Datasets:
cve_id stringlengths 13 15 | summary stringlengths 15 4k | description_hash stringlengths 64 64 | published_date timestamp[us, tz=UTC]date 2025-07-31 14:15:34 2025-10-29 13:15:34 | modified_date timestamp[us, tz=UTC]date 2025-07-31 18:42:37 2025-10-29 13:53:20 | is_rejected bool 2
classes | source stringclasses 1
value | source_url stringclasses 7
values | retrieved_at timestamp[us, tz=UTC]date 2025-10-29 13:52:01 2025-10-29 13:52:01 | source_record_hash stringlengths 64 64 |
|---|---|---|---|---|---|---|---|---|---|
CVE-2025-54589 | Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing... | 533572e310b5cd89ea983a546f3cca4b95ab848044eed8e964a247fe5f24d0e2 | 2025-07-31T14:15:34.927000 | 2025-09-22T14:38:17.617000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 6a0c102ad50a6543ece569793475bf1b62d88c5ad2fa83790bfb78230b9d6232 |
CVE-2025-7738 | A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text expo... | 3e99c081a0f26c4e88712e6220a42599d2fc705dc3c12b5106b5e2a70590e02d | 2025-07-31T14:15:35.177000 | 2025-08-04T22:15:28.823000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 44dd03787f5be3473f1f152bb2ade36a62f2553c67a410ca11d60bf97f4b2fd0 |
CVE-2025-8407 | A vulnerability, which was classified as critical, has been found in code-projects Vehicle Management 1.0. This issue affects some unknown processing of the file /filter2.php. The manipulation of the argument from leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public... | c2f8730301222349ce11b420803b5ac1bfb14b02a4f4f3ca648a4e26e04a5725 | 2025-07-31T14:15:36.630000 | 2025-08-05T20:45:10.170000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e621c11719ae055df12689838534770c9a46d215970d61ad50d809fe283ad957 |
CVE-2011-10008 | A stack-based buffer overflow vulnerability exists in MPlayer Lite r33064 due to improper bounds checking when handling M3U playlist files containing long http:// URL entries. An attacker can craft a malicious .m3u file with a specially formatted URL that triggers a stack overflow when processed by the player, particul... | 617cfe0e312120330dadf4b565825155befa933104e17a33f0db6789437f3e49 | 2025-07-31T15:15:31.460000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | a7b26b830230da4d652d7048289c13bfdba3a6f19d48dc540b0dd524239902b2 |
CVE-2012-10021 | A stack-based buffer overflow vulnerability exists in D-Link DIR-605L Wireless N300 Cloud Router firmware versions 1.12 and 1.13 via the getAuthCode() function. The flaw arises from unsafe usage of sprintf() when processing user-supplied CAPTCHA data via the FILECODE parameter in /goform/formLogin. A remote unauthentic... | 2ce11b8724c11688fed383ccc05d4a043393e93923a5c764a0bf7d0e4aaca7f2 | 2025-07-31T15:15:32.597000 | 2025-09-23T17:45:55.843000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 2d47e60644672b1b4390298837f33cbb33b61a8b64071bda369067201e26a58b |
CVE-2013-10033 | An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under specific environmental conditions. This can lead to remote code execution ... | 64be93cd3677fb38d2d9ca9d0aa881a7625219fa010664735a70aa0643eef271 | 2025-07-31T15:15:32.773000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e6bc306da4d7688ef35ab164638942822fb58ea8763d3adada25a91cc83079a7 |
CVE-2013-10034 | An unrestricted file upload vulnerability exists in Kaseya KServer versions prior to 6.3.0.2. The uploadImage.asp endpoint allows unauthenticated users to upload files to arbitrary paths via a crafted filename parameter in a multipart/form-data POST request. Due to the lack of authentication and input sanitation, an at... | 2130354dd7f3696149f0eb121a49865a2943c4163b9f27dc7db775195aee2d61 | 2025-07-31T15:15:32.937000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | a17a7c2f2b3a8d12c34b33becf5839609342c31230d2eb484bc97a603e2244a8 |
CVE-2013-10035 | A code injection vulnerability exists in ProcessMaker Open Source versions 2.x when using the default 'neoclassic' skin. An authenticated user can execute arbitrary PHP code via multiple endpoints, including appFolderAjax.php, casesStartPage_Ajax.php, and cases_SchedulerGetPlugins.php, by supplying crafted POST request... | 60fda17f76602490661cb69eacc5ef504b48eb45cfe4d576931957ca587d83a9 | 2025-07-31T15:15:33.100000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 9cd8ddd5fdc7a852f43ca20fb418ac9a0ebfdcf474a7145d93fe060bc0540995 |
CVE-2013-10036 | A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overwrite the Structured Exception Handler (SEH), leading to arbitrary... | eb059925404e2dcac33847aa8ecd32c2540c3b519452d3f799b83cd776ba278c | 2025-07-31T15:15:33.257000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 9f211a2cc0485163cee1aa5190638c9610b84f34620ef35069d7e51888da5a34 |
CVE-2013-10037 | An OS command injection vulnerability exists in WebTester version 5.x via the install2.php installation script. The parameters cpusername, cppassword, and cpdomain are passed directly to shell commands without sanitization. A remote unauthenticated attacker can exploit this flaw by sending a crafted HTTP POST request, ... | 87d07f6a928d4dd455f8fef0ad712a8ce8925217b95e933eb649ade44b34a8d9 | 2025-07-31T15:15:33.417000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 36aea614c25e24a94228d7693eaea85f676c074c614b3469af6e4b5784dd649b |
CVE-2013-10038 | An unauthenticated arbitrary file upload vulnerability exists in FlashChat versions 6.0.2 and 6.0.4 through 6.0.8. The upload.php endpoint fails to properly validate file types and authentication, allowing attackers to upload malicious PHP scripts. Once uploaded, these scripts can be executed remotely, resulting in arb... | 2a451b5b9ec6210ef80d6b82a22eba7c149a32d2bd3f40828b021266f8e92556 | 2025-07-31T15:15:33.583000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 33d9d4c04b9ab8e9bd40f330e6aea1643f3ac3d94ad60ecd671570453a4e16cf |
CVE-2013-10039 | A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentication may be required depending on deployment configuration. | b23047b5c0c99f7c761ce973444d3f475735cf7368bcf590456cecb427c59815 | 2025-07-31T15:15:33.753000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | ca0ef8b85f6ef5d0e13d59e88f4ea4344a35c41d88380d391e2d40d3ed41166f |
CVE-2013-10040 | ClipBucket version 2.6 and earlier contains a critical vulnerability in the ofc_upload_image.php script located at /admin_area/charts/ofc-library/. This endpoint allows unauthenticated users to upload arbitrary files, including executable PHP scripts. Once uploaded, the attacker can access the file via a predictable pa... | fff753786c84d08c11167a80953e875a0d5a221f62949c6a987f4d915868f2e6 | 2025-07-31T15:15:33.917000 | 2025-09-23T23:36:04.290000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 245df9ec3b80adc6ebabb82d1483e6b0fc44417bc818943de1b6d54edc63afa1 |
