Top 100 Recent CVEs

CVE-2025-26819 8.6
Published: 2025-02-15T00:15:28.510

What it does:

This vulnerability allows an attacker to make unlimited requests to an HTTP server connection in Monero versions prior to 0.18.3.4 without restriction, potentially overwhelming the server.

Why it's a problem:

This vulnerability can lead to a denial-of-service (DoS) attack, which can cause the server to slow down or crash, making it unavailable to legitimate users.

Steps to mitigate:

  • Upgrade Monero to version 0.18.3.4 or later
  • Implement rate limiting on HTTP server connections
  • Configure firewall rules to limit incoming traffic from suspicious sources.
CVE-2025-21401 4.5
Published: 2025-02-15T00:15:27.163

What it does:

This vulnerability allows attackers to bypass security features in Microsoft Edge, a popular web browser, which is based on the Chromium platform.

Why it's a problem:

This vulnerability is a problem because it enables attackers to evade security controls and potentially gain unauthorized access to sensitive information or systems.

Steps to mitigate:

  • Update Microsoft Edge to the latest version
  • [Enable browser security features, such as sandboxing and extension controls]
  • Use alternative browsers with robust security features until a patch is available.
CVE-2024-5461 0
Published: 2025-02-15T00:15:13.513

What it does:

This vulnerability affects the Brocade 6547 (FC5022) embedded switch blade's implementation of the Simple Network Management Protocol (SNMP). It allows an authenticated attacker to inject commands or parameters into SNMP operations, which can lead to the execution of commands with Root privileges.

Why it's a problem:

This vulnerability is a problem because it enables an attacker to gain unauthorized access to the system and execute commands with the highest level of privileges, potentially leading to a complete takeover of the system.

Steps to mitigate:

  • Update the Brocade 6547 (FC5022) embedded switch blade's software to the latest version that addresses this vulnerability
  • Implement strict access controls to limit who can access the SNMP functionality
  • Monitor system logs for suspicious activity and anomalies.
CVE-2024-4282 0
Published: 2025-02-15T00:15:13.370

What it does:

The Brocade SANnav OVA software, prior to version 2.3.1b, allows the use of the outdated SHA1 encryption algorithm for Secure Shell (SSH) connections on port 22.

Why it's a problem:

This is a problem because SHA1 is a deprecated encryption algorithm, which means it's no longer considered secure. Using SHA1 can leave the system vulnerable to attacks, allowing hackers to intercept and access sensitive data.

Steps to mitigate:

  • Upgrade Brocade SANnav OVA software to version 2.3.1b or later
  • Disable the use of SHA1 for SSH connections on port 22
  • Configure SSH to use a more secure encryption algorithm, such as SHA2 or SHA3.
CVE-2025-0593 8.8
Published: 2025-02-14T21:15:16.680

What it does:

This vulnerability allows a remote attacker with low privileges to execute arbitrary shell commands on a device.

Why it's a problem:

This is a serious issue because it enables an unauthorized person to gain control of a device and perform malicious actions, potentially causing damage to the system or stealing sensitive information.

Steps to mitigate:

  • Apply software updates or patches as soon as possible
  • Limit network access to the device until the patch is applied
  • Implement additional security measures, such as firewalls and intrusion detection systems, to prevent remote access to the device.
CVE-2025-0592 8.8
Published: 2025-02-14T21:15:16.543

What it does:

This vulnerability allows a remote attacker with limited privileges to execute arbitrary shell commands on a device by manipulating and uploading a malicious firmware file.

Why it's a problem:

This vulnerability is a significant concern because it allows an attacker to gain control of the device, potentially leading to data theft, system compromise, or disruption of critical services.

Steps to mitigate:

  • Limit access to the device's firmware upload feature to trusted users and networks
  • Implement secure firmware validation and verification procedures
  • Regularly monitor device logs for suspicious activity
  • Ensure all devices are updated with the latest security patches as soon as possible.
CVE-2024-31144 0.0
Published: 2025-02-14T21:15:15.107

What it does:

A malicious virtual machine (VM) can manipulate its disk to appear as a metadata backup, allowing it to potentially restore false metadata about Virtual Machines and Storage Repositories.

Why it's a problem:

This vulnerability allows an attacker to gain control over metadata, which could lead to unauthorized access or data manipulation. Since VM owners control their disk content, a malicious VM can exploit this weakness, potentially causing harm to the system.

Steps to mitigate:

CVE-2022-28693 4.7
Published: 2025-02-14T21:15:13.263

What it does:

This vulnerability allows an authorized user to access sensitive information on certain Intel processors by exploiting an unprotected feature that predicts the target of return branch instructions.

Why it's a problem:

This vulnerability could lead to an attacker gaining unauthorized access to sensitive information, which could be used for malicious purposes. Since it requires local access, an attacker would need to have physical access to the affected device or be able to log in to it remotely.

Steps to mitigate:

  • Update Intel processor microcode to the latest version
  • Apply available firmware updates
  • Implement restrictions on local access to affected devices
  • Use additional security measures, such as encryption and access controls, to protect sensitive information.
CVE-2022-26083 7.5
Published: 2025-02-14T21:15:11.947

What it does:

A weakness in the Intel IPP Cryptography software library generates weak initialization vectors, which can allow an attacker to access sensitive information.

Why it's a problem:

This vulnerability is a problem because it can lead to information disclosure, potentially exposing confidential data to unauthorized users. An attacker can exploit this weakness to gain access to sensitive information, even without proper authentication.

Steps to mitigate:

  • Update the Intel IPP Cryptography software library to version 2021.5 or later
  • Ensure that all systems using this library are patched with the latest updates
  • Limit local access to systems using this library to authorized personnel only.
CVE-2025-25304 0.0
Published: 2025-02-14T20:15:36.903

What it does:

This vulnerability allows an attacker to inject malicious JavaScript code into a Vega visualization, which can lead to cross-site scripting (XSS) attacks.

Why it's a problem:

This vulnerability is a problem because it can allow an attacker to steal user data, take control of user sessions, or perform unauthorized actions on a user's behalf.

Steps to mitigate:

  • Upgrade Vega to version 5.26.0 or later
  • Upgrade vega-selections to version 5.4.2 or later
  • Avoid using the `vlSelectionTuples` function until the upgrade is complete.
CVE-2025-25297 8.6
Published: 2025-02-14T20:15:36.627

What it does:

This vulnerability, found in Label Studio's S3 storage integration feature, allows an attacker to trick the application into sending HTTP requests to internal services by specifying a custom S3 endpoint URL.

Why it's a problem:

This vulnerability is a problem because it enables attackers to bypass network segmentation, access internal services that should not be accessible from the external network, and even exfiltrate data from those services through error message responses.

