instruction
stringlengths
55
56
inputs
stringclasses
1 value
outputs
stringlengths
86
4.06k
Please provide detailed information about CVE-2025-27738
CVE:CVE-2025-27738 Description:Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network. published:2025-04-08T18:16:02.280
Please provide detailed information about CVE-2025-27739
CVE:CVE-2025-27739 Description:Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:02.470
Please provide detailed information about CVE-2025-27740
CVE:CVE-2025-27740 Description:Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network. published:2025-04-08T18:16:02.653
Please provide detailed information about CVE-2025-27741
CVE:CVE-2025-27741 Description:Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. published:2025-04-08T18:16:02.833
Please provide detailed information about CVE-2025-27742
CVE:CVE-2025-27742 Description:Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally. published:2025-04-08T18:16:03.040
Please provide detailed information about CVE-2025-27743
CVE:CVE-2025-27743 Description:Untrusted search path in System Center allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:03.260
Please provide detailed information about CVE-2025-27744
CVE:CVE-2025-27744 Description:Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:03.497
Please provide detailed information about CVE-2025-27745
CVE:CVE-2025-27745 Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:03.670
Please provide detailed information about CVE-2025-27746
CVE:CVE-2025-27746 Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:03.877
Please provide detailed information about CVE-2025-27747
CVE:CVE-2025-27747 Description:Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:04.047
Please provide detailed information about CVE-2025-27748
CVE:CVE-2025-27748 Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:04.213
Please provide detailed information about CVE-2025-27749
CVE:CVE-2025-27749 Description:Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:04.370
Please provide detailed information about CVE-2025-27750
CVE:CVE-2025-27750 Description:Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:04.520
Please provide detailed information about CVE-2025-27751
CVE:CVE-2025-27751 Description:Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:04.680
Please provide detailed information about CVE-2025-27752
CVE:CVE-2025-27752 Description:Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:04.840
Please provide detailed information about CVE-2025-29791
CVE:CVE-2025-29791 Description:Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:05.003
Please provide detailed information about CVE-2025-29792
CVE:CVE-2025-29792 Description:Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:05.160
Please provide detailed information about CVE-2025-29793
CVE:CVE-2025-29793 Description:Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. published:2025-04-08T18:16:05.320
Please provide detailed information about CVE-2025-29794
CVE:CVE-2025-29794 Description:Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. published:2025-04-08T18:16:05.467
Please provide detailed information about CVE-2025-29800
CVE:CVE-2025-29800 Description:Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:05.680
Please provide detailed information about CVE-2025-29801
CVE:CVE-2025-29801 Description:Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:05.840
Please provide detailed information about CVE-2025-29802
CVE:CVE-2025-29802 Description:Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:06.017
Please provide detailed information about CVE-2025-29804
CVE:CVE-2025-29804 Description:Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:06.180
Please provide detailed information about CVE-2025-29805
CVE:CVE-2025-29805 Description:Exposure of sensitive information to an unauthorized actor in Outlook for Android allows an unauthorized attacker to disclose information over a network. published:2025-04-08T18:16:06.330
Please provide detailed information about CVE-2025-29808
CVE:CVE-2025-29808 Description:Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. published:2025-04-08T18:16:06.483
Please provide detailed information about CVE-2025-29809
CVE:CVE-2025-29809 Description:Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally. published:2025-04-08T18:16:06.633
Please provide detailed information about CVE-2025-29810
CVE:CVE-2025-29810 Description:Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network. published:2025-04-08T18:16:06.797
Please provide detailed information about CVE-2025-29811
CVE:CVE-2025-29811 Description:Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:06.977
Please provide detailed information about CVE-2025-29812
CVE:CVE-2025-29812 Description:Untrusted pointer dereference in Windows Kernel Memory allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:07.160
Please provide detailed information about CVE-2025-29816
CVE:CVE-2025-29816 Description:Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network. published:2025-04-08T18:16:07.370
Please provide detailed information about CVE-2025-29819
CVE:CVE-2025-29819 Description:External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally. published:2025-04-08T18:16:07.520
Please provide detailed information about CVE-2025-29820
CVE:CVE-2025-29820 Description:Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:07.683
Please provide detailed information about CVE-2025-29821
CVE:CVE-2025-29821 Description:Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally. published:2025-04-08T18:16:07.867
Please provide detailed information about CVE-2025-29822
CVE:CVE-2025-29822 Description:Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally. published:2025-04-08T18:16:08.023
Please provide detailed information about CVE-2025-29823
CVE:CVE-2025-29823 Description:Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. published:2025-04-08T18:16:08.190
Please provide detailed information about CVE-2025-29824
CVE:CVE-2025-29824 Description:Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. published:2025-04-08T18:16:08.340
Please provide detailed information about CVE-2025-32035
CVE:CVE-2025-32035 Description:DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2. published:2025-04-08T18:16:08.597
Please provide detailed information about CVE-2025-32036
CVE:CVE-2025-32036 Description:DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. The algorithm used to generate the captcha image shows the least complexity of the desired image. For this reason, the created image can be easily read by OCR tools, and the intruder can send automatic requests by building a robot and using this tool. This vulnerability is fixed in 9.13.8. published:2025-04-08T18:16:08.750
Please provide detailed information about CVE-2025-30295
CVE:CVE-2025-30295 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:49.453
Please provide detailed information about CVE-2025-30296
CVE:CVE-2025-30296 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:49.613
Please provide detailed information about CVE-2025-30297
CVE:CVE-2025-30297 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:49.770
Please provide detailed information about CVE-2025-30298
CVE:CVE-2025-30298 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:49.923
Please provide detailed information about CVE-2025-30299
CVE:CVE-2025-30299 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:50.083
Please provide detailed information about CVE-2025-30300
CVE:CVE-2025-30300 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:50.240
Please provide detailed information about CVE-2025-30301
CVE:CVE-2025-30301 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:50.390
Please provide detailed information about CVE-2025-30302
CVE:CVE-2025-30302 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:50.537
Please provide detailed information about CVE-2025-30303
CVE:CVE-2025-30303 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:50.693
Please provide detailed information about CVE-2025-30304
CVE:CVE-2025-30304 Description:Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:50.863
Please provide detailed information about CVE-2025-30305
CVE:CVE-2025-30305 Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:51.027
Please provide detailed information about CVE-2025-30306
CVE:CVE-2025-30306 Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:51.197
Please provide detailed information about CVE-2025-30307
CVE:CVE-2025-30307 Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:51.353
Please provide detailed information about CVE-2025-30308
CVE:CVE-2025-30308 Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:51.513
Please provide detailed information about CVE-2025-30309
CVE:CVE-2025-30309 Description:XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T19:15:51.670
Please provide detailed information about CVE-2025-3416
CVE:CVE-2025-3416 Description:A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string. published:2025-04-08T19:15:53.717
Please provide detailed information about CVE-2025-22871
CVE:CVE-2025-22871 Description:The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext. published:2025-04-08T20:15:20.183
Please provide detailed information about CVE-2025-24446
CVE:CVE-2025-24446 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T20:15:20.417
Please provide detailed information about CVE-2025-24447
CVE:CVE-2025-24447 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T20:15:20.573
Please provide detailed information about CVE-2025-30281
CVE:CVE-2025-30281 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction. published:2025-04-08T20:15:25.670
Please provide detailed information about CVE-2025-30282
CVE:CVE-2025-30282 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application. published:2025-04-08T20:15:25.820
Please provide detailed information about CVE-2025-30284
CVE:CVE-2025-30284 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T20:15:25.980
Please provide detailed information about CVE-2025-30285
CVE:CVE-2025-30285 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T20:15:26.127
Please provide detailed information about CVE-2025-30286
CVE:CVE-2025-30286 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. published:2025-04-08T20:15:26.273
Please provide detailed information about CVE-2025-30287
CVE:CVE-2025-30287 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application. published:2025-04-08T20:15:26.430
Please provide detailed information about CVE-2025-30288
CVE:CVE-2025-30288 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. published:2025-04-08T20:15:26.583
Please provide detailed information about CVE-2025-30289
CVE:CVE-2025-30289 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. published:2025-04-08T20:15:26.737
Please provide detailed information about CVE-2025-30290
CVE:CVE-2025-30290 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are stored outside the intended restricted directory. Exploitation of this issue requires user interaction. published:2025-04-08T20:15:26.883
Please provide detailed information about CVE-2025-30291
CVE:CVE-2025-30291 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction. published:2025-04-08T20:15:27.057
Please provide detailed information about CVE-2025-30292
CVE:CVE-2025-30292 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. published:2025-04-08T20:15:27.210
Please provide detailed information about CVE-2025-30293
CVE:CVE-2025-30293 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T20:15:27.363
Please provide detailed information about CVE-2025-30294
CVE:CVE-2025-30294 Description:ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2025-04-08T20:15:27.527
Please provide detailed information about CVE-2025-27188
CVE:CVE-2025-27188 Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. published:2025-04-08T21:15:50.393
Please provide detailed information about CVE-2025-27189
CVE:CVE-2025-27189 Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could be exploited to cause a denial-of-service condition. An attacker could trick a logged-in user into submitting a forged request to the vulnerable application, which may disrupt service availability. Exploitation of this issue requires user interaction, typically in the form of clicking a malicious link or visiting an attacker-controlled website. published:2025-04-08T21:15:50.567
Please provide detailed information about CVE-2025-27190
CVE:CVE-2025-27190 Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. published:2025-04-08T21:15:50.727
Please provide detailed information about CVE-2025-27191
CVE:CVE-2025-27191 Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. published:2025-04-08T21:15:50.883
Please provide detailed information about CVE-2025-27192
CVE:CVE-2025-27192 Description:Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to gain unauthorized access to protected resources by obtaining sensitive credential information. Exploitation of this issue does not require user interaction. published:2025-04-08T21:15:51.040
Please provide detailed information about CVE-2025-25013
CVE:CVE-2025-25013 Description:Improper restriction of environment variables in Elastic Defend can lead to exposure of sensitive information such as API keys and tokens via automatic transmission of unfiltered environment variables to the stack. published:2025-04-08T23:15:45.540
Please provide detailed information about CVE-2025-32460
CVE:CVE-2025-32460 Description:GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call. published:2025-04-09T02:15:15.137
Please provide detailed information about CVE-2025-32461
CVE:CVE-2025-32461 Description:wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3. published:2025-04-09T02:15:16.253
Please provide detailed information about CVE-2025-29988
CVE:CVE-2025-29988 Description:Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. published:2025-04-09T03:15:15.737
Please provide detailed information about CVE-2025-32464
CVE:CVE-2025-32464 Description:HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. published:2025-04-09T03:15:16.847
Please provide detailed information about CVE-2025-3100
CVE:CVE-2025-3100 Description:The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping in tasks discussion. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. published:2025-04-09T05:15:43.253
Please provide detailed information about CVE-2025-3442
CVE:CVE-2025-3442 Description:This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device. published:2025-04-09T07:15:41.210
Please provide detailed information about CVE-2025-20952
CVE:CVE-2025-20952 Description:Improper access control in Mdecservice prior to SMR Apr-2025 Release 1 allows local attackers to access arbitrary files with system privilege. published:2025-04-09T08:15:16.153
Please provide detailed information about CVE-2025-23407
CVE:CVE-2025-23407 Description:Incorrect privilege assignment vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote attacker who can log in to the product may alter the settings without appropriate privileges. published:2025-04-09T09:15:15.963
Please provide detailed information about CVE-2025-25053
CVE:CVE-2025-25053 Description:OS command injection vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product. published:2025-04-09T09:15:16.213
