The CVE-2025-52650 vulnerability allows inline script execution despite Content Security Policy (CSP) restrictions in HCL AION version 2.0, potentially enabling attackers to inject and execute malicious scripts.
This vulnerability is a problem because it can lead to cross-site scripting (XSS) attacks, where an attacker can inject malicious code into a website, steal user data, or take control of user sessions, compromising the security and integrity of the system.
The CVE-2025-52634 vulnerability allows sensitive information to be exposed to unauthorized actors in HCL AION version 2.0, potentially giving them access to confidential data.
This vulnerability is a problem because it can lead to unauthorized access to sensitive information, which can result in data breaches, intellectual property theft, and other malicious activities, compromising the security and integrity of the affected system.
The CVE-2025-52632 vulnerability occurs when an encrypted session cookie in HCL AION lacks a secure attribute, allowing the cookie to be transmitted over an insecure connection.
This vulnerability is a problem because it enables attackers to intercept and access sensitive session information, potentially leading to unauthorized access, data theft, or other malicious activities, compromising the security and confidentiality of user data.
The CVE-2025-52630 vulnerability allows unauthorized access to sensitive information in HCL AION version 2.0, potentially exposing confidential data to unwanted parties.
This vulnerability is a problem because it can lead to the unauthorized disclosure of sensitive information, which can be used for malicious purposes, compromising the security and privacy of the affected system and its users.
This vulnerability allows an attacker to perform a Reflected Cross-Site Scripting (XSS) attack on Xibo CMS version 4.1.2 by creating a malicious template with a specially crafted 'Configuration Name' field, potentially executing unwanted code on a user's browser.
This vulnerability is a problem because it enables attackers to inject malicious scripts into a user's browser, potentially leading to unauthorized access, data theft, or other malicious activities, by exploiting the lack of proper validation of user input in the Xibo CMS.
This vulnerability allows an attacker to store malicious code in Xibo Signage's Xibo CMS v4.1.2 by creating a template, adding a text element, and modifying the text field with a malicious payload, enabling a Stored Cross-Site Scripting (XSS) attack.
This vulnerability is a problem because it enables attackers to inject malicious code into the system, which can then be executed by other users, potentially leading to unauthorized access, data theft, or other malicious activities.
This vulnerability allows sensitive information to be inserted into log files in Elasticsearch when auditing requests to the reindex API, potentially exposing confidential data under specific conditions.
This vulnerability is a problem because it can lead to a loss of confidentiality, where unauthorized parties may gain access to sensitive information that is not intended for public disclosure, compromising the security and privacy of the data stored in Elasticsearch.
The CVE-2025-30001 vulnerability allows incorrect execution-assigned permissions in Apache StreamPark, potentially leading to unauthorized access or actions.
This vulnerability is a problem because it can enable malicious users to perform actions they shouldn't be allowed to, compromising the security and integrity of the system.
The CVE-2025-25018 vulnerability allows an attacker to inject malicious code into Kibana's web pages due to improper handling of user input, leading to stored Cross-Site Scripting (XSS) attacks.
This vulnerability is a problem because it enables attackers to execute malicious scripts on users' browsers, potentially stealing sensitive information, hijacking user sessions, or performing unauthorized actions, which can compromise the security and integrity of the affected system.
This vulnerability allows an attacker to inject malicious code into Kibana's web pages due to improper handling of user input, leading to Cross-Site Scripting (XSS) attacks.
This vulnerability is a problem because it enables attackers to execute malicious scripts on users' browsers, potentially stealing sensitive information, taking control of user sessions, or performing unauthorized actions.
The CVE-2025-52655 vulnerability in HCL MyXalytics v6.6 allows the application to load third-party scripts without checking their integrity or validating their source, which can lead to external code running within the application.
This vulnerability is a problem because it enables external code to run in the application's context, potentially exposing sensitive data and putting the security of the application and its users at risk.
This vulnerability allows an attacker to store malicious code in the Energy CRM system by exploiting a lack of input validation in the "customerName_0" parameter of a POST request to "/crm/create_invoice_submit.php", enabling them to send a specially crafted query to an authenticated user.
This problem is significant because it could allow a remote attacker to steal an authenticated user's cookie session details, potentially leading to unauthorized access to sensitive information and system compromise.
This vulnerability allows low-privileged users with authentication to access sensitive user information, including email addresses of other accounts, by querying a specific endpoint in SonarQube.
This vulnerability is a problem because it exposes personal data of users, such as email addresses, to unauthorized individuals, potentially leading to privacy violations, phishing attacks, or other security threats.