CVE-2013-10042 | A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in memory corruption. This can lead to denial of service or arbitrary c... | a2b75e7f8b0f56891083878068e127826fce94953beecbce7d7216900db13905 | 2025-07-31T15:15:34.167000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 103e4c174926cf81b3ba5f51b5f072d2398829f481e1f641a91591c2f9350448 |
CVE-2013-10043 | A vulnerability exists in OAstium VoIP PBX astium-confweb-2.1-25399 and earlier, where improper input validation in the logon.php script allows an attacker to bypass authentication via SQL injection. Once authenticated as an administrator, the attacker can upload arbitrary PHP code through the importcompany field in im... | 72952cbc9df831ba222e34c3d74068965a9186b889d3e0cfeb1dfd7f6d95932d | 2025-07-31T15:15:34.313000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 288ee431d0ca56ddb9d579118d5cdfdb477711b98ec670f6e4b2e8da6c908471 |
CVE-2014-125121 | Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The devices ship with a default SSH login or a hardcoded DSA private ... | 39d8aa053a9db7ed147c1de78afda4e466887bd55a9a3b8179990a3bdf905e68 | 2025-07-31T15:15:34.470000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 14affe24e31afc91cdd0a921b7b82a050f5e2e62b89fefc93605110cb25cb878 |
CVE-2014-125122 | A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker... | fe62aae1b3d216a990cc561486b90011b3aec12758a2453a8053f21997e2f7ff | 2025-07-31T15:15:34.620000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | bda146c1667caf3a4dc8ab280e8fa2356521d56866b4682f1e7bc0fc23a4938f |
CVE-2014-125123 | An unauthenticated SQL injection vulnerability exists in the Kloxo web hosting control panel (developed by LXCenter) prior to version 6.1.12. The flaw resides in the login-name parameter passed to lbin/webcommand.php, which fails to properly sanitize input, allowing an attacker to extract the administrator’s password f... | a573a6f388d186faeb4c34448bce513e8ff9bd935eeaccebc338008a844c79dc | 2025-07-31T15:15:34.770000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | bb7e6513d410b8deca3f0626a2e7cf3671d1dcb1a53ef894a32f22ac4fd89265 |
CVE-2014-125124 | An unauthenticated remote command execution vulnerability exists in Pandora FMS versions up to and including 5.0RC1 via the Anyterm web interface, which listens on TCP port 8023. The anyterm-module endpoint accepts unsanitized user input via the p parameter and directly injects it into a shell command, allowing arbitra... | d6d1f0ada5350a1d004b10cd9be4d9b9c62ed09bc97e0158553265ec6904c0b4 | 2025-07-31T15:15:34.913000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | b0f0c0d38af38e7bbf13de47d9d04e98e7bd4f1f0838e552efe69150578cbeb6 |
CVE-2014-125125 | A path traversal vulnerability exists in A10 Networks AX Loadbalancer versions 2.6.1-GR1-P5, 2.7.0, and earlier. The vulnerability resides in the handling of the filename parameter in the /xml/downloads endpoint, which fails to properly sanitize user input. An unauthenticated attacker can exploit this flaw by sending c... | b7fbb0042b28ad9c170b2c099f9bb51e6dc9430c2f8ecba6dced9ec04603fa84 | 2025-07-31T15:15:35.063000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 1488fd6eb0fbb68023582a00314066e46fedce69d13a35c5a6758e94ace19dda |
CVE-2014-125126 | An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize ... | 9066d808d566325beeb770874d3ed178ccca8f0fe63d9ab193f32a1d937d30c8 | 2025-07-31T15:15:35.210000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 742c42da0dabfa101103193b068f875081b979bd72f46198d3a494afdaa36f57 |
CVE-2024-34328 | An open redirect in Sielox AnyWare v2.1.2 allows attackers to execute a man-in-the-middle attack via a crafted URL. | f4ea1add1dbba036c02ff9392e47bcec8147d4bee41de777b7b687ff16de3814 | 2025-07-31T15:15:35.443000 | 2025-07-31T20:15:31.013000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | c776af6b7986a48e5536814fe227f9d98bb6c8b23086fdaf44c11824f1becf57 |
CVE-2025-29557 | ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control in the MailConfiguration API endpoint, where users with operator-level privileges can issue an HTTP request to retrieve SMTP credentials, including plaintext passwords. | b9834f4ffb8f380ae13987b4acd8f4e645bd9deef443cba48b3c5e7370331df7 | 2025-07-31T15:15:36.110000 | 2025-07-31T20:15:32.113000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | adcaf4f12ce0c59b3dfd162500f62953423be5e6533372b3f1853087d0bddbd1 |
CVE-2025-34146 | A prototype pollution vulnerability exists in @nyariv/sandboxjs versions <= 0.8.23, allowing attackers to inject arbitrary properties into Object.prototype via crafted JavaScript code. This can result in a denial-of-service (DoS) condition or, under certain conditions, escape the sandboxed environment intended to restr... | 21de749948c3d1587d9401930d81e1cb81b0513f9024275ce1f1b9f2182f481b | 2025-07-31T15:15:36.260000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | ed2f4e3589e8f9b9ed5b1e6f312fa3949ea770851787437d71962b5bbf520c18 |
CVE-2025-50270 | A stored Cross Site Scripting (xss) vulnerability in the "content management" feature in AnQiCMS v.3.4.11 allows a remote attacker to execute arbitrary code via a crafted script to the title, categoryTitle, and tmpTag parameters. | a6b2a55d72c988a7daa42436b54228259254e3c2b6184a04e98ddeac05181357 | 2025-07-31T15:15:36.687000 | 2025-07-31T20:15:43.270000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 7eb6f6483499141a36ccaeab4738af2b487793e9221d2cb946ec4b2d5daa3c52 |
CVE-2025-50475 | An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vulnerability stems from improper neutralization of special elements ... | cd430bef6340f88854f4be150bc38d4fd26e46d13a1639021cf293a647587427 | 2025-07-31T15:15:36.830000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | f8a083f136ad17e74b46f0b681ee0a0e62e6d797edd663ace7446a4a74e4b0c5 |
CVE-2025-50849 | CS Cart 4.18.3 is vulnerable to Insecure Direct Object Reference (IDOR). The user profile functionality allows enabling or disabling stickers through a parameter (company_id) sent in the request. However, this operation is not properly validated on the server side. An authenticated user can manipulate the request to ta... | b0f806c98c0d7ed76d7b10a03b6e3a8e04d86c7c83fef31beaff69c9c59caf90 | 2025-07-31T15:15:36.977000 | 2025-07-31T18:42:37.870000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | fcc49471460f1afc9166c36dd737e04549189255c37d841fb236b36a59d1e1fd |
CVE-2025-51569 | A cross-site scripting (XSS) vulnerability exists in the LB-Link BL-CPE300M 01.01.02P42U14_06 router's web interface. The /goform/goform_get_cmd_process endpoint fails to sanitize user input in the cmd parameter before reflecting it into a text/html response. This allows unauthenticated attackers to inject arbitrary Ja... | 8f149d9e0fe2e947d6324d617a335ca7c32eeab47660d7eb26baab275db37cd8 | 2025-07-31T15:15:37.120000 | 2025-07-31T20:15:45.767000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 78ae2e268befd35c83644f8464c9c836b3084e85726e16fd57985ffc527d2234 |
CVE-2025-52289 | A Broken Access Control vulnerability in MagnusBilling v7.8.5.3 allows newly registered users to gain escalated privileges by sending a crafted request to /mbilling/index.php/user/save to set their account status fom "pending" to "active" without requiring administrator approval. | be79425329458ef870a3f87d286b521b2f347e55c4b39fa749c8a914411a3eea | 2025-07-31T15:15:37.263000 | 2025-08-06T16:37:10.657000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 0a8f9b9b46b7a95717a8a06fe2e5178e878daeb853e046793b3f12353b2c6cdc |
CVE-2025-8408 | A vulnerability, which was classified as critical, was found in code-projects Vehicle Management 1.0. Affected is an unknown function of the file /filter1.php. The manipulation of the argument vehicle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ... | f210d588df2eadc891e7c1709dc7e8800b565a982627a028a423a261a0414a68 | 2025-07-31T15:15:40.740000 | 2025-08-05T20:59:37.380000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | c0f9b0c0c3e12369ca7887a321a0bbb071a773518ae9c9faac6b45ac7b37caf8 |
CVE-2025-29556 | ExaGrid EX10 6.3 - 7.0.1.P08 is vulnerable to Incorrect Access Control. Since version 6.3, ExaGrid enforces restrictions preventing users with the Admin role from creating or modifying users with the Security Officer role without approval. However, a flaw in the account creation process allows an attacker to bypass the... | bb56b008dd7e99942fb54fe4ef5a7f204a774c5261f40c1af6031e41bc8b3828 | 2025-07-31T16:15:29.517000 | 2025-07-31T20:15:31.913000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 24c00ca974cc0d89288d704c613bd3d73d9253b16a8c6e7344ec8a02834e9744 |
CVE-2025-46809 | A Plaintext Storage of a Password vulnerability in SUSE exposes the credentials for the HTTP proxy in the log files. This issue affects Container suse/manager/4.3/proxy-httpd:4.3.16.9.67.1: from ? before 4.3.33-150400.3.55.2; Container suse/manager/5.0/x86_64/proxy-httpd:5.0.5.7.23.1: from ? before 5.0.14-150600.4.17.1... | 68abe9c2e628550ef2804341439a288dd137bc6e012cf4d442e8cabd9b779614 | 2025-07-31T16:15:30.153000 | 2025-09-03T08:15:31.460000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 48a4610595b4de3338f4436eb7f5e6cfec669b82a02ae966d588bc956ce2fb30 |
CVE-2025-50847 | Cross Site Request Forgery (CSRF) vulnerability in CS Cart 4.18.3, allows attackers to add products to a user's comparison list via a crafted HTTP request. | 0ddbfdbe672311de78458e19cb8f0f5feea90678d264ddc61244667c7a1e7f30 | 2025-07-31T16:15:30.683000 | 2025-08-06T16:36:17.257000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e918cf3af53b1264fea002891f657b365298d9fe72d6d2aba72d24596f94a59f |
CVE-2025-50848 | A file upload vulnerability was discovered in CS Cart 4.18.3, allows attackers to execute arbitrary code. CS Cart 4.18.3 allows unrestricted upload of HTML files, which are rendered directly in the browser when accessed. This allows an attacker to upload a crafted HTML file containing malicious content, such as a fake ... | d0e8f18b66954b586c0a6889ba590fc0454d9dbaa164bdc6f652614c3f316b30 | 2025-07-31T16:15:30.843000 | 2025-08-06T16:35:06.037000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | b274c0920d71fe906de0d909a405a2239aa29ad943c87e4f51f014626b07f295 |
CVE-2025-50850 | An issue was discovered in CS Cart 4.18.3 allows the vendor login functionality lacks essential security controls such as CAPTCHA verification and rate limiting. This allows an attacker to systematically attempt various combinations of usernames and passwords (brute-force attack) to gain unauthorized access to vendor a... | bd6442c8502fa22b5504e579ccd76a7b2f3a1a57e1f1f2c1612b0b3142a12eab | 2025-07-31T16:15:31.163000 | 2025-08-06T16:34:48.977000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 7352bbac47c18c5d0556dcf2af5c820b25d493e7aa18df2cf3535ceb1dd0f229 |
CVE-2025-50867 | A SQL Injection vulnerability exists in the takeassessment2.php endpoint of the CloudClassroom-PHP-Project 1.0, where the Q5 POST parameter is directly embedded in SQL statements without sanitization. | b146d67bd48b286ad7b765bc5e7da72bf74514defdc60cbc0ecbf39271277241 | 2025-07-31T16:15:31.293000 | 2025-08-06T16:33:28.567000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 43a3ab6a1955d9033f40870030f82070ff6d60b3dbf02c71665c4c0691ea28ec |
CVE-2025-52203 | A stored cross-site scripting (XSS) vulnerability exists in DevaslanPHP project-management v1.2.4. The vulnerability resides in the Ticket Name field, which fails to properly sanitize user-supplied input. An authenticated attacker can inject malicious JavaScript payloads into this field, which are subsequently stored i... | 160c58e2f2fc728906a13d3eb5935ff513108375b0358a3c34dbe9423a053f97 | 2025-07-31T16:15:31.423000 | 2025-08-06T16:18:51.437000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e0e71de288c61b6331e8a9c94b885ceab668d9d204a91e7665e368ec9b908b88 |
CVE-2025-8409 | A vulnerability has been found in code-projects Vehicle Management 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /filter.php. The manipulation of the argument from leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the ... | 61dfac5dc1c266f65877a11dc308fa6eda00092ea5d841879a7844d09c557463 | 2025-07-31T16:15:32.213000 | 2025-08-05T20:59:30.430000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 82693f6d64b0591f12e24e7c7176c103a97659b3a8c295b80e84aaf86fa3b9c7 |
CVE-2024-34327 | Sielox AnyWare v2.1.2 was discovered to contain a SQL injection vulnerability via the email address field of the password reset form. | 9abcf981b4d77899f9f68e635f0894cc780130c5d1b4abbbf456e325770fb3be | 2025-07-31T17:15:29.937000 | 2025-08-06T16:20:02.843000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | bc60e9833e8ed482fcf9dfd999258bad74ccfb4eda48f9261d95d9f9fc4bc3d8 |
CVE-2025-50866 | CloudClassroom-PHP-Project 1.0 contains a reflected Cross-site Scripting (XSS) vulnerability in the email parameter of the postquerypublic endpoint. Improper sanitization allows an attacker to inject arbitrary JavaScript code that executes in the context of the user s browser, potentially leading to session hijacking o... | c5354a62546bf94d0d04299e95cf080d35553051da2e8f9d9b2fd0c3c3ee6192 | 2025-07-31T17:15:30.200000 | 2025-08-06T16:51:07.707000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | f2967a701d0103cf00b3e8a78b33a819f810c047e9b77b037658aa97292d39b9 |
