CVE Alert: CVE-2024-35295
Vulnerability Summary: CVE-2024-35295 A vulnerability has been identified in Perfect Harmony GH180 (All versions >= V8.0 < V8.3.3 with NXGPro+...
Vulnerability Summary: CVE-2024-35295 A vulnerability has been identified in Perfect Harmony GH180 (All versions >= V8.0 < V8.3.3 with NXGPro+...
Vulnerability Summary: CVE-2025-4798 The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and...
Vulnerability Summary: CVE-2025-4799 The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on...
Vulnerability Summary: CVE-2025-5395 The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file...
Vulnerability Summary: CVE-2025-26412 The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands...
Vulnerability Summary: CVE-2025-4315 The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to Privilege Escalation in all...
Vulnerability Summary: CVE-2025-41661 An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack...
Vulnerability Summary: CVE-2025-4573 Mattermost versions 10.7.x
Vulnerability Summary: CVE-2025-41662 An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack...
Vulnerability Summary: CVE-2025-5986 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the...
Vulnerability Summary: CVE-2025-49710 An integer overflow was present in `OrderedHashTable` used by the JavaScript engine This vulnerability affects Firefox <...
Vulnerability Summary: CVE-2025-3302 The Xagio SEO – AI Powered SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via...
Vulnerability Summary: CVE-2025-49709 Certain canvas operations could have lead to memory corruption. This vulnerability affects Firefox < 139.0.4. Affected Endpoints:...
Vulnerability Summary: CVE-2025-4128 Mattermost versions 10.5.x
Vulnerability Summary: CVE-2025-32711 Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network. Affected...
Vulnerability Summary: CVE-2025-5687 A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root. *This...
Vulnerability Summary: CVE-2025-35941 A password is exposed locally. Affected Endpoints: No affected endpoints listed. Published Date: 6/11/2025, 2:15:33 PM ⚠️...
Vulnerability Summary: CVE-2025-5144 The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-date-*’ parameters...
Vulnerability Summary: CVE-2025-40914 Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX...
Vulnerability Summary: CVE-2025-48013 Missing Authorization vulnerability in Drupal Quick Node Block allows Forceful Browsing.This issue affects Quick Node Block: from...
Vulnerability Summary: CVE-2025-4922 Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup can lead to incorrect rule application and...
Vulnerability Summary: CVE-2025-3473 IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due...
Vulnerability Summary: CVE-2025-4605 A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability....
Vulnerability Summary: CVE-2025-0163 IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate...