Search

Search Results (326427 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-6797 2 Dyadyalesha, Wordpress 2 Dl Robots.txt, Wordpress 2026-01-02 4.8 Medium
The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
CVE-2025-4302 1 Fullworks 1 Stop User Enumeration 2026-01-02 5.3 Medium
The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path.
CVE-2025-44652 1 Netgear 2 Rax30, Rax30 Firmware 2026-01-02 7.5 High
In Netgear RAX30 V1.0.10.94_3, the USERLIMIT_GLOBAL option is set to 0 in multiple bftpd-related configuration files. This can cause DoS attacks when unlimited users are connected.
CVE-2025-61940 3 Microsoft, Mirion, Mirion Medical 3 Windows, Biodose\/nmis, Nmis Biodose 2026-01-02 8.3 High
NMIS/BioDose V22.02 and previous versions rely on a common SQL Server user account to access data in the database. User access in the client application is restricted by a password authentication check in the client software but the underlying database connection always has access. The latest version of NMIS/BioDose introduces an option to use Windows user authentication with the database, which would restrict this database connection.
CVE-2025-44654 1 Linksys 2 E2500, E2500 Firmware 2026-01-02 9.8 Critical
In Linksys E2500 3.0.04.002, the chroot_local_user option is enabled in the vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
CVE-2025-62575 2 Mirion, Mirion Medical 2 Biodose\/nmis, Nmis Biodose 2026-01-02 8.3 High
NMIS/BioDose V22.02 and previous versions rely on a Microsoft SQL Server database. The SQL user account 'nmdbuser' and other created accounts by default have the sysadmin role. This can lead to remote code execution through the use of certain built-in stored procedures.
CVE-2015-10140 1 Connekthq 1 Ajax Load More 2026-01-02 8.8 High
The Ajax Load More plugin before 2.8.1.2 does not have authorisation in some of its AJAX actions, allowing any authenticated users, such as subscriber, to upload and delete arbitrary files.
CVE-2025-64298 3 Microsoft, Mirion, Mirion Medical 3 Windows, Biodose\/nmis, Nmis Biodose 2026-01-02 8.4 High
NMIS/BioDose V22.02 and previous version installations where the embedded Microsoft SQLServer Express is used are exposed in the Windows share accessed by clients in networked installs. By default, this directory has insecure directory paths that allow access to the SQL Server database and configuration files, which can contain sensitive data.
CVE-2024-57695 2 Agnitum, Opswat 2 Outpost Security Suite, Outpost Security Suite 2026-01-02 7.7 High
An issue in Agnitum Outpost Security Suite 7.5.3 (3942.608.1810) and 7.6 (3984.693.1842) allows a local attacker to execute arbitrary code via the lock function. The manufacturer fixed the vulnerability in version 8.0 (4164.652.1856) from December 17, 2012.
CVE-2025-64642 2 Mirion, Mirion Medical 2 Biodose\/nmis, Nmis Biodose 2026-01-02 8 High
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.
CVE-2025-64778 2 Mirion, Mirion Medical 2 Biodose\/nmis, Nmis Biodose 2026-01-02 7.3 High
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
CVE-2025-63396 2 Linuxfoundation, Pytorch 2 Pytorch, Pytorch 2026-01-02 3.3 Low
An issue was discovered in PyTorch v2.5 and v2.7.1. Omission of profiler.stop() can cause torch.profiler.profile (PythonTracer) to crash or hang during finalization, leading to a Denial of Service (DoS).
CVE-2025-13058 1 Extplorer 1 Extplorer 2026-01-02 3.5 Low
A security flaw has been discovered in soerennb eXtplorer up to 2.1.15. The affected element is an unknown function of the component Filename Handler. The manipulation results in cross site scripting. The attack may be launched remotely. The patch is identified as 002def70b985f7012586df2c44368845bf405ab3. Applying a patch is advised to resolve this issue.
CVE-2025-63938 2 Tinyproxy, Tinyproxy Project 2 Tinyproxy, Tinyproxy 2026-01-02 6.5 Medium
Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.
CVE-2025-65235 2 Opencode, Opencode Systems 2 Ussd Gateway, Ussd Gateway 2026-01-02 9.8 Critical
OpenCode Systems USSD Gateway OC Release: 5 Version 6.13.11 was discovered to contain a SQL injection vulnerability via the ID parameter in the getSubUsersByProvider function.
CVE-2025-65236 2 Opencode, Opencode Systems 2 Ussd Gateway, Ussd Gateway 2026-01-02 9.8 Critical
OpenCode Systems USSD Gateway OC Release: 5 was discovered to contain a SQL injection vulnerability via the Session ID parameter in the /occontrolpanel/index.php endpoint.
CVE-2025-65237 2 Opencode, Opencode Systems 2 Ussd Gateway, Ussd Gateway 2026-01-02 6.1 Medium
A reflected cross-site scripted (XSS) vulnerability in OpenCode Systems USSD Gateway OC Release: 5 allows attackers to execute arbitrary JavaScript in the context of a user's browser via injecting a crafted payload.
CVE-2025-65238 2 Opencode, Opencode Systems 2 Ussd Gateway, Ussd Gateway 2026-01-02 6.5 Medium
Incorrect access control in the getSubUsersByProvider function of OpenCode Systems USSD Gateway OC Release: 5 Version 6.13.11 allows attackers with low-level privileges to dump user records and access sensitive information.
CVE-2021-47740 2026-01-02 7.5 High
KZTech JT3500V 4G LTE CPE 2.0.1 contains a session management vulnerability that allows attackers to reuse old session credentials without proper expiration. Attackers can exploit the weak session handling to maintain unauthorized access and potentially compromise device authentication mechanisms.
CVE-2025-14010 1 Redhat 3 Ceph Storage, Community.general, Openstack 2026-01-02 5.5 Medium
A flaw was found in ansible-collection-community-general. This vulnerability allows for information exposure (IE) of sensitive credentials, specifically plaintext passwords, via verbose output when running Ansible with debug modes. Attackers with access to logs could retrieve these secrets and potentially compromise Keycloak accounts or administrative access.