Search

Search Results (313358 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59932 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 8.6 High
Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the /api/resources endpoint previously allowed POST and DELETE requests without proper authentication or authorization. This could have enabled unauthorized users to create, modify, or delete resources on the platform. The issue has been fixed in FlagForge version 2.3.1.
CVE-2025-8277 1 Redhat 2 Enterprise Linux, Openshift 2025-10-08 3.1 Low
A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.
CVE-2025-6170 2 Redhat, Xmlsoft 5 Enterprise Linux, Jboss Core Services, Openshift and 2 more 2025-10-08 2.5 Low
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
CVE-2024-36451 2 Gentoo, Webmin 2 Webmin, Webmin 2025-10-08 8.8 High
Improper handling of insufficient permissions or privileges vulnerability exists in ajaxterm module of Webmin prior to 2.003. If this vulnerability is exploited, a console session may be hijacked by an unauthorized user. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted.
CVE-2024-36453 1 Webmin 2 Usermin, Webmin 2025-10-08 6.1 Medium
Cross-site scripting vulnerability exists in session_login.cgi of Webmin versions prior to 1.970 and Usermin versions prior to 1.820. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. As a result, a webpage may be altered or sensitive information such as a credential may be disclosed.
CVE-2024-36452 1 Webmin 1 Webmin 2025-10-08 3.1 Low
Cross-site request forgery vulnerability exists in ajaxterm module of Webmin versions prior to 2.003. If this vulnerability is exploited, unintended operations may be performed when a user views a malicious page while logged in. As a result, data within a system may be referred, a webpage may be altered, or a server may be permanently halted.
CVE-2025-52653 1 Hcltech 1 Dryice Myxalytics 2025-10-08 7.6 High
HCL MyXalytics product is affected by Cross Site Scripting vulnerability in the web application. This can allow the execution of unauthorized scripts, potentially resulting in unauthorized actions or access.
CVE-2025-52658 1 Hcltech 1 Dryice Myxalytics 2025-10-08 3.5 Low
HCL MyXalytics  6.6.  product is affected by Use of Vulnerable/Outdated Versions Vulnerability
CVE-2025-52654 1 Hcltech 1 Dryice Myxalytics 2025-10-08 4.6 Medium
A vulnerability in HCL HCL MyXalytics allows HTML InjectionThis issue affects HCL MyXalytics: 6.6.
CVE-2025-52656 1 Hcltech 1 Dryice Myxalytics 2025-10-08 7.6 High
HCL MyXalytics: 6.6.  is affected by Mass Assignment vulnerability. Mass Assignment occurs when user input is automatically bound to application objects without proper validation or access controls, potentially allowing unauthorized modification of sensitive fields.
CVE-2024-42329 1 Zabbix 1 Zabbix 2025-10-08 3.3 Low
The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd->error will be NULL and trying to read from it will result in a crash.
CVE-2024-42328 1 Zabbix 1 Zabbix 2025-10-08 3.3 Low
When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server's response is an empty document, then wd->data in the code below will remain NULL and an attempt to read from it will result in a crash.
CVE-2024-42327 1 Zabbix 1 Zabbix 2025-10-08 9.9 Critical
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
CVE-2025-59826 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 7.6 High
Flag Forge is a Capture The Flag (CTF) platform. In version 2.1.0, non-admin users can create arbitrary challenges, potentially introducing malicious, incorrect, or misleading content. This issue has been patched in version 2.2.0.
CVE-2025-59827 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 9.8 Critical
Flag Forge is a Capture The Flag (CTF) platform. In version 2.1.0, the /api/admin/assign-badge endpoint lacks proper access control, allowing any authenticated user to assign high-privilege badges (e.g., Staff) to themselves. This could lead to privilege escalation and impersonation of administrative roles. This issue has been patched in version 2.2.0.
CVE-2025-59833 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 7.5 High
Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.1.0 to before 2.3.0, the API endpoint GET /api/problems/:id returns challenge hints in plaintext within the question object, regardless of whether the user has unlocked them via point deduction. Users can view all hints for free, undermining the business logic of the platform and reducing the integrity of the challenge system. This issue has been patched in version 2.3.0.
CVE-2025-59841 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 9.8 Critical
Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.2.0 to before 2.3.1, the FlagForge web application improperly handles session invalidation. Authenticated users can continue to access protected endpoints, such as /api/profile, even after logging out. CSRF tokens are also still valid post-logout, which can allow unauthorized actions. This issue has been patched in version 2.3.1.
CVE-2025-59843 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 5.3 Medium
Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the public endpoint /api/user/[username] returns user email addresses in its JSON response. The problem has been patched in FlagForge version 2.3.1. The fix removes email addresses from public API responses while keeping the endpoint publicly accessible. Users should upgrade to version 2.3.1 or later to eliminate exposure. There are no workarounds for this vulnerability.
CVE-2024-42326 1 Zabbix 1 Zabbix 2025-10-08 4.4 Medium
There was discovered a use after free bug in browser.c in the es_browser_get_variant function
CVE-2025-59714 1 Internet2 1 Grouper 2025-10-08 6.5 Medium
In Internet2 Grouper 5.17.1 before 5.20.5, group admins who are not Grouper sysadmins can configure loader jobs.