CVE-2025-51383 | D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_road_asp function via the host_ip parameter. | 384a76fba7a3cdb3317b806f4c5b0eb248f8996d20531bdef92eb7070afba9ca | 2025-07-31T18:15:41.713000 | 2025-08-01T19:35:22.427000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | fc4cd8b6293c83021cc516faef52422b7b987216c9a8234cda3c4e5d4d46a7ee |
CVE-2025-51384 | D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the ipsec_net_asp function via the remot_ip parameter. | 2dc0be0ddf1a72ecc06a0ec05950aa7811782ec497ca08f9101a790f1036b70a | 2025-07-31T18:15:41.853000 | 2025-08-01T19:35:50.997000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 1838997c9a9c176413fec697d0ce5af1dc575146e653c2d53cab09869ff88367 |
CVE-2025-51385 | D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the yyxz_dlink_asp function via the id parameter. | b312cd3af0980df83ea4c040000d1ba1bf049d75bf7749e92d1f808dd3b34385 | 2025-07-31T18:15:42.010000 | 2025-08-01T19:36:03.910000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 77a20a6e02e2de9b81d9cff7ad398617f887332f13fc0342b47a0529779c6342 |
CVE-2025-51503 | A Stored Cross-Site Scripting (XSS) vulnerability in Microweber CMS 2.0 allows attackers to inject malicious scripts into user profile fields, leading to arbitrary JavaScript execution in admin browsers. | bcc1b3aa9d7b9da1fe45961c38062fc552a6eb6f1efd7cb80c3b01b426def0ed | 2025-07-31T18:15:42.147000 | 2025-08-06T16:21:09.210000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e21410b7e50fe7191ae052a9e3df6989f1826ed9a1e0552fda7db0626455c2ab |
CVE-2025-54832 | OPEXUS FOIAXpress Public Access Link (PAL), version v11.1.0, allows an authenticated user to add entries to the list of states and territories. | ca0a372306810be662c30e6f7ff6e9b74e9c06aeb0710d6d337cb42df8999292 | 2025-07-31T18:15:42.887000 | 2025-09-12T17:29:23.913000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 5bd962d1ef33f3ee70c0aaee36c1e0f3ad1088c603595efd05991bfbdc471c21 |
CVE-2025-54833 | OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows attackers to bypass account-lockout and CAPTCHA protections. Unauthenticated remote attackers can more easily brute force passwords. | 476137629e9c7afddf14c5670ec31eb7a03a873b2b98f19997b7879c13a4c3c9 | 2025-07-31T18:15:43.067000 | 2025-09-12T17:28:59.847000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | b2d5eccee8f503d96ecf4af21a9cab7386db3f1c32604e5df390885cf3ec74d9 |
CVE-2025-54834 | OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place. | dc4b10183dc4d5d98a8497292b460e996b1de94db3453141320a557f11d17b8e | 2025-07-31T18:15:43.250000 | 2025-09-12T17:17:56.947000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 135c586e1d67ed4745f7e1e5c95b78d8346f0f02c81cd6b1f276c2cad4f5ee0f |
CVE-2025-8426 | Marvell QConvergeConsole compressConfigFiles Directory Traversal Information Disclosure and Denial-of-Service Vulnerability. This vulnerability allows remote attackers to disclose sensitive information or to create a denial-of-service condition on affected installations of Marvell QConvergeConsole. Authentication is no... | ca190574d07833e1080e1d0b7baa6583c898875ee856f36939b36a61fcd66489 | 2025-07-31T18:15:44.030000 | 2025-08-06T16:50:11.847000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 5c8d67c5818ae0d3857c6953bbd3fb8869378ff03940fb11843a9eef8fa3754d |
CVE-2025-26062 | An access control issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to access the router's settings file and obtain potentially sensitive information from the current settings. | 3735ebfac252bf272cc59b22565a495f866740e5874a25971e0fed1a55c5f1d1 | 2025-07-31T19:15:28.610000 | 2025-09-12T16:52:00.927000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | a72e190219d417e7028c93ff47e31065ea114f32e2d71e97c8e7c4209b78cbae |
CVE-2025-26063 | An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into the ESSID name when creating a network. | afea702abeff7162b9bca8360efe059d424fa4babcdaea5f25a9f03d8086c690 | 2025-07-31T19:15:28.773000 | 2025-08-20T19:59:17.983000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 3de07ed503f4a0d04b9a2b503b923cf92276859bfe21af2c84d6dfdf1bde8873 |
CVE-2025-26064 | A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name of a connnected device. | 8ca65f4d55de1099a4d58876d5fa045d8667b98adf130714f6b722f5ce1c14ab | 2025-07-31T19:15:28.927000 | 2025-08-20T19:57:29.210000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 70634e3fadca1aba8513a002bddf7fc7fcf4b53e55422280bbe89fb981133b3e |
CVE-2025-37108 | Cross-site scripting vulnerability has been identified in HPE Telco Service Activator product | 4ff0ad4eac5789f00e7d04b979453f02a5c0f39d88833b7571316278fd464fc4 | 2025-07-31T20:15:32.357000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 0b0be0b6bedfcf20f20b370b2b05c95bf4e505b27e5e46581e8e905689cec3f2 |
CVE-2025-37109 | Cross-site scripting vulnerability has been identified in HPE Telco Service Activator product | 4ff0ad4eac5789f00e7d04b979453f02a5c0f39d88833b7571316278fd464fc4 | 2025-07-31T20:15:32.520000 | 2025-08-04T19:15:30.953000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 1c0c083bf5d2d4ef2e11f4c807b2eb034db117fba2865f92b241614774d112da |
CVE-2025-37110 | A vulnerability was discovered in the storage policy for certain sets of sensitive credential information in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information. | 92daa81f5dae4c427dc0aef3dcd6ed2b7e905029514deb674f7073ef57c86d5b | 2025-07-31T20:15:32.667000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 585ba8234d523742345ec9b59e3ae31fadb2fd0709e1fbf844ac7e55159d4bb2 |
CVE-2025-37111 | A vulnerability was discovered in the storage policy for certain sets of authentication keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information. | 55a705bc084034c7fe12f515899b409dcf54e479a1ecffd6b37299b9217b9f81 | 2025-07-31T20:15:32.823000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | c2556115850ed1af9ba08c126fa41d689e6dd21c922a41081873191a3030b99b |
CVE-2025-37112 | A vulnerability was discovered in the storage policy for certain sets of encryption keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information. | 82295e22a3af23d02573986be3b6bae216c2c26379f77f812a977b3393fa0892 | 2025-07-31T20:15:32.990000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 49e30f175c9a552b3a4b501c10530c71f03df794dc67dc53b4263089c622c5da |
CVE-2025-45769 | php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an ou... | 063fbdb6060bb15cecf0abc9da06d8ff894c76bf5283c45d82d2e9dac8437fc4 | 2025-07-31T20:15:33.150000 | 2025-08-17T04:15:39.083000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | b7de7d7b93d9370bbdc162a66560cdad3893fcbd1c0eeb3e3f01f2766487d5d5 |
CVE-2025-45770 | jwt v5.4.3 was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome... | ca203b96ecf85abe143369b07be14857b96ff672b86c299db34e2e2af5fc5bd1 | 2025-07-31T20:15:33.280000 | 2025-08-17T04:15:40.680000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 83a68ccdd6241bde9793a7a196011cb83d5842e7c04c21a2fba245ff586e3dc4 |