The CVE-2025-21070 vulnerability allows an attacker to write data outside the intended boundaries of memory in the SPI decoder of Samsung Notes, prior to version 4.4.30.63, which can lead to unauthorized modifications of memory content.
This vulnerability is a problem because it can be exploited by local attackers to potentially gain elevated privileges, execute malicious code, or cause the application to crash, resulting in disruption of service or compromise of sensitive data.
This vulnerability allows a local attacker to access memory outside the intended boundaries when Samsung Notes (prior to version 4.4.30.63) parses image data, potentially exposing sensitive information.
This vulnerability is a problem because it could enable attackers to access sensitive data or disrupt the normal functioning of the device, which could lead to security breaches or crashes.
The CVE-2025-21068 vulnerability allows a local attacker to access memory outside the intended boundaries when reading image data in Samsung Notes versions prior to 4.4.30.63.
This vulnerability is a problem because it can potentially lead to unauthorized access to sensitive information stored in the device's memory, compromising user data and system security.
This vulnerability allows a local attacker to access memory outside the allocated buffer for images in Samsung Notes, prior to version 4.4.30.63, due to an out-of-bounds read.
This vulnerability is a problem because it could potentially enable attackers to access sensitive information or disrupt the normal functioning of the application, leading to data breaches or other security issues.
The CVE-2025-21066 vulnerability allows a local attacker to perform an out-of-bounds read in the SPI decoder of Samsung Notes versions prior to 4.4.30.63, enabling them to access memory outside the intended boundaries.
This vulnerability is a problem because it can potentially lead to unauthorized access to sensitive information, crashing of the application, or even execution of malicious code, which could compromise the security and integrity of the affected device.
This vulnerability allows an attacker with access to a device in Retail Mode to execute commands that normally require higher privileges, potentially giving them control over the device.
This is a problem because it could allow someone with physical access to a device to gain unauthorized control, potentially leading to data theft, device takeover, or other malicious activities.
The CVE-2025-21064 vulnerability allows unauthorized access to data being transferred through Smart Switch, a feature that enables data transfer between devices, due to improper authentication in versions prior to 3.7.66.6.
This vulnerability is a problem because it enables adjacent attackers, who are in close proximity to the victim's device, to intercept and access sensitive data being transferred, potentially leading to data theft, unauthorized access, or other malicious activities.
The Samsung Voice Recorder app has a vulnerability that allows someone with physical access to a device to access recording files even when the device is locked, due to improper access control.
This vulnerability is a problem because it could allow unauthorized individuals to listen to sensitive or private recordings, potentially leading to invasion of privacy or disclosure of confidential information.
The CVE-2025-21062 vulnerability allows attackers to replace the restoring application in Smart Switch versions prior to 3.7.67.2 by exploiting a broken or risky cryptographic algorithm, but only if they have local access and the user interacts with the vulnerability.
This vulnerability is a problem because it enables attackers to manipulate the restoring application, potentially leading to unauthorized access, data tampering, or malware installation, which can compromise the security and integrity of the affected system.
This vulnerability allows local attackers to access sensitive data stored in cleartext by the Smart Switch application, but only if the user interacts with the application in a specific way and the Smart Switch version is prior to 3.7.67.2.
This is a problem because sensitive information is not being properly protected, which could lead to unauthorized access and potential misuse of the data, compromising user privacy and security.
This vulnerability allows an attacker with local access to view sensitive information stored in plain text in the Smart Switch application's backup data, but only if the user interacts with the application in a specific way.
This is a problem because it could give an attacker access to confidential data, such as passwords or personal information, that is supposed to be protected. If an attacker gains local access to a device, they could exploit this vulnerability to steal sensitive information.
The CVE-2025-21059 vulnerability allows unauthorized local access to data stored in the Samsung Health application, specifically in versions prior to 6.30.5.105, due to improper authorization.
This vulnerability is a problem because it enables local attackers to view or exploit sensitive health information without permission, potentially leading to privacy breaches or other malicious activities.
This vulnerability allows local attackers to potentially execute arbitrary code with SystemUI privilege due to improper access control in Routines prior to version 4.8.7.1 in Android 15 and 4.9.6.0 in Android 16.
This vulnerability is a problem because it enables attackers to gain elevated system privileges, potentially allowing them to access sensitive information, modify system settings, or install malicious software, which can compromise the security and integrity of the affected device.
The CVE-2025-21057 vulnerability in Samsung Notes versions prior to 4.4.30.63 allows a local attacker to access shared notes due to the app's use of implicit intent for sensitive communication.