Please provide detailed information about CVE-2025-25056
CVE:CVE-2025-25056 Description:Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views a malicious page while logged in, unintended operations may be performed. published:2025-04-09T09:15:16.423
Please provide detailed information about CVE-2025-25213
CVE:CVE-2025-25213 Description:Improper restriction of rendered UI layers or frames issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views and clicks on the content on the malicious page while logged in, unintended operations may be performed. published:2025-04-09T09:15:16.610
Please provide detailed information about CVE-2025-27722
CVE:CVE-2025-27722 Description:Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information. published:2025-04-09T09:15:16.790
Please provide detailed information about CVE-2025-27797
CVE:CVE-2025-27797 Description:OS command injection vulnerability in the specific service exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product. published:2025-04-09T09:15:16.977
Please provide detailed information about CVE-2025-27934
CVE:CVE-2025-27934 Description:Information disclosure of authentication information in the specific service vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote unauthenticated attacker may obtain the product authentication information. published:2025-04-09T09:15:17.153
Please provide detailed information about CVE-2025-29870
CVE:CVE-2025-29870 Description:Missing authentication for critical function vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote unauthenticated attacker may obtain the product configuration information including authentication information. published:2025-04-09T09:15:17.347
Please provide detailed information about CVE-2025-2222
CVE:CVE-2025-2222 Description:CWE-552: Files or Directories Accessible to External Parties vulnerability over https exists that could leak information and potential privilege escalation following man in the middle attack. published:2025-04-09T11:15:42.063
Please provide detailed information about CVE-2025-2223
CVE:CVE-2025-2223 Description:CWE-20: Improper Input Validation vulnerability exists that could cause a loss of Confidentiality, Integrity and Availability of engineering workstation when a malicious project file is loaded by a user from the local system. published:2025-04-09T11:15:42.320
Please provide detailed information about CVE-2025-2440
CVE:CVE-2025-2440 Description:CWE-922: Insecure Storage of Sensitive Information vulnerability exists that could potentially lead to unauthorized access of confidential data when a malicious user, having physical access and advanced information on the file system, sets the radio in factory default mode. published:2025-04-09T11:15:42.507
Please provide detailed information about CVE-2025-2441
CVE:CVE-2025-2441 Description:CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could lead to loss of confidentiality when a malicious user, having physical access, sets the radio in factory default mode where the product does not correctly initialize all data. published:2025-04-09T11:15:42.730
Please provide detailed information about CVE-2025-2442
CVE:CVE-2025-2442 Description:CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could potentially lead to unauthorized access which could result in the loss of confidentially, integrity and availability when a malicious user, having physical access, sets the radio to the factory default mode. published:2025-04-09T11:15:42.947
Please provide detailed information about CVE-2025-29189
CVE:CVE-2025-29189 Description:Flowise <= 2.2.3 is vulnerable to SQL Injection. via tableName parameter at Postgres_VectorStores. published:2025-04-09T12:15:15.003
Please provide detailed information about CVE-2025-30677
CVE:CVE-2025-30677 Description:Apache Pulsar contains multiple connectors for integrating with Apache Kafka. The Pulsar IO Apache Kafka Source Connector, Sink Connector, and Kafka Connect Adaptor Sink Connector log sensitive configuration properties in plain text in application logs. This vulnerability can lead to unintended exposure of credentials in log files, potentially allowing attackers with access to these logs to obtain Apache Kafka credentials. The vulnerability's impact is limited by the fact that an attacker would need access to the application logs to exploit this issue. This issue affects Apache Pulsar IO's Apache Kafka connectors in all versions before 3.0.11, 3.3.6, and 4.0.4. 3.0.x version users should upgrade to at least 3.0.11. 3.3.x version users should upgrade to at least 3.3.6. 4.0.x version users should upgrade to at least 4.0.4. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions. published:2025-04-09T12:15:15.363
Please provide detailed information about CVE-2025-31672
CVE:CVE-2025-31672 Description:Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely. published:2025-04-09T12:15:15.563
Please provide detailed information about CVE-2025-1968
CVE:CVE-2025-1968 Description:Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429. published:2025-04-09T14:15:27.950