Search

Search Results (313650 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-2134 1 Bdtask 1 Hospital Automanager 2025-10-10 4.3 Medium
A vulnerability has been found in Bdtask Hospita AutoManager up to 20240223 and classified as problematic. This vulnerability affects unknown code of the file /investigation/delete/ of the component Investigation Report Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255496. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-2135 1 Bdtask 1 Hospital Automanager 2025-10-10 2.4 Low
A vulnerability was found in Bdtask Hospita AutoManager up to 20240223 and classified as problematic. This issue affects some unknown processing of the file /hospital_activities/birth/form of the component Hospital Activities Page. The manipulation of the argument Description with the input <img src=a onerror=alert(1)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255497 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-34248 1 D-link 1 Nuclias Connect 2025-10-10 N/A
D-Link Nuclias Connect firmware versions < 1.3.1.4 contain a directory traversal vulnerability within /api/web/dnc/global/database/deleteBackup due to improper sanitization of the deleteBackupList parameter. This can allow an authenticated attacker to delete arbitrary files impacting the integrity and availability of the system.
CVE-2025-30258 1 Gnupg 1 Gnupg 2025-10-10 2.7 Low
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
CVE-2025-59286 1 Microsoft 3 365, 365 Copilot, 365 Copilot Chat 2025-10-10 6.5 Medium
Copilot Spoofing Vulnerability
CVE-2025-59272 1 Microsoft 3 365, 365 Copilot, 365 Copilot Chat 2025-10-10 6.5 Medium
Copilot Spoofing Vulnerability
CVE-2025-11561 1 Redhat 2 Enterprise Linux, Openshift 2025-10-10 8.8 High
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
CVE-2025-55321 1 Microsoft 1 Azure Monitor 2025-10-10 8.7 High
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an authorized attacker to perform spoofing over a network.
CVE-2025-59252 1 Microsoft 2 365, 365 Copilot 2025-10-10 6.5 Medium
M365 Copilot Spoofing Vulnerability
CVE-2024-7696 1 Axis 1 Camera Station Pro 2025-10-10 6.3 Medium
Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for an authenticated malicious client to tamper with audit log creation in AXIS Camera Station, or perform a Denial-of-Service attack on the AXIS Camera Station server using maliciously crafted audit log entries. Axis has released a patched version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2025-59271 2025-10-10 8.7 High
Redis Enterprise Elevation of Privilege Vulnerability
CVE-2025-62240 1 Liferay 2 Dxp, Portal 2025-10-10 N/A
Multiple cross-site scripting (XSS) vulnerabilities with Calendar events in Liferay Portal 7.4.3.35 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.7, 7.4 update 35 through update 92, and 7.3 update 25 through update 36 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user’s (1) First Name, (2) Middle Name or (3) Last Name text field.
CVE-2025-62292 2025-10-10 4.3 Medium
In SonarQube before 25.6, 2025.3 Commercial, and 2025.1.3 LTA, authenticated low-privileged users can query the /api/v2/users-management/users endpoint and obtain user fields intended for administrators only, including the email addresses of other accounts.
CVE-2025-59247 1 Microsoft 2 Azure, Azure Playfab 2025-10-10 8.8 High
Azure PlayFab Elevation of Privilege Vulnerability
CVE-2025-21049 2025-10-10 5.5 Medium
Improper access control in SecSettings prior to SMR Oct-2025 Release 1 allows local attackers to access sensitive information. User interaction is required for triggering this vulnerability.
CVE-2025-59246 1 Microsoft 1 Entra Id 2025-10-10 9.8 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2025-21051 2025-10-10 4 Medium
Out-of-bounds write in the pre-processing of JPEG decoding in libpadm.so prior to SMR Oct-2025 Release 1 allows local attackers to write out-of-bounds memory.
CVE-2025-59218 1 Microsoft 1 Entra Id 2025-10-10 9.6 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2025-6519 1 Copeland 8 E3 Supervisory Controller Firmware, Site Supervisor Bx 860-1240, Site Supervisor Bxe 860-1245 and 5 more 2025-10-10 9.8 Critical
E3 Site Supervisor (firmware version < 2.31F01) has a default admin user "ONEDAY" with a daily generated password. An attacker can predictably generate the password for ONEDAY. The oneday user cannot be deleted or modified by any user.
CVE-2025-11558 1 Code-projects 1 E-commerce Website 2025-10-10 7.3 High
A vulnerability was found in code-projects E-Commerce Website 1.0. Impacted is an unknown function of the file /pages/user_index_search.php. Performing manipulation of the argument Search results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.