This vulnerability is a problem because it enables unauthorized access to potentially sensitive information shared through notes, compromising user privacy and security.
This vulnerability allows remote attackers to read and write outside the boundaries of authorized memory areas in the libimagecodec.quram.so library, prior to the SMR Oct-2025 Release 1.
This vulnerability is a problem because it enables attackers to potentially access sensitive information or disrupt system stability by manipulating memory outside the intended boundaries, which could lead to data breaches, system crashes, or other malicious activities.
This vulnerability allows a local attacker to read memory outside the intended boundaries when the system is decoding JPEG images, due to a flaw in the libpadm.so library.
This vulnerability is a problem because it could potentially allow an attacker to access sensitive information stored in the system's memory, which could be used for malicious purposes.
This vulnerability allows an attacker to write data outside the intended boundaries in the JPEG decoding process of a specific library, potentially causing memory corruption.
This issue is a problem because it can lead to unstable system behavior, crashes, or even allow attackers to execute arbitrary code, compromising the security and integrity of the system.
This vulnerability allows a local attacker to write data outside the intended boundaries in the JPEG decoding process of a specific library, potentially causing memory corruption.
This vulnerability is a problem because it can lead to unpredictable behavior, crashes, or even allow attackers to execute malicious code, compromising the security and stability of the system.
The CVE-2025-21051 vulnerability allows a local attacker to write data to areas of memory outside the intended boundaries during the processing of JPEG images in the libpadm.so library.
This vulnerability is a problem because it can potentially enable attackers to execute malicious code, modify sensitive data, or crash systems by overwriting critical memory areas, thus compromising system security and stability.
This vulnerability allows a local attacker to access data from multiple user profiles due to improper input validation in the Contacts feature, affecting versions prior to the SMR Oct-2025 Release 1.
This is a problem because it enables unauthorized access to sensitive information across different user accounts, potentially leading to data breaches and privacy violations.
This vulnerability allows local attackers to access sensitive information due to improper access control in SecSettings, but only if the attacker can interact with the system in some way.
This is a problem because it could allow unauthorized individuals to gain access to confidential data, which could be used for malicious purposes, compromising the security and privacy of the system and its users.
The CVE-2025-21048 vulnerability allows a local attacker to execute arbitrary code on a system running Knox Enterprise, prior to the SMR Oct-2025 Release 1, by exploiting a relative path traversal weakness.
This vulnerability is a problem because it enables an attacker with local access to potentially take control of the system, execute malicious code, and access sensitive data, which could lead to significant security breaches and data compromises.
The CVE-2025-21047 vulnerability allows physical attackers to access and use privileged APIs in KnoxGuard due to improper access control, affecting versions prior to the SMR Oct-2025 Release 1.
This vulnerability is a problem because it enables attackers with physical access to exploit the system, potentially leading to unauthorized data access, modification, or other malicious activities, which can compromise the security and integrity of the affected device.
The CVE-2025-21046 vulnerability allows an attacker with physical access to a device to temporarily view the list of recently used apps in Samsung DeX, due to improper access control in the WindowManager.
This vulnerability is a problem because it could potentially expose sensitive information about the device's usage, such as recently accessed confidential documents or private communications, to unauthorized individuals who gain physical access to the device.
The Galaxy Watch stores sensitive information in an insecure manner, allowing local attackers to access this information on devices prior to the SMR Oct-2025 Release 1.
This vulnerability is a problem because it enables unauthorized access to sensitive information, potentially leading to data breaches, identity theft, or other malicious activities, compromising the security and privacy of the device's user.
This vulnerability allows a local attacker with privileged access to write data outside the intended boundaries of a memory area in the fingerprint trustlet, which is a security component.
This vulnerability is a problem because it could enable an attacker to modify sensitive data or execute malicious code, potentially leading to a security breach or system compromise.
The Booking Manager WordPress plugin has a vulnerability that allows users with contributor or higher privileges to delete bookings by visiting a page containing a specific shortcode, which triggers the deletion of bookings.
This vulnerability is a problem because it allows unauthorized or unintended deletion of bookings, potentially disrupting business operations and causing data loss, especially if the shortcode is accidentally or intentionally used by someone with sufficient privileges.
The NAS Navigator2 Windows version by BUFFALO INC. has a vulnerability where it registers a Windows service with an unquoted file path, allowing a user with write permission on the system drive's root directory to potentially execute arbitrary code with elevated SYSTEM privileges.
This vulnerability is a problem because it could allow an attacker with limited access to the system drive to gain full control over the system by executing malicious code with the highest level of privileges, leading to unauthorized access, data theft, or system compromise.
