Show filters
349,136 Total Results
Displaying 21-30 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown

CVE-2025-26526

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.
0
Attacker Value
Unknown

CVE-2025-26525

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).
0
Attacker Value
Unknown

CVE-2025-27364

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.
0
Attacker Value
Unknown

CVE-2025-27133

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
WeGIA is a Web manager for charitable institutions. A SQL Injection vulnerability was discovered in the WeGIA application prior to version 3.2.15 at the `adicionar_tipo_exame.php` endpoint. This vulnerability allows an authorized attacker to execute arbitrary SQL queries, allowing access to sensitive information. Version 3.2.15 contains a patch for the issue.
0
Attacker Value
Unknown

CVE-2025-27112

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials. An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails with a "permission denied" error due to insufficient permissions, limiting the impact to unauthorized viewing of information. Version 0.54.5 contains a patch for this issue.
0
Attacker Value
Unknown

CVE-2024-57026

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
TawkTo Widget Version <= 1.3.7 is vulnerable to Cross Site Scripting (XSS) due to processing user input in a way that allows JavaScript execution.
0
Attacker Value
Unknown

CVE-2024-54820

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
XOne Web Monitor v02.10.2024.530 framework 1.0.4.9 was discovered to contain a SQL injection vulnerability in the login page. This vulnerability allows attackers to extract all usernames and passwords via a crafted input.
0
Attacker Value
Unknown

CVE-2025-26201

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
Credential disclosure vulnerability via the /staff route in GreaterWMS <= 2.1.49 allows a remote unauthenticated attackers to bypass authentication and escalate privileges.
0
Attacker Value
Unknown

CVE-2025-26200

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
SQL injection in SLIMS v.9.6.1 allows a remote attacker to escalate privileges via the month parameter in the visitor_report_day.php component.
0
Attacker Value
Unknown

CVE-2025-22495

Disclosure Date: February 24, 2025 (last updated February 25, 2025)
An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
0