CVE-2025-50572 | An issue was discovered in Archer Technology RSA Archer 6.11.00204.10014 allowing attackers to execute arbitrary code via crafted system inputs that would be exported into the CSV and be executed after the user opened the file with compatible applications. | c01c35ae77aaae70f6d0bb041a1ce43609c8075719d740adb3083c24c79c5fb1 | 2025-07-31T20:15:43.470000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 6e4969f7c2f08160d94877118ca1e137f3f64b1b0e890d6ca3c9d6674b31f091 |
CVE-2025-8286 | The affected products expose an unauthenticated Telnet-based command line interface that could allow an attacker to modify hardware configurations, manipulate data, or factory reset the device. | cd85fe35b9f6499c610699fb6779bcd02dc45f2277ce6f6c83cd87d13c61bf0c | 2025-07-31T20:15:46.350000 | 2025-08-15T21:15:37.030000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | f64375ce271f5fe7dfaddb443d8e8b0d726076ed4cfa139d4f48a11f8973dbf4 |
CVE-2023-32251 | A vulnerability has been identified in the Linux kernel's ksmbd component (kernel SMB/CIFS server). A security control designed to prevent dictionary attacks, which introduces a 5-second delay during session setup, can be bypassed through the use of asynchronous requests. This bypass negates the intended anti-brute-for... | f70df078c2d8b47613d24798891ef4a3dcc7c8f5824eee247b3239509c168d02 | 2025-07-31T21:15:26.810000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | ac6f366cbb1d7ad05bd472de48ae1ef150abe861f52a0d22dfae1bdcd61d9717 |
CVE-2025-23289 | NVIDIA Omniverse Launcher for Windows and Linux contains a vulnerability in the launcher logs, where a user could cause sensitive information to be written to the log files through proxy servers. A successful exploit of this vulnerability might lead to information disclosure. | 1009ea4a9471568133f43cd0f0c88a17cc4434bc1c21330c6e726e557509a9dd | 2025-07-31T21:15:27.067000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 85e3b38af15a557146d2c3e8c3ec13add54764b099f31624bd01421f4c1a013f |
CVE-2025-45768 | pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement). | a341786b1a008975c9b2ecab495365aab2025faaa55a4d10df05725d6ece159f | 2025-07-31T21:15:27.320000 | 2025-09-12T16:45:51.510000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 7213ec0273e55111ae28aaa839e38fb84ddfd703698d38226614fd61fb2c20fa |
CVE-2025-48071 | OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forg... | a07c2c4ca754498e68c62a9f3377164cba2be0af19f0cc5d9fbe2b60b8550651 | 2025-07-31T21:15:27.990000 | 2025-08-13T19:18:51.740000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | c079d8694ed7b97e7074596f001dbdb846c168905aabd914be629d6ee384553e |
CVE-2025-48072 | OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. Version 3.3.2 is vulnerable to a heap-based buffer overflow during a read operation due to bad pointer math when decompressing DWAA-packed scan-line EXR files with a malicious... | c45d8998998a833d9540285fa3fad1ed893ba919cfad936f275d1510093d97e1 | 2025-07-31T21:15:28.163000 | 2025-08-13T20:23:43.777000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 7880b9e4f0f61a09657c80b42f7e8137acbdc10bac577dbbbb1c9ef2fa723db3 |
CVE-2025-48073 | OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, when reading a deep scanline image with a large sample count in reduceMemory mode, it is possible to crash a target application with a NULL pointer dereferen... | 6f7505a03a08de848eda3b61aca87ad8e4427020fd8ca35fb29e953f9848afef | 2025-07-31T21:15:28.340000 | 2025-08-13T19:06:51.723000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | f0f47ee6c705bd4a0f2351ea3404408e6007230a582549be49f5b3a41b9e8d21 |
CVE-2025-8431 | A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/add-boat.php. The manipulation of the argument boatname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public a... | 3c077306177e7c799e4ba4df4fa29b17eddba5e9c7f9beb881ff9b0f75bcfe07 | 2025-08-01T02:15:25.660000 | 2025-08-05T19:04:58.027000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e1bfd2dfb625c10f5ed3e9d5aadb537f0fe5c353736d86772ccd5181119c575e |
CVE-2025-5954 | The Service Finder SMS System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.0.0. This is due to the plugin not restricting user role selection at the time of registration through the aonesms_fn_savedata_after_signup() function. This makes it poss... | 8b491a4f449974539d9c137755eb3eb2b4d9b4ce19ffa664c8fae613d2def8ce | 2025-08-01T03:15:24.433000 | 2025-08-04T15:06:36.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 919912de0e81cf7dc23cbf413364cc0bc21a648d9f6f8db1287f2f2a46a7ef01 |
CVE-2019-19145 | Quantum SuperLoader 3 V94.0 005E.0h devices allow attackers to access the hardcoded fa account because there are only 65536 possible passwords. | 0b2aff55d960da1916fe61aff3491b113f4284eb53cd76588c4d1b393b50cdc5 | 2025-08-01T04:16:11.330000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 5d4508dd546b86a948a69fc25c48056bdf5d87d8b7d0428251b1d35a778ccab6 |
CVE-2025-53399 | In Sipwise rtpengine before 13.4.1.1, an origin-validation error in the endpoint-learning logic of the media-relay core allows remote attackers to inject or intercept RTP/SRTP media streams via RTP packets (except when the relay is configured for strict source and learning disabled). Version 13.4.1.1 fixes the heuristi... | 5aa12d078924701ef4bb53527de929639df7ec61d7ce37553a8a6c70bace4f0f | 2025-08-01T04:16:16.683000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 13f9d29f44f896cc8d03ea60f51467f6333cfb3af706d2c676a526313089b6cf |
CVE-2025-54657 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:18.450000 | 2025-08-01T04:16:18.450000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 89820d45bedcf4725dda29d7d4596213261df0517644bbe0d59c23a1175478c1 |
CVE-2025-54839 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:18.703000 | 2025-08-01T04:16:18.703000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 9f1b000ee1c84cc56e1cd0ea2053c6d61fd8bcb2d26c6f13dfb0a38f3891d971 |
CVE-2025-54840 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:18.787000 | 2025-08-01T04:16:18.787000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | e1505c2a40126659e04dcbf0dee6f2f2e55f0cb1c48fa7af11f623731f0a80d5 |
CVE-2025-54841 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:18.860000 | 2025-08-01T04:16:18.860000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 4b88abbfe7e5dd50bda6ca5e36da43829d49fc18057beaa0c596d1415668a574 |
CVE-2025-54842 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:19.007000 | 2025-08-01T04:16:19.007000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 60ed96f4807c166f1c2a0f3f390e9742d25fff839e75df2794e46594c19f4dd5 |
