CVE Database

Comprehensive vulnerability intelligence with advanced analytics

7.8

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: Apr 08, 2025
Modified: Jul 09, 2025
Product: microsoft office_online_server
EPSS: 0.75%
View Details
7.2

Kentico Xperience before 13.0.178 has a specific set of allowed ContentUploader file extensions for unauthenticated uploads; however, because .zip is processed through TryZipProviderSafe, there is additional functionality to create files with other extensions. NOTE: this is a separate issue not necessarily related to SVG or XSS.

Published: Apr 06, 2025
Modified: Apr 08, 2025
Product: kentico xperience
EPSS: 0.21%
View Details
5.6

An issue was discovered on Mitel ICP VoIP 3100 devices. When a remote user attempts to log in via TELNET during the login wait time and an external call comes in, the system incorrectly divulges information about the call and any SMDR records generated by the system. The information provided…

Published: Apr 01, 2025
Modified: Apr 04, 2025
EPSS: 1.45%
View Details
8.6

YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. This vulnerability is fixed in 4.5.2.

Published: Apr 01, 2025
Modified: May 09, 2025
Product: yeswiki yeswiki
EPSS: 8.42%
View Details
9.8

The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those…

Published: Mar 28, 2025
Modified: Mar 28, 2025
EPSS: 54.35%
View Details
9.8

An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component.

Published: Mar 27, 2025
Modified: Jun 09, 2025
EPSS: 85.32%
View Details
7.5

An Improper Link Resolution Before File Access ("Link Following") and Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"). This vulnerability occurs when extracting a maliciously crafted tar file, which can result in unauthorized file writes or overwrites outside the intended extraction directory. The issue is associated with…

Published: Mar 27, 2025
Modified: Nov 03, 2025
EPSS: 0.99%
View Details
6.5

An issue was discovered in Appsmith before 1.51. A user on Appsmith that doesn't have admin permissions can trigger the restart API on Appsmith, causing a server restart. This is still within the Appsmith container, and the impact is limited to Appsmith's own server only, but there is a denial…

Published: Mar 26, 2025
Modified: Apr 01, 2025
Product: appsmith appsmith
EPSS: 24.26%
View Details
9.8

A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the…

Published: Mar 25, 2025
Modified: Nov 10, 2025
EPSS: 91.55%
View Details
5.3

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This…

Published: Mar 24, 2025
Modified: Sep 23, 2025
Product: vitejs vite
EPSS: 88.12%
View Details
9.1

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it…

Published: Mar 21, 2025
Modified: Sep 10, 2025
Product: vercel next.js
EPSS: 92.90%
View Details
7.3

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.

Published: Mar 11, 2025
Modified: Jul 07, 2025
Product: microsoft windows_11_22h2
EPSS: 2.03%
View Details
6.5

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

Published: Mar 11, 2025
Modified: Jul 03, 2025
Product: microsoft windows_10_1507
EPSS: 57.65%
View Details
9.8

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

Published: Mar 11, 2025
Modified: Jul 31, 2025
Product: keras keras
EPSS: 4.79%
View Details
6.3

A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla and classified as critical. This issue affects some unknown processing of the file /extensions/realestate/index.php/properties/list/list-with-sidebar/realties of the component GET Parameter Handler. The manipulation of the argument title leads to sql injection. The attack may be initiated remotely. The exploit…

Published: Mar 09, 2025
Modified: Mar 11, 2025
Product: joomlaux jux_real_estate
EPSS: 0.59%
View Details
4.8

The Reservit Hotel WordPress plugin before 3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

Published: Mar 07, 2025
Modified: Jan 09, 2026
Product: reservit reservit_hotel
EPSS: 2.25%
View Details
5.1

GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less (fixed in 6.2.0), is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process.

Published: Feb 28, 2025
Modified: Mar 19, 2025
EPSS: 0.33%
View Details
8.8

GeoVision GV-ASWeb with the version 6.1.2.0 or less (fixed in 6.2.0), contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.

Published: Feb 27, 2025
Modified: Mar 19, 2025
EPSS: 10.53%
View Details

A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.. This issue affects DocsGPT: from 0.8.1 through 0.12.0.

Published: Feb 20, 2025
Modified: Oct 03, 2025
EPSS: 11.13%
View Details
5.3

Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.

Published: Feb 20, 2025
Modified: Feb 20, 2025
EPSS: 62.83%
View Details
5.3

An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory.

Published: Feb 06, 2025
Modified: Feb 11, 2025
EPSS: 8.20%
View Details
9.1

A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node. This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker…

Published: Feb 05, 2025
Modified: Mar 28, 2025
Product: cisco identity_services_engine
EPSS: 0.20%
View Details
9.9

A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device. This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending…

Published: Feb 05, 2025
Modified: Mar 28, 2025
Product: cisco identity_services_engine
EPSS: 0.99%
View Details
9.8

An issue in compop.ca ONLINE MALL v.3.5.3 allows a remote attacker to execute arbitrary code via the rid, tid, et, and ts parameters.

Published: Feb 04, 2025
Modified: Feb 06, 2025
EPSS: 3.15%
View Details