instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
---|---|---|
Please provide detailed information about CVE-2025-27738 | CVE:CVE-2025-27738
Description:Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network.
published:2025-04-08T18:16:02.280 |
|
Please provide detailed information about CVE-2025-27739 | CVE:CVE-2025-27739
Description:Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:02.470 |
|
Please provide detailed information about CVE-2025-27740 | CVE:CVE-2025-27740
Description:Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network.
published:2025-04-08T18:16:02.653 |
|
Please provide detailed information about CVE-2025-27741 | CVE:CVE-2025-27741
Description:Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
published:2025-04-08T18:16:02.833 |
|
Please provide detailed information about CVE-2025-27742 | CVE:CVE-2025-27742
Description:Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally.
published:2025-04-08T18:16:03.040 |
|
Please provide detailed information about CVE-2025-27743 | CVE:CVE-2025-27743
Description:Untrusted search path in System Center allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:03.260 |
|
Please provide detailed information about CVE-2025-27744 | CVE:CVE-2025-27744
Description:Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:03.497 |
|
Please provide detailed information about CVE-2025-27745 | CVE:CVE-2025-27745
Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:03.670 |
|
Please provide detailed information about CVE-2025-27746 | CVE:CVE-2025-27746
Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:03.877 |
|
Please provide detailed information about CVE-2025-27747 | CVE:CVE-2025-27747
Description:Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:04.047 |
|
Please provide detailed information about CVE-2025-27748 | CVE:CVE-2025-27748
Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:04.213 |
|
Please provide detailed information about CVE-2025-27749 | CVE:CVE-2025-27749
Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:04.370 |
|
Please provide detailed information about CVE-2025-27750 | CVE:CVE-2025-27750
Description:Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:04.520 |
|
Please provide detailed information about CVE-2025-27751 | CVE:CVE-2025-27751
Description:Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:04.680 |
|
Please provide detailed information about CVE-2025-27752 | CVE:CVE-2025-27752
Description:Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:04.840 |
|
Please provide detailed information about CVE-2025-29791 | CVE:CVE-2025-29791
Description:Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:05.003 |
|
Please provide detailed information about CVE-2025-29792 | CVE:CVE-2025-29792
Description:Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:05.160 |
|
Please provide detailed information about CVE-2025-29793 | CVE:CVE-2025-29793
Description:Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
published:2025-04-08T18:16:05.320 |
|
Please provide detailed information about CVE-2025-29794 | CVE:CVE-2025-29794
Description:Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
published:2025-04-08T18:16:05.467 |
|
Please provide detailed information about CVE-2025-29800 | CVE:CVE-2025-29800
Description:Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:05.680 |
|
Please provide detailed information about CVE-2025-29801 | CVE:CVE-2025-29801
Description:Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:05.840 |
|
Please provide detailed information about CVE-2025-29802 | CVE:CVE-2025-29802
Description:Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:06.017 |
|
Please provide detailed information about CVE-2025-29804 | CVE:CVE-2025-29804
Description:Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:06.180 |
|
Please provide detailed information about CVE-2025-29805 | CVE:CVE-2025-29805
Description:Exposure of sensitive information to an unauthorized actor in Outlook for Android allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:16:06.330 |
|
Please provide detailed information about CVE-2025-29808 | CVE:CVE-2025-29808
Description:Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.
published:2025-04-08T18:16:06.483 |
|
Please provide detailed information about CVE-2025-29809 | CVE:CVE-2025-29809
Description:Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally.
published:2025-04-08T18:16:06.633 |
|
Please provide detailed information about CVE-2025-29810 | CVE:CVE-2025-29810
Description:Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
published:2025-04-08T18:16:06.797 |
|
Please provide detailed information about CVE-2025-29811 | CVE:CVE-2025-29811
Description:Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:06.977 |
|
Please provide detailed information about CVE-2025-29812 | CVE:CVE-2025-29812
Description:Untrusted pointer dereference in Windows Kernel Memory allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:07.160 |
|
Please provide detailed information about CVE-2025-29816 | CVE:CVE-2025-29816
Description:Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network.
published:2025-04-08T18:16:07.370 |
|
Please provide detailed information about CVE-2025-29819 | CVE:CVE-2025-29819
Description:External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally.
