Red Hot Cyber
La cybersecurity è condivisione. Riconosci il rischio, combattilo, condividi le tue esperienze ed incentiva gli altri a fare meglio di te.
Cerca

Lista delle CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database degli Stati Uniti d'America. Se la vostra infrastruttura utilizza questi prodotti, è fondamentale prestare la massima attenzione per prevenire possibili sfruttamenti da parte di malintenzionati che potrebbero compromettere la sicurezza dei vostri sistemi.

📅 2025-08-15

🔧 Unknown

CVE-2025-9023 (score: 8.8, severity: HIGH)
A vulnerability has been found in Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Affected is the function formSetSchedLed of the file /goform/SetLEDCfg. The manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 15/08/2025 09:15:31
Ultima modifica: 15/08/2025 09:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-9023

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-7778 (score: 9.8, severity: CRITICAL)
The Icons Factory plugin for WordPress is vulnerable to Arbitrary File Deletion due to insufficient authorization and improper path validation within the delete_files() function in all versions up to, and including, 1.6.12. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Source Identifier: [email protected]
Pubblicato il: 15/08/2025 09:15:30
Ultima modifica: 15/08/2025 09:15:30
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7778

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-6679 (score: 9.8, severity: CRITICAL)
The Bit Form builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 2.20.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. For this to be exploitable, the PRO version needs to be installed and activated as well. Additionally a form with an advanced file upload element needs to be published.
Source Identifier: [email protected]
Pubblicato il: 15/08/2025 07:15:28
Ultima modifica: 15/08/2025 07:15:28
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6679

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-9007 (score: 8.8, severity: HIGH)
A vulnerability has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function formeditFileName of the file /goform/editFileName. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 15/08/2025 04:15:57
Ultima modifica: 15/08/2025 04:15:57
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-9007

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-9006 (score: 8.8, severity: HIGH)
A vulnerability was identified in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function formdelFileName of the file /goform/delFileName. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 15/08/2025 03:15:38
Ultima modifica: 15/08/2025 03:15:38
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-9006

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

📅 2025-08-14

🔧 Unknown

CVE-2025-55708 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Systems Quiz And Survey Master allows SQL Injection. This issue affects Quiz And Survey Master: from n/a through 10.2.4.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 19:15:42
Ultima modifica: 14/08/2025 19:15:42
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-55708

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-53587 (score: 8.8, severity: HIGH)
Cross-Site Request Forgery (CSRF) vulnerability in ApusTheme Findgo allows Cross Site Request Forgery. This issue affects Findgo: from n/a through 1.3.57.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 19:15:36
Ultima modifica: 14/08/2025 19:15:36
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53587

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-20263 (score: 8.6, severity: HIGH)
A vulnerability in the web services interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected system.  This vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could cause the system to reload, resulting in a denial of service (DoS) condition.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:39
Ultima modifica: 14/08/2025 17:15:39
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20263

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20265 (score: 10, severity: CRITICAL)
A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.  This vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high privilege level. Note: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:39
Ultima modifica: 14/08/2025 17:15:39
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20265

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 6
Fonti:
CVE-2025-20243 (score: 8.6, severity: HIGH)
A vulnerability in the management and VPN web servers of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability is due to improper validation of user-supplied input on an interface with VPN web services. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on an affected device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:38
Ultima modifica: 14/08/2025 17:15:38
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20243

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20251 (score: 8.5, severity: HIGH)
A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover. This vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive. To exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:38
Ultima modifica: 14/08/2025 17:15:38
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20251

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: LOW
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-20253 (score: 8.6, severity: HIGH)
A vulnerability in the IKEv2 feature of Cisco IOS Software, IOS XE Software, Secure Firewall ASA Software, and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a DoS condition. This vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause an infinite loop that exhausts resources and could cause the device to reload.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:38
Ultima modifica: 14/08/2025 17:15:38
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20253

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20239 (score: 8.6, severity: HIGH)
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition. This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:37
Ultima modifica: 14/08/2025 17:15:37
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20239

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20222 (score: 8.6, severity: HIGH)
A vulnerability in the RADIUS proxy feature for the IPsec VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper processing of IPv6 packets. An attacker could exploit this vulnerability by sending IPv6 packets over an IPsec VPN connection to an affected device. A successful exploit could allow the attacker to trigger a reload of the device, resulting in a DoS condition.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:36
Ultima modifica: 14/08/2025 17:15:36
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20222

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20136 (score: 8.6, severity: HIGH)
A vulnerability in the function that performs IPv4 and IPv6 Network Address Translation (NAT) DNS inspection for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.  This vulnerability is due to an infinite loop condition that occurs when a Cisco Secure ASA or Cisco Secure FTD device processes DNS packets with DNS inspection enabled and the device is configured for NAT44, NAT64, or NAT46. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static NAT rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to create an infinite loop and cause the device to reload, resulting in a DoS condition.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:35
Ultima modifica: 14/08/2025 17:15:35
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20136

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20148 (score: 8.5, severity: HIGH)
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document. This vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only).
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:35
Ultima modifica: 14/08/2025 17:15:35
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20148

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: LOW
  • Availability Impact: NONE
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-20217 (score: 8.6, severity: HIGH)
A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:35
Ultima modifica: 14/08/2025 17:15:35
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20217

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20133 (score: 8.6, severity: HIGH)
A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition. This vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:34
Ultima modifica: 14/08/2025 17:15:34
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20133

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-20134 (score: 8.6, severity: HIGH)
A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending a crafted SSL/TLS certificate to an affected system through a listening SSL/TLS socket. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 17:15:34
Ultima modifica: 14/08/2025 17:15:34
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-20134

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 4
Fonti:
CVE-2025-40758 (score: 8.7, severity: HIGH)
A vulnerability has been identified in Mendix SAML (Mendix 10.12 compatible) (All versions < V4.0.3), Mendix SAML (Mendix 10.21 compatible) (All versions < V4.1.2), Mendix SAML (Mendix 9.24 compatible) (All versions < V3.6.21). Affected versions of the module insufficiently enforce signature validation and binding checks. This could allow unauthenticated remote attackers to hijack an account in specific SSO configurations.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 15:15:36
Ultima modifica: 14/08/2025 15:15:36
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-40758

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.2
  • Impact Score: 5.8
Fonti:
CVE-2024-53945 (score: 8.8, severity: HIGH)
The KuWFi 4G AC900 LTE router 1.0.13 is vulnerable to command injection on the HTTP API endpoints /goform/formMultiApnSetting and /goform/atCmd. An authenticated attacker can execute arbitrary OS commands with root privileges via shell metacharacters in parameters such as pincode and cmds. Exploitation can lead to full system compromise, including enabling remote access (e.g., enabling telnet).
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 14:15:30
Ultima modifica: 14/08/2025 19:15:30
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2024-53945

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2024-53946 (score: 8.8, severity: HIGH)
The KuWFi 4G LTE AC900 router 1.0.13 is vulnerable to Cross-Site Request Forgery (CSRF) on its web management interface. This vulnerability allows an attacker to trick an authenticated admin user into performing unauthorized actions, such as exploiting a command injection vulnerability in /goform/formMultiApnSetting. Successful exploitation can also lead to unauthorized configuration changes.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 14:15:30
Ultima modifica: 14/08/2025 16:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2024-53946

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8714 (score: 8.8, severity: HIGH)
Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.
Source Identifier: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Pubblicato il: 14/08/2025 13:15:37
Ultima modifica: 14/08/2025 13:15:37
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8714

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8715 (score: 8.8, severity: HIGH)
Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.
Source Identifier: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Pubblicato il: 14/08/2025 13:15:37
Ultima modifica: 14/08/2025 13:15:37
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8715

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-54707 (score: 9.3, severity: CRITICAL)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 MDTF allows SQL Injection. This issue affects MDTF: from n/a through 1.3.3.7.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:53
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54707

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.9
  • Impact Score: 4.7
Fonti:
CVE-2025-8958 (score: 8.8, severity: HIGH)
A vulnerability was identified in Tenda TX3 16.03.13.11_multi_TDE01. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:53
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8958

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-54693 (score: 9, severity: CRITICAL)
Unrestricted Upload of File with Dangerous Type vulnerability in epiphyt Form Block allows Upload a Web Shell to a Web Server. This issue affects Form Block: from n/a through 1.5.5.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:50
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54693

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.2
  • Impact Score: 6
Fonti:
CVE-2025-54686 (score: 9.8, severity: CRITICAL)
Deserialization of Untrusted Data vulnerability in scriptsbundle Exertio allows Object Injection. This issue affects Exertio: from n/a through 1.3.2.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:48
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54686

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-54678 (score: 9.3, severity: CRITICAL)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in hassantafreshi Easy Form Builder allows Blind SQL Injection. This issue affects Easy Form Builder: from n/a through 3.8.15.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:46
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54678

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.9
  • Impact Score: 4.7
Fonti:
CVE-2025-54669 (score: 9.3, severity: CRITICAL)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RomanCode MapSVG allows SQL Injection. This issue affects MapSVG: from n/a through n/a.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:45
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54669

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.9
  • Impact Score: 4.7
Fonti:
CVE-2025-52820 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in infosoftplugin WooCommerce Point Of Sale (POS) allows SQL Injection. This issue affects WooCommerce Point Of Sale (POS): from n/a through 1.4.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:44
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-52820

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-52823 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ovatheme Cube Portfolio allows SQL Injection. This issue affects Cube Portfolio: from n/a through 1.16.8.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:44
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-52823

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-52732 (score: 8.8, severity: HIGH)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 Google Map Targeting allows PHP Local File Inclusion. This issue affects Google Map Targeting: from n/a through 1.1.6.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:43
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-52732

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-52720 (score: 9.3, severity: CRITICAL)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in highwarden Super Store Finder allows SQL Injection. This issue affects Super Store Finder: from n/a through 7.5.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:42
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-52720

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.9
  • Impact Score: 4.7
Fonti:
CVE-2025-49869 (score: 8.8, severity: HIGH)
Deserialization of Untrusted Data vulnerability in Arraytics Eventin allows Object Injection. This issue affects Eventin: from n/a through 4.0.31.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:40
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49869

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-49887 (score: 9.9, severity: CRITICAL)
Improper Control of Generation of Code ('Code Injection') vulnerability in WPFactory Product XML Feed Manager for WooCommerce allows Remote Code Inclusion. This issue affects Product XML Feed Manager for WooCommerce: from n/a through 2.9.3.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:40
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49887

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 6
Fonti:
CVE-2025-49267 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shabti Kaplan Frontend Admin by DynamiApps allows Blind SQL Injection. This issue affects Frontend Admin by DynamiApps: from n/a through 3.28.3.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:39
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49267

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-49059 (score: 9.3, severity: CRITICAL)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CleverReach® CleverReach® WP allows SQL Injection. This issue affects CleverReach® WP: from n/a through 1.5.20.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:38
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49059

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.9
  • Impact Score: 4.7
Fonti:
CVE-2025-48293 (score: 9.8, severity: CRITICAL)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Dylan Kuhn Geo Mashup allows PHP Local File Inclusion. This issue affects Geo Mashup: from n/a through 1.13.16.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:35
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-48293

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-49033 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid allows Blind SQL Injection. This issue affects ProfileGrid : from n/a through 5.9.5.3.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:35
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49033

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-39510 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Pinterest Automatic Pin allows SQL Injection. This issue affects Pinterest Automatic Pin: from n/a through n/a.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:34
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-39510

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-30998 (score: 8.5, severity: HIGH)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rico Macchi WP Links Page allows SQL Injection. This issue affects WP Links Page: from n/a through 4.9.6.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:33
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-30998

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • Exploitability Score: 3.1
  • Impact Score: 4.7
Fonti:
CVE-2025-25174 (score: 10, severity: CRITICAL)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 BeeTeam368 Extensions allows PHP Local File Inclusion. This issue affects BeeTeam368 Extensions: from n/a through 1.9.4.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:31
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-25174

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 6
Fonti:
CVE-2025-24775 (score: 9.9, severity: CRITICAL)
Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server. This issue affects Forms: from n/a through 2.9.0.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 11:15:30
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-24775

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 6
Fonti:
CVE-2025-8047 (score: 9.8, severity: CRITICAL)
The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 10:15:29
Ultima modifica: 14/08/2025 15:15:42
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8047

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-8943 (score: 9.8, severity: CRITICAL)
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 10:15:29
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8943

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-55346 (score: 9.8, severity: CRITICAL)
User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 10:15:26
Ultima modifica: 14/08/2025 16:15:41
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-55346

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-8940 (score: 8.8, severity: HIGH)
A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this vulnerability is the function strcpy of the file /goform/saveParentControlInfo. The manipulation of the argument Time leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 06:15:29
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8940

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8939 (score: 8.8, severity: HIGH)
A vulnerability was determined in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/WifiGuestSet. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Source Identifier: [email protected]
Pubblicato il: 14/08/2025 06:15:28
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8939

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

📅 2025-08-13

🔧 google

CVE-2025-8901 (score: 8.8, severity: HIGH)
Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:40
Ultima modifica: 14/08/2025 01:07:54
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8901

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8882 (score: 8.8, severity: HIGH)
Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:39
Ultima modifica: 14/08/2025 01:07:41
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8882

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8880 (score: 8.8, severity: HIGH)
Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:37
Ultima modifica: 14/08/2025 01:07:29
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8880

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8879 (score: 8.8, severity: HIGH)
Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:33
Ultima modifica: 14/08/2025 01:07:06
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8879

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

🔧 apple

CVE-2025-8901 (score: 8.8, severity: HIGH)
Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:40
Ultima modifica: 14/08/2025 01:07:54
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8901

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8882 (score: 8.8, severity: HIGH)
Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:39
Ultima modifica: 14/08/2025 01:07:41
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8882

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8880 (score: 8.8, severity: HIGH)
Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:37
Ultima modifica: 14/08/2025 01:07:29
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8880

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8879 (score: 8.8, severity: HIGH)
Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:33
Ultima modifica: 14/08/2025 01:07:06
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8879

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

🔧 linux

CVE-2025-8901 (score: 8.8, severity: HIGH)
Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:40
Ultima modifica: 14/08/2025 01:07:54
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8901

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8882 (score: 8.8, severity: HIGH)
Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:39
Ultima modifica: 14/08/2025 01:07:41
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8882

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8880 (score: 8.8, severity: HIGH)
Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:37
Ultima modifica: 14/08/2025 01:07:29
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8880

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8879 (score: 8.8, severity: HIGH)
Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:33
Ultima modifica: 14/08/2025 01:07:06
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8879

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

🔧 microsoft

CVE-2025-8901 (score: 8.8, severity: HIGH)
Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:40
Ultima modifica: 14/08/2025 01:07:54
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8901

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8882 (score: 8.8, severity: HIGH)
Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:39
Ultima modifica: 14/08/2025 01:07:41
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8882

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8880 (score: 8.8, severity: HIGH)
Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:37
Ultima modifica: 14/08/2025 01:07:29
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8880

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8879 (score: 8.8, severity: HIGH)
Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 03:15:33
Ultima modifica: 14/08/2025 01:07:06
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8879

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

🔧 Unknown

CVE-2025-43982 (score: 9.8, severity: CRITICAL)
Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices enable the SSH service by default. There is a hidden hard-coded root account that cannot be disabled in the GUI.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 20:15:30
Ultima modifica: 14/08/2025 14:15:30
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-43982

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-43986 (score: 9.8, severity: CRITICAL)
An issue was discovered on KuWFi GC111 GC111-GL-LM321_V3.0_20191211 devices. The TELNET service is enabled by default and exposed over the WAN interface without authentication.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 20:15:30
Ultima modifica: 14/08/2025 14:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-43986

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-6186 (score: 8.7, severity: HIGH)
An issue has been discovered in GitLab CE/EE affecting all versions from 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed authenticated users to achieve account takeover by injecting malicious HTML into work item names.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 18:15:32
Ultima modifica: 14/08/2025 13:12:09
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6186

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.3
  • Impact Score: 5.8
Fonti:
CVE-2025-7734 (score: 8.7, severity: HIGH)
An issue has been discovered in GitLab CE/EE affecting all versions from 14.2 before 18.0.6, 18.1 before 18.1.4 and 18.2 before 18.2.2 that, under certain conditions, could have allowed a successful attacker to execute actions on behalf of users by injecting malicious content.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 18:15:32
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7734

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.3
  • Impact Score: 5.8
Fonti:
CVE-2025-7739 (score: 8.7, severity: HIGH)
An issue has been discovered in GitLab CE/EE affecting all versions from 18.2 before 18.2.2 that, under certain conditions, could have allowed authenticated users to achieve stored cross-site scripting by injecting malicious HTML content in scoped label descriptions.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 18:15:32
Ultima modifica: 14/08/2025 13:11:53
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7739

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.3
  • Impact Score: 5.8
Fonti:
CVE-2025-52385 (score: 9.8, severity: CRITICAL)
An issue in Studio 3T v.2025.1.0 and before allows a remote attacker to execute arbitrary code via a crafted payload to the child_process module
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 17:15:28
Ultima modifica: 14/08/2025 14:15:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-52385

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-50594 (score: 9.8, severity: CRITICAL)
An issue was discovered in /Code/Websites/DanpheEMR/Controllers/Settings/SecuritySettingsController.cs in Danphe Health Hospital Management System EMR 3.2 allowing attackers to reset any account password.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 17:15:27
Ultima modifica: 14/08/2025 14:15:31
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-50594

