information about CVE-2025-29064
CVE:CVE-2025-29064 Description:An issue in TOTOLINK x18 v.9.1.0cu.2024_B20220329 allows a remote attacker to execute arbitrary code via the sub_410E54 function of the cstecgi.cgi. published:2025-04-03T20:15:24.117
Please provide detailed information about CVE-2025-29462
CVE:CVE-2025-29462 Description:A buffer overflow vulnerability has been discovered in Tenda Ac15 V15.13.07.13. The vulnerability occurs when the webCgiGetUploadFile function calls the socketRead function to process HTTP request messages, resulting in the overwriting of a buffer on the stack. published:2025-04-03T20:15:24.383
Please provide detailed information about CVE-2025-29504
CVE:CVE-2025-29504 Description:Insecure Permission vulnerability in student-manage 1 allows a local attacker to escalate privileges via the Unsafe permission verification. published:2025-04-03T20:15:24.560
Please provide detailed information about CVE-2025-29570
CVE:CVE-2025-29570 Description:An issue in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 allows a local attacker to escalate privileges via the function tftp_image_check of a binary named rc. published:2025-04-03T20:15:24.723
Please provide detailed information about CVE-2025-30406
CVE:CVE-2025-30406 Description:Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\web.config. published:2025-04-03T20:15:24.987
Please provide detailed information about CVE-2025-31119
CVE:CVE-2025-31119 Description:generator-jhipster-entity-audit is a JHipster module to enable entity audit and audit log page. Prior to 5.9.1, generator-jhipster-entity-audit allows unsafe reflection when having Javers selected as Entity Audit Framework. If an attacker manages to place some malicious classes into the classpath and also has access to these REST interface for calling the mentioned REST endpoints, using these lines of code can lead to unintended remote code execution. This vulnerability is fixed in 5.9.1. published:2025-04-03T20:15:25.223
Please provide detailed information about CVE-2025-31161
CVE:CVE-2025-31161 Description:CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. The server first verifies the existence of the user by performing a call to login_user_pass() with no password requirement. This will authenticate the session through the HMAC verification process and up until the server checks for user verification once more. The vulnerability can be further stabilized, eliminating the need for successfully triggering a race condition, by sending a mangled AWS4-HMAC header. By providing only the username and a following slash (/), the server will successfully find a username, which triggers the successful anypass authentication process, but the server will fail to find the expected SignedHeaders entry, resulting in an index-out-of-bounds error that stops the code from reaching the session cleanup. Together, these issues make it trivial to authenticate as any known or guessable user (e.g., crushadmin), and can lead to a full compromise of the system by obtaining an administrative account. published:2025-04-03T20:15:25.373
Please provide detailed information about CVE-2025-31481
CVE:CVE-2025-31481 Description:API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Using the Relay special node type you can bypass the configured security on an operation. This vulnerability is fixed in 4.0.22 and 3.4.17. published:2025-04-03T20:15:25.543
Please provide detailed information about CVE-2025-31485
CVE:CVE-2025-31485 Description:API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Prior to 4.0.22 and 3.4.17, a GraphQL grant on a property might be cached with different objects. The ApiPlatform\GraphQl\Serializer\ItemNormalizer::isCacheKeySafe() method is meant to prevent the caching but the parent::normalize method that is called afterwards still creates the cache key and causes the issue. This vulnerability is fixed in 4.0.22 and 3.4.17. published:2025-04-03T20:15:25.740
Please provide detailed information about CVE-2025-31489
CVE:CVE-2025-31489 Description:MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. The signature component of the authorization may be invalid, which would mean that as a client you can use any arbitrary secret to upload objects given the user already has prior WRITE permissions on the bucket. Prior knowledge of access-key, and bucket name this user might have access to - and an access-key with a WRITE permissions is necessary. However with relevant information in place, uploading random objects to buckets is trivial and easy via curl. This issue is fixed in RELEASE.2025-04-03T14-56-28Z. published:2025-04-03T20:15:25.897
Please provide detailed information about CVE-2025-3176
CVE:CVE-2025-3176 Description:A vulnerability was found in Project Worlds Online Lawyer Management System 1.0. It has been classified as critical. This affects an unknown part of the file /single_lawyer.php. The manipulation of the argument u_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T20:15:27.317
Please provide detailed information about CVE-2025-3177
CVE:CVE-2025-3177 Description:A vulnerability was found in FastCMS 0.1.5. It has been declared as critical. This vulnerability affects unknown code of the component JWT Handler. The manipulation leads to use of hard-coded cryptographic key . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. published:2025-04-03T20:15:27.507
Please provide detailed information about CVE-2025-3178
CVE:CVE-2025-3178 Description:A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /doctor/deleteappointment.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T21:15:42.000