CVE-2025-54843 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:19.463000 | 2025-08-01T04:16:19.463000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | db6c883de63d2907f5451d6eba0a9039952218473e991e3f7da8bfa5ea48cb86 |
CVE-2025-54844 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:19.770000 | 2025-08-01T04:16:19.770000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 1a34bbff0cad5f452359d0c078ab2cabc0db51845e42a4556db794bc7c77f580 |
CVE-2025-54845 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:20.040000 | 2025-08-01T04:16:20.040000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 383128e87622e0e1aba935548c5fcb649d68352e58847304ee63ee007e607313 |
CVE-2025-54846 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:21.290000 | 2025-08-01T04:16:21.290000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 82aafdd95e7ed1b8c641585d68ffe62707beef40a4616495b6c64c700ee822a6 |
CVE-2025-54847 | Rejected reason: Not used | 9e7556900835929ec8b21ecbf12b2bb05922cf280b5eabee9b0b96d7956d0c15 | 2025-08-01T04:16:21.473000 | 2025-08-01T04:16:21.473000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | d1da929fa664a7f65d323b59378bed967c5cbd4ae75afbf8e0d78acd4797918f |
CVE-2025-5947 | The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via authentication bypass in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's cookie value prior to logging them in through the service_finder_switch_back() function. This makes it po... | 3074eeb32caa61aa9432815bd95a4bc0d4b7abf00c95433196e8906391f0483c | 2025-08-01T04:16:21.693000 | 2025-10-23T14:15:41.593000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 95f9f44c79bf4f72c03013cb9b8c65636b964c5bf577fe21313b8f1050a8a589 |
CVE-2025-8433 | A vulnerability was found in code-projects Document Management System 1.0 and classified as critical. This issue affects the function unlink of the file /dell.php. The manipulation of the argument ID leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be u... | 4f8f86c7c703a0687913afd01b7205772ee01d7c874add50da41bc91bb89a794 | 2025-08-01T04:16:22.103000 | 2025-08-05T19:04:43.947000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 56ef43df45f1f033cbf4441cc544982cc1e71aacc8c05b42f71a2483b7753ad2 |
CVE-2025-8434 | A vulnerability was found in code-projects Online Movie Streaming 1.0. It has been classified as critical. Affected is an unknown function of the file /admin.php. The manipulation of the argument ID leads to missing authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the publi... | ec3ed982785c29f2549f0dece9ce789ced2daa5c2655a25ee19af841e0a64189 | 2025-08-01T04:16:22.383000 | 2025-08-05T18:55:25.380000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 1f9283398463b03a27ff635bd6e2c571c65ef8a69f1b0580fcb65c180122e977 |
CVE-2025-4523 | The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the admin_donor_profile_view() function in versions 2.0.0 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access an... | baba1cdd39a5cae01c6fad9c95a174c11a4b2f263eea5be8fca43c7a0b912981 | 2025-08-01T05:15:36.553000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 50a834bed9bd77da4c1f07a5a0638b8bad631373cceb9e0fc156624d960668f4 |
CVE-2025-7443 | The BerqWP – Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the store_javascript_cache.php file in all versions up to, and including, 2.2.42. This makes it poss... | f469d01704476955b6b1b034c7c46879dc366c1ef78dd83ebed80be9fb77f5b2 | 2025-08-01T05:15:36.743000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | daec610267d4fcd4ed1bc8899bb94f08a4dfb98297439a686be39105d40e9d95 |
CVE-2025-7725 | The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the comment feature in all versions up to, and including, 26.1.0 due to insufficient input sanit... | 1bd63d595cbc81cc10dc9760a1c50450e091aac39f288fb4462c3028355d779f | 2025-08-01T05:15:36.907000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 8bc95635e068c8f144618117827fc466279cc8f58d75639efe85b18d93309569 |
CVE-2025-7845 | The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Advanced Google Maps and Image Hotspot widgets in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for... | 1376402d99c8dc4f6e7a7c7066b436b57b7f20df89a9d314b71198dcc6b271ef | 2025-08-01T05:15:37.090000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 6b41c8c4b66b900779fdcbcfc366cc4de5856133f11a349d4e0f27dfff15b8f2 |
CVE-2025-8435 | A vulnerability was found in code-projects Online Movie Streaming 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin-control.php. The manipulation of the argument ID leads to missing authorization. The attack can be launched remotely. The exploit has bee... | b0e4d06ba0eec547212135e182cc155a81c6ceed12d7b321cdb4371de65dab56 | 2025-08-01T05:15:37.253000 | 2025-08-05T18:55:19.663000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 809df132e36f118075b1fb3829a08534415a11f3a7f71fc6d1329f3ebf6e7ddf |
CVE-2025-31716 | In bootloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. | 750214e82028378bc6e62c7cafeee6350738fb5a9d68e7a3af4efc8134f6d399 | 2025-08-01T06:15:28.657000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | c428c807888ea675f28bb17202043aeb5c90c207600d9d2b0681b121f2d769e9 |
CVE-2025-54939 | LiteSpeed QUIC (LSQUIC) Library before 4.3.1 has an lsquic_engine_packet_in memory leak. | d151a5a40b72415d71b927e579fd2e82cae17a3f815d45665c3cda83406fdd30 | 2025-08-01T06:15:28.860000 | 2025-08-27T15:52:46.787000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | a35b65a758c31e2391185a2d707d6223f41351c80841359a98fdec1d2e6f1947 |
CVE-2025-5921 | The SureForms WordPress plugin before 1.7.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against both authenticated and unauthenticated users. | 04ba2a33d533ba7d94c577c58e92db5bc956a84a901f60de119118aa23de8c6d | 2025-08-01T06:15:29.127000 | 2025-08-06T16:48:59.193000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | a66468960b895caf48d096073cd3ac8f33cd0ba6184ae0c1e7352f00b8a0f398 |
CVE-2025-8436 | A vulnerability was found in projectworlds Online Admission System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /viewdoc.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the pub... | 13745bc356356fcae341c7db9b9e58104b7be8667adb5e8cac2ebf3c8e7b2d21 | 2025-08-01T06:15:29.250000 | 2025-08-06T16:48:44.180000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | a61705b18028482fc7be0dfa886a9e94f2b2f7c3a6e9693aa693cbd856d46e3c |
CVE-2025-8454 | It was discovered that uscan, a tool to scan/watch upstream sources for new releases of software, included in devscripts (a collection of scripts to make the life of a Debian Package maintainer easier), skips OpenPGP verification if the upstream source is already downloaded from a previous run even if the verification ... | 819aa257d7d3e87e1cea30d57d822bb71890da7729cb9a13722bab66e3f50ad6 | 2025-08-01T06:15:29.493000 | 2025-08-06T16:17:38.593000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | c4f0af48604d48eb7b5770a644bff33799548a14371c3277722a3be8c55fbe64 |
