instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
|---|---|---|
Please provide detailed information about CVE-2025-31475
|
CVE:CVE-2025-31475
Description:tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js prior to 1.20.1, where the addOrUpdate function, used for applying custom texts, did not properly validate input. This allowed an attacker with direct access to the site's source code or a CMS plugin to manipulate JavaScript object prototypes, leading to potential security risks such as data corruption or unintended code execution. An attacker with high privileges could exploit this vulnerability to modify object prototypes, affecting core JavaScript behavior, cause application crashes or unexpected behavior, or potentially introduce further security vulnerabilities depending on the application's architecture. This vulnerability is fixed in 1.20.1.
published:2025-04-07T15:15:44.220
|
|
Please provide detailed information about CVE-2025-31476
|
CVE:CVE-2025-31476
Description:tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js, allowing a user with high privileges (access to the site's source code or a CMS plugin) to enter a URL containing an insecure scheme such as javascript:alert(). Before the fix, URL validation was insufficient, which could allow arbitrary JavaScript execution if a user clicked on a malicious link. An attacker with high privileges could insert a link exploiting an insecure URL scheme, leading to execution of arbitrary JavaScript code, theft of sensitive data through phishing attacks, or modification of the user interface behavior. This vulnerability is fixed in 1.20.1.
published:2025-04-07T15:15:44.370
|
|
Please provide detailed information about CVE-2025-32014
|
CVE:CVE-2025-32014
Description:estree-util-value-to-estree converts a JavaScript value to an ESTree expression. When generating an ESTree from a value with a property named __proto__, valueToEstree would generate an object that specifies a prototype instead. This vulnerability is fixed in 3.3.3.
published:2025-04-07T15:15:44.593
|
|
Please provide detailed information about CVE-2025-3248
|
CVE:CVE-2025-3248
Description:Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
published:2025-04-07T15:15:44.897
|
|
Please provide detailed information about CVE-2025-3371
|
CVE:CVE-2025-3371
Description:A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component DELETE Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T15:15:46.097
|
|
Please provide detailed information about CVE-2025-3372
|
CVE:CVE-2025-3372
Description:A vulnerability, which was classified as critical, was found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component MKDIR Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T15:15:46.300
|
|
Please provide detailed information about CVE-2025-28400
|
CVE:CVE-2025-28400
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the postID parameter in the edit method
published:2025-04-07T16:15:24.137
|
|
Please provide detailed information about CVE-2025-28401
|
CVE:CVE-2025-28401
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the menuId parameter
published:2025-04-07T16:15:24.270
|
|
Please provide detailed information about CVE-2025-28402
|
CVE:CVE-2025-28402
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobId parameter
published:2025-04-07T16:15:24.383
|
|
Please provide detailed information about CVE-2025-28403
|
CVE:CVE-2025-28403
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method does not properly validate whether the requesting user has administrative privileges before allowing modifications to system configuration settings
published:2025-04-07T16:15:24.493
|
|
Please provide detailed information about CVE-2025-28405
|
CVE:CVE-2025-28405
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the changeStatus method
published:2025-04-07T16:15:24.603
|
|
Please provide detailed information about CVE-2025-28406
|
CVE:CVE-2025-28406
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobLogId parameter
published:2025-04-07T16:15:24.710
|
|
Please provide detailed information about CVE-2025-28407
|
CVE:CVE-2025-28407
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the edit method of the /edit/{dictId} endpoint does not properly validate whether the requesting user has permission to modify the specified dictId
published:2025-04-07T16:15:24.827
|
|
Please provide detailed information about CVE-2025-28408
|
CVE:CVE-2025-28408
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the selectDeptTree method of the /selectDeptTree/{deptId} endpoint does not properly validate the deptId parameter
published:2025-04-07T16:15:24.947
|
|
Please provide detailed information about CVE-2025-28409
|
CVE:CVE-2025-28409
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId
published:2025-04-07T16:15:25.057
|
|
Please provide detailed information about CVE-2025-28410
|
CVE:CVE-2025-28410
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the cancelAuthUserAll method does not properly validate whether the requesting user has administrative privileges
published:2025-04-07T16:15:25.170
|
|
Please provide detailed information about CVE-2025-28411
|
CVE:CVE-2025-28411
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method in /tool/gen/editSave
published:2025-04-07T16:15:25.300
|
|
Please provide detailed information about CVE-2025-28412
|
CVE:CVE-2025-28412
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the /editSave method in SysNoticeController
published:2025-04-07T16:15:25.433
|
|
Please provide detailed information about CVE-2025-28413
|
CVE:CVE-2025-28413
Description:An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the SysDictTypeController component
published:2025-04-07T16:15:25.543
|
|
Please provide detailed information about CVE-2025-3373
|
CVE:CVE-2025-3373
Description:A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this vulnerability is an unknown functionality of the component SITE CHMOD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T16:15:27.340
|
|
Please provide detailed information about CVE-2025-3374
|
CVE:CVE-2025-3374
Description:A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this issue is some unknown functionality of the component CCC Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T16:15:27.530
|
|
Please provide detailed information about CVE-2025-3424
|
CVE:CVE-2025-3424
Description:The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the "Object Marshalling" technique, which allows an attacker to read internal files without any authentication. This is possible by crafting specific .NET Remoting URLs derived from information enumerated in the client-side configuration files. This issue affects IntelliSpace Portal: 12 and prior.
published:2025-04-07T16:15:27.703
|
|
Please provide detailed information about CVE-2025-3425
|
CVE:CVE-2025-3425
Description:The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior.
published:2025-04-07T16:15:27.963
|
|
Please provide detailed information about CVE-2025-3375
|
CVE:CVE-2025-3375
Description:A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. This affects an unknown part of the component CDUP Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T17:15:39.457
|
|
Please provide detailed information about CVE-2025-3376
|
CVE:CVE-2025-3376
Description:A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. This vulnerability affects unknown code of the component CONF Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T17:15:39.680
|
|
Please provide detailed information about CVE-2025-3426
|
CVE:CVE-2025-3426
Description:We observed that Intellispace Portal binaries doesn’t have any protection mechanisms to prevent reverse engineering. Specifically, the app’s code is not obfuscated, and no measures are in place to protect against decompilation, disassembly, or debugging. As a result, attackers can reverse-engineer the application to gain insights into its internal workings, which can potentially lead to the discovery of sensitive information, business logic flaws, and other vulnerabilities. Utilizing this flaw, the attacker was able to identify the Hardcoded credentials from PortalUsersDatabase.dll, which contains .NET remoting definition. Inside the namespace PortalUsersDatabase, the class Users contains the functions CreateAdmin and CreateService that are used to initialize accounts in the Portal service. Both CreateAdmin and CreateService functions contain a hardcoded encrypted password along with its respective salt that are set with the function SetInitialPasswordAndSalt. This issue affects IntelliSpace Portal: 12 and prior; Advanced Visualization Workspace: 15.
published:2025-04-07T17:15:40.073
|
|
Please provide detailed information about CVE-2025-3377
|
CVE:CVE-2025-3377
Description:A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. This issue affects some unknown processing of the component ENC Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T18:15:45.733
|
|
Please provide detailed information about CVE-2025-3378
|
CVE:CVE-2025-3378
Description:A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component EPRT Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T18:15:45.923
|
|
Please provide detailed information about CVE-2025-3379
|
CVE:CVE-2025-3379
Description:A vulnerability classified as critical was found in PCMan FTP Server 2.0.7. Affected by this vulnerability is an unknown functionality of the component EPSV Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T19:15:57.533
|
|
Please provide detailed information about CVE-2025-3380
|
CVE:CVE-2025-3380
Description:A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. Affected by this issue is some unknown functionality of the component FEAT Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T19:15:57.747
|
|
Please provide detailed information about CVE-2025-29087
|
CVE:CVE-2025-29087
Description:Sqlite 3.49.0 is susceptible to integer overflow through the concat function.
published:2025-04-07T20:15:20.253
|
|
Please provide detailed information about CVE-2025-29478
|
CVE:CVE-2025-29478
Description:An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the cfl_list_size in cfl_list.h:165.
published:2025-04-07T20:15:20.373
|
|
Please provide detailed information about CVE-2025-29479
|
CVE:CVE-2025-29479
Description:Buffer Overflow in hiredis 1.2.0 allows a local attacker to cause a denial of service via the sdscatlen function.
published:2025-04-07T20:15:20.490
|
|
Please provide detailed information about CVE-2025-29480
|
CVE:CVE-2025-29480
Description:Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to cause a denial of service via the OGRSpatialReference::Release function.
published:2025-04-07T20:15:20.607
|
|
Please provide detailed information about CVE-2025-29481
|
CVE:CVE-2025-29481
Description:Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker to execute arbitrary code via the bpf_object__init_prog` function of libbpf.
published:2025-04-07T20:15:20.720
|
|
Please provide detailed information about CVE-2025-29482
|
CVE:CVE-2025-29482
Description:Buffer Overflow vulnerability in libheif 1.19.7 allows a local attacker to execute arbitrary code via the SAO (Sample Adaptive Offset) processing of libde265.
published:2025-04-07T20:15:20.847
|
|
Please provide detailed information about CVE-2025-29594
|
CVE:CVE-2025-29594
Description:A vulnerability exists in the errorpage.php file of the CS2-WeaponPaints-Website v2.1.7 where user-controlled input is not adequately validated before being processed. Specifically, the $_GET['errorcode'] parameter can be manipulated to access unauthorized error codes, leading to Cross-Site Scripting (XSS) attacks and information disclosure.
published:2025-04-07T20:15:20.963
|
|
Please provide detailed information about CVE-2025-29769
|
CVE:CVE-2025-29769
Description:libvips is a demand-driven, horizontally threaded image processing library. The heifsave operation could incorrectly determine the presence of an alpha channel in an input when it was not possible to determine the colour interpretation, known internally within libvips as "multiband". There aren't many ways to create a "multiband" input, but it is possible with a well-crafted TIFF image. If a "multiband" TIFF input image had 4 channels and HEIF-based output was requested, this led to libvips creating a 3 channel HEIF image without an alpha channel but then attempting to write 4 channels of data. This caused a heap buffer overflow, which could crash the process. This vulnerability is fixed in 8.16.1.
published:2025-04-07T20:15:21.090
|
|
Please provide detailed information about CVE-2025-3381
|
CVE:CVE-2025-3381
Description:A vulnerability, which was classified as critical, was found in zhangyanbo2007 youkefu 4.2.0. This affects an unknown part of the file WebIMController.java of the component File Upload. The manipulation of the argument ID leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T20:15:21.760
|
|
Please provide detailed information about CVE-2025-3382
|
CVE:CVE-2025-3382
Description:A vulnerability has been found in joey-zhou xiaozhi-esp32-server-java up to a14fe8115842ee42ab5c7a51706b8a85db5200b7 and classified as critical. This vulnerability affects the function update of the file /api/user/update. The manipulation of the argument state leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
published:2025-04-07T20:15:21.943
|
|
Please provide detailed information about CVE-2025-31496
|
CVE:CVE-2025-31496
Description:apollo-compiler is a query-based compiler for the GraphQL query language. Prior to 1.27.0, a vulnerability in Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. Named fragments were being processed once per fragment spread in some cases during query validation, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service in applications. This vulnerability is fixed in 1.27.0.
published:2025-04-07T21:15:42.720
|
|
Please provide detailed information about CVE-2025-32029
|
CVE:CVE-2025-32029
Description:ts-asn1-der is a collection of utility classes to encode ASN.1 data following DER rule. Incorrect number DER encoding can lead to denial on service for absolute values in the range 2**31 -- 2**32 - 1. The arithmetic in the numBitLen didn't take into account that values in this range could result in a negative result upon applying the >> operator, leading to an infinite loop. The issue is patched in version 1.0.4. If upgrading is not an option, the issue can be mitigated by validating inputs to Asn1Integer to ensure that they are not smaller than -2**31 + 1 and no larger than 2**31 - 1.
published:2025-04-07T21:15:42.880
|
|
Please provide detailed information about CVE-2025-32030
|
CVE:CVE-2025-32030
Description:Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1.
published:2025-04-07T21:15:43.037
|
|
Please provide detailed information about CVE-2025-32031
|
CVE:CVE-2025-32031
Description:Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed. The query planner includes an optimization that significantly speeds up planning for applicable GraphQL selections. However, queries with deeply nested and reused named fragments can generate many selections where this optimization does not apply, leading to significantly longer planning times. Because the query planner does not enforce a timeout, a small number of such queries can render gateway inoperable. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1.
published:2025-04-07T21:15:43.220
|
|
Please provide detailed information about CVE-2025-32032
|
CVE:CVE-2025-32032
Description:The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed. The query planner includes an optimization that significantly speeds up planning for applicable GraphQL selections. However, queries with deeply nested and reused named fragments can generate many selections where this optimization does not apply, leading to significantly longer planning times. Because the query planner does not enforce a timeout, a small number of such queries can exhaust router's thread pool, rendering it inoperable. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.
published:2025-04-07T21:15:43.363
|
|
Please provide detailed information about CVE-2025-32033
|
CVE:CVE-2025-32033
Description:The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, the operation limits plugin uses unsigned 32-bit integers to track limit counters (e.g. for a query's height). If a counter exceeded the maximum value for this data type (4,294,967,295), it wrapped around to 0, unintentionally allowing queries to bypass configured thresholds. This could occur for large queries if the payload limit were sufficiently increased, but could also occur for small queries with deeply nested and reused named fragments. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.
published:2025-04-07T21:15:43.527
|
|
Please provide detailed information about CVE-2025-32034
|
CVE:CVE-2025-32034
Description:The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, a vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1.
published:2025-04-07T21:15:43.690
|
|
Please provide detailed information about CVE-2025-3383
|
CVE:CVE-2025-3383
Description:A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search/search_sales.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T21:15:43.850
|
|
Please provide detailed information about CVE-2025-3384
|
CVE:CVE-2025-3384
Description:A vulnerability was found in 1000 Projects Human Resource Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /controller/employee.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T21:15:44.053
|
|
Please provide detailed information about CVE-2025-0942
|
CVE:CVE-2025-0942
Description:The DB chooser functionality in Jalios JPlatform 10 SP6 before 10.0.6 improperly neutralizes special elements used in an SQL command allows for unauthenticated users to trigger SQL Injection. This issue affects JPlatform before 10.0.6 and a PatchPlugin release 10.0.6 was issued 2023-02-06.
published:2025-04-07T22:15:16.020
|
|
Please provide detailed information about CVE-2025-32409
|
CVE:CVE-2025-32409
Description:Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency.
published:2025-04-07T22:15:16.963
|
|
Please provide detailed information about CVE-2025-3385
|
CVE:CVE-2025-3385
Description:A vulnerability was found in LinZhaoguan pb-cms 2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Classification Management Page. The manipulation of the argument Classification name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T22:15:17.137
|
|
Please provide detailed information about CVE-2025-3386
|
CVE:CVE-2025-3386
Description:A vulnerability was found in LinZhaoguan pb-cms 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin#links of the component Friendship Link Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T22:15:17.337
|
|
Please provide detailed information about CVE-2025-3387
|
CVE:CVE-2025-3387
Description:A vulnerability classified as problematic has been found in renrenio renren-security up to 5.4.0. This affects an unknown part of the component JSON Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
published:2025-04-07T23:15:43.530
|
|
Please provide detailed information about CVE-2025-3388
|
CVE:CVE-2025-3388
Description:A vulnerability classified as problematic was found in hailey888 oa_system up to 2025.01.01. This vulnerability affects the function loginCheck of the file cn/gson/oasys/controller/login/LoginsController.java of the component Frontend. The manipulation of the argument Username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
published:2025-04-07T23:15:44.033
|
|
Please provide detailed information about CVE-2025-3389
|
CVE:CVE-2025-3389
Description:A vulnerability, which was classified as problematic, has been found in hailey888 oa_system up to 2025.01.01. This issue affects the function testMess of the file cn/gson/oasys/controller/inform/InformManageController.java of the component Backend. The manipulation of the argument menu leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
published:2025-04-08T00:15:15.793
|
|
Please provide detailed information about CVE-2025-3390
|
CVE:CVE-2025-3390
Description:A vulnerability, which was classified as problematic, was found in hailey888 oa_system up to 2025.01.01. Affected is the function addandchangeday of the file cn/gson/oass/controller/daymanager/DaymanageController.java of the component Backend. The manipulation of the argument scheduleList leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
published:2025-04-08T00:15:15.993
|
|
Please provide detailed information about CVE-2025-3391
|
CVE:CVE-2025-3391
Description:A vulnerability has been found in hailey888 oa_system up to 2025.01.01 and classified as problematic. Affected by this vulnerability is the function outAddress of the file cn/gson/oass/controller/address/AddrController. java of the component Backend. The manipulation of the argument outtype leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
published:2025-04-08T01:15:42.223
|
|
Please provide detailed information about CVE-2025-2519
|
CVE:CVE-2025-2519
Description:The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files.
published:2025-04-08T02:15:19.283
|
|
Please provide detailed information about CVE-2025-2525
|
CVE:CVE-2025-2525
Description:The Streamit theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'st_Authentication_Controller::edit_profile' function in all versions up to, and including, 4.0.1. This makes it possible for authenticated attackers, with subscriber-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.
published:2025-04-08T02:15:20.363
|
|
Please provide detailed information about CVE-2025-2526
|
CVE:CVE-2025-2526
Description:The Streamit theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email in the 'st_Authentication_Controller::edit_profile' function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
published:2025-04-08T02:15:20.523
|
|
Please provide detailed information about CVE-2025-3361
|
CVE:CVE-2025-3361
Description:The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.
published:2025-04-08T02:15:20.737
|
|
Please provide detailed information about CVE-2025-3362
|
CVE:CVE-2025-3362
Description:The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.
published:2025-04-08T02:15:20.913
|
|
Please provide detailed information about CVE-2025-3363
|
CVE:CVE-2025-3363
Description:The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.
published:2025-04-08T02:15:21.077
|
|
Please provide detailed information about CVE-2025-3392
|
CVE:CVE-2025-3392
Description:A vulnerability was found in hailey888 oa_system up to 2025.01.01 and classified as problematic. Affected by this issue is the function Save of the file cn/gson/oasys/controller/mail/MailController.java of the component Backend. The manipulation of the argument MailNumberId leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
published:2025-04-08T02:15:21.227
|
|
Please provide detailed information about CVE-2025-3393
|
CVE:CVE-2025-3393
Description:A vulnerability was found in mrcen springboot-ucan-admin up to 5f35162032cbe9288a04e429ef35301545143509. It has been classified as problematic. This affects an unknown part of the file /ucan-admin/index of the component Personal Settings Interface. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
published:2025-04-08T02:15:21.410
|
|
Please provide detailed information about CVE-2025-3397
|
CVE:CVE-2025-3397
Description:A vulnerability classified as problematic has been found in YzmCMS 7.1. Affected is an unknown function of the file message.tpl. The manipulation of the argument gourl leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T02:15:21.597
|
|
Please provide detailed information about CVE-2025-3398
|
CVE:CVE-2025-3398
Description:A vulnerability classified as critical was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function configure of the file blogserver/src/main/java/org/sang/config/WebSecurityConfig.java. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T02:15:21.780
|
|
Please provide detailed information about CVE-2025-3399
|
CVE:CVE-2025-3399
Description:A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5.6.3.154.205_20250114. Affected by this issue is some unknown functionality of the file /pubinfo/updateNotice.jsp. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T02:15:21.980
|
|
Please provide detailed information about CVE-2025-3400
|
CVE:CVE-2025-3400
Description:A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. This affects an unknown part of the file /client/UnChkMailApplication.jsp. The manipulation of the argument typename leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T02:15:22.167
|
|
Please provide detailed information about CVE-2025-32413
|
CVE:CVE-2025-32413
Description:Vulnerability-Lookup before 2.7.1 allows stored XSS via a user bio in website/web/views/user.py.
published:2025-04-08T03:15:14.723
|
|
Please provide detailed information about CVE-2025-32414
|
CVE:CVE-2025-32414
Description:In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
published:2025-04-08T03:15:15.940
|
|
Please provide detailed information about CVE-2025-3364
|
CVE:CVE-2025-3364
Description:The SSH service of PowerStation from HGiga has a Chroot Escape vulnerability, allowing attackers with root privileges to bypass chroot restrictions and access the entire file system.
published:2025-04-08T03:15:16.107
|
|
Please provide detailed information about CVE-2025-3401
|
CVE:CVE-2025-3401
Description:A vulnerability has been found in ESAFENET CDG 5.6.3.154.205_20250114 and classified as critical. This vulnerability affects unknown code of the file /parameter/getLimitIPList.jsp. The manipulation of the argument noticeId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T03:15:16.280
|
|
Please provide detailed information about CVE-2025-3402
|
CVE:CVE-2025-3402
Description:A vulnerability was found in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform 5.5.2 and classified as critical. This issue affects some unknown processing of the file /sysform/042/check.js%70. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T03:15:16.463
|
|
Please provide detailed information about CVE-2025-3403
|
CVE:CVE-2025-3403
Description:A vulnerability was found in Vivotek NVR ND8422P, NVR ND9525P and NVR ND9541P 2.4.0.204/3.3.0.104/4.2.0.101. It has been classified as problematic. Affected is an unknown function of the component HTML Form Handler. The manipulation leads to inclusion of sensitive information in source code. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T03:15:16.670
|
|
Please provide detailed information about CVE-2025-3405
|
CVE:CVE-2025-3405
Description:A vulnerability was found in FCJ Venture Builder appclientefiel 3.0.27. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /rest/cliente/ObterPedido/ of the component HTTP GET Request Handler. The manipulation of the argument ORDER_ID leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T04:15:31.400
|
|
Please provide detailed information about CVE-2025-3406
|
CVE:CVE-2025-3406
Description:A vulnerability was found in Nothings stb up to f056911. It has been classified as problematic. Affected is the function stbhw_build_tileset_from_image of the component Header Array Handler. The manipulation of the argument w leads to out-of-bounds read. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T04:15:31.647
|
|
Please provide detailed information about CVE-2025-3407
|
CVE:CVE-2025-3407
Description:A vulnerability was found in Nothings stb up to f056911. It has been declared as critical. Affected by this vulnerability is the function stbhw_build_tileset_from_image. The manipulation of the argument h_count/v_count leads to out-of-bounds read. The attack can be launched remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T04:15:31.877
|
|
Please provide detailed information about CVE-2025-3408
|
CVE:CVE-2025-3408
Description:A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T04:15:32.077
|
|
Please provide detailed information about CVE-2025-20934
|
CVE:CVE-2025-20934
Description:Improper access control in Sticker Center prior to SMR Apr-2025 Release 1 allows local attackers to access image files with system privilege.
published:2025-04-08T05:15:37.790
|
|
Please provide detailed information about CVE-2025-20935
|
CVE:CVE-2025-20935
Description:Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access files with system privilege. User interaction is required for triggering this vulnerability.
published:2025-04-08T05:15:37.923
|
|
Please provide detailed information about CVE-2025-20936
|
CVE:CVE-2025-20936
Description:Improper access control in HDCP trustlet prior to SMR Apr-2025 Release 1 allows local attackers with shell privilege to escalate their privileges to root.
published:2025-04-08T05:15:38.043
|
|
Please provide detailed information about CVE-2025-20938
|
CVE:CVE-2025-20938
Description:Improper access control in SamsungContacts prior to SMR Apr-2025 Release 1 allows local attackers to access protected data in SamsungContacts.
published:2025-04-08T05:15:38.170
|
|
Please provide detailed information about CVE-2025-20939
|
CVE:CVE-2025-20939
Description:Improper authorization in wireless download protocol in Galaxy Watch prior to SMR Apr-2025 Release 1 allows physical attackers to update device unique identifier of Watch devices.