Please provide detailed information about CVE-2025-3179
CVE:CVE-2025-3179 Description:A vulnerability classified as critical has been found in projectworlds Online Doctor Appointment Booking System 1.0. Affected is an unknown function of the file /doctor/deletepatient.php. The manipulation of the argument ic leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T21:15:42.183
Please provide detailed information about CVE-2025-3180
CVE:CVE-2025-3180 Description:A vulnerability classified as critical was found in projectworlds Online Doctor Appointment Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /doctor/deleteschedule.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T21:15:42.370
Please provide detailed information about CVE-2025-0278
CVE:CVE-2025-0278 Description:HCL Traveler is affected by an internal path disclosure in a Windows application when the application inadvertently reveals internal file paths, in error messages, debug logs, or responses to user requests. published:2025-04-03T22:15:16.563
Please provide detailed information about CVE-2025-0279
CVE:CVE-2025-0279 Description:HCL Traveler generates some error messages that provide detailed information about errors and failures, such as internal paths, file names, sensitive tokens, credentials, error codes, or stack traces. Attackers could exploit this information to gain insights into the system's architecture and potentially launch targeted attacks. published:2025-04-03T22:15:16.700
Please provide detailed information about CVE-2025-30370
CVE:CVE-2025-30370 Description:jupyterlab-git is a JupyterLab extension for version control using Git. On many platforms, a third party can create a Git repository under a name that includes a shell command substitution string in the syntax $(<command>). These directory names are allowed in macOS and a majority of Linux distributions. If a user starts jupyter-lab in a parent directory of this inappropriately-named Git repository, opens it, and clicks "Git > Open Git Repository in Terminal" from the menu bar, then the injected command <command> is run in the user's shell without the user's permission. This issue is occurring because when that menu entry is clicked, jupyterlab-git opens the terminal and runs cd <git-repo-path> through the shell to set the current directory. Doing so runs any command substitution strings present in the directory name, which leads to the command injection issue described here. A previous patch provided an incomplete fix. This vulnerability is fixed in 0.51.1. published:2025-04-03T22:15:21.190
Please provide detailed information about CVE-2025-3181
CVE:CVE-2025-3181 Description:A vulnerability, which was classified as critical, has been found in projectworlds Online Doctor Appointment Booking System 1.0. Affected by this issue is some unknown functionality of the file /patient/appointment.php?scheduleDate=1&appid=1. The manipulation of the argument scheduleDate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T22:15:21.350
Please provide detailed information about CVE-2025-3182
CVE:CVE-2025-3182 Description:A vulnerability, which was classified as critical, was found in projectworlds Online Doctor Appointment Booking System 1.0. This affects an unknown part of the file /patient/getschedule.php. The manipulation of the argument q leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-03T22:15:21.533
Please provide detailed information about CVE-2025-3183
CVE:CVE-2025-3183 Description:A vulnerability has been found in projectworlds Online Doctor Appointment Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /patient/patientupdateprofile.php. The manipulation of the argument patientFirstName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. published:2025-04-03T22:15:21.723
Please provide detailed information about CVE-2025-3184
CVE:CVE-2025-3184 Description:A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0 and classified as critical. This issue affects some unknown processing of the file /patient/profile.php?patientId=1. The manipulation of the argument patientFirstName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. published:2025-04-03T23:15:38.170
Please provide detailed information about CVE-2025-3185
CVE:CVE-2025-3185 Description:A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient/patientupdateprofile.php. The manipulation of the argument patientFirstName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. published:2025-04-03T23:15:38.350
Please provide detailed information about CVE-2025-3186
CVE:CVE-2025-3186 Description:A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /patient/invoice.php. The manipulation of the argument appid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T00:15:15.347
Please provide detailed information about CVE-2025-25000
CVE:CVE-2025-25000 Description:Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. published:2025-04-04T01:15:38.070
Please provide detailed information about CVE-2025-25001
CVE:CVE-2025-25001 Description:Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. published:2025-04-04T01:15:39.153
Please provide detailed information about CVE-2025-29796
CVE:CVE-2025-29796 Description:User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network. published:2025-04-04T01:15:39.310
Please provide detailed information about CVE-2025-29815
CVE:CVE-2025-29815 Description:Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network. published:2025-04-04T01:15:39.487
Please provide detailed information about CVE-2025-3187
CVE:CVE-2025-3187 Description:A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument logindetail leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T01:15:40.197
Please provide detailed information about CVE-2025-3188
CVE:CVE-2025-3188 Description:A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T01:15:40.407
Please provide detailed information about CVE-2025-24310
CVE:CVE-2025-24310 Description:Improper restriction of rendered UI layers or frames issue exists in HMI ViewJet C-more series, which may allow a remote unauthenticated attacker to trick the product user to perform operations on the product's web pages. published:2025-04-04T02:15:17.463
Please provide detailed information about CVE-2025-24317
CVE:CVE-2025-24317 Description:Allocation of resources without limits or throttling issue exists in HMI ViewJet C-more series and HMI GC-A2 series, which may allow a remote unauthenticated attacker to cause a denial-of-service (DoS) condition. published:2025-04-04T02:15:17.757
Please provide detailed information about CVE-2025-25061
CVE:CVE-2025-25061 Description:Unintended proxy or intermediary ('Confused Deputy') issue exists in HMI ViewJet C-more series and HMI GC-A2 series, which may allow a remote unauthenticated attacker to use the product as an intermediary for FTP bounce attack. published:2025-04-04T02:15:17.910
Please provide detailed information about CVE-2025-26401
CVE:CVE-2025-26401 Description:Weak encoding for password vulnerability exists in HMI ViewJet C-more series. If this vulnerability is exploited, authentication information may be obtained by a local authenticated attacker. published:2025-04-04T02:15:18.047
Please provide detailed information about CVE-2025-3195
CVE:CVE-2025-3195 Description:A vulnerability, which was classified as critical, has been found in itsourcecode Online Blood Bank Management System 1.0. This issue affects some unknown processing of the file /bbms.php. The manipulation of the argument Search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T02:15:18.423
Please provide detailed information about CVE-2025-3196
CVE:CVE-2025-3196 Description:A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. published:2025-04-04T02:15:18.627
Please provide detailed information about CVE-2025-3198
CVE:CVE-2025-3198 Description:A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue. published:2025-04-04T02:15:18.803
Please provide detailed information about CVE-2025-3199
CVE:CVE-2025-3199 Description:A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component. published:2025-04-04T02:15:19.013
Please provide detailed information about CVE-2025-3202
CVE:CVE-2025-3202 Description:A vulnerability classified as critical has been found in ageerle ruoyi-ai up to 2.0.0. Affected is an unknown function of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysNoticeController.java. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 6382e177bf90cc56ff70521842409e35c50df32d. It is recommended to upgrade the affected component. published:2025-04-04T03:15:13.997
Please provide detailed information about CVE-2025-3203
CVE:CVE-2025-3203 Description:A vulnerability classified as problematic was found in Tenda W18E 16.01.0.11. Affected by this vulnerability is the function formSetAccountList of the file /goform/setModules. The manipulation of the argument Password leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T03:15:14.207
Please provide detailed information about CVE-2025-3204
CVE:CVE-2025-3204 Description:A vulnerability, which was classified as critical, has been found in CodeAstro Car Rental System 1.0. Affected by this issue is some unknown functionality of the file /returncar.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T03:15:14.413
Please provide detailed information about CVE-2025-3205
CVE:CVE-2025-3205 Description:A vulnerability, which was classified as critical, was found in CodeAstro Student Grading System 1.0. This affects an unknown part of the file studentsubject.php. The manipulation of the argument studentId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T03:15:14.613
Please provide detailed information about CVE-2025-3206
CVE:CVE-2025-3206 Description:A vulnerability has been found in code-projects Hospital Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/doctor-specilization.php. The manipulation of the argument doctorspecilization leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T04:15:39.357
Please provide detailed information about CVE-2025-3207
CVE:CVE-2025-3207 Description:A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /birthing_form.php. The manipulation of the argument birth_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T04:15:39.603
Please provide detailed information about CVE-2025-2075
CVE:CVE-2025-2075 Description:The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. This is due to add_role() and user_role() functions missing proper capability checks performed through the validate_rest_call() function. This makes it possible for unauthenticated attackers to set the role of arbitrary users to administrator granting full access to the site, though privilege escalation requires an active account on the site so this is considered an authenticated privilege escalation. published:2025-04-04T05:15:45.400
Please provide detailed information about CVE-2025-3191
CVE:CVE-2025-3191 Description:All versions of the package react-draft-wysiwyg are vulnerable to Cross-site Scripting (XSS) via the Embedded button which will then result in saving the payload in the <iframe> tag. published:2025-04-04T05:15:45.577
Please provide detailed information about CVE-2025-3192