CVE-2025-7646 | The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom script parameter in all versions up to, and including, 6.3.10 even when the user does not have the unfiltered_html capability. This makes... | daa576ad081c854addb5c23831b983137760adb2f3a37803ae3a3f2ef012f20a | 2025-08-01T07:15:32.990000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | ba28fafe0f10c7a4181897be43f8db628a582cf6ce1b42b968af1611913b9759 |
CVE-2025-8437 | A vulnerability classified as critical has been found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may... | 442d65a8d1b9adbeec05e294aeb68dde8bac4eab4ad7b5b02f8482165527918b | 2025-08-01T07:15:34.033000 | 2025-08-05T18:55:11.420000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 4b0b9abb4e1d9eda2a2f9f58b365a4620fa43da375f4467505cc0cd3be5be799 |
CVE-2025-8438 | A vulnerability classified as critical was found in code-projects Wazifa System 1.0. This vulnerability affects unknown code of the file /controllers/postpublish.php. The manipulation of the argument post leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may ... | 8b25accb57eddaf16e7e09d8e597954340729cff044efb49bde3ba9f508f119e | 2025-08-01T07:15:34.273000 | 2025-08-05T18:54:45.290000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 82addf699282dffcdbdf5a362af5a6356fd1907b1e6b0a4527ebd97c734c00d9 |
CVE-2025-8439 | A vulnerability, which was classified as critical, has been found in code-projects Wazifa System 1.0. This issue affects some unknown processing of the file /controllers/updatesettings.php. The manipulation of the argument Password leads to sql injection. The attack may be initiated remotely. The exploit has been discl... | 51cc26197070e8bc8ce1a1daf224bf6f9f40ab9e259f021ecfcba46f64da479c | 2025-08-01T07:15:34.473000 | 2025-08-05T18:54:32.310000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | ebd77c0ad7176f5da7c1275f45aa8d5bb10f6ae16338b39345de27215fc464c0 |
CVE-2025-8441 | A vulnerability, which was classified as critical, was found in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /pharsignup.php. The manipulation of the argument phuname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the publi... | 7f0d5bb9d754642a205bca5e9b2a8c8fabd3697b4b500ed32f463fa71c9e42c8 | 2025-08-01T08:15:26.370000 | 2025-08-05T18:54:00.843000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | ac2a138801df43808fd78cce7d3f25303f5bde2816d13ffc391ea93d1ca0b873 |
CVE-2025-8442 | A vulnerability has been found in code-projects Online Medicine Guide 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /cussignup.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed ... | a729923a615a45d1d8e26bfffb6e90e59c51a61bd7a4f87996c54bd76a32b497 | 2025-08-01T08:15:26.587000 | 2025-08-05T18:53:52.877000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 58bceeda40ef32d0ec7b3ea0468ea7238e32e239f6f9d6aedb6cd5f120753b41 |
CVE-2025-6398 | A null pointer dereference vulnerability exists in the IOMap64.sys driver of ASUS AI Suite 3. The vulnerability can be triggered by a specially crafted input, which may lead to a system crash (BSOD). Refer to the '
Security Update for for AI Suite 3
' section on the ASUS Security Advisory for more information. | 8a0b3bd171fd1bcd351455e3fbb7e5f8246fc031c87647357c5538d4fc21a45e | 2025-08-01T09:15:33.450000 | 2025-08-04T15:06:15.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=0 | 2025-10-29T13:52:01.759000 | 005b5c94d0bfc2459410e1cb2e04a617846bcd5cf30fec1b1ba6203e205bb010 |
CVE-KEV Snapshot (one-time, offline bundle)
This bundle lets you rank likely exploited CVEs and cite official sources without any APIs or accounts, fully offline. It’s a one-time snapshot of the last 90 days of NVD, aligned with CISA KEV for immediate focus on likely exploited CVEs. Query-ready Parquet tables and an optional small RAG pack let you rank by severity, pivot by CWE, and fetch references for briefings. Every row includes provenance; validation metrics and an integrity manifest are included. The compiled dataset is dedicated to the public domain (CC0).
Quick start (60 seconds)
- Open
demo/OVX_quickstart.html(no network) ordemo/OVX_quickstart.ipynb. - Or run this DuckDB query for top KEV CVEs by severity:
SELECT c.cve_id, m.cvss_v3_score, k.date_added
FROM read_parquet('parquet/kev.parquet') k
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
LIMIT 20;
Snapshot as of (UTC): 2025-10-29T13:51:37Z NVD window (days): 90
Accuracy at a glance
- Total CVE rows: 12307
- Total KEV rows: 28
- Artifacts: Validation Report · Integrity Check · Build Manifest
- KEV is window‑aligned; within‑window coverage = 1.0 by design. See
docs/VALIDATION.jsonforkev_rows_total_fetched,kev_rows_within_window,kev_rows_filtered_out, andkev_within_window_over_global_ratio.
- KEV is window‑aligned; within‑window coverage = 1.0 by design. See
What this is
A single, immutable dataset combining:
- CVE records (IDs, summaries) with CVSS and CWE from NVD (public domain)
- KEV flags from CISA (CC0)
- Provenance on every row and edge (source, source_url, retrieved_at, source_record_hash)
- A tiny RAG pack (embeddings + FAISS index) built only from PD/CC0 text
Who this is for
- Security ML teams: feature prototyping (KEV=true, CVSS, CWE signals)
- RAG/QA prototypers: grounded retrieval with official citations
- Analysts: local, verifiable artifact (no APIs/accounts)
What you can do quickly (offline)
- Rank KEV CVEs by severity; pivot by CWE categories
- Retrieve references for a CVE (official NVD/KEV links)
- Trial RAG with a tiny index (if the embedding model is cached locally)
- Inspect validation metrics and per-row provenance
Files
- parquet/: cve.parquet, nvd_meta.parquet, kev.parquet, edges.parquet, preview.parquet (~1000 CVEs; see preview criteria)
- rag/: index.faiss, meta.parquet, mapping.parquet, vectors.npy (optional)
- docs/: LICENSES.md, LICENCE.md (CC0 legal code), NOTICE.md, INTEGRITY.txt, VALIDATION.json (if enabled), BUILD_MANIFEST.json
- demo/: OVX_quickstart.ipynb (offline quickstart)
Validation and integrity
VALIDATION.json includes: counts, cvss_v3_presence_ratio, cwe_presence_ratio, kev_cve_coverage_ratio, kev_cve_coverage_ratio_within_window, kev_rows_total_fetched, kev_rows_within_window, kev_within_window_over_global_ratio, rejected_cve_count, url_shape_failures, http_head_failures_hard, http_head_failures_flaky, dead_reference_links, duplicate_edges_dropped, snapshot_as_of
URL checks (if present in this snapshot’s validation step) were executed conservatively with a single worker to reduce flakiness and rate limiting.