Steps to mitigate:

  • Upgrade to Label Studio version 1.16.0 or later, which contains a patch for this issue.
  • Validate and restrict S3 endpoint URLs to prevent arbitrary HTTP requests.
  • Implement network segmentation and access controls to limit access to internal services.
CVE-2025-25296 6.1
Published: 2025-02-14T20:15:36.103

What it does:

This vulnerability allows attackers to inject malicious HTML and JavaScript code into Label Studio's `/projects/upload-example` endpoint, enabling Cross-Site Scripting (XSS) attacks.

Why it's a problem:

This vulnerability is a problem because it enables attackers to execute arbitrary JavaScript code in victims' browsers, potentially leading to sensitive data theft, session hijacking, or other malicious actions.

Steps to mitigate:

  • Upgrade to Label Studio version 1.16.0 or later
  • Ensure proper sanitization of user-provided HTML content in the upload-example endpoint
  • Implement a Content Security Policy (CSP) in enforce mode to prevent script execution.
CVE-2025-25290 5.3
Published: 2025-02-14T20:15:35.593

What it does:

This vulnerability in the @octokit/request library allows an attacker to send a specially crafted HTTP request to a server, causing it to use excessive CPU resources and potentially becoming unresponsive.

Why it's a problem:

This can lead to a denial-of-service attack, making the server unavailable to users and impacting service availability.

Steps to mitigate:

  • Upgrade to version 9.2.1 or later of the @octokit/request library to fix the vulnerable regular expression.
  • Avoid using versions 1.0.0 to 9.2.0 of the library.
  • Implement measures to monitor CPU usage and detect potential denial-of-service attacks.
CVE-2025-25289 5.3
Published: 2025-02-14T20:15:35.100

What it does:

This vulnerability allows an attacker to send a specially crafted authorization header with an excessive number of spaces followed by a newline and "@", which can trigger a Regular Expression Denial of Service (ReDoS) in the @octokit/request-error error class. This can cause the server to consume excessive resources, leading to performance degradation or a denial-of-service (DoS) condition.

Why it's a problem:

This vulnerability can significantly impact server availability, making it difficult or impossible for users to access the server. This can lead to downtime, lost productivity, and potential revenue loss.

Steps to mitigate:

  • Upgrade @octokit/request-error to version 6.1.7 or later, which contains a fix for the issue.
  • Implement network traffic filtering or intrusion detection systems to detect and block malicious authorization headers.
  • Monitor server performance and resource utilization to quickly identify potential exploitation attempts.
CVE-2025-25288 5.3
Published: 2025-02-14T20:15:34.737

What it does:

This vulnerability allows an attacker to trigger a ReDoS (Regular Expression Denial of Service) attack by crafting a malicious "link" parameter in the "headers" section of the "request" when using the `octokit.paginate.iterator()` function in the `@octokit/plugin-paginate-rest` package.

Why it's a problem:

A ReDoS attack can cause a denial of service, slowing down or crashing the system, making it unavailable to users. This can lead to downtime and loss of productivity.

Steps to mitigate:

  • Update the `@octokit/plugin-paginate-rest` package to version 11.4.1 or later, which contains a fix for the issue.
CVE-2025-25285 5.3
Published: 2025-02-14T20:15:34.487

What it does:

This vulnerability allows an attacker to crash a program by crafting specific input to the `@octokit/endpoint` package, causing a regular expression denial-of-service (ReDoS) attack.

Why it's a problem:

This attack causes the program to hang and results in high CPU utilization, making the system unavailable and potentially causing damage to the application or system.

Steps to mitigate:

  • Update the `@octokit/endpoint` package to version 10.1.3 or later, which contains a patch for this issue.
CVE-2025-0503 3.1
Published: 2025-02-14T18:15:23.870

What it does:

This vulnerability allows an attacker to access information from deleted direct messages (DMs) in Mattermost versions 9.11.x up to 9.11.6, even if they were manually marked as deleted in the database.

Why it's a problem:

This vulnerability is a problem because it allows attackers to gather sensitive information about users, including their IDs and other metadata, which can be used for malicious purposes.

Steps to mitigate:

  • Upgrade to Mattermost version 9.11.7 or later
  • Verify that manually deleted DMs are properly removed from the database
  • Implement additional access controls to restrict who can access DM metadata.
CVE-2025-26508 0
Published: 2025-02-14T17:15:22.983

What it does:

This vulnerability allows an attacker to remotely execute malicious code and gain elevated privileges on certain HP printers, specifically LaserJet Pro, Enterprise, and Managed Printers, by sending a specially crafted PostScript print job.

Why it's a problem:

This vulnerability is a problem because it could enable an attacker to take control of the printer, access sensitive information, and potentially spread malware to other devices on the network, leading to significant security breaches and data loss.

Steps to mitigate:

  • Update HP printer firmware to the latest version
  • Disable PostScript printing functionality until a patch is available
  • Restrict network access to printers and limit privileges to authorized personnel only.
CVE-2025-26507 0
Published: 2025-02-14T17:15:22.863

What it does:

This vulnerability allows an attacker to remotely take control of certain HP printers (LaserJet Pro, Enterprise, and Managed) by sending a specially crafted PostScript print job. This can lead to the execution of malicious code and elevation of privileges.

Why it's a problem:

An attacker could use this vulnerability to take control of affected printers, potentially causing damage to the device, stealing sensitive information, or using the printer as a gateway to attack other devices on the network.

Steps to mitigate:

  • Update HP printer software and firmware to the latest version
  • Block incoming PostScript print jobs from unknown sources
  • Limit access to the printer network
  • Disable PostScript printing capabilities until a patch is available.
CVE-2025-26506 0
Published: 2025-02-14T17:15:22.747

What it does:

This vulnerability allows an attacker to remotely execute malicious code or gain elevated access on certain HP printers when processing a specially crafted PostScript print job.

Why it's a problem:

This vulnerability can give an attacker control over the printer, allowing them to steal sensitive information, disrupt printer operations, or even use the printer as a entry point to attack the larger network.

Steps to mitigate:

  • Avoid printing untrusted PostScript files
  • Implement network segmentation to isolate printers from the rest of the network
  • Apply security patches from HP as soon as they become available
  • Limit access to printer management interfaces
  • Monitor printer logs for suspicious activity
CVE-2025-26158 0
Published: 2025-02-14T17:15:22.590

What it does:

This vulnerability allows an attacker to inject malicious scripts onto the "manage-employee.php" page of the Kashipara Online Attendance Management System V1.0 by manipulating the "department" parameter.

Why it's a problem:

This vulnerability can lead to unauthorized access to sensitive information, session hijacking, or even complete takeover of a user's account, as the attacker's script can be executed by unsuspecting users visiting the affected page.

Steps to mitigate:

  • Check for updates to the Kashipara Online Attendance Management System and apply the latest patch
  • Validate and sanitize user input, especially the "department" parameter, to prevent malicious script injection
  • Implement web application firewalls (WAFs) or intrusion detection systems to detect and block XSS attacks
  • Conduct regular security audits and testing to identify and address similar vulnerabilities.
CVE-2025-26157 0.0
Published: 2025-02-14T17:15:22.437

What it does:

This vulnerability allows hackers to inject malicious code into the database of the Beauty Parlour Management System through a specific webpage, enabling them to execute arbitrary code remotely.