CVE:CVE-2025-3192 Description:Versions of the package spatie/browsershot from 0.0.0 are vulnerable to Server-side Request Forgery (SSRF) in the setUrl() function due to a missing restriction on user input, enabling attackers to access localhost and list all of its directories. published:2025-04-04T05:15:45.743
Please provide detailed information about CVE-2025-3194
CVE:CVE-2025-3194 Description:Versions of the package bigint-buffer from 0.0.0 are vulnerable to Buffer Overflow in the toBigIntLE() function. Attackers can exploit this to crash the application. published:2025-04-04T05:15:45.927
Please provide detailed information about CVE-2025-3197
CVE:CVE-2025-3197 Description:Versions of the package expand-object from 0.0.0 are vulnerable to Prototype Pollution in the expand() function in index.js. This function expands the given string into an object and allows a nested property to be set without checking the provided keys for sensitive properties like __proto__. published:2025-04-04T05:15:46.103
Please provide detailed information about CVE-2025-3208
CVE:CVE-2025-3208 Description:A vulnerability was found in code-projects Patient Record Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /xray_print.php. The manipulation of the argument itr_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T05:15:46.367
Please provide detailed information about CVE-2025-3209
CVE:CVE-2025-3209 Description:A vulnerability was found in code-projects Patient Record Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /add_patient.php. The manipulation of the argument itr_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T05:15:46.600
Please provide detailed information about CVE-2025-3210
CVE:CVE-2025-3210 Description:A vulnerability was found in code-projects Patient Record Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /birthing_pending.php. The manipulation of the argument birth_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T05:15:46.817
Please provide detailed information about CVE-2025-2159
CVE:CVE-2025-2159 Description:Stored XSS in Desktop UI in M-Files Server Admin tool before version 25.3.14681.7 on Windows allows authenticated local user to run scripts via UI published:2025-04-04T06:15:40.347
Please provide detailed information about CVE-2025-2270
CVE:CVE-2025-2270 Description:The Countdown, Coming Soon, Maintenance – Countdown & Clock plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.9.1 via the createCdObj function. This makes it possible for unauthenticated attackers to include and execute files with the specific filenames on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in some cases. published:2025-04-04T06:15:40.540
Please provide detailed information about CVE-2025-2279
CVE:CVE-2025-2279 Description:The Maps WordPress plugin through 1.0.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. published:2025-04-04T06:15:40.757
Please provide detailed information about CVE-2025-2317
CVE:CVE-2025-2317 Description:The Product Filter by WBW plugin for WordPress is vulnerable to time-based SQL Injection via the filtersDataBackend parameter in all versions up to, and including, 2.7.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. published:2025-04-04T06:15:40.890
Please provide detailed information about CVE-2025-2836
CVE:CVE-2025-2836 Description:The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘payment_method’ parameter in all versions up to, and including, 6.0.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. published:2025-04-04T06:15:41.070
Please provide detailed information about CVE-2025-3211
CVE:CVE-2025-3211 Description:A vulnerability classified as critical has been found in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /birthing_print.php. The manipulation of the argument itr_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T06:15:41.247
Please provide detailed information about CVE-2025-3213
CVE:CVE-2025-3213 Description:A vulnerability classified as critical was found in PHPGurukul e-Diary Management System 1.0. This vulnerability affects unknown code of the file /view-note.php?noteid=11. The manipulation of the argument remark leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T06:15:41.480
Please provide detailed information about CVE-2025-3214
CVE:CVE-2025-3214 Description:A vulnerability has been found in JFinal CMS up to 5.2.4 and classified as problematic. Affected by this vulnerability is the function engine.getTemplate of the file /readTemplate. The manipulation of the argument template leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains that this is not a bug but a feature. published:2025-04-04T06:15:41.740
Please provide detailed information about CVE-2025-2780
CVE:CVE-2025-2780 Description:The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. published:2025-04-04T07:15:40.807
Please provide detailed information about CVE-2025-2797
CVE:CVE-2025-2797 Description:The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_handle_user_approval_actions' function. This makes it possible for unauthenticated attackers to approve registration for any user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. published:2025-04-04T07:15:42.380
Please provide detailed information about CVE-2025-32111
CVE:CVE-2025-32111 Description:The Docker image from acme.sh before 40b6db6 is based on a .github/workflows/dockerhub.yml file that lacks "persist-credentials: false" for actions/checkout. published:2025-04-04T07:15:42.580
Please provide detailed information about CVE-2025-3086
CVE:CVE-2025-3086 Description:Improper isolation of users in M-Files Server version before 25.3.14549 allows anonymous user to affect other anonymous users views and possibly cause a denial of service published:2025-04-04T07:15:42.797