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-50251 (score: 9.1, severity: CRITICAL)
Server side request forgery (SSRF) vulnerability in makeplane plane 0.23.1 via the password recovery.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 15:15:34
Ultima modifica: 13/08/2025 21:15:35
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-50251

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 3.9
  • Impact Score: 5.2
Fonti:
CVE-2025-55154 (score: 8.8, severity: HIGH)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, the magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption. This issue has been patched in versions 6.9.13-27 and 7.1.2-1.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 14:15:33
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-55154

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-54382 (score: 9.6, severity: CRITICAL)
Cherry Studio is a desktop client that supports for multiple LLM providers. In version 1.5.1, a remote code execution (RCE) vulnerability exists in the Cherry Studio platform when connecting to streamableHttp MCP servers. The issue arises from the server’s implicit trust in the oauth auth redirection endpoints and failure to properly sanitize the URL. This issue has been patched in version 1.5.2.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 14:15:32
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54382

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 6
Fonti:
CVE-2025-32451 (score: 8.8, severity: HIGH)
A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uninitialized pointer. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 14:15:31
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-32451

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8913 (score: 9.8, severity: CRITICAL)
Organization Portal System developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 10:15:27
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8913

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-55345 (score: 8.8, severity: HIGH)
Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 09:15:29
Ultima modifica: 13/08/2025 20:15:32
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-55345

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8760 (score: 9.8, severity: CRITICAL)
A vulnerability was identified in INSTAR 2K+ and 4K 3.11.1 Build 1124. This affects the function base64_decode of the component fcgi_server. The manipulation of the argument Authorization leads to buffer overflow. It is possible to initiate the attack remotely.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 07:15:28
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8760

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-6184 (score: 8.8, severity: HIGH)
The Tutor LMS Pro – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter used in the get_submitted_assignments() function in all versions up to, and including, 3.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Tutor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only the Pro version is affected.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 07:15:27
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6184

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-6715 (score: 9.8, severity: CRITICAL)
The LatePoint WordPress plugin before 5.1.94 is vulnerable to Local File Inclusion via the layout parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 06:15:26
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6715

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7384 (score: 9.8, severity: CRITICAL)
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 05:15:26
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7384

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

🔧 totolink

CVE-2025-51451 (score: 9.8, severity: CRITICAL)
In TOTOLINK EX1200T firmware 4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 17:15:27
Ultima modifica: 14/08/2025 15:15:37
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-51451

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-51452 (score: 9.8, severity: CRITICAL)
In TOTOLINK A7000R firmware 9.1.0u.6115_B20201022, an attacker can bypass login by sending a specific request through formLoginAuth.htm.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 16:15:32
Ultima modifica: 14/08/2025 14:15:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-51452

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

🔧 mybb

CVE-2011-10018 (score: 9.8, severity: CRITICAL)
myBB version 1.6.4 was distributed with an unauthorized backdoor embedded in the source code. The backdoor allowed remote attackers to execute arbitrary PHP code by injecting payloads into a specially crafted collapsed cookie. This vulnerability was introduced during packaging and was not part of the intended application logic. Exploitation requires no authentication and results in full compromise of the web server under the context of the web application.
Source Identifier: [email protected]
Pubblicato il: 13/08/2025 21:15:29
Ultima modifica: 14/08/2025 17:42:18
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2011-10018

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

📅 2025-08-12

🔧 Unknown

CVE-2025-49457 (score: 9.6, severity: CRITICAL)
Untrusted search path in certain Zoom Clients for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 23:15:28
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49457

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 6
Fonti:
CVE-2025-53778 (score: 8.8, severity: HIGH)
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:46
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53778

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-53772 (score: 8.8, severity: HIGH)
Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:45
Ultima modifica: 13/08/2025 17:33:46
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53772

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-53143 (score: 8.8, severity: HIGH)
Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:38
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53143

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-53144 (score: 8.8, severity: HIGH)
Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:38
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53144

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-53145 (score: 8.8, severity: HIGH)
Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:38
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53145

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-53131 (score: 8.8, severity: HIGH)
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:36
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53131

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-49757 (score: 8.8, severity: HIGH)
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:31
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49757

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-49712 (score: 8.8, severity: HIGH)
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:30
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49712

