instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
|---|---|---|
Please provide detailed information about CVE-2025-32197
|
CVE:CVE-2025-32197
Description:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Addons For Elementor allows Stored XSS. This issue affects Piotnet Addons For Elementor: from n/a through 2.4.34.
published:2025-04-04T16:15:29.953
|
|
Please provide detailed information about CVE-2025-32200
|
CVE:CVE-2025-32200
Description:Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Nikita Advanced WordPress Backgrounds allows Code Injection. This issue affects Advanced WordPress Backgrounds: from n/a through 1.12.4.
published:2025-04-04T16:15:30.107
|
|
Please provide detailed information about CVE-2025-32201
|
CVE:CVE-2025-32201
Description:Missing Authorization vulnerability in Xpro Xpro Theme Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Xpro Theme Builder: from n/a through 1.2.8.3.
published:2025-04-04T16:15:30.253
|
|
Please provide detailed information about CVE-2025-32203
|
CVE:CVE-2025-32203
Description:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in manu225 Falling things allows SQL Injection. This issue affects Falling things: from n/a through 1.08.
published:2025-04-04T16:15:30.407
|
|
Please provide detailed information about CVE-2025-32204
|
CVE:CVE-2025-32204
Description:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in rocketelements Split Test For Elementor allows SQL Injection. This issue affects Split Test For Elementor: from n/a through 1.8.2.
published:2025-04-04T16:15:30.560
|
|
Please provide detailed information about CVE-2025-32207
|
CVE:CVE-2025-32207
Description:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anzar Ahmed Ni WooCommerce Cost Of Goods allows Stored XSS. This issue affects Ni WooCommerce Cost Of Goods: from n/a through 3.2.8.
published:2025-04-04T16:15:30.713
|
|
Please provide detailed information about CVE-2025-32217
|
CVE:CVE-2025-32217
Description:Missing Authorization vulnerability in WP Messiah Ai Image Alt Text Generator for WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8.
published:2025-04-04T16:15:30.873
|
|
Please provide detailed information about CVE-2025-32218
|
CVE:CVE-2025-32218
Description:Missing Authorization vulnerability in RealMag777 TableOn – WordPress Posts Table Filterable allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects TableOn – WordPress Posts Table Filterable: from n/a through 1.0.4.
published:2025-04-04T16:15:31.043
|
|
Please provide detailed information about CVE-2025-32219
|
CVE:CVE-2025-32219
Description:Missing Authorization vulnerability in Syntactics, Inc. eaSYNC allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects eaSYNC: from n/a through 1.3.19.
published:2025-04-04T16:15:31.200
|
|
Please provide detailed information about CVE-2025-32220
|
CVE:CVE-2025-32220
Description:Missing Authorization vulnerability in Dimitri Grassi Salon booking system allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Salon booking system: from n/a through 10.10.7.
published:2025-04-04T16:15:31.357
|
|
Please provide detailed information about CVE-2025-32224
|
CVE:CVE-2025-32224
Description:Missing Authorization vulnerability in shivammani Privyr CRM allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Privyr CRM: from n/a through 1.0.1.
published:2025-04-04T16:15:31.530
|
|
Please provide detailed information about CVE-2025-32225
|
CVE:CVE-2025-32225
Description:Missing Authorization vulnerability in WP Event Manager WP Event Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Event Manager: from n/a through 3.1.47.
published:2025-04-04T16:15:31.703
|
|
Please provide detailed information about CVE-2025-32226
|
CVE:CVE-2025-32226
Description:Missing Authorization vulnerability in Anzar Ahmed Display product variations dropdown on shop page allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Display product variations dropdown on shop page: from n/a through 1.1.3.
published:2025-04-04T16:15:31.863
|
|
Please provide detailed information about CVE-2025-32229
|
CVE:CVE-2025-32229
Description:Missing Authorization vulnerability in Bowo Variable Inspector allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Variable Inspector: from n/a through 2.6.3.
published:2025-04-04T16:15:32.040
|
|
Please provide detailed information about CVE-2025-32231
|
CVE:CVE-2025-32231
Description:Missing Authorization vulnerability in Bookingor Bookingor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Bookingor: from n/a through 1.0.6.
published:2025-04-04T16:15:32.223
|
|
Please provide detailed information about CVE-2025-32232
|
CVE:CVE-2025-32232
Description:Missing Authorization vulnerability in ERA404 StaffList allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects StaffList: from n/a through 3.2.6.
published:2025-04-04T16:15:32.397
|
|
Please provide detailed information about CVE-2025-32233
|
CVE:CVE-2025-32233
Description:Missing Authorization vulnerability in WP Chill Revive.so – Bulk Rewrite and Republish Blog Posts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Revive.so – Bulk Rewrite and Republish Blog Posts: from n/a through 2.0.3.
published:2025-04-04T16:15:32.617
|
|
Please provide detailed information about CVE-2025-32234
|
CVE:CVE-2025-32234
Description:Missing Authorization vulnerability in aleswebs AdMail – Multilingual Back in-Stock Notifier for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AdMail – Multilingual Back in-Stock Notifier for WooCommerce: from n/a through 1.7.0.
published:2025-04-04T16:15:32.760
|
|
Please provide detailed information about CVE-2025-32235
|
CVE:CVE-2025-32235
Description:Missing Authorization vulnerability in sonaar MP3 Audio Player for Music, Radio & Podcast by Sonaar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 5.9.4.
published:2025-04-04T16:15:32.917
|
|
Please provide detailed information about CVE-2025-32237
|
CVE:CVE-2025-32237
Description:Missing Authorization vulnerability in Stylemix MasterStudy LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MasterStudy LMS: from n/a through 3.5.23.
published:2025-04-04T16:15:33.077
|
|
Please provide detailed information about CVE-2025-32238
|
CVE:CVE-2025-32238
Description:Generation of Error Message Containing Sensitive Information vulnerability in vcita Online Booking & Scheduling Calendar for WordPress by vcita allows Retrieve Embedded Sensitive Data. This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5.2.
published:2025-04-04T16:15:33.233
|
|
Please provide detailed information about CVE-2025-32239
|
CVE:CVE-2025-32239
Description:Missing Authorization vulnerability in Joao Romao Social Share Buttons & Analytics Plugin – GetSocial.io allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Social Share Buttons & Analytics Plugin – GetSocial.io: from n/a through 4.5.
published:2025-04-04T16:15:33.383
|
|
Please provide detailed information about CVE-2025-32241
|
CVE:CVE-2025-32241
Description:Cross-Site Request Forgery (CSRF) vulnerability in CleverReach® Official CleverReach Plugin for WooCommerce allows Cross Site Request Forgery. This issue affects Official CleverReach Plugin for WooCommerce: from n/a through 3.4.3.
published:2025-04-04T16:15:33.530
|
|
Please provide detailed information about CVE-2025-32246
|
CVE:CVE-2025-32246
Description:Missing Authorization vulnerability in Tim Nguyen 1-Click Backup & Restore Database allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 1-Click Backup & Restore Database: from n/a through 1.0.3.
published:2025-04-04T16:15:33.673
|
|
Please provide detailed information about CVE-2025-32247
|
CVE:CVE-2025-32247
Description:Cross-Site Request Forgery (CSRF) vulnerability in ABCdatos AI Content Creator allows Cross Site Request Forgery. This issue affects AI Content Creator: from n/a through 1.2.6.
published:2025-04-04T16:15:33.820
|
|
Please provide detailed information about CVE-2025-32248
|
CVE:CVE-2025-32248
Description:Cross-Site Request Forgery (CSRF) vulnerability in SwiftXR SwiftXR (3D/AR/VR) Viewer allows Cross Site Request Forgery. This issue affects SwiftXR (3D/AR/VR) Viewer: from n/a through 1.0.7.
published:2025-04-04T16:15:33.973
|
|
Please provide detailed information about CVE-2025-32249
|
CVE:CVE-2025-32249
Description:Cross-Site Request Forgery (CSRF) vulnerability in designinvento DirectoryPress allows Cross Site Request Forgery. This issue affects DirectoryPress: from n/a through 3.6.19.
published:2025-04-04T16:15:34.123
|
|
Please provide detailed information about CVE-2025-32250
|
CVE:CVE-2025-32250
Description:Cross-Site Request Forgery (CSRF) vulnerability in rollbar Rollbar allows Cross Site Request Forgery. This issue affects Rollbar: from n/a through 2.7.1.
published:2025-04-04T16:15:34.273
|
|
Please provide detailed information about CVE-2025-32251
|
CVE:CVE-2025-32251
Description:Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in J. Tyler Wiest Jetpack Feedback Exporter allows Retrieve Embedded Sensitive Data. This issue affects Jetpack Feedback Exporter: from n/a through 1.23.
published:2025-04-04T16:15:34.423
|
|
Please provide detailed information about CVE-2025-32252
|
CVE:CVE-2025-32252
Description:Missing Authorization vulnerability in blackandwhitedigital WP Genealogy – Your Family History Website allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Genealogy – Your Family History Website: from n/a through 0.1.9.
published:2025-04-04T16:15:34.573
|
|
Please provide detailed information about CVE-2025-32253
|
CVE:CVE-2025-32253
Description:Missing Authorization vulnerability in ComMotion Course Booking System allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Course Booking System: from n/a through 6.0.5.
published:2025-04-04T16:15:34.720
|
|
Please provide detailed information about CVE-2025-32254
|
CVE:CVE-2025-32254
Description:Missing Authorization vulnerability in Iqonic Design WPBookit allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WPBookit: from n/a through 1.0.1.
published:2025-04-04T16:15:34.887
|
|
Please provide detailed information about CVE-2025-32255
|
CVE:CVE-2025-32255
Description:Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList allows Retrieve Embedded Sensitive Data. This issue affects StaffList: from n/a through 3.2.6.
published:2025-04-04T16:15:35.047
|
|
Please provide detailed information about CVE-2025-32256
|
CVE:CVE-2025-32256
Description:Missing Authorization vulnerability in devsoftbaltic SurveyJS allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects SurveyJS: from n/a through 1.12.20.
published:2025-04-04T16:15:35.190
|
|
Please provide detailed information about CVE-2025-32257
|
CVE:CVE-2025-32257
Description:Exposure of Sensitive System Information Due to Uncleared Debug Information vulnerability in 1clickmigration 1 Click WordPress Migration allows Retrieve Embedded Sensitive Data. This issue affects 1 Click WordPress Migration: from n/a through 2.2.
published:2025-04-04T16:15:35.343
|
|
Please provide detailed information about CVE-2025-32258
|
CVE:CVE-2025-32258
Description:Missing Authorization vulnerability in InfoGiants Simple Website Logo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple Website Logo: from n/a through 1.1.
published:2025-04-04T16:15:36.573
|
|
Please provide detailed information about CVE-2025-32261
|
CVE:CVE-2025-32261
Description:Cross-Site Request Forgery (CSRF) vulnerability in Kuppuraj Advanced All in One Admin Search by WP Spotlight allows Cross Site Request Forgery. This issue affects Advanced All in One Admin Search by WP Spotlight: from n/a through 1.1.1.
published:2025-04-04T16:15:36.720
|
|
Please provide detailed information about CVE-2025-32262
|
CVE:CVE-2025-32262
Description:Cross-Site Request Forgery (CSRF) vulnerability in Robert D Payne RDP Wiki Embed allows Cross Site Request Forgery. This issue affects RDP Wiki Embed: from n/a through 1.2.20.
published:2025-04-04T16:15:36.887
|
|
Please provide detailed information about CVE-2025-32263
|
CVE:CVE-2025-32263
Description:Cross-Site Request Forgery (CSRF) vulnerability in BeRocket Sequential Order Numbers for WooCommerce allows Cross Site Request Forgery. This issue affects Sequential Order Numbers for WooCommerce: from n/a through 3.6.2.
published:2025-04-04T16:15:37.060
|
|
Please provide detailed information about CVE-2025-32264
|
CVE:CVE-2025-32264
Description:Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam UltraAddons Elementor Lite allows Cross Site Request Forgery. This issue affects UltraAddons Elementor Lite: from n/a through 2.0.0.
published:2025-04-04T16:15:37.230
|
|
Please provide detailed information about CVE-2025-32265
|
CVE:CVE-2025-32265
Description:Cross-Site Request Forgery (CSRF) vulnerability in Hossni Mubarak JobWP allows Cross Site Request Forgery. This issue affects JobWP: from n/a through 2.3.9.
published:2025-04-04T16:15:37.410
|
|
Please provide detailed information about CVE-2025-32266
|
CVE:CVE-2025-32266
Description:Cross-Site Request Forgery (CSRF) vulnerability in wp-buy 404 Image Redirection (Replace Broken Images) allows Cross Site Request Forgery. This issue affects 404 Image Redirection (Replace Broken Images): from n/a through 1.4.
published:2025-04-04T16:15:37.560
|
|
Please provide detailed information about CVE-2025-32267
|
CVE:CVE-2025-32267
Description:Cross-Site Request Forgery (CSRF) vulnerability in wpzinc Post to Social Media – WordPress to Hootsuite allows Cross Site Request Forgery. This issue affects Post to Social Media – WordPress to Hootsuite: from n/a through 1.5.8.
published:2025-04-04T16:15:37.713
|
|
Please provide detailed information about CVE-2025-32268
|
CVE:CVE-2025-32268
Description:Cross-Site Request Forgery (CSRF) vulnerability in www.15.to QR Code Tag for WC allows Cross Site Request Forgery. This issue affects QR Code Tag for WC: from n/a through 1.9.36.
published:2025-04-04T16:15:37.870
|
|
Please provide detailed information about CVE-2025-32269
|
CVE:CVE-2025-32269
Description:Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms allows Cross Site Request Forgery. This issue affects WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through 1.1.3.
published:2025-04-04T16:15:38.060
|
|
Please provide detailed information about CVE-2025-32270
|
CVE:CVE-2025-32270
Description:Cross-Site Request Forgery (CSRF) vulnerability in Broadstreet Broadstreet allows Cross Site Request Forgery. This issue affects Broadstreet: from n/a through 1.51.1.
published:2025-04-04T16:15:38.213
|
|
Please provide detailed information about CVE-2025-32271
|
CVE:CVE-2025-32271
Description:Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5.
published:2025-04-04T16:15:38.370
|
|
Please provide detailed information about CVE-2025-32272
|
CVE:CVE-2025-32272
Description:Cross-Site Request Forgery (CSRF) vulnerability in PickPlugins Wishlist allows Cross Site Request Forgery. This issue affects Wishlist: from n/a through 1.0.44.
published:2025-04-04T16:15:38.530
|
|
Please provide detailed information about CVE-2025-32273
|
CVE:CVE-2025-32273
Description:Cross-Site Request Forgery (CSRF) vulnerability in freetobook Freetobook Responsive Widget allows Cross Site Request Forgery. This issue affects Freetobook Responsive Widget: from n/a through 1.1.
published:2025-04-04T16:15:38.677
|
|
Please provide detailed information about CVE-2025-32274
|
CVE:CVE-2025-32274
Description:Cross-Site Request Forgery (CSRF) vulnerability in axew3 WP w3all phpBB allows Cross Site Request Forgery. This issue affects WP w3all phpBB: from n/a through 2.9.2.
published:2025-04-04T16:15:38.820
|
|
Please provide detailed information about CVE-2025-32276
|
CVE:CVE-2025-32276
Description:Cross-Site Request Forgery (CSRF) vulnerability in Quý Lê 91 Administrator Z allows Cross Site Request Forgery. This issue affects Administrator Z: from n/a through 2025.03.04.
published:2025-04-04T16:15:39.007
|
|
Please provide detailed information about CVE-2025-32277
|
CVE:CVE-2025-32277
Description:Missing Authorization vulnerability in Ateeq Rafeeq RepairBuddy allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects RepairBuddy: from n/a through 3.8211.
published:2025-04-04T16:15:39.170
|
|
Please provide detailed information about CVE-2025-32278
|
CVE:CVE-2025-32278
Description:Cross-Site Request Forgery (CSRF) vulnerability in wprio Table Block by RioVizual allows Cross Site Request Forgery. This issue affects Table Block by RioVizual: from n/a through 2.1.7.
published:2025-04-04T16:15:39.307
|
|
Please provide detailed information about CVE-2025-32280
|
CVE:CVE-2025-32280
Description:Cross-Site Request Forgery (CSRF) vulnerability in weDevs WP Project Manager allows Cross Site Request Forgery. This issue affects WP Project Manager: from n/a through 2.6.22.
published:2025-04-04T16:15:39.453
|
|
Please provide detailed information about CVE-2025-3252
|
CVE:CVE-2025-3252
Description:A vulnerability has been found in xujiangfei admintwo 1.0 and classified as problematic. This vulnerability affects unknown code of the file /resource/add. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T16:15:40.180
|
|
Please provide detailed information about CVE-2025-3253
|
CVE:CVE-2025-3253
Description:A vulnerability was found in xujiangfei admintwo 1.0 and classified as problematic. This issue affects some unknown processing of the file /ztree/insertTree. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T16:15:40.390
|
|
Please provide detailed information about CVE-2025-3254
|
CVE:CVE-2025-3254
Description:A vulnerability was found in xujiangfei admintwo 1.0. It has been classified as critical. Affected is an unknown function of the file /resource/add. The manipulation of the argument description leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T16:15:40.607
|
|
Please provide detailed information about CVE-2025-3255
|
CVE:CVE-2025-3255
Description:A vulnerability was found in xujiangfei admintwo 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/home. The manipulation of the argument ID leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T16:15:40.807
|
|
Please provide detailed information about CVE-2025-3256
|
CVE:CVE-2025-3256
Description:A vulnerability was found in xujiangfei admintwo 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/updateSet. The manipulation of the argument email leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T17:15:47.500
|
|
Please provide detailed information about CVE-2025-3257
|
CVE:CVE-2025-3257
Description:A vulnerability classified as problematic has been found in xujiangfei admintwo 1.0. This affects an unknown part of the file /user/updateSet. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T17:15:47.740
|
|
Please provide detailed information about CVE-2025-3258
|
CVE:CVE-2025-3258
Description:A vulnerability classified as critical was found in PHPGurukul Old Age Home Management System 1.0. This vulnerability affects unknown code of the file /search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T17:15:47.977
|
|
Please provide detailed information about CVE-2025-29476
|
CVE:CVE-2025-29476
Description:Buffer Overflow vulnerability in compress_chunk_fuzzer with oss-fuzz on commit 16450518afddcb3139de627157208e49bfef6987 in c-blosc2 v.2.17.0 and before.
published:2025-04-04T18:15:48.263
|
|
Please provide detailed information about CVE-2025-29477
|
CVE:CVE-2025-29477
Description:An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the function consume_event.
published:2025-04-04T18:15:48.387
|
|
Please provide detailed information about CVE-2025-3259
|
CVE:CVE-2025-3259
Description:A vulnerability, which was classified as critical, has been found in Tenda RX3 16.03.13.11. This issue affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T18:15:49.137
|
|
Please provide detailed information about CVE-2025-3265
|
CVE:CVE-2025-3265
Description:A vulnerability classified as critical was found in PHPGurukul e-Diary Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add-category.php. The manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T20:15:18.347
|
|
Please provide detailed information about CVE-2025-3266
|
CVE:CVE-2025-3266
Description:A vulnerability, which was classified as critical, has been found in qinguoyi TinyWebServer up to 1.0. Affected by this issue is some unknown functionality of the file /http/http_conn.cpp. The manipulation of the argument name/password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T20:15:18.543
|
|
Please provide detailed information about CVE-2025-3267
|
CVE:CVE-2025-3267
Description:A vulnerability, which was classified as critical, was found in qinguoyi TinyWebServer up to 1.0. This affects an unknown part of the file /http/http_conn.cpp. The manipulation of the argument name/password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T20:15:18.740
|
|
Please provide detailed information about CVE-2025-3268
|
CVE:CVE-2025-3268
Description:A vulnerability has been found in qinguoyi TinyWebServer up to 1.0 and classified as critical. This vulnerability affects unknown code of the file http/http_conn.cpp. The manipulation of the argument m_url_real leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-04T21:15:51.557
|
|
Please provide detailed information about CVE-2025-2889
|
CVE:CVE-2025-2889
Description:The Link Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Additional Parameters in all versions up to, and including, 7.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
published:2025-04-05T00:15:15.287
|
|
Please provide detailed information about CVE-2025-1500
|
CVE:CVE-2025-1500
Description:IBM Maximo Application Suite 9.0 could allow an authenticated user to upload a file with dangerous types that could be executed by another user if opened.
published:2025-04-05T01:15:42.000
|
|
Please provide detailed information about CVE-2025-0810
|
CVE:CVE-2025-0810
Description:The Read More & Accordion plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.5. This is due to missing or incorrect nonce validation on the addNewButtons() function. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
published:2025-04-05T02:15:15.140
|
|
Please provide detailed information about CVE-2025-2544
|
CVE:CVE-2025-2544
Description:The AI Content Pipelines plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
published:2025-04-05T02:15:15.307
|
|
Please provide detailed information about CVE-2025-2933
|
CVE:CVE-2025-2933
Description:The Email Notifications for Updates plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the awun_import_settings() function in all versions up to, and including, 1.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
published:2025-04-05T02:15:15.477
|
|
Please provide detailed information about CVE-2025-32352
|
CVE:CVE-2025-32352
Description:A type confusion vulnerability in lib/NSSAuthenticator.php in ZendTo before v5.04-7 allows remote attackers to bypass authentication for users with passwords stored as MD5 hashes that can be interpreted as numbers. A solution requires moving from MD5 to bcrypt.
published:2025-04-05T05:15:44.693
|
|
Please provide detailed information about CVE-2025-0839
|
CVE:CVE-2025-0839
Description:The ZoomSounds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 6.91 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
published:2025-04-05T06:15:39.050
|
|
Please provide detailed information about CVE-2025-1233
|
CVE:CVE-2025-1233
Description:The Lafka Plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'lafka_options_upload' AJAX function in all versions up to, and including, 7.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the theme option that overrides the site.
published:2025-04-05T06:15:39.223
|
|
Please provide detailed information about CVE-2025-2789
|
CVE:CVE-2025-2789
Description:The MultiVendorX – Empower Your WooCommerce Store with a Dynamic Multivendor Marketplace – Build the Next Amazon, eBay, Etsy plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the delete_table_rate_shipping_row function in all versions up to, and including, 4.2.19. This makes it possible for unauthenticated attackers to delete Table Rates that can impact the shipping cost calculations.
published:2025-04-05T06:15:39.477
|
|
Please provide detailed information about CVE-2025-2941
|
CVE:CVE-2025-2941
Description:The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the wc-upload-file[] parameter in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php).
published:2025-04-05T07:15:40.107
|
|
Please provide detailed information about CVE-2025-3296
|
CVE:CVE-2025-3296
Description:A vulnerability, which was classified as critical, has been found in SourceCodester Online Eyewear Shop 1.0. This issue affects some unknown processing of the file /classes/Users.php?f=delete_customer. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-05T08:15:13.787
|
|
Please provide detailed information about CVE-2025-3297
|
CVE:CVE-2025-3297
Description:A vulnerability, which was classified as problematic, was found in SourceCodester Online Eyewear Shop 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_product. The manipulation of the argument brand leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
published:2025-04-05T09:15:15.237
|
|
Please provide detailed information about CVE-2025-3298
|
CVE:CVE-2025-3298
Description:A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /oews/classes/Master.php?f=save_product of the component Registration Handler. The manipulation of the argument email leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-05T11:15:40.917
|
|
Please provide detailed information about CVE-2025-3299
|
CVE:CVE-2025-3299
Description:A vulnerability was found in PHPGurukul Men Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /appointment.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-05T11:15:41.180
|
|
Please provide detailed information about CVE-2025-30401
|
CVE:CVE-2025-30401
Description:A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.
published:2025-04-05T12:15:14.540
|
|
Please provide detailed information about CVE-2025-32357
|
CVE:CVE-2025-32357
Description:In Zammad 6.4.x before 6.4.2, an authenticated agent with knowledge base permissions was able to use the Zammad API to fetch knowledge base content that they have no permission for.
published:2025-04-05T21:15:39.450
|
|
Please provide detailed information about CVE-2025-32358
|
CVE:CVE-2025-32358
Description:In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
published:2025-04-05T21:15:40.487
|
|
Please provide detailed information about CVE-2025-32359
|
CVE:CVE-2025-32359
Description:In Zammad 6.4.x before 6.4.2, there is client-side enforcement of server-side security. When changing their two factor authentication configuration, users need to re-authenticate with their current password first. However, this change was enforced in Zammad only on the front end level, and not when using the API directly.
published:2025-04-05T21:15:40.657
|
|
Please provide detailed information about CVE-2025-32360
|
CVE:CVE-2025-32360
Description:In Zammad 6.4.x before 6.4.2, there is information exposure. Only agents should be able to see and work on shared article drafts. However, a logged in customer was able to see details about shared drafts for their customer tickets in the browser console, which may contain confidential information, and also to manipulate them via API.
published:2025-04-05T21:15:40.820
|
|
Please provide detailed information about CVE-2025-3303
|
CVE:CVE-2025-3303
Description:A vulnerability, which was classified as critical, has been found in code-projects Patient Record Management System 1.0. Affected by this issue is some unknown functionality of the file /birthing_record.php. The manipulation of the argument itr_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-05T21:15:40.990
|
|
Please provide detailed information about CVE-2025-32364
|
CVE:CVE-2025-32364
Description:A floating-point exception in the PSStack::roll function of Poppler before 25.04.0 can cause an application to crash when handling malformed inputs associated with INT_MIN.
published:2025-04-05T22:15:18.337
|
|
Please provide detailed information about CVE-2025-32365
|
CVE:CVE-2025-32365
Description:Poppler before 25.04.0 allows crafted input files to trigger out-of-bounds reads in the JBIG2Bitmap::combine function in JBIG2Stream.cc because of a misplaced isOk check.
published:2025-04-05T22:15:19.010
|
|
Please provide detailed information about CVE-2025-3304
|
CVE:CVE-2025-3304
Description:A vulnerability, which was classified as critical, was found in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /dental_not.php. The manipulation of the argument itr_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-05T22:15:19.203
|
|
Please provide detailed information about CVE-2025-32366
|
CVE:CVE-2025-32366
Description:In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr->rdlen) and memcpy(response+offset,*end,*rdlen).
published:2025-04-05T23:15:40.910
|
|
Please provide detailed information about CVE-2025-3305
|
CVE:CVE-2025-3305
Description:A vulnerability has been found in 1902756969/code-projects IKUN_Library 1.0 and classified as problematic. This vulnerability affects the function addInterceptors of the file MvcConfig.java of the component Borrow Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-05T23:15:41.780
|
|
Please provide detailed information about CVE-2025-3306
|
CVE:CVE-2025-3306
Description:A vulnerability was found in code-projects Blood Bank Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /don.php. The manipulation of the argument fullname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
published:2025-04-06T01:15:40.663
|
|
Please provide detailed information about CVE-2025-3307
|
CVE:CVE-2025-3307
Description:A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /reset.php. The manipulation of the argument useremail leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-06T03:15:15.603
|
|
Please provide detailed information about CVE-2025-3308
|
CVE:CVE-2025-3308
Description:A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /viewrequest.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-06T04:15:15.887
|
|
Please provide detailed information about CVE-2025-1264
|
CVE:CVE-2025-1264
Description:The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to SQL Injection via the 'orderBy' parameter in all versions up to, and including, 1.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
published:2025-04-06T05:15:15.400
|
|
Please provide detailed information about CVE-2025-32369
|
CVE:CVE-2025-32369
Description:Kentico Xperience before 13.0.181 allows authenticated users to distribute malicious content (for stored XSS) via certain interactions with the media library file upload feature.
published:2025-04-06T06:15:15.470
|
|
Please provide detailed information about CVE-2025-3309
|
CVE:CVE-2025-3309
Description:A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/campsdetails.php. The manipulation of the argument hospital leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-06T06:15:17.530
|
|
Please provide detailed information about CVE-2025-3310
|
CVE:CVE-2025-3310
Description:A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. This affects an unknown part of the file /admin/delete.php. The manipulation of the argument Search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-06T06:15:17.980
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.