published:2025-04-08T18:16:07.520 |
|
Please provide detailed information about CVE-2025-29820 | CVE:CVE-2025-29820
Description:Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:07.683 |
|
Please provide detailed information about CVE-2025-29821 | CVE:CVE-2025-29821
Description:Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally.
published:2025-04-08T18:16:07.867 |
|
Please provide detailed information about CVE-2025-29822 | CVE:CVE-2025-29822
Description:Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally.
published:2025-04-08T18:16:08.023 |
|
Please provide detailed information about CVE-2025-29823 | CVE:CVE-2025-29823
Description:Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:08.190 |
|
Please provide detailed information about CVE-2025-29824 | CVE:CVE-2025-29824
Description:Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:08.340 |
|
Please provide detailed information about CVE-2025-32035 | CVE:CVE-2025-32035
Description:DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2.
published:2025-04-08T18:16:08.597 |
|
Please provide detailed information about CVE-2025-32036 | CVE:CVE-2025-32036
Description:DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. The algorithm used to generate the captcha image shows the least complexity of the desired image. For this reason, the created image can be easily read by OCR tools, and the intruder can send automatic requests by building a robot and using this tool. This vulnerability is fixed in 9.13.8.
published:2025-04-08T18:16:08.750 |
|
Please provide detailed information about CVE-2025-30295 | CVE:CVE-2025-30295
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:49.453 |
|
Please provide detailed information about CVE-2025-30296 | CVE:CVE-2025-30296
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:49.613 |
|
Please provide detailed information about CVE-2025-30297 | CVE:CVE-2025-30297
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:49.770 |
|
Please provide detailed information about CVE-2025-30298 | CVE:CVE-2025-30298
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:49.923 |
|
Please provide detailed information about CVE-2025-30299 | CVE:CVE-2025-30299
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:50.083 |
|
Please provide detailed information about CVE-2025-30300 | CVE:CVE-2025-30300
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:50.240 |
|
Please provide detailed information about CVE-2025-30301 | CVE:CVE-2025-30301
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:50.390 |
|
Please provide detailed information about CVE-2025-30302 | CVE:CVE-2025-30302
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:50.537 |
|
Please provide detailed information about CVE-2025-30303 | CVE:CVE-2025-30303
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:50.693 |
|
Please provide detailed information about CVE-2025-30304 | CVE:CVE-2025-30304
Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:50.863 |
|
Please provide detailed information about CVE-2025-30305 | CVE:CVE-2025-30305
Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:51.027 |
|
Please provide detailed information about CVE-2025-30306 | CVE:CVE-2025-30306
Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:51.197 |
|
Please provide detailed information about CVE-2025-30307 | CVE:CVE-2025-30307
Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:51.353 |
|
Please provide detailed information about CVE-2025-30308 | CVE:CVE-2025-30308
Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:51.513 |
|
Please provide detailed information about CVE-2025-30309 | CVE:CVE-2025-30309
Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T19:15:51.670 |
|
Please provide detailed information about CVE-2025-3416 | CVE:CVE-2025-3416
Description:A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
published:2025-04-08T19:15:53.717 |
|
Please provide detailed information about CVE-2025-22871 | CVE:CVE-2025-22871
Description:The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.
published:2025-04-08T20:15:20.183 |
|
Please provide detailed information about CVE-2025-24446 | CVE:CVE-2025-24446
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T20:15:20.417 |
|
Please provide detailed information about CVE-2025-24447 | CVE:CVE-2025-24447
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T20:15:20.573 |
|
Please provide detailed information about CVE-2025-30281 | CVE:CVE-2025-30281
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction.
published:2025-04-08T20:15:25.670 |
|
Please provide detailed information about CVE-2025-30282 | CVE:CVE-2025-30282
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application.
published:2025-04-08T20:15:25.820 |
|
Please provide detailed information about CVE-2025-30284 | CVE:CVE-2025-30284
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T20:15:25.980 |
|
Please provide detailed information about CVE-2025-30285 | CVE:CVE-2025-30285
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T20:15:26.127 |
|
Please provide detailed information about CVE-2025-30286 | CVE:CVE-2025-30286
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction.