The drupal-pattern-lab/unified-twig-extensions package has a Cross-site Scripting (XSS) vulnerability due to insufficient filtering of data, allowing attackers to inject malicious code when the code is executed outside of Drupal.
This vulnerability is a problem because it can be exploited to steal user data, take control of user sessions, or perform other malicious actions, especially since the package is intended to be shared between Drupal and Pattern Lab, potentially increasing the attack surface.
The CVE-2025-11569 vulnerability allows an attacker to access system files by exploiting the consecutive use of zipSync() and unzipSync() functions in the cross-zip package, particularly when arguments like __dirname are used, enabling directory traversal attacks.
This vulnerability is a problem because it enables attackers to access sensitive system files, potentially leading to data breaches, unauthorized access, or even taking control of the system, which can have severe security and privacy implications.
This vulnerability allows an attacker to execute arbitrary code in the browsers of ServiceNow users by tricking them into clicking on a specially crafted link, which can lead to reflected cross-site scripting attacks.
This vulnerability is a problem because it can compromise the security of ServiceNow users' browsers, potentially allowing attackers to steal sensitive information, perform unauthorized actions, or take control of the user's session.
This vulnerability allows an attacker to execute arbitrary code in the browsers of ServiceNow users by tricking them into clicking on a specially crafted link, which can lead to reflected cross-site scripting attacks.
This vulnerability is a problem because it can allow attackers to steal user data, take control of user sessions, or perform other malicious actions, potentially compromising the security and confidentiality of sensitive information.
The CVE-2025-61928 vulnerability allows an unauthenticated attacker to create or modify API keys for any user in the Better Auth library for TypeScript, by exploiting a flaw in the authentication process that occurs when a user's ID is passed in the request body without proper validation.
This vulnerability is a problem because it enables an attacker to bypass authentication and gain complete access to a user's account, allowing them to perform any action as the victim user, potentially compromising user data and the application, depending on the victim's privileges.
The CVE-2025-61926 vulnerability affects the Allstar GitHub App's Reviewbot component, where inbound webhook requests are validated against a hard-coded, shared secret that is compiled into the Allstar binary and cannot be changed at runtime.
This vulnerability is a problem because it allows every deployment using Reviewbot to use the same secret for validating requests, making it easier for attackers to intercept and manipulate these requests, potentially leading to unauthorized access or malicious activities.
This vulnerability allows attackers to inject malicious code into Liferay Portal and Liferay DXP through crafted payloads in a user's First Name, Middle Name, or Last Name text fields, enabling cross-site scripting (XSS) attacks.
This vulnerability is a problem because it enables remote attackers to inject arbitrary web scripts or HTML, potentially leading to unauthorized access, data theft, or malicious activities on the affected systems.
The Python Social Auth vulnerability allows a user to be associated with an account by email, even if the `associate_by_email` pipeline is not included, potentially leading to account compromise when using third-party authentication services that do not validate or require unique email addresses.
This vulnerability is a problem because it can allow unauthorized access to user accounts, especially when third-party authentication services do not properly validate email addresses, which can lead to security breaches and data compromise.
The CVE-2025-61779 vulnerability in Confidential Containers's Trustee project allows any unauthenticated client to change the attestation policy by submitting a request to the attestation-policy endpoint, because the endpoint does not check for proper authentication.
This vulnerability is a problem because it enables unauthorized access to modify the attestation policy, potentially compromising the security and confidentiality of sensitive information and allowing malicious activities to go undetected.
The CVE-2025-61773 vulnerability allows an attacker to inject arbitrary content into the pyLoad web interface by exploiting insufficient input validation in the Captcha script endpoint and the Click'N'Load (CNL) Blueprint, potentially leading to client-side code execution or other unintended behaviors.
This vulnerability is a problem because it enables attackers to manipulate the web interface and execute malicious code, which can compromise the security of the system and potentially steal sensitive information or disrupt service.
This vulnerability allows any authenticated user to crash the chat functionality in BigBlueButton virtual classrooms by sending a malformed message, specifically a wrong `reactionEmojiId`, disrupting the meeting for all participants.
This denial-of-service vulnerability is a problem because it can be exploited by any user who has access to a meeting, causing disruptions and potentially hindering communication and collaboration among participants, which can be particularly damaging in educational or professional settings.
The CVE-2025-61601 vulnerability allows an authenticated user to crash or freeze a BigBlueButton virtual classroom server by submitting a malicious payload with a large array in the "answerIds" field, causing meetings to become unresponsive.
This vulnerability is a problem because it can be exploited by any authenticated user to disrupt the entire server, potentially affecting all meetings and causing significant downtime and inconvenience for users.
The CVE-2025-60375 vulnerability allows attackers to bypass login credentials in Perfex CRM versions before 3.3.1 by sending empty username and password parameters, granting unauthorized access to user accounts, including administrative accounts, without valid credentials.
This vulnerability is a problem because it enables attackers to gain access to sensitive information and perform malicious actions without needing legitimate login credentials, potentially leading to data breaches, account takeovers, and other security incidents.
The CVE-2025-59286 vulnerability allows attackers to spoof Copilot, potentially tricking users into executing malicious actions or revealing sensitive information.
This vulnerability is a problem because it can lead to unauthorized access, data breaches, and other malicious activities, compromising the security and trust of Copilot users.
The CVE-2025-59272 vulnerability allows attackers to spoof Copilot, potentially tricking users into executing malicious actions or revealing sensitive information.
This vulnerability is a problem because it can lead to unauthorized access, data breaches, or malicious activity, compromising the security and integrity of affected systems and user data.
The CVE-2025-59271 vulnerability allows an attacker to gain elevated privileges in Redis Enterprise, potentially giving them unauthorized access to sensitive data and system controls.
This vulnerability is a problem because it can be exploited by attackers to gain control over the Redis Enterprise system, allowing them to steal or modify sensitive data, disrupt system operations, or use the system as a launchpoint for further attacks.
The CVE-2025-59252 vulnerability allows an attacker to spoof the M365 Copilot, potentially tricking users into performing unintended actions or revealing sensitive information.
This vulnerability is a problem because it can lead to phishing attacks, unauthorized access to sensitive data, and compromised user trust in the M365 Copilot system, ultimately putting user privacy and security at risk.
The Azure PlayFab Elevation of Privilege Vulnerability allows an attacker to gain unauthorized access and escalate their privileges, potentially taking control of sensitive resources and data within the Azure PlayFab environment.
This vulnerability is a problem because it enables malicious actors to bypass security controls, access restricted information, and perform actions that could compromise the integrity and confidentiality of the system, leading to potential data breaches, financial losses, and reputational damage.
The Azure Entra ID Elevation of Privilege Vulnerability allows an attacker to gain higher-level access and privileges to Azure Entra ID, potentially giving them control over sensitive information and systems.
This vulnerability is a problem because it enables attackers to escalate their privileges, potentially leading to unauthorized access, data breaches, and disruption of critical systems, which can have severe consequences for organizations relying on Azure services.
The Azure Entra ID Elevation of Privilege Vulnerability allows an attacker to gain elevated access and privileges to Azure Entra ID, potentially enabling them to perform unauthorized actions and access sensitive information.
This vulnerability is a problem because it can lead to unauthorized access, data breaches, and disruption of services, compromising the security and integrity of Azure Entra ID and related systems, with a high severity score of 9.6 indicating a critical risk.
This vulnerability allows an authorized attacker to inject malicious code into Azure Monitor's web pages, enabling them to spoof content and potentially trick users into performing unintended actions.
This vulnerability is a problem because it can lead to unauthorized access, data theft, and other malicious activities, as attackers can use spoofed content to deceive users and gain their trust, ultimately compromising the security of the system and its users.
This vulnerability allows an app to bypass Gatekeeper checks on macOS devices, which are designed to ensure that only trusted applications are installed and run.
This is a problem because Gatekeeper checks are a crucial security feature that helps protect users from potentially malicious or untrusted software. If an app can bypass these checks, it may be able to install and run malicious code, potentially leading to data theft, system compromise, or other security issues.
The Newforma Info Exchange (NIX) software, prior to version 2023.1, allows anonymous authentication by default, enabling an unauthorized attacker to access the system without a username or password, and potentially exploit other vulnerabilities that normally require authentication.
This vulnerability is a problem because it allows attackers to bypass the initial security barrier, gaining unauthorized access to the system and potentially leading to further exploitation of other vulnerabilities, which could result in data breaches, system compromise, or other malicious activities.
The CVE-2025-35061 vulnerability allows a remote attacker to trick the Newforma Info Exchange (NIX) system into connecting to a malicious server via SMB, enabling the attacker to capture the NTLMv2 hash of the NIX service account.
This vulnerability is a problem because it enables attackers to obtain sensitive authentication information (NTLMv2 hash) that can be used to gain unauthorized access to the NIX system or other systems that use the same credentials, potentially leading to data breaches or lateral movement within the network.