Why it's a problem:

This vulnerability can lead to unauthorized access to sensitive data, including customer information and business records, and can potentially disrupt the operation of the management system.

Steps to mitigate:

  • Update the Beauty Parlour Management System to the latest version
  • Validate and sanitize user input to prevent SQL injection
  • Implement robust access controls and authentication mechanisms to limit remote access
  • Perform regular security audits and penetration testing to identify and address vulnerabilities.
CVE-2025-26156 0
Published: 2025-02-14T17:15:22.273

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the "orderid" parameter in the /shopping/track-orders.php script in PHPGurukul Online Shopping Portal v2.1, which can lead to the execution of arbitrary code.

Why it's a problem:

This vulnerability is a problem because it enables an attacker to gain unauthorized access to sensitive data, modify or delete data, or even take control of the entire system. This can result in serious consequences, including data breaches, financial losses, and damage to the organization's reputation.

Steps to mitigate:

  • Update PHPGurukul Online Shopping Portal to a version that fixes this vulnerability
  • Validate and sanitize user input to prevent SQL injection attacks
  • Use prepared statements and parameterized queries to prevent malicious SQL code execution
  • Implement robust access controls and authentication mechanisms to limit access to sensitive data.
CVE-2025-25997 0.0
Published: 2025-02-14T17:15:22.117

What it does:

This vulnerability allows an attacker to access sensitive information on a FeMiner wms v.1.0 system by exploiting a weakness in the databak.php component, which can lead to unauthorized access to files and data.

Why it's a problem:

This vulnerability is a problem because it allows an attacker to gain access to sensitive information, which can be used for malicious purposes such as data theft, sabotage, or espionage.

Steps to mitigate:

  • Update FeMiner wms to a version that patches the Directory Traversal vulnerability
  • Limit access to the databak.php component to authorized personnel only
  • Implement strict file system permissions to restrict access to sensitive data.
CVE-2025-25994 0.0
Published: 2025-02-14T17:15:21.953

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the FeMiner wms wms 1.0 system, which can be used to extract sensitive information.

Why it's a problem:

This vulnerability is a problem because it allows an unauthorized person to access sensitive information, which can lead to data breaches, identity theft, and other serious security concerns.

Steps to mitigate:

  • Update to a patched version of FeMiner wms wms
  • Implement input validation to prevent malicious SQL code injection
  • Restrict access to sensitive information and limit privileges for users and applications
  • Regularly monitor system logs for suspicious activity
  • Consider using a Web Application Firewall (WAF) to detect and prevent SQL injection attacks.
CVE-2025-25993 0.0
Published: 2025-02-14T17:15:21.793

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the FeMiner wms system, which can be used to extract sensitive information from the database.

Why it's a problem:

This vulnerability poses a significant risk because an attacker can use it to gain unauthorized access to sensitive data, such as usernames, passwords, or financial information, which can lead to serious consequences, including data breaches and identity theft.

Steps to mitigate:

  • Update FeMiner wms to the latest version
  • Implement input validation and sanitization to prevent SQL injection attacks
  • Limit database privileges to minimize the amount of data that can be accessed
  • Monitor database logs for suspicious activity
  • Consider implementing a Web Application Firewall (WAF) to detect and block SQL injection attacks.
CVE-2025-25992 0
Published: 2025-02-14T17:15:21.640

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the inquire_inout_item.php component of FeMiner wms 1.0, which can be used to access sensitive information.

Why it's a problem:

This vulnerability can lead to unauthorized access to sensitive data, including passwords, credit card numbers, or other confidential information, which can have serious consequences for individuals and organizations.

Steps to mitigate:

  • Ensure input validation and sanitization for all user input in the inquire_inout_item.php component
  • Use prepared statements and parameterized queries to prevent SQL injection attacks
  • Implement a Web Application Firewall (WAF) to detect and block suspicious traffic
  • Keep FeMiner wms 1.0 up-to-date with the latest security patches
  • Conduct regular security audits and penetration testing to identify and address vulnerabilities.
CVE-2025-25991 0.0
Published: 2025-02-14T17:15:21.477

What it does:

This vulnerability allows an attacker to inject malicious SQL code into the /install/index.php component of hooskcms version 1.7.1, potentially giving them access to sensitive information.

Why it's a problem:

This vulnerability can lead to unauthorized access to sensitive data, compromising the security and confidentiality of the affected system.

Steps to mitigate:

  • Patch hooskcms to a version that fixes this vulnerability
  • Update input validation to prevent malicious SQL code injection
  • Limit access to the /install/index.php component to trusted users only
  • Implement robust logging and monitoring to detect potential exploitation attempts
  • Consider performing a thorough security audit to identify and address any other potential vulnerabilities.
CVE-2025-25990 0.0
Published: 2025-02-14T17:15:21.320

What it does:

This vulnerability allows an attacker to inject malicious code (Cross-Site Scripting) into the /install/index.php component of hooskcms version 1.7.1, potentially stealing sensitive information.

Why it's a problem:

This vulnerability could allow an attacker to access sensitive information, such as login credentials or other confidential data, which could lead to further malicious activities.

Steps to mitigate:

  • Update hooskcms to a patched version
  • Ensure input validation and sanitization in the /install/index.php component
  • Implement web application firewall rules to detect and prevent XSS attacks
CVE-2025-25988 0.0
Published: 2025-02-14T17:15:21.157

What it does:

This vulnerability allows a remote attacker to inject malicious code into a website using the "custom Link title" and "Title" parameters in hooskcms version 1.8, leading to a denial of service.

Why it's a problem:

This vulnerability can cause the website to become unavailable, resulting in loss of access to critical information and disruption of business operations. Additionally, it can also lead to further attacks, such as unauthorized data access or malware distribution.

Steps to mitigate:

  • Upgrade to a patched version of hooskcms
  • Validate and sanitize user-input data for the "custom Link title" and "Title" parameters
  • Implement input filtering and output encoding to prevent cross-site scripting (XSS) attacks
  • Monitor website logs for suspicious activity and deny requests from known malicious IP addresses.
CVE-2025-25295 0.0
Published: 2025-02-14T17:15:20.230

What it does:

This vulnerability allows unauthorized access to files outside the intended directory structure in Label Studio, a data labeling tool. An attacker can create tasks with special path traversal sequences in the image field, forcing the application to read files from arbitrary server filesystem locations when exporting projects in VOC, COCO, or YOLO formats.

Why it's a problem:

This can lead to the exposure of sensitive information, including configuration files, credentials, and confidential data, which can be disastrous for the security of the system and its users.

Steps to mitigate:

  • Upgrade to Label Studio version 1.16.0 or newer to ensure the SDK version is 1.0.10 or higher, which fixes this vulnerability.
CVE-2025-25206 8.3
Published: 2025-02-14T17:15:19.327

What it does:

This vulnerability allows an authenticated user to read sensitive information, including login tokens or other content stored in the database, due to incorrect input validation in eLabFTW electronic lab notebooks prior to version 5.1.15.

Why it's a problem:

This vulnerability is a problem because it can lead to privilege escalation if cookies are enabled (which is the default setting), allowing an attacker to gain unauthorized access to sensitive information and potentially take control of the system.

Steps to mitigate:

  • Upgrade to eLabFTW version 5.1.15 or later to receive a fix.
CVE-2025-25204 6.3
Published: 2025-02-14T17:15:19.140

What it does:

A bug in the `gh` command line tool's Artifact Attestation feature causes it to incorrectly return a successful status code when no attestations are present, instead of indicating a verification failure.

Why it's a problem:

This vulnerability allows an attacker to deploy malicious artifacts in systems that rely on the `gh attestation verify` exit codes to ensure secure deployments, potentially leading to security breaches.

Steps to mitigate:

  • Update `gh` to version `v2.67.0` or later as soon as possible to fix the bug and prevent potential attacks.
CVE-2024-8893 7.3
Published: 2025-02-14T17:15:18.690

What it does:

This vulnerability allows someone with physical access to the device to access the web interface of the inverter using Wi-Fi, without needing a password or authentication.

Why it's a problem:

This is a serious problem because it gives unauthorized access to the device's web interface, allowing an attacker to take full control of the inverter and potentially disrupt its operation or steal sensitive information.

Steps to mitigate:

  • Update the GW1500-XS inverter to a version that does not have hard-coded credentials
  • Change the default Wi-Fi password and ensure it is strong and unique
  • Restrict physical access to the device to authorized personnel only
  • Consider disabling Wi-Fi access to the device when not necessary.
CVE-2024-57790 0.0
Published: 2025-02-14T17:15:18.343

What it does:

The IXrouter IX2400 Industrial Edge Gateway has hardcoded root credentials stored in the device's flash memory, which can be accessed by attackers with physical access to the device.

Why it's a problem:

This vulnerability allows an attacker with physical access to the device to gain full control (root access) over the device, potentially leading to unauthorized access to sensitive data, system compromise, or malicious activity.

Steps to mitigate:

  • Update to a patched version of the IXrouter IX2400 firmware that removes the hardcoded root credentials
  • Ensure physical access to the device is restricted to authorized personnel only
  • Implement additional security measures such as multi-factor authentication and encryption to prevent unauthorized access.
CVE-2024-56463 4.8
Published: 2025-02-14T17:15:16.420

What it does:

This vulnerability allows an attacker to inject malicious JavaScript code into the IBM QRadar SIEM 7.5 Web UI, which can alter the way the system behaves.

Why it's a problem:

This vulnerability is a problem because it can be used to steal login credentials or take control of a user's session, even if the user has privileged access.

Steps to mitigate:

  • Update IBM QRadar SIEM to a version that patches this vulnerability
  • Restrict access to the Web UI to trusted users only
  • Implement additional security measures, such as input validation and output encoding, to prevent cross-site scripting attacks.
CVE-2024-3220 0
Published: 2025-02-14T17:15:15.567

What it does:

This vulnerability allows other users to create invalid files in specific locations on Windows systems, causing a MemoryError to be raised when Python starts up or leading to incorrect file type interpretations.

Why it's a problem:

This vulnerability is a problem because it can cause Python to malfunction or crash, potentially leading to system instability or crashes. Additionally, it can lead to incorrect file type interpretations, which can have unintended consequences.

Steps to mitigate:

  • Call mimetypes.init() with an empty list (“[]”) on Windows platforms to avoid using the default list of known file locations.
CVE-2025-25745 8.8
Published: 2025-02-14T16:15:37.010

What it does:

This vulnerability allows an attacker to overflow a buffer in the SetQuickVPNSettings module of D-Link DIR-853 routers with firmware version 1.20B07 by manipulating the Password parameter, potentially leading to remote code execution.

Why it's a problem:

This vulnerability can be exploited to take control of the affected router, allowing an attacker to access sensitive information, disrupt network traffic, or launch further attacks on other devices on the network.

Steps to mitigate:

  • Update to a patched firmware version
  • Implement network segmentation to isolate the affected router
  • Restrict access to the router's administration interface to trusted sources only
  • Avoid using default or weak passwords for the router's administration account.
CVE-2024-57778 0
Published: 2025-02-14T16:15:34.453

What it does:

This vulnerability allows a remote attacker to escalate privileges by manipulating the server's response from a "500" (server error) status code to a "200" (success) status code in Orbe ONetView Roeador Onet-1200 devices.

Why it's a problem:

This vulnerability is a problem because it allows an attacker to gain elevated access to the device, enabling them to perform actions that they wouldn't normally be able to do, potentially leading to unauthorized data access, modification, or deletion.

Steps to mitigate:

  • Update Orbe ONetView Roeador Onet-1200 devices to the latest firmware version
  • Implement input validation and error handling mechanisms to prevent status code manipulation
  • Restrict access to the device to trusted sources and networks
  • Monitor device logs for suspicious activity.
CVE-2024-57725 0
Published: 2025-02-14T16:15:34.360

What it does:

This vulnerability allows an attacker, either remotely or locally, to change the GPON link value on an Arcadyan Livebox Fibra PRV3399B_B_LT device without needing a password or authentication. This can be done by accessing a specific web page (/firstconnection.cgi endpoint) on the device.

Why it's a problem:

This is a problem because it can cause an internet service disruption, which means that users may experience internet outages or connectivity issues.

Steps to mitigate:

  • Update the device's firmware to the latest version
  • Restrict access to the /firstconnection.cgi endpoint to only trusted users
  • Implement strong password policies and enable authentication for all users accessing the device
  • Use a firewall to block unauthorized access to the device
CVE-2024-56973 0
Published: 2025-02-14T16:15:34.273

What it does:

This vulnerability allows a remote attacker to execute arbitrary code on a vulnerable system by manipulating the source and filename parameters in the ProcessUploadFromURL.jsp component of Alvaria, Inc Unified IP Unified Director before version 7.2SP2.

Why it's a problem:

This vulnerability is a problem because it gives attackers the ability to run malicious code on the system, which can lead to data breaches, unauthorized access, and other serious security issues.

Steps to mitigate:

  • Update Alvaria, Inc Unified IP Unified Director to version 7.2SP2 or later
  • Restrict access to the ProcessUploadFromURL.jsp component to trusted users only
  • Implement stricter input validation and sanitization for the source and filename parameters.
CVE-2025-25740 0
Published: 2025-02-14T15:15:13.190

What it does:

This vulnerability allows an attacker to overflow a buffer in the SetQuickVPNSettings module of the D-Link DIR-853 router by sending a maliciously crafted PSK parameter. This can cause the router to crash or allow the attacker to execute arbitrary code.

Why it's a problem:

This vulnerability can allow an attacker to take control of the router, leading to unauthorized access to the network and sensitive information. This can lead to serious security breaches and data theft.

Steps to mitigate:

  • Update the firmware of the D-Link DIR-853 router to a version that fixes this vulnerability
  • Avoid using the QuickVPN feature until the firmware is updated
  • Implement firewall rules to restrict access to the router's management interface from unknown sources.
CVE-2024-56477 6.5
Published: 2025-02-14T15:15:11.887

What it does:

This vulnerability allows an authenticated user to access arbitrary files on the IBM Power Hardware Management Console system by sending a specially crafted URL request with "dot dot" sequences (/../), which can traverse directories.

Why it's a problem:

This vulnerability is a problem because it allows an attacker to access sensitive files and data on the system, potentially leading to unauthorized access, data breaches, or other security issues.

Steps to mitigate:

  • Update to IBM Power Hardware Management Console V10.3.1050.1 or later
  • Apply security patches and fixes provided by IBM
  • Limit access to the system to trusted users and implement strict access controls
  • Implement robust URL filtering and validation to prevent malicious requests.
CVE-2024-52895 6.5
Published: 2025-02-14T15:15:09.210

What it does:

This vulnerability allows a privileged attacker to bypass database capability restrictions and remove or alter important database files, leading to denial of service and incorrect behavior of software products that rely on the database.

Why it's a problem:

This vulnerability is a problem because it can cause critical database infrastructure files to be deleted or modified, leading to software products malfunctioning or becoming unavailable. This can result in significant disruption to business operations and potentially lead to data loss or corruption.

Steps to mitigate:

  • Implement proper access controls to restrict privileged access to the database
  • Regularly back up critical database files
  • Ensure that software products relying on the database are regularly updated and patched
  • Monitor database activity for signs of unauthorized access or modifications.
CVE-2025-1239 0.0
Published: 2025-02-14T14:15:32.687

What it does:

This vulnerability allows an attacker to inject malicious code into the Blocked Sites list on a WatchGuard Firebox, which can lead to a stored Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability is a problem because it can allow an attacker to steal sensitive information, take control of the device, or perform other malicious actions. Since it requires an authenticated administrator session, the attacker could exploit the trust of the administrator's account to gain unauthorized access.

Steps to mitigate:

  • Update Fireware OS to a version outside the affected range (before 12.0 or after 12.11)
  • Ensure administrator accounts have strong passwords and are used only for administrative tasks
  • Limit access to the Firebox and Blocked Sites list to only trusted personnel.
CVE-2025-1071 0
Published: 2025-02-14T14:15:32.560

What it does:

This vulnerability allows an attacker to store malicious code on a WatchGuard Firebox device, which can then be executed on other administrators' browsers when they access the device. This is known as a Stored Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can lead to unauthorized access to sensitive information, modification of system settings, or execution of malicious commands on the device. Since it requires an authenticated administrator session, it could be particularly damaging if an attacker gains access to an admin account.

Steps to mitigate:

  • Update Fireware OS to a version outside of the affected range (12.0-12.5.12+701324 and 12.6-12.11)
  • Ensure all administrator sessions are secure and monitor for suspicious activity
  • Limit access to the Firebox device to only necessary personnel.
CVE-2025-0178 0
Published: 2025-02-14T14:15:32.403

What it does:

This vulnerability allows an attacker to manipulate the HTTP Host header in requests sent to the Web UI of WatchGuard Fireware OS, which can lead to unwanted redirects, cache poisoning, or injection of malicious JavaScript code.

Why it's a problem:

This vulnerability is a problem because it can be exploited by attackers to redirect users to fake websites, steal sensitive information, or inject malware into responses sent by the Web UI, ultimately compromising the security and integrity of the system.

Steps to mitigate:

  • Update Fireware OS to a version outside of the affected range (12.0-12.11)
  • Implement traffic filtering and monitoring to detect and block suspicious HTTP requests
  • Validate user input and ensure proper input sanitization to prevent manipulation of HTTP headers.
CVE-2024-56180 0
Published: 2025-02-14T14:15:32.267

What it does:

This vulnerability allows attackers to send manipulated messages to the Apache EventMesh master branch, which can lead to remote code execution via Hessian deserialization RPC protocol.

Why it's a problem:

This vulnerability is a problem because it allows attackers to execute malicious code on affected systems, giving them unauthorized access and control.

Steps to mitigate:

  • Update to version 1.11.0 or use the code under the master branch in the project repository to fix this issue.
CVE-2024-12651 8.5
Published: 2025-02-14T14:15:31.487

What it does:

The HGS Mobile App before version 6.5.0 has a vulnerability that allows an attacker to manipulate user-controlled variables by exploiting an exposed dangerous method or function.

Why it's a problem:

This vulnerability can give an attacker unauthorized control over the app, potentially leading to sensitive data exposure, unauthorized actions, or other malicious activities.

Steps to mitigate:

  • Upgrade the HGS Mobile App to version 6.5.0 or later
  • Ensure that all instances of the app are updated to the latest version
  • Review and monitor app behavior for any suspicious activity.
CVE-2025-24700 7.1
Published: 2025-02-14T13:15:50.330

What it does:

This vulnerability allows hackers to inject malicious code into websites using the WP Event Aggregator plugin, which can then be executed by unsuspecting users visiting the site.

Why it's a problem:

This can lead to theft of sensitive information, account takeover, or other malicious activities. Since the malicious code is injected through a trusted website, users are more likely to trust the site and be unaware of the attack.

Steps to mitigate:

  • Update WP Event Aggregator to a version later than 1.8.2
  • Validate and sanitize all user input to prevent XSS attacks
  • Use a web application firewall (WAF) to detect and block suspicious traffic
  • Use security software/scanners to identify and patch vulnerabilities regularly.
CVE-2025-24699 7.1
Published: 2025-02-14T13:15:50.193

What it does:

This vulnerability allows an attacker to trick a user into performing unintended actions on a website, and also inject malicious code into the user's browser.

Why it's a problem:

This vulnerability can be exploited by attackers to steal sensitive information, take control of user accounts, or perform malicious actions on the user's behalf, all without the user's knowledge or consent.

Steps to mitigate:

  • Update WP Coder to a version later than 3.6
  • Implement CSRF protection mechanisms, such as token-based validation, on all sensitive requests
  • Use a web application firewall (WAF) to filter out malicious traffic
  • Use input validation and sanitization to prevent XSS attacks.
CVE-2025-24692 7.1
Published: 2025-02-14T13:15:50.050

What it does:

This vulnerability in the Bulk Menu Edit plugin allows unauthorized access to edit menus, even if the user doesn't have the necessary permissions.

Why it's a problem:

This is a problem because it allows malicious users to make unauthorized changes to menus, potentially causing damage to the system or exposing sensitive information.

Steps to mitigate:

  • Update the Bulk Menu Edit plugin to a version higher than 1.3
  • Review and ensure correct configuration of access control security levels
  • Limit access to the plugin to only trusted and authorized users.
CVE-2025-24688 7.1
Published: 2025-02-14T13:15:49.910

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by other users who visit the site.

Why it's a problem:

This is a problem because it can allow an attacker to steal user data, take control of user sessions, or perform other malicious actions on behalf of the user. This can lead to sensitive information being stolen or compromised.

Steps to mitigate:

  • Update WP Mailster to a version later than 1.8.20.0
  • Validate and sanitize all user input to prevent malicious code from being injected
  • Implement content security policies to define which sources of content are allowed to be executed within a web page
CVE-2025-24641 7.1
Published: 2025-02-14T13:15:49.773

What it does:

This vulnerability allows attackers to inject malicious code into a website through the Better WishList API, which can lead to cross-site scripting (XSS). This means that an attacker can store malicious code on the website, which will then be executed by other users who visit the site.

Why it's a problem:

This is a problem because it allows attackers to steal user data, take control of user sessions, or perform malicious actions on behalf of the user. This can lead to serious security breaches and compromise the integrity of the website and its users.

Steps to mitigate:

  • Update the Better WishList API to a version later than 1.1.3
  • Implement input validation and sanitization to prevent malicious code injection
  • Review and test website security regularly to detect and respond to potential XSS attacks
  • Consider implementing a Web Application Firewall (WAF) to detect and block XSS attempts.
CVE-2025-24617 7.1
Published: 2025-02-14T13:15:49.633

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by a user's browser. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can be exploited by an attacker to steal user data, take control of user sessions, or perform actions on the user's behalf. This can lead to sensitive information being compromised, financial loss, or reputational damage.

Steps to mitigate:

  • Upgrade AcyMailing SMTP Newsletter to a patched version
  • Ensure all user input is properly validated and sanitized
  • Implement web application firewall (WAF) rules to detect and block XSS attacks
  • Educate users about the risks of clicking on suspicious links and providing sensitive information to untrusted websites.
CVE-2025-24616 7.1
Published: 2025-02-14T13:15:49.490

What it does:

This vulnerability allows an attacker to inject malicious code into a website using the Uix Page Builder tool, which can then be executed by users visiting the site.

Why it's a problem:

This vulnerability enables reflected cross-site scripting (XSS), which can lead to unauthorized actions being taken on behalf of users, such as stealing sensitive information or taking control of their accounts.

Steps to mitigate:

  • Update Uix Page Builder to a version higher than 1.7.3
  • Ensure all user input is properly validated and sanitized
  • Implement web application firewalls (WAFs) to detect and block malicious traffic
  • Use anti-XSS protection mechanisms, such as Content Security Policy (CSP), to prevent malicious code execution.
CVE-2025-24615 7.1
Published: 2025-02-14T13:15:49.353

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by unsuspecting users who visit the page.

Why it's a problem:

This type of attack, known as cross-site scripting (XSS), can be used to steal sensitive information, take control of user sessions, or perform other malicious actions. It can compromise the security of users who interact with the affected Analytics Cat application.

Steps to mitigate:

  • Upgrade Analytics Cat to a version later than 1.1.2
  • Ensure input validation and sanitization are properly implemented in web page generation
  • Implement web application firewalls (WAFs) or XSS filters to detect and prevent XSS attacks
CVE-2025-24614 7.1
Published: 2025-02-14T13:15:49.217

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by other users who visit the page.

Why it's a problem:

This can lead to unwanted actions being taken on behalf of the user, such as stealing sensitive information or taking control of their account. It can also allow attackers to spread malware or ransomware to other users.

Steps to mitigate:

  • Update Post Timeline to version 2.3.10 or later
  • Use a web application firewall (WAF) to detect and block malicious traffic
  • Implement input validation and sanitization to prevent malicious code injection.
CVE-2025-24607 5.8
Published: 2025-02-14T13:15:49.083

What it does:

This vulnerability allows unauthorized access to IdeaPush due to incorrectly configured access control security levels.

Why it's a problem:

This vulnerability could allow an attacker to access sensitive information or perform actions without proper permissions, potentially leading to data breaches or system compromise.

Steps to mitigate:

  • Review and update access control security levels in IdeaPush to ensure they are configured correctly
  • Verify that all users and roles have proper permissions and access levels
  • Apply the latest security patches and updates to IdeaPush, up to version 8.71 or higher.
CVE-2025-24592 7.1
Published: 2025-02-14T13:15:48.940

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by other users who visit that page.

Why it's a problem:

This vulnerability, known as Reflected Cross-Site Scripting (XSS), can lead to unauthorized actions being taken on a user's account, stealing of sensitive information, or propagation of malware.

Steps to mitigate:

  • Update Customize My Account for WooCommerce to version 2.8.23 or later
  • Ensure that all plugins and software are up-to-date
  • Avoid using outdated or vulnerable versions of software and plugins.
CVE-2025-24567 6.5
Published: 2025-02-14T13:15:48.800

What it does:

This vulnerability allows an attacker to access sensitive information embedded in emails sent through the WP Mailster plugin, which can include confidential data.

Why it's a problem:

This is a problem because it can lead to unauthorized access to sensitive information, which can be used for malicious purposes, such as identity theft or financial fraud.

Steps to mitigate:

  • Update WP Mailster to a version later than 1.8.16.0
  • Review email content and remove any sensitive information before sending
  • Implement additional security measures to protect sensitive data, such as encryption or secure transmission protocols.
CVE-2025-24566 7.1
Published: 2025-02-14T13:15:48.663

What it does:

This vulnerability allows an attacker to inject malicious code into a web page through the Intro Tour Tutorial DeepPresentation feature, which can then be executed by other users who visit the page.

Why it's a problem:

This type of attack, known as cross-site scripting (XSS), can allow an attacker to steal user data, take control of user sessions, or spread malware. This can compromise sensitive information and put users at risk.

Steps to mitigate:

  • Update Intro Tour Tutorial DeepPresentation to a version later than 6.5.2
  • Ensure proper input validation and sanitization to prevent malicious code injection
  • Implement web application firewall (WAF) rules to detect and block XSS attacks
  • Monitor web page traffic for suspicious activity and take action if an attack is detected.
CVE-2025-24565 7.1
Published: 2025-02-14T13:15:48.540

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by unsuspecting users who visit the site.

Why it's a problem:

This type of attack, known as cross-site scripting (XSS), can lead to the theft of sensitive information, unauthorized actions, and even malware infections. If exploited, it can compromise the security of users who interact with the affected website.

Steps to mitigate:

  • Update WP2LEADS to a version later than 3.3.3
  • Ensure input validation and sanitization are properly implemented in web page generation
  • Perform regular security audits and testing to identify potential vulnerabilities.
CVE-2025-24564 7.1
Published: 2025-02-14T13:15:48.393

What it does:

This vulnerability allows an attacker to inject malicious code into a website's contact form, which can then be executed by users who visit the page. This is known as a Cross-site Scripting (XSS) attack.

Why it's a problem:

This vulnerability is a problem because it can lead to sensitive data theft, unauthorized actions, or malware infections on users' devices. An attacker could steal login credentials, credit card information, or other sensitive data, or take control of a user's session.

Steps to mitigate:

CVE-2025-24558 7.1
Published: 2025-02-14T13:15:48.253

What it does:

This vulnerability allows an attacker to inject malicious code into CRM Perks CRM Perks, which can then be executed by other users who visit the affected page. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can allow attackers to steal user data, take control of user sessions, or perform other malicious actions. Since it affects the CRM Perks system, it could compromise sensitive customer or business data.

Steps to mitigate:

  • Upgrade CRM Perks to a version later than 1.1.5
  • Apply patches or hotfixes provided by the vendor to address this vulnerability
  • Implement input validation and sanitization to prevent malicious code injection.
CVE-2025-24554 7.1
Published: 2025-02-14T13:15:48.113

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by users who visit the page.

Why it's a problem:

This type of attack, known as cross-site scripting (XSS), can allow hackers to steal user data, take control of user sessions, or perform other malicious actions. If an attacker gains access to sensitive information, it can lead to serious consequences such as identity theft or financial loss.

Steps to mitigate:

  • Update AWcode Toolkit to version 1.0.15 or later
  • Ensure that all input data is properly validated and sanitized to prevent malicious code injection
  • Implement a web application firewall (WAF) to detect and block XSS attacks.
CVE-2025-23905 7.1
Published: 2025-02-14T13:15:47.973

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by a user who visits the compromised webpage.

Why it's a problem:

This can lead to unauthorized control of the user's session, theft of sensitive information, or installation of malware on the user's device.

Steps to mitigate:

  • Update Johannes van Poelgeest Admin Options Pages to version 0.9.8 or later
  • Ensure proper input validation and sanitization in web applications to prevent cross-site scripting
  • Implement a Web Application Firewall (WAF) to detect and block malicious traffic.
CVE-2025-23857 7.1
Published: 2025-02-14T13:15:47.837

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by users who visit the site.

Why it's a problem:

This can lead to a range of malicious activities, including stealing user data, taking control of user sessions, and spreading malware. If an attacker exploits this vulnerability, they can potentially harm users of the affected Essential WP Real Estate plugin.

Steps to mitigate:

  • Update the Essential WP Real Estate plugin to a version later than 1.1.3
  • Ensure that all input data is properly validated and sanitized to prevent malicious code injection
  • Implement a web application firewall (WAF) to detect and block XSS attacks
CVE-2025-23853 7.1
Published: 2025-02-14T13:15:47.700

What it does:

This vulnerability allows hackers to inject malicious code into a website, which can then be executed by users who visit the site.

Why it's a problem:

This type of attack, known as Cross-Site Scripting (XSS), can lead to users' sensitive information being stolen, or their computers being taken over by hackers. It can also lead to unwanted actions being performed on the user's behalf.

Steps to mitigate:

  • Update NoFollow Free to a version higher than 1.6.3
  • Ensure that all user input is properly validated and sanitized to prevent malicious code from being injected into the website
  • Implement a Web Application Firewall (WAF) to detect and prevent XSS attacks.
CVE-2025-23851 7.1
Published: 2025-02-14T13:15:47.550

What it does:

This vulnerability allows an attacker to inject malicious code into a website through the Coronavirus (COVID-19) Outbreak Data Widgets, which can then be executed by unsuspecting users who visit the website.

Why it's a problem:

This type of attack, known as Cross-Site Scripting (XSS), can steal user data, take control of user sessions, or perform malicious actions on behalf of the user. This can lead to unauthorized access to sensitive information, financial loss, and reputational damage.

Steps to mitigate:

  • Update the Coronavirus (COVID-19) Outbreak Data Widgets to version 1.1.1 or later
  • Ensure proper input validation and sanitization on user input
  • Implement web application firewalls or XSS filters to detect and block malicious requests.
CVE-2025-23790 7.1
Published: 2025-02-14T13:15:47.417

What it does:

This vulnerability allows attackers to inject malicious code into a website through user input, causing the website to execute the malicious code.

Why it's a problem:

This vulnerability, known as Reflected Cross-Site Scripting (XSS), can lead to unauthorized access to sensitive user data, session hijacking, and other malicious activities. It can also be used to spread malware and phishing attacks.

Steps to mitigate:

CVE-2025-23789 7.1
Published: 2025-02-14T13:15:47.280

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by a user's browser, potentially stealing sensitive information or taking control of their session.

Why it's a problem:

This vulnerability can be exploited by an attacker to steal user credentials, take control of user sessions, or inject malware into a user's browser. This can lead to unauthorized access to sensitive information, financial loss, and reputational damage.

Steps to mitigate:

CVE-2025-23788 7.1
Published: 2025-02-14T13:15:47.143

What it does:

This vulnerability allows an attacker to inject malicious code into a website, known as Reflected Cross-Site Scripting (XSS), through the Easy Filter feature.

Why it's a problem:

This vulnerability can allow an attacker to steal sensitive information, such as login credentials, or take control of a user's session, leading to unintended actions or data theft.

Steps to mitigate:

  • Update Easy Filter to a version higher than 1.10
  • Avoid using the affected version of Easy Filter until a patch is applied
  • Use a web application firewall (WAF) to detect and block XSS attacks
  • Implement input validation and sanitization to prevent malicious code injection.
CVE-2025-23787 7.1
Published: 2025-02-14T13:15:47.003

What it does:

This vulnerability allows attackers to inject malicious code into a website, which can then be executed by users who visit the site. This is known as a Reflected XSS (Cross-site Scripting) attack.

Why it's a problem:

This vulnerability can lead to unauthorized access to sensitive user data, session hijacking, and other malicious activities. If an attacker exploits this vulnerability, they can steal user credentials, take control of user sessions, or redirect users to phishing sites.

Steps to mitigate:

CVE-2025-23786 7.1
Published: 2025-02-14T13:15:46.860

What it does:

This vulnerability allows an attacker to inject malicious code into a website, known as Cross-site Scripting (XSS), through the DuoGeek Email to Download feature.

Why it's a problem:

This vulnerability can be exploited by an attacker to steal user data, take control of user sessions, or perform unauthorized actions on the website, potentially leading to data breaches or other security incidents.

Steps to mitigate:

  • Update DuoGeek Email to Download to a version later than 3.1.0
  • Implement input validation and sanitization to prevent malicious code injection
  • Use web application firewalls (WAFs) and security software to detect and block XSS attacks.
CVE-2025-23771 6.5
Published: 2025-02-14T13:15:46.727

What it does:

This vulnerability allows unauthorized access to sensitive features in Murali Push Notification for Post and BuddyPress, bypassing security controls due to incorrect configuration.