published:2025-04-08T05:15:38.293
|
|
Please provide detailed information about CVE-2025-20940
|
CVE:CVE-2025-20940
Description:Improper handling of insufficient permission in Samsung Device Health Manager Service prior to SMR Apr-2025 Release 1 allows local attackers to access provider in SDMHS.
published:2025-04-08T05:15:38.413
|
|
Please provide detailed information about CVE-2025-20941
|
CVE:CVE-2025-20941
Description:Improper access control in InputManager to SMR Apr-2025 Release 1 allows local attackers to access the scancode of specific input device.
published:2025-04-08T05:15:38.550
|
|
Please provide detailed information about CVE-2025-20942
|
CVE:CVE-2025-20942
Description:Improper Verification of Intent by Broadcast Receiver in DeviceIdService prior to SMR Apr-2025 Release 1 allows local attackers to reset OAID.
published:2025-04-08T05:15:38.670
|
|
Please provide detailed information about CVE-2025-20943
|
CVE:CVE-2025-20943
Description:Out-of-bounds write in secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to cause memory corruption.
published:2025-04-08T05:15:38.787
|
|
Please provide detailed information about CVE-2025-20944
|
CVE:CVE-2025-20944
Description:Out-of-bounds read in parsing audio data in libsavsac.so prior to SMR Apr-2025 Release 1 allows local attackers to read out-of-bounds memory.
published:2025-04-08T05:15:38.913
|
|
Please provide detailed information about CVE-2025-20945
|
CVE:CVE-2025-20945
Description:Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch.
published:2025-04-08T05:15:39.037
|
|
Please provide detailed information about CVE-2025-20946
|
CVE:CVE-2025-20946
Description:Improper handling of exceptional conditions in pairing specific bluetooth devices in Galaxy Watch Bluetooth pairing prior to SMR Apr-2025 Release 1 allows local attackers to pair with specific bluetooth devices without user interaction.
published:2025-04-08T05:15:39.160
|
|
Please provide detailed information about CVE-2025-20947
|
CVE:CVE-2025-20947
Description:Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access image files across multiple users. User interaction is required for triggering this vulnerability.
published:2025-04-08T05:15:39.283
|
|
Please provide detailed information about CVE-2025-20948
|
CVE:CVE-2025-20948
Description:Out-of-bounds read in enrollment with cdsp frame secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to read out-of-bounds memory.
published:2025-04-08T05:15:39.400
|
|
Please provide detailed information about CVE-2025-20950
|
CVE:CVE-2025-20950
Description:Use of implicit intent for sensitive communication in SamsungNotes prior to version 4.4.26.45 allows local attackers to access sensitive information.
published:2025-04-08T05:15:39.527
|
|
Please provide detailed information about CVE-2025-20951
|
CVE:CVE-2025-20951
Description:Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.90.7 allows local attackers to write arbitrary files with the privilege of Galaxy Store.
published:2025-04-08T05:15:39.647
|
|
Please provide detailed information about CVE-2025-2004
|
CVE:CVE-2025-2004
Description:The Simple WP Events plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpe_delete_file AJAX action in all versions up to, and including, 1.8.17. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
published:2025-04-08T05:15:39.767
|
|
Please provide detailed information about CVE-2025-3409
|
CVE:CVE-2025-3409
Description:A vulnerability classified as critical has been found in Nothings stb up to f056911. This affects the function stb_include_string. The manipulation of the argument path_to_includes leads to stack-based buffer overflow. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T05:15:40.050
|
|
Please provide detailed information about CVE-2025-3410
|
CVE:CVE-2025-3410
Description:A vulnerability classified as critical was found in mymagicpower AIAS 20250308. This vulnerability affects unknown code of the file training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T05:15:40.243
|
|
Please provide detailed information about CVE-2025-3411
|
CVE:CVE-2025-3411
Description:A vulnerability, which was classified as critical, has been found in mymagicpower AIAS 20250308. This issue affects some unknown processing of the file 3_api_platform/api-platform/src/main/java/top/aias/platform/controller/AsrController.java. The manipulation of the argument url leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
published:2025-04-08T05:15:40.423
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.