The Newforma Info Exchange (NIX) 'Send a File Transfer' feature allows remote authenticated attackers to upload SVG files containing JavaScript or other executable content that can be rendered by a web browser on a mobile device.
This vulnerability is a problem because it enables attackers to potentially execute malicious code on a user's mobile device, leading to unauthorized access, data theft, or other security breaches, by exploiting the trust placed in uploaded files.
The Newforma Info Exchange (NIX) system has a vulnerability in its '/DownloadWeb/hyperlinkredirect.aspx' page, which allows an attacker to redirect users to any URL without authentication by manipulating the 'nhl' parameter.
This vulnerability is a problem because it can be used by attackers to trick users into visiting malicious websites, potentially leading to phishing attacks, malware downloads, or other types of cyber threats, by making it appear as though the link is coming from a trusted source.
The CVE-2025-35058 vulnerability allows an unauthenticated attacker to trick Newforma Info Exchange (NIX) into connecting to a malicious server via SMB, enabling the attacker to capture the NTLMv2 hash of the NIX service account.
This vulnerability is a problem because it allows attackers to obtain sensitive authentication information (NTLMv2 hash) that can be used to gain unauthorized access to the system, potentially leading to data breaches, lateral movement, and other malicious activities.
The CVE-2025-35057 vulnerability allows a remote attacker to trick Newforma Info Exchange (NIX) into connecting to a malicious server via SMB, which enables the attacker to capture the NTLMv2 hash of the NIX service account.
This vulnerability is a problem because it allows attackers to obtain sensitive authentication information (NTLMv2 hash) that can be used to gain unauthorized access to the NIX system or other systems that use the same credentials, potentially leading to data breaches or lateral movement within the network.
This vulnerability allows an authenticated attacker to read arbitrary files on a system running Newforma Info Exchange (NIX) by exploiting the 'StreamStampImage' feature in the '/UserWeb/Common/MarkupServices.ashx' endpoint, which can process and return images of specified files using an encrypted file path generated with a hard-coded secret key.
This is a problem because it enables attackers who have already gained some level of access to the system to escalate their privileges and access sensitive files that they should not be able to read, potentially leading to data breaches or other malicious activities.
The CVE-2025-35055 vulnerability allows an attacker to upload any file to a writable location on the Newforma Info Exchange (NIX) application server, potentially including malicious files like web shells, and also enables the deletion of directories.
This vulnerability is a problem because it enables an attacker to gain control over the server by uploading and executing malicious content, potentially leading to unauthorized access, data breaches, or disruption of service, especially since anonymous access is enabled by default in versions before 2023.1, making it easier for unauthenticated attackers to exploit.
The Newforma Info Exchange (NIX) stores encrypted credentials in a registry location, but also stores the encryption key in the same location, allowing authenticated users to access both.
This vulnerability is a problem because it allows attackers to potentially gain access to sensitive credentials, including Active Directory credentials, which could be used to access additional systems and resources, compromising the security of the network.
The CVE-2025-35053 vulnerability allows an authenticated user to access and delete arbitrary files on a Newforma Info Exchange (NIX) system with elevated 'NT AUTHORITY\NetworkService' privileges by sending a specific request to the '/UserWeb/Common/MarkupServices.ashx' endpoint. This is further exacerbated by CVE-2025-35062, which enables anonymous access by default in Newforma versions before 2023.1, potentially allowing unauthenticated attackers to exploit this vulnerability.
This vulnerability is a problem because it grants unauthorized access to sensitive files and allows them to be read or deleted, potentially leading to data loss, disruption of services, or unauthorized disclosure of confidential information. The fact that anonymous access is enabled by default in older versions makes it even more severe, as it lowers the barrier for potential attackers.
The Newforma Info Exchange (NIX) uses a fixed, hard-coded key to encrypt certain parameters in queries, which can allow unauthorized access to download files by bypassing normal authentication and authorization processes.
This vulnerability is a problem because it allows potential attackers to access sensitive files without proper credentials, potentially leading to data breaches or other malicious activities, due to the shared hard-coded key used across all NIX installations.
The Newforma Project Center Server (NPCS) has a vulnerability that allows a remote attacker to send malicious .NET data to the server, which can lead to the execution of arbitrary code with elevated privileges.
This vulnerability is a problem because it enables an unauthorized attacker to gain control of the server and potentially access sensitive data or disrupt operations, posing a significant security risk due to its high severity level of 9.8.
The CVE-2025-35050 vulnerability allows a remote, unauthenticated attacker to send malicious .NET data to the '/remoteweb/remote.rem' endpoint in Newforma Info Exchange (NIX), which can lead to the execution of arbitrary code with elevated privileges.
