Vulnerabilities (CVE)

Total 299905 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-28381 1 Openc3 1 Cosmos 2025-06-17 N/A 7.5 HIGH
A credential leak in OpenC3 COSMOS v6.0.0 allows attackers to access service credentials as environment variables stored in all containers.
CVE-2024-36526 1 Zkteco 1 Zkbio Cvsecurity 2025-06-17 N/A 9.8 CRITICAL
ZKTeco ZKBio CVSecurity v6.1.1 was discovered to contain a hardcoded cryptographic key.
CVE-2025-28380 1 Openc3 1 Cosmos 2025-06-17 N/A 6.1 MEDIUM
A cross-site scripting (XSS) vulnerability in OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter.
CVE-2024-5475 1 Lepileppanen 1 Responsive Video Embed 2025-06-17 N/A 5.4 MEDIUM
The Responsive video embed WordPress plugin before 0.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
CVE-2024-4749 1 Tipsandtricks-hq 1 Wp Emember 2025-06-17 N/A 8.3 HIGH
The wp-eMember WordPress plugin before 10.3.9 does not sanitize and escape the "fieldId" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
CVE-2025-5648 1 Radare 1 Radare2 2025-06-17 1.0 LOW 2.5 LOW
A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added.
CVE-2024-1076 1 Sslzen 1 Ssl Zen 2025-06-17 N/A 6.5 MEDIUM
The SSL Zen WordPress plugin before 4.6.0 does not properly prevent directory listing of the private keys folder, as it only relies on the use of .htaccess to prevent visitors from accessing the site's generated private keys, which allows an attacker to read them if the site runs on a server who doesn't support .htaccess files, like NGINX.
CVE-2024-28294 1 Limbas 1 Limbas 2025-06-17 N/A 6.5 MEDIUM
Limbas up to v5.2.14 was discovered to contain a SQL injection vulnerability via the ftid parameter.
CVE-2024-0868 1 Dev4press 1 Coreactivity 2025-06-17 N/A 5.3 MEDIUM
The coreActivity: Activity Logging plugin for WordPress plugin before 2.1 retrieved IP addresses of requests via headers such X-FORWARDED to log them, allowing users to spoof them by providing an arbitrary value
CVE-2023-4826 1 Socialdriver 1 Socialdriver 2025-06-17 N/A 6.1 MEDIUM
The SocialDriver WordPress theme before version 2024 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties resulting in a cross-site scripting (XSS) attack.
CVE-2025-27956 1 Pixeon 1 Weblaudos 2025-06-17 N/A 7.5 HIGH
Directory Traversal vulnerability in WebLaudos 24.2 (04) allows a remote attacker to obtain sensitive information via the id parameter.
CVE-2024-50599 1 Synacor 1 Zimbra Collaboration Suite 2025-06-17 N/A 6.1 MEDIUM
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Zimbra Collaboration Suite (ZCS) 8.8.15, affecting one of the webmail calendar endpoints. This arises from improper handling of user-supplied input, allowing an attacker to inject malicious code that is reflected back in the HTML response.
CVE-2025-5431 1 Assamlook 1 Assamlook Cms 2025-06-17 6.5 MEDIUM 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in AssamLook CMS 1.0. Affected is an unknown function of the file /department-profile.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-31815 1 Totolink 2 Ex200, Ex200 Firmware 2025-06-17 N/A 9.1 CRITICAL
In TOTOLINK EX200 V4.0.3c.7314_B20191204, an attacker can obtain the configuration file without authorization through /cgi-bin/ExportSettings.sh
CVE-2024-24279 1 Secdiskapp 1 Secdiskapp 2025-06-17 N/A 8.8 HIGH
An issue in secdiskapp 1.5.1 (management program for NewQ Fingerprint Encryption Super Speed Flash Disk) allows attackers to gain escalated privileges via vsVerifyPassword and vsSetFingerPrintPower functions.
CVE-2024-21507 1 Sidorares 1 Mysql2 2025-06-17 N/A 6.5 MEDIUM
Versions of the package mysql2 before 3.9.3 are vulnerable to Improper Input Validation through the keyFromFields function, resulting in cache poisoning. An attacker can inject a colon (:) character within a value of the attacker-crafted key.
CVE-2025-5689 2025-06-17 N/A 8.5 HIGH
A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.
CVE-2025-39240 2025-06-17 N/A 7.2 HIGH
Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.
CVE-2025-22242 2025-06-17 N/A 5.6 MEDIUM
Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
CVE-2025-22241 2025-06-17 N/A 5.6 MEDIUM
File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.