Please provide detailed information about CVE-2025-3087
CVE:CVE-2025-3087 Description:Stored XSS in M-Files Web versions from 25.1.14445.5 to 25.2.14524.4 allows an authenticated user to run scripts published:2025-04-04T07:15:42.993
Please provide detailed information about CVE-2025-3215
CVE:CVE-2025-3215 Description:A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add-subadmin.php. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. published:2025-04-04T07:15:43.143
Please provide detailed information about CVE-2025-3216
CVE:CVE-2025-3216 Description:A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been classified as critical. This affects an unknown part of the file /password-recovery.php. The manipulation of the argument username/contactno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T07:15:43.400
Please provide detailed information about CVE-2025-3217
CVE:CVE-2025-3217 Description:A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T07:15:43.707
Please provide detailed information about CVE-2025-3105
CVE:CVE-2025-3105 Description:The Vehica Core plugin for WordPress, used by the Vehica - Car Dealer & Listing WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 1.0.97. This is due to the plugin not properly validating user meta fields prior to updating them in the database. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change escalate their privileges to Administrator. published:2025-04-04T08:15:14.190
Please provide detailed information about CVE-2025-3219
CVE:CVE-2025-3219 Description:A vulnerability was found in CodeCanyon Perfex CRM 3.2.1. It has been classified as problematic. Affected is an unknown function of the file /perfex/clients/project/2 of the component Project Discussions Module. The manipulation of the argument description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T08:15:14.543
Please provide detailed information about CVE-2025-3220
CVE:CVE-2025-3220 Description:A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T08:15:14.767
Please provide detailed information about CVE-2025-3229
CVE:CVE-2025-3229 Description:A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /edit-subadmin.php. The manipulation of the argument fullname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. published:2025-04-04T09:15:17.357
Please provide detailed information about CVE-2025-3231
CVE:CVE-2025-3231 Description:A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. This issue affects some unknown processing of the file /aboutus.php. The manipulation of the argument pagetitle leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T09:15:17.677
Please provide detailed information about CVE-2025-1865
CVE:CVE-2025-1865 Description:The kernel driver, accessible to low-privileged users, exposes a function that fails to properly validate the privileges of the calling process. This allows creating files at arbitrary locations with full user control, ultimately allowing for privilege escalation to SYSTEM. published:2025-04-04T10:15:15.277
Please provide detailed information about CVE-2025-2243
CVE:CVE-2025-2243 Description:A server-side request forgery (SSRF) vulnerability in Bitdefender GravityZone Console allows an attacker to bypass input validation logic using leading characters in DNS requests. Paired with other potential vulnerabilities, this bypass could be used for execution of third party code. This issue affects GravityZone Console: before 6.41.2.1. published:2025-04-04T10:15:16.313
Please provide detailed information about CVE-2025-2244
CVE:CVE-2025-2244 Description:A vulnerability in the sendMailFromRemoteSource method in Emails.php  as used in Bitdefender GravityZone Console unsafely uses php unserialize() on user-supplied input without validation. By crafting a malicious serialized payload, an attacker can trigger PHP object injection, perform a file write, and gain arbitrary command execution on the host system. published:2025-04-04T10:15:16.580
Please provide detailed information about CVE-2025-2245
CVE:CVE-2025-2245 Description:A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to restrict outbound requests, but fails to properly sanitize hostnames containing null-byte (%00) sequences. By crafting a request to a domain such as evil.com%00.bitdefender.com, an attacker can bypass the allowlist check, causing the proxy to forward requests to arbitrary external or internal systems. published:2025-04-04T10:15:16.740
Please provide detailed information about CVE-2025-3235
CVE:CVE-2025-3235 Description:A vulnerability was found in PHPGurukul Old Age Home Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/profile.php. The manipulation of the argument adminname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T10:15:16.900
Please provide detailed information about CVE-2025-3236
CVE:CVE-2025-3236 Description:A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical. This vulnerability affects unknown code of the file /goform/VirSerDMZ of the component Web Management Interface. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T10:15:17.177
Please provide detailed information about CVE-2025-3237
CVE:CVE-2025-3237 Description:A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects some unknown processing of the file /goform/wrlwpsset. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T10:15:17.383
Please provide detailed information about CVE-2025-3238
CVE:CVE-2025-3238 Description:A vulnerability classified as critical has been found in PHPGurukul Online Fire Reporting System 1.2. Affected is an unknown function of the file /search-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. published:2025-04-04T10:15:17.577