This vulnerability is a problem because it enables attackers to gain control over the system with 'NT AUTHORITY\NetworkService' privileges, potentially allowing them to access and compromise associated Newforma Project Center Server (NPCS) systems, leading to significant security breaches and data compromise.
The CVE-2025-34248 vulnerability allows an authenticated attacker to delete arbitrary files on a D-Link Nuclias Connect system by exploiting a directory traversal flaw in the firmware's deleteBackup function, due to improper sanitization of user input.
This vulnerability is a problem because it can compromise the integrity and availability of the system, allowing attackers to potentially disrupt or disable critical functions by deleting important files.
This vulnerability allows an attacker to perform a SQL injection attack by manipulating the "Search" argument in the /pages/user_index_search.php file of the code-projects E-Commerce Website 1.0, potentially giving them access to sensitive database information.
This vulnerability is a problem because it can be exploited remotely, allowing attackers to access and manipulate sensitive data, potentially leading to data breaches, unauthorized access, and other malicious activities, which can compromise the security and integrity of the website and its users.
The CVE-2025-11557 vulnerability allows an attacker to inject malicious SQL code into the Gate Pass Management System 1.0 by manipulating the "fullname" argument in the /add-pass.php file, which can be executed remotely.
This vulnerability is a problem because it enables attackers to access and manipulate sensitive data in the system's database, potentially leading to unauthorized data breaches, modification, or deletion, which can have serious security and confidentiality implications.
The CVE-2025-11556 vulnerability allows an attacker to manipulate the "table" argument in the /user.php file of Simple Leave Manager 1.0, leading to a SQL injection attack, which can be exploited remotely.
This vulnerability is a problem because it enables attackers to inject malicious SQL code, potentially allowing them to access, modify, or delete sensitive data, disrupt the application's functionality, or even gain unauthorized access to the system.
The CVE-2025-11555 vulnerability allows an attacker to inject malicious SQL code into the Campcodes Online Learning Management System 1.0 by manipulating the "date_start" argument in the /admin/calendar_of_events.php file, which can be done remotely.
This vulnerability is a problem because it enables attackers to access and manipulate sensitive data in the database, potentially leading to unauthorized data breaches, modifications, or even deletion of critical information, which can compromise the security and integrity of the system.
This vulnerability allows an authenticated attacker to inject and execute arbitrary system commands as root on AVTECH devices that have the CloudSetup.cgi management endpoint, by exploiting the lack of validation or whitelisting of the `exefile` parameter.
This vulnerability is a problem because it grants full control of the device to the attacker, potentially enabling them to steal credentials, move laterally within a network, or exfiltrate data, especially if the device stores sensitive information or has access to internal systems.
The CVE-2025-60316 vulnerability allows an attacker to inject malicious SQL code into the Pet Grooming Management Software through the ID parameter in the admin/view_customer.php file, potentially giving them unauthorized access to sensitive database information.
This vulnerability is a problem because it can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the software's database, which may contain sensitive customer information.
The CVE-2025-11554 vulnerability allows an attacker to manipulate the User Type Handler in Portabilis i-Educar, leading to insecure inherited permissions, which can be initiated remotely.
This vulnerability is a problem because it enables remote attackers to potentially gain unauthorized access to sensitive information or perform actions they shouldn't be able to, by exploiting the insecure permissions inheritance in the affected system.
The CVE-2025-11553 vulnerability allows an attacker to inject malicious SQL code into the Courier Management System 1.0 by manipulating the "Shippername" argument in the /add-courier.php file, which can be done remotely.
This vulnerability is a problem because it enables attackers to access and manipulate sensitive data in the system's database, potentially leading to unauthorized data disclosure, modification, or deletion, which can compromise the security and integrity of the system.
This vulnerability allows an authenticated attacker to trick the server into making requests to arbitrary internal or external services by submitting a crafted URL, due to a lack of proper validation of user-supplied URLs.
This is a problem because it enables an attacker to potentially access sensitive internal services, extract data, or disrupt operations, exploiting the trust that the server has in its authenticated users, and potentially leading to further malicious activities.
The BigBlueButton virtual classroom has a vulnerability in its "Shared Notes" feature that allows a user with a malicious username to execute arbitrary JavaScript code when higher-privileged users, such as admins, open the Shared Notes page.
This vulnerability is a problem because it enables a low-privileged user to perform actions in the context of higher-privileged users, potentially leading to unauthorized access, data modification, or other malicious activities, compromising the security and integrity of the virtual classroom environment.
This vulnerability allows an authenticated administrator to bypass system restrictions and execute arbitrary commands through the management web interface of the Palo Alto Networks PAN-OS software.
This is a problem because it enables an administrator with malicious intentions to perform unauthorized actions, potentially leading to system compromise, data breaches, or disruption of services.
This vulnerability allows an authenticated administrator to view session tokens of users logged into the firewall web interface, potentially enabling them to impersonate those users.
This is a problem because it could allow an administrator with malicious intentions to access and control other users' accounts, compromising the security and privacy of those users and potentially the entire network.
This vulnerability allows an attacker to inject malicious SQL code into the Online Complaint Site 1.0 application through the Category argument in the /admin/category.php file, potentially giving them unauthorized access to sensitive data.
This vulnerability is a problem because it can be exploited remotely, allowing attackers to access and manipulate sensitive data without needing physical access to the system, and since the exploit is publicly available, it increases the likelihood of the vulnerability being used by malicious actors.
This vulnerability allows an attacker to inject malicious SQL code into the "cond" parameter in the "notice/list" function of xckk version 9.6, potentially giving them unauthorized access to sensitive database information.
This vulnerability is a problem because it enables attackers to manipulate database queries, which can lead to data theft, modification, or deletion, and potentially allow them to gain control of the entire system.
The Amazon.IonDotnet library has an infinite loop issue that can be triggered by a specially crafted text input, allowing a threat actor to cause a denial of service.
This vulnerability is a problem because it can be exploited to disrupt service, making the system or application unavailable, which can lead to significant downtime and potential data loss.
The CVE-2025-11551 vulnerability allows an attacker to manipulate the "roll", "name", or "gpa" argument in the Student Result Manager 1.0 system, which can lead to a SQL injection attack, potentially giving the attacker access to sensitive database information.
This vulnerability is a problem because it can be exploited remotely, allowing an attacker to access and manipulate sensitive data without needing physical access to the system, which can lead to data breaches, unauthorized data modification, or other malicious activities.
This vulnerability allows an attacker to manipulate a specific function in the Tenda W12 router's HTTP Request Handler, causing a null pointer dereference. This can be done remotely, meaning the attacker doesn't need direct access to the router.
This vulnerability is a problem because it can be exploited by attackers from a remote location, potentially allowing them to crash the router or execute arbitrary code, which could lead to unauthorized access or control of the device.
The CVE-2025-60304 vulnerability allows an attacker to inject malicious code into the Simple Scheduling System 1.0 via the Subject Description field, enabling Cross Site Scripting (XSS) attacks.
This vulnerability is a problem because it can lead to unauthorized access to user data, session hijacking, and other malicious activities, potentially compromising the security and integrity of the system and its users.
This vulnerability allows an attacker to inject malicious SQL code into the "address/list" endpoint by manipulating the "orderBy" parameter, potentially giving them unauthorized access to sensitive data.
This SQL injection vulnerability can lead to unauthorized data access, modification, or deletion, and potentially even allow attackers to gain control of the entire system, compromising the security and integrity of the data.
The CVE-2025-60010 vulnerability allows an attacker to access a Juniper Networks device using an expired password, even if the password should have been changed according to the RADIUS server's policy.
This vulnerability is a problem because it enables attackers to bypass password aging policies, potentially allowing unauthorized access to the device with an expired password, which could lead to security breaches and data compromises.
The CVE-2025-60009 vulnerability allows an attacker to inject malicious script tags into the CLI Configlet page in Juniper Networks Junos Space, enabling them to execute commands with the target user's permissions when the page is visited.
This vulnerability is a problem because it enables attackers to gain unauthorized access and control, potentially allowing them to execute commands with administrator privileges, which could lead to data breaches, system compromise, and other malicious activities.
The CVE-2025-60006 vulnerability allows an attacker to inject malicious commands into the Command Line Interface (CLI) of Juniper Networks Junos OS Evolved, potentially elevating privileges and executing unauthorized commands.
This vulnerability is a problem because it enables attackers to bypass security restrictions and perform actions that they should not be allowed to do, according to their assigned permissions, which can lead to unauthorized access and potential system compromise.
The CVE-2025-60004 vulnerability allows an unauthenticated attacker to send a specific BGP EVPN update message to a Juniper Networks device running Junos OS or Junos OS Evolved, causing the routing protocol daemon (rpd) to crash and restart.
This vulnerability is a problem because it can be exploited by an attacker to launch a Denial-of-Service (DoS) attack, disrupting the device's ability to route traffic and potentially causing network outages. This can have significant impacts on network availability and reliability.