Search

Search Results (324598 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-52163 1 Digiever 4 Ds-2105 Pro, Ds-2105 Pro\+, Ds-2105 Pro\+ Firmware and 1 more 2025-12-24 8.8 High
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-13324 1 Mattermost 1 Mattermost 2025-12-24 3.7 Low
Mattermost versions 10.11.x <= 10.11.5, 11.0.x <= 11.0.4, 10.12.x <= 10.12.2 fail to invalidate remote cluster invite tokens when using the legacy (version 1) protocol or when the confirming party does not provide a refreshed token, which allows an attacker who has obtained an invite token to authenticate as the remote cluster and perform limited actions on shared channels even after the invitation has been legitimately confirmed.
CVE-2023-46308 1 Plotly 1 Plotly.js 2025-12-24 9.8 Critical
In Plotly plotly.js before 2.25.2, plot API calls have a risk of __proto__ being polluted in expandObjectPaths or nestedProperty.
CVE-2022-40011 1 Typora 1 Typora 2025-12-24 6.1 Medium
Typora through 1.3.8 allows XSS if a document containing an SVG element with an attacker-controlled onload attribute is exported and then used at a victim's origin.
CVE-2025-37164 1 Hpe 1 Oneview 2025-12-24 10 Critical
A remote code execution issue exists in HPE OneView.
CVE-2025-68695 2025-12-24 N/A
Not used
CVE-2025-68694 2025-12-24 N/A
Not used
CVE-2025-68693 2025-12-24 N/A
Not used
CVE-2025-68692 2025-12-24 N/A
Not used
CVE-2025-68691 2025-12-24 N/A
Not used
CVE-2025-68690 2025-12-24 N/A
Not used
CVE-2025-68689 2025-12-24 N/A
Not used
CVE-2025-68688 2025-12-24 N/A
Not used
CVE-2025-68687 2025-12-24 N/A
Not used
CVE-2025-8415 1 Redhat 1 Cryostat 2025-12-23 5.9 Medium
A vulnerability was found in the Cryostat HTTP API. Cryostat's HTTP API binds to all network interfaces, allowing possible external visibility and access to the API port if Network Policies are disabled, allowing an unauthenticated, malicious attacker to jeopardize the environment.
CVE-2025-10622 1 Redhat 4 Satellite, Satellite Capsule, Satellite Maintenance and 1 more 2025-12-23 8 High
A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting.
CVE-2025-12654 2 Wordpress, Wpvividplugins 2 Wordpress, Migration Backup Staging Wpvivd Backup And Migration 2025-12-23 2.7 Low
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
CVE-2025-13838 3 Htplugins, Woocommerce, Wordpress 3 Wishsuite, Woocommerce, Wordpress 2025-12-23 6.4 Medium
The WishSuite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_text' parameter of the 'wishsuite_button' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2025-14080 2 Wordpress, Wpshuffle 2 Wordpress, Frontend Post Submission Manager 2025-12-23 5.3 Medium
The Frontend Post Submission Manager Lite plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.5. This is due to missing authorization checks on the post update functionality in the fpsml_form_process AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary posts by providing a post_id parameter via the guest posting form, allowing them to change post titles, content, excerpts, and remove post authors.
CVE-2025-13361 2 Dipesh Patel, Wordpress 2 Web To Sugarcrm Lead, Wordpress 2025-12-23 4.3 Medium
The Web to SugarCRM Lead plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on the custom field deletion functionality. This makes it possible for unauthenticated attackers to delete custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.