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-49557 (score: 8.7, severity: HIGH)
Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be exploited by a low-privileged attacker to inject malicious scripts into vulnerable form fields. These scripts may be used to escalate privileges within the application or compromise sensitive user data. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. Scope is changed.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:29
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49557

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: REQUIRED
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 2.3
  • Impact Score: 5.8
Fonti:
CVE-2025-24325 (score: 8.8, severity: HIGH)
Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 17:15:33
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-24325

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2
  • Impact Score: 6
Fonti:
CVE-2025-55010 (score: 9.1, severity: CRITICAL)
Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event["data"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 16:15:28
Ultima modifica: 13/08/2025 17:34:12
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-55010

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.3
  • Impact Score: 6
Fonti:
CVE-2025-40746 (score: 9.1, severity: CRITICAL)
A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V3.2). Affected products do not properly validate input for a backup script. This could allow an authenticated remote attacker with high privileges in the application to execute arbitrary code with 'NT Authority/SYSTEM' privileges.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 12:15:36
Ultima modifica: 12/08/2025 14:25:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-40746

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.3
  • Impact Score: 6
Fonti:
CVE-2025-8418 (score: 8.8, severity: HIGH)
The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Arbitrary Plugin Installation in all versions up to, and including, 1.1.30. This is due to missing capability checks on the activated_plugin function. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the server which can make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 07:15:30
Ultima modifica: 12/08/2025 14:25:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8418

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-8059 (score: 9.8, severity: CRITICAL)
The B Blocks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization and improper input validation within the rgfr_registration() function in all versions up to, and including, 2.0.6. This makes it possible for unauthenticated attackers to create a new account and assign it the administrator role.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 05:15:32
Ultima modifica: 12/08/2025 14:25:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-8059

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-42957 (score: 9.9, severity: CRITICAL)
SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 03:15:28
Ultima modifica: 12/08/2025 14:25:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-42957

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 6
Fonti:
CVE-2025-42950 (score: 9.9, severity: CRITICAL)
SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 03:15:27
Ultima modifica: 12/08/2025 14:25:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-42950

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.1
  • Impact Score: 6
Fonti:
CVE-2025-42951 (score: 8.8, severity: HIGH)
Due to broken authorization, SAP Business One (SLD) allows an authenticated attacker to gain administrator privileges of a database by invoking the corresponding API.�As a result , it has a high impact on the confidentiality, integrity, and availability of the application.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 03:15:27
Ultima modifica: 12/08/2025 14:25:33
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-42951

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

🔧 microsoft

CVE-2025-53766 (score: 9.8, severity: CRITICAL)
Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:45
Ultima modifica: 14/08/2025 17:11:06
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53766

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-53727 (score: 8.8, severity: HIGH)
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:42
Ultima modifica: 14/08/2025 01:20:00
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53727

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-50171 (score: 9.1, severity: CRITICAL)
Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:35
Ultima modifica: 14/08/2025 17:06:56
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-50171

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • Exploitability Score: 3.9
  • Impact Score: 5.2
Fonti:
CVE-2025-50165 (score: 9.8, severity: CRITICAL)
Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:34
Ultima modifica: 14/08/2025 17:05:02
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-50165

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-50163 (score: 8.8, severity: HIGH)
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:33
Ultima modifica: 14/08/2025 17:41:02
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-50163

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: REQUIRED
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-49758 (score: 8.8, severity: HIGH)
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:31
Ultima modifica: 14/08/2025 01:20:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49758

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-49759 (score: 8.8, severity: HIGH)
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:31
Ultima modifica: 14/08/2025 01:20:16
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-49759

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-47954 (score: 8.8, severity: HIGH)
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:28
Ultima modifica: 14/08/2025 01:19:28
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-47954

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:
CVE-2025-24999 (score: 8.8, severity: HIGH)
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 18:15:27
Ultima modifica: 14/08/2025 17:14:01
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-24999

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 2.8
  • Impact Score: 5.9
Fonti:

🔧 fortinet

CVE-2025-25256 (score: 9.8, severity: CRITICAL)
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 19:15:28
Ultima modifica: 13/08/2025 20:23:18
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-25256

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

🔧 wegia

CVE-2025-55168 (score: 9.8, severity: CRITICAL)
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a SQL Injection vulnerability was identified in the /html/saude/aplicar_medicamento.php endpoint, specifically in the id_fichamedica parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue has been patched in version 3.4.8.
Source Identifier: [email protected]
Pubblicato il: 12/08/2025 19:15:36
Ultima modifica: 14/08/2025 01:30:09
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-55168

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti: