Total
298999 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-47889 | 1 Jenkins | 1 Wso2 Oauth | 2025-06-12 | N/A | 9.8 CRITICAL |
In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist. | |||||
CVE-2025-46052 | 1 Weberp | 1 Weberp | 2025-06-12 | N/A | 9.8 CRITICAL |
An error-based SQL Injection (SQLi) vulnerability in WebERP v4.15.2 allows attackers to execute arbitrary SQL command and extract sensitive data by injecting a crafted payload into the DEL form field in a POST request to /StockCounts.php | |||||
CVE-2025-46053 | 1 Weberp | 1 Weberp | 2025-06-12 | N/A | 5.1 MEDIUM |
A SQL Injection vulnerability in WebERP v4.15.2 allows attackers to execute arbitrary SQL commands and extract sensitive data by injecting a crafted payload into the ReportID and ReplaceReportID parameters within a POST request to /reportwriter/admin/ReportCreator.php | |||||
CVE-2025-48051 | 1 Lichess | 1 Powertip.ts | 2025-06-12 | N/A | 4.7 MEDIUM |
powertip.ts in Lila (for Lichess) before ab0beaf allows XSS in some applications because of an innerHTML usage pattern in which text is extracted from a DOM node and interpreted as HTML. | |||||
CVE-2025-4541 | 1 Lmxcms | 1 Lmxcms | 2025-06-12 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability classified as critical has been found in LmxCMS 1.41. Affected is the function manageZt of the file c\admin\ZtAction.class.php of the component POST Request Handler. The manipulation of the argument sortid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2025-40571 | 2025-06-12 | N/A | 2.2 LOW | ||
A vulnerability has been identified in Mendix OIDC SSO (Mendix 10 compatible) (All versions < V4.1.0), Mendix OIDC SSO (Mendix 10.12 compatible) (All versions < V4.0.1), Mendix OIDC SSO (Mendix 9 compatible) (All versions). The Mendix OIDC SSO module grants read and write access to all tokens exclusively to the Administrator role and could result in privilege misuse by an adversary modifying the module during Mendix development. | |||||
CVE-2025-1732 | 2025-06-12 | N/A | 6.7 MEDIUM | ||
An improper privilege management vulnerability in the recovery function of the Zyxel USG FLEX H series uOS firmware version V1.31 and earlier could allow an authenticated local attacker with administrator privileges to upload a crafted configuration file and escalate privileges on a vulnerable device. | |||||
CVE-2025-1731 | 2025-06-12 | N/A | 7.8 HIGH | ||
An incorrect permission assignment vulnerability in the PostgreSQL commands of the Zyxel USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Modifying the system configuration is only possible if the administrator has not logged out and the token remains valid. | |||||
CVE-2025-49822 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49821 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49820 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49819 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49818 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49817 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49816 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49815 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2025-49814 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2023-36636 | 2025-06-12 | N/A | N/A | ||
Rejected reason: Not used | |||||
CVE-2024-45516 | 1 Synacor | 1 Zimbra Collaboration Suite | 2025-06-11 | N/A | 6.1 MEDIUM |
An issue was discovered in Zimbra Collaboration (ZCS) 9.0.0 before Patch 43, 10.0.x before 10.0.12, 10.1.x before 10.1.4, and 8.8.15 before Patch 47. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, including malformed <img> tags with embedded JavaScript. The vulnerability is triggered when a user views a specially crafted email in the Classic UI, requiring no additional user interaction. | |||||
CVE-2025-32354 | 1 Synacor | 1 Zimbra Collaboration Suite | 2025-06-11 | N/A | 8.8 HIGH |
In Zimbra Collaboration (ZCS) 9.0 through 10.1, a Cross-Site Request Forgery (CSRF) vulnerability exists in the GraphQL endpoint (/service/extension/graphql) of Zimbra webmail due to a lack of CSRF token validation. This allows attackers to perform unauthorized GraphQL operations, such as modifying contacts, changing account settings, and accessing sensitive user data when an authenticated user visits a malicious website. |