INTEGRITY.txt: SHA-256 list of all files in this bundle. Verify locally:
- macOS:
shasum -a 256 -c docs/INTEGRITY.txt - Linux:
sha256sum -c docs/INTEGRITY.txt
- macOS:
Build metadata: see
docs/BUILD_MANIFEST.jsonfor snapshot parameters (timestamp, NVD window, tool/version info, internal commit/config). Provided for transparency; the build system is not included.
RAG constraints
- Texts are PD/CC0-only (NVD short descriptions, KEV notes)
- meta.parquet: normalize=true, metric="IP", pinned model_name="BAAI/bge-small-en-v1.5" and dimension=384
- Retrieval requires the model to be present in local cache; no downloads
- If
rag/mapping.parquetis present, it maps FAISSrow_index→cve_idwith columns:row_index(int32),cve_id(string)
Preview parquet
parquet/preview.parquetis a convenience subset for quick inspection.- Selection: first 1000 rows by
cve_idordering fromparquet/cve.parquet. - Columns:
cve_id,summary,published_date,modified_date(when available); otherwise falls back to a best-effort subset.
Non-affiliation and license
- Not affiliated with NIST/NVD, CISA/KEV, or FIRST/EPSS
- NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
- Compiled artifact dedicated to the public domain under CC0 1.0 (see docs/LICENCE.md)
- Upstream sources: NVD (public domain), CISA KEV (CC0). Third‑party pages reached via reference URLs are governed by their own terms
Start here
- Open demo/OVX_quickstart.ipynb (no network calls)
- Or open demo/OVX_quickstart.html for a view-only quickstart
- Or query with DuckDB directly:
SELECT c.cve_id, m.cvss_v3_score, k.date_added
FROM read_parquet('parquet/kev.parquet') k
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
LIMIT 20;
Top queries to try (DuckDB)
-- Top KEV CVEs by CVSS
SELECT c.cve_id, m.cvss_v3_score, k.date_added
FROM read_parquet('parquet/kev.parquet') k
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
LIMIT 20;
-- Count malformed or missing CVSS
SELECT SUM(cvss_v3_score IS NULL) AS missing_cvss_v3, COUNT(*) AS total
FROM read_parquet('parquet/nvd_meta.parquet');
-- Top CWE categories by count
WITH u AS (
SELECT UNNEST(cwe_ids) AS cwe FROM read_parquet('parquet/nvd_meta.parquet')
)
SELECT cwe, COUNT(*) AS cnt
FROM u
GROUP BY cwe
ORDER BY cnt DESC
LIMIT 20;
-- References for a specific CVE
SELECT dst_id AS reference_url
FROM read_parquet('parquet/edges.parquet')
WHERE src_type='cve' AND src_id='CVE-2021-44228' AND edge_type='cve_ref_url'
ORDER BY reference_url;
Validation notes
- Where URL reachability checks were included, they used a single worker by default and domain-specific pacing (e.g., stricter for
vuldb.com). Counts of malformed URLs and network failures are summarized indocs/VALIDATION.json.
Limitations
- Some CVEs may lack CVSS vectors/scores in the NVD window (nulls are expected).
- URL checks are conservative and may still include dead or redirected links; always verify with official sources.
- KEV rows are filtered to the NVD window by design; KEV counts reflect in-window coverage, not global totals.
Scope and KEV alignment
- KEV is filtered to the same NVD window; only KEV CVEs that are also in the NVD window are included. Edges never reference out‑of‑window CVEs.
- Coverage metric naming:
kev_cve_coverage_ratio_within_windowreflects this alignment and is expected to be 1.0 by design. The legacy keykev_cve_coverage_ratiois retained and equals the within-window value. - Global context ratio:
kev_within_window_over_global_ratio = kev_rows_within_window / kev_rows_total_fetched(share of KEV entries that fall into this snapshot’s NVD window).
Schemas (columns and types)
parquet/cve.parquet
- cve_id: string
- summary: string
- description_hash: string
- published_date: timestamp[us, UTC]
- modified_date: timestamp[us, UTC]
- is_rejected: boolean
- source: string
- source_url: string
- retrieved_at: timestamp[us, UTC]
- source_record_hash: string
parquet/nvd_meta.parquet
- cve_id: string
- cvss_v3_score: float64 (nullable)
- cvss_v3_vector: string (nullable)
- cvss_v2_score: float64 (nullable)
- cwe_ids: list
- reference_urls: list
- ref_tags: list
- source: string
- source_url: string
- retrieved_at: timestamp[us, UTC]
- source_record_hash: string
parquet/kev.parquet
- cve_id: string
- date_added: date32[day]
- notes: string (nullable)
- source: string
- source_url: string
- retrieved_at: timestamp[us, UTC]
- source_record_hash: string
parquet/edges.parquet
- src_type: string
- src_id: string
- edge_type: string
- dst_type: string
- dst_id: string
- source: string
- source_url: string
- retrieved_at: timestamp[us, UTC]
rag/meta.parquet
- model_name: string
- dim: int32
- normalize: boolean
- metric: string
- texts_count: int64
Storage and performance notes
- Parquet compression:
snappy(writer default). - Disk footprint: varies by window; see your build output directory sizes to estimate download needs.
Uniqueness rules
- Primary keys:
cve.parquet:cve_idnvd_meta.parquet:cve_idkev.parquet:cve_id
- Edges composite uniqueness:
- Unique on (
src_type,src_id,edge_type,dst_type,dst_id,source) - Duplicates are dropped; see
duplicate_edges_droppedindocs/VALIDATION.json.
- Unique on (
Citation
If you use this snapshot, please cite:
"CVE-KEV Snapshot (2025-10-29T13:51:37Z)", CC0-1.0, https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-10-29
Usage
- DuckDB
SELECT c.cve_id, m.cvss_v3_score, k.date_added
FROM read_parquet('parquet/kev.parquet') k
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
LIMIT 20;
- Python (Pandas)
import pandas as pd
k = pd.read_parquet('parquet/kev.parquet')
c = pd.read_parquet('parquet/cve.parquet')
m = pd.read_parquet('parquet/nvd_meta.parquet')
df = k.merge(c, on='cve_id').merge(m[['cve_id','cvss_v3_score']], on='cve_id', how='left')
print(df.head())
- Python (Polars)
import polars as pl
k = pl.read_parquet('parquet/kev.parquet')
c = pl.read_parquet('parquet/cve.parquet')
m = pl.read_parquet('parquet/nvd_meta.parquet').select('cve_id','cvss_v3_score')
df = k.join(c, on='cve_id').join(m, on='cve_id', how='left')
print(df.head())
- Downloads last month
- 34