Search Results (342475 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-30172 1 Abb 3 Aspect Enterprise, Matrix Series, Nexus Series 2025-07-12 8 High
Remote Code Execution vulnerabilities are present in ASPECT if session administrator credentials become compromised This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.
CVE-2025-30173 1 Abb 3 Aspect Enterprise, Matrix Series, Nexus Series 2025-07-12 6.7 Medium
File upload vulnerabilities are present in ASPECT if session administrator credentials become compromised This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.
CVE-2025-30193 1 Powerdns 1 Dnsdist 2025-07-12 7.5 High
In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service. The remedy is: upgrade to the patched 1.9.10 version. A workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting. We would like to thank Renaud Allard for bringing this issue to our attention.
CVE-2025-30195 1 Powerdns 1 Recursor 2025-07-12 7.5 High
An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service. The remedy is: upgrade to the patched 5.2.1 version. We would like to thank Volodymyr Ilyin for bringing this issue to our attention.
CVE-2025-30235 1 Securenvoy 1 Securaccess 2025-07-12 3.5 Low
Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 is intended to disable accounts that have had more than 10 failed authentication attempts, but instead allows hundreds of failed authentication attempts, because concurrent attempts are mishandled.
CVE-2025-30349 1 Horde 2 Horde Application Framework, Imp 2025-07-12 7.2 High
Horde IMP through 6.2.27, as used with Horde Application Framework through 5.2.23, allows XSS that leads to account takeover via a crafted text/html e-mail message with an onerror attribute (that may use base64-encoded JavaScript code), as exploited in the wild in March 2025.
CVE-2025-30371 1 Metabase 1 Metabase 2025-07-12 N/A
Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed in v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8. Migrating to Metabase Cloud or redeploying Metabase in a dedicated subnet with strict outbound port controls is an available workaround.
CVE-2025-30741 1 Pixelfed 1 Pixelfed 2025-07-12 4.3 Medium
Pixelfed before 0.12.5 allows anyone to follow private accounts and see private posts on other Fediverse servers. This affects users elsewhere in the Fediverse, if they otherwise have any followers from a Pixelfed instance.
CVE-2025-31481 1 Api-platform 1 Core 2025-07-12 7.5 High
API Platform Core is a system to create hypermedia-driven REST and GraphQL APIs. Using the Relay special node type you can bypass the configured security on an operation. This vulnerability is fixed in 4.0.22 and 3.4.17.
CVE-2025-31489 1 Minio 1 Minio 2025-07-12 7.5 High
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. The signature component of the authorization may be invalid, which would mean that as a client you can use any arbitrary secret to upload objects given the user already has prior WRITE permissions on the bucket. Prior knowledge of access-key, and bucket name this user might have access to - and an access-key with a WRITE permissions is necessary. However with relevant information in place, uploading random objects to buckets is trivial and easy via curl. This issue is fixed in RELEASE.2025-04-03T14-56-28Z.
CVE-2025-53879 2025-07-12 N/A
Not used
CVE-2025-53878 2025-07-12 N/A
Not used
CVE-2025-53877 2025-07-12 N/A
Not used
CVE-2025-53876 2025-07-12 N/A
Not used
CVE-2025-53875 2025-07-12 N/A
Not used
CVE-2025-53874 2025-07-12 N/A
Not used
CVE-2025-53873 2025-07-12 N/A
Not used
CVE-2025-53872 2025-07-12 N/A
Not used
CVE-2025-53871 2025-07-12 N/A
Not used
CVE-2024-10813 1 Codeastrology 1 Woo Product Table 2025-07-12 5.3 Medium
The Product Table for WooCommerce by CodeAstrology (wooproducttable.com) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.1 via the var_dump_table parameter. This makes it possible for unauthenticated attackers var data.