published:2025-04-08T20:15:26.273 |
|
Please provide detailed information about CVE-2025-30287 | CVE:CVE-2025-30287
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application.
published:2025-04-08T20:15:26.430 |
|
Please provide detailed information about CVE-2025-30288 | CVE:CVE-2025-30288
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
published:2025-04-08T20:15:26.583 |
|
Please provide detailed information about CVE-2025-30289 | CVE:CVE-2025-30289
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction.
published:2025-04-08T20:15:26.737 |
|
Please provide detailed information about CVE-2025-30290 | CVE:CVE-2025-30290
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are stored outside the intended restricted directory. Exploitation of this issue requires user interaction.
published:2025-04-08T20:15:26.883 |
|
Please provide detailed information about CVE-2025-30291 | CVE:CVE-2025-30291
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction.
published:2025-04-08T20:15:27.057 |
|
Please provide detailed information about CVE-2025-30292 | CVE:CVE-2025-30292
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
published:2025-04-08T20:15:27.210 |
|
Please provide detailed information about CVE-2025-30293 | CVE:CVE-2025-30293
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T20:15:27.363 |
|
Please provide detailed information about CVE-2025-30294 | CVE:CVE-2025-30294
Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T20:15:27.527 |
|
Please provide detailed information about CVE-2025-27188 | CVE:CVE-2025-27188
Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
published:2025-04-08T21:15:50.393 |
|
Please provide detailed information about CVE-2025-27189 | CVE:CVE-2025-27189
Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could be exploited to cause a denial-of-service condition. An attacker could trick a logged-in user into submitting a forged request to the vulnerable application, which may disrupt service availability. Exploitation of this issue requires user interaction, typically in the form of clicking a malicious link or visiting an attacker-controlled website.
published:2025-04-08T21:15:50.567 |
|
Please provide detailed information about CVE-2025-27190 | CVE:CVE-2025-27190
Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
published:2025-04-08T21:15:50.727 |
|
Please provide detailed information about CVE-2025-27191 | CVE:CVE-2025-27191
Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
published:2025-04-08T21:15:50.883 |
|
Please provide detailed information about CVE-2025-27192 | CVE:CVE-2025-27192
Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to gain unauthorized access to protected resources by obtaining sensitive credential information. Exploitation of this issue does not require user interaction.
published:2025-04-08T21:15:51.040 |
|
Please provide detailed information about CVE-2025-25013 | CVE:CVE-2025-25013
Description:Improper restriction of environment variables in Elastic Defend can lead to exposure of sensitive information such as API keys and tokens via automatic transmission of unfiltered environment variables to the stack.
published:2025-04-08T23:15:45.540 |
|
Please provide detailed information about CVE-2025-32460 | CVE:CVE-2025-32460
Description:GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call.
published:2025-04-09T02:15:15.137 |
|
Please provide detailed information about CVE-2025-32461 | CVE:CVE-2025-32461
Description:wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3.
published:2025-04-09T02:15:16.253 |
|
Please provide detailed information about CVE-2025-29988 | CVE:CVE-2025-29988
Description:Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
published:2025-04-09T03:15:15.737 |
|
Please provide detailed information about CVE-2025-32464 | CVE:CVE-2025-32464
Description:HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one.
published:2025-04-09T03:15:16.847 |
|
Please provide detailed information about CVE-2025-3100 | CVE:CVE-2025-3100
Description:The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping in tasks discussion. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
published:2025-04-09T05:15:43.253 |
|
Please provide detailed information about CVE-2025-3442 | CVE:CVE-2025-3442
Description:This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
published:2025-04-09T07:15:41.210 |
|
Please provide detailed information about CVE-2025-20952 | CVE:CVE-2025-20952
Description:Improper access control in Mdecservice prior to SMR Apr-2025 Release 1 allows local attackers to access arbitrary files with system privilege.
published:2025-04-09T08:15:16.153 |
|
Please provide detailed information about CVE-2025-23407 | CVE:CVE-2025-23407
Description:Incorrect privilege assignment vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote attacker who can log in to the product may alter the settings without appropriate privileges.
published:2025-04-09T09:15:15.963 |
|
Please provide detailed information about CVE-2025-25053 | CVE:CVE-2025-25053
Description:OS command injection vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
published:2025-04-09T09:15:16.213 |
|
Please provide detailed information about CVE-2025-25056 | CVE:CVE-2025-25056
Description:Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views a malicious page while logged in, unintended operations may be performed.
published:2025-04-09T09:15:16.423 |
|
Please provide detailed information about CVE-2025-25213 | CVE:CVE-2025-25213
Description:Improper restriction of rendered UI layers or frames issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views and clicks on the content on the malicious page while logged in, unintended operations may be performed.
published:2025-04-09T09:15:16.610 |
|
Please provide detailed information about CVE-2025-27722 | CVE:CVE-2025-27722
Description:Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information.
published:2025-04-09T09:15:16.790 |
|
Please provide detailed information about CVE-2025-27797 | CVE:CVE-2025-27797
Description:OS command injection vulnerability in the specific service exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product.
published:2025-04-09T09:15:16.977 |
|
Please provide detailed information about CVE-2025-27934 | CVE:CVE-2025-27934
Description:Information disclosure of authentication information in the specific service vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote unauthenticated attacker may obtain the product authentication information.
published:2025-04-09T09:15:17.153 |
|
Please provide detailed information about CVE-2025-29870 | CVE:CVE-2025-29870
Description:Missing authentication for critical function vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote unauthenticated attacker may obtain the product configuration information including authentication information.
published:2025-04-09T09:15:17.347 |
|
Please provide detailed information about CVE-2025-2222 | CVE:CVE-2025-2222
Description:CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak information and potential privilege escalation following man in the middle attack.
published:2025-04-09T11:15:42.063 |
|
Please provide detailed information about CVE-2025-2223 | CVE:CVE-2025-2223
Description:CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and Availability of engineering workstation when a malicious project file is loaded by a user from the local system.
published:2025-04-09T11:15:42.320 |
|
Please provide detailed information about CVE-2025-2440 | CVE:CVE-2025-2440
Description:CWE-922: Insecure Storage of Sensitive Information vulnerability exists that could potentially lead to unauthorized access of confidential data when a malicious user, having physical access and advanced information on the file system, sets the radio in factory default mode.
published:2025-04-09T11:15:42.507 |
|
Please provide detailed information about CVE-2025-2441 | CVE:CVE-2025-2441
Description:CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of confidentiality when a malicious user, having physical access, sets the radio in factory default mode where the product does not correctly initialize all data.
published:2025-04-09T11:15:42.730 |
|
Please provide detailed information about CVE-2025-2442 | CVE:CVE-2025-2442
Description:CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to unauthorized access which could result in the loss of confidentially, integrity and availability when a malicious user, having physical access, sets the radio to the factory default mode.
published:2025-04-09T11:15:42.947 |
|
Please provide detailed information about CVE-2025-29189 | CVE:CVE-2025-29189
Description:Flowise <= 2.2.3 is vulnerable to SQL Injection. via tableName parameter at Postgres_VectorStores.
published:2025-04-09T12:15:15.003 |
|
Please provide detailed information about CVE-2025-30677 | CVE:CVE-2025-30677
Description:Apache Pulsar contains multiple connectors for integrating with Apache Kafka. The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect Adaptor Sink Connector log sensitive configuration properties in plain text in application logs. This vulnerability can lead to unintended exposure of credentials in log files, potentially allowing attackers with access to these logs to obtain Apache Kafka credentials. The vulnerability's impact is limited by the fact that an attacker would need access to the application logs to exploit this issue. This issue affects Apache Pulsar IO's Apache Kafka connectors in all versions before 3.0.11, 3.3.6, and 4.0.4. 3.0.x version users should upgrade to at least 3.0.11. 3.3.x version users should upgrade to at least 3.3.6. 4.0.x version users should upgrade to at least 4.0.4. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
published:2025-04-09T12:15:15.363 |
|
Please provide detailed information about CVE-2025-31672 | CVE:CVE-2025-31672
Description:Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely.
published:2025-04-09T12:15:15.563 |
|
Please provide detailed information about CVE-2025-1968 | CVE:CVE-2025-1968
Description:Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429.
published:2025-04-09T14:15:27.950 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.