Why it's a problem:

This vulnerability is a problem because it allows unauthorized users to exploit the system, potentially leading to data breaches, unauthorized actions, or other malicious activities.

Steps to mitigate:

  • Review and correct access control security levels in Murali Push Notification for Post and BuddyPress
  • Ensure that all configurations are set up correctly and securely
  • Update to a patched version of Push Notification for Post and BuddyPress, if available
  • Audit system logs for suspicious activity.
CVE-2025-23766 6.5
Published: 2025-02-14T13:15:46.583

What it does:

This vulnerability allows unauthorized access to the OPSI Israel Domestic Shipments system due to incorrectly configured access control security levels.

Why it's a problem:

This vulnerability is a problem because it enables unauthorized users to access and potentially manipulate sensitive data or perform unauthorized actions, which can lead to data breaches, financial losses, and reputational damage.

Steps to mitigate:

  • Verify and correct access control security levels configuration
  • Restrict access to authorized personnel only
  • Implement additional authentication and authorization mechanisms
  • Regularly review and update system configurations to prevent similar vulnerabilities.
CVE-2025-23751 7.1
Published: 2025-02-14T13:15:46.450

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by other users who visit the page. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability is a problem because it can allow attackers to steal user data, take control of user sessions, or perform other malicious actions. This can lead to unauthorized access to sensitive information, financial loss, or other serious consequences.

Steps to mitigate:

  • Update Think201 Data Dash to a version later than 1.2.3
  • Ensure all user input is properly validated and sanitized to prevent malicious code injection
  • Implement additional security measures, such as output encoding and Content Security Policy (CSP), to prevent XSS attacks.
CVE-2025-23750 7.1
Published: 2025-02-14T13:15:46.313

What it does:

This vulnerability allows an attacker to inject malicious code into a web page using the Custom Widget Creator tool, which can then be executed by unsuspecting users who visit the page.

Why it's a problem:

This allows an attacker to steal user data, take control of user sessions, or perform other malicious actions on behalf of the user.

Steps to mitigate:

  • Update the Custom Widget Creator tool to a version higher than 1.0.5
  • Avoid using the affected Custom Widget Creator tool until an update is available
  • Use a web application firewall or other security controls to detect and block malicious traffic
  • Implement input validation and sanitization to prevent XSS attacks
CVE-2025-23748 7.1
Published: 2025-02-14T13:15:46.177

What it does:

This vulnerability allows an attacker to inject malicious code into a webpage, which can then be executed by users visiting the page. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can lead to unauthorized actions being taken on behalf of the user, such as stealing login credentials, taking control of the user's session, or redirecting the user to a malicious website.

Steps to mitigate:

  • Update Singsys -Awesome Gallery to a version higher than 1.0
  • Ensure input validation and sanitization are properly implemented in web page generation
  • Apply security patches and updates as soon as they become available
  • Disable JavaScript execution in untrusted websites.
CVE-2025-23742 7.1
Published: 2025-02-14T13:15:46.033

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by unsuspecting users who visit the page.

Why it's a problem:

This can lead to the theft of sensitive information, such as login credentials or credit card numbers, as well as other malicious activities like taking control of the user's session or distributing malware.

Steps to mitigate:

  • Upgrade Podamibe Twilio Private Call to a version later than 1.0.1
  • Implement input validation and sanitization to prevent malicious code injection
  • Use a web application firewall (WAF) to detect and block XSS attacks
  • Use browser extensions or plugins that provide XSS protection
  • Avoid clicking on suspicious links or providing sensitive information on untrusted websites.
CVE-2025-23658 7.1
Published: 2025-02-14T13:15:45.900

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, known as Cross-site Scripting (XSS), through the Advanced Angular Contact Form. This can happen when a user clicks on a specially crafted link or visits a malicious website.

Why it's a problem:

This vulnerability can lead to unauthorized actions being taken on behalf of the user, such as stealing sensitive information, taking control of the user's account, or spreading malware.

Steps to mitigate:

  • Update the Advanced Angular Contact Form to a version later than 1.1.0
  • Validate and sanitize all user input to prevent malicious code from being injected
  • Implement Content Security Policy (CSP) to define which sources of content are allowed to be executed within a web application.
CVE-2025-23657 7.1
Published: 2025-02-14T13:15:45.760

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by unsuspecting users who visit the site.

Why it's a problem:

This can lead to unauthorized actions being performed on behalf of the user, such as stealing sensitive information or taking control of their account.

Steps to mitigate:

  • Update WordPress-to-candidate for Salesforce CRM to a version later than 1.0.1
  • Implement input validation and sanitization to prevent malicious code injection
  • Use a web application firewall (WAF) to detect and block XSS attacks
  • Use browser extensions or plugins that provide XSS protection.
CVE-2025-23655 7.1
Published: 2025-02-14T13:15:45.610

What it does:

This vulnerability allows attackers to inject malicious code into a website through the Contact Form 7 – Paystack Add-on, which can then be executed by unsuspecting users who visit the site.

Why it's a problem:

This type of attack, known as Cross-Site Scripting (XSS), can lead to serious consequences such as stealing user data, taking control of user sessions, or spreading malware.

Steps to mitigate:

  • Update the Contact Form 7 – Paystack Add-on to a version above 1.2.3.
  • Ensure proper input validation and sanitization in the add-on to prevent malicious code injection.
  • Implement a Web Application Firewall (WAF) or other security measures to detect and block XSS attacks.
CVE-2025-23653 7.1
Published: 2025-02-14T13:15:45.467

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by users who visit the page. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

If an attacker successfully injects malicious code, they can steal user data, take control of user sessions, or perform actions on behalf of the user. This can lead to sensitive information being stolen, identity theft, or other severe consequences.

Steps to mitigate:

  • Patch the Form To Online Booking system to version 1.1 or higher
  • Validate and sanitize user input to prevent malicious code injection
  • Implement web application firewalls or XSS filters to detect and block suspicious traffic
  • Educate users to avoid clicking on suspicious links or providing sensitive information on untrusted websites.
CVE-2025-23652 7.1
Published: 2025-02-14T13:15:45.333

What it does:

This vulnerability allows an attacker to inject malicious code into a web page by exploiting a weakness in the NotFound Add custom content after post feature. This can lead to a Cross-site Scripting (XSS) attack, where the attacker can steal user data, take control of the user's session, or perform other malicious actions.

Why it's a problem:

This vulnerability is a problem because it allows an attacker to manipulate the content of a web page, potentially leading to the theft of sensitive information, unauthorized access, or other security breaches.

Steps to mitigate:

  • Update the NotFound Add custom content after post feature to version 1.1 or later
  • Implement input validation and sanitization to prevent malicious code injection
  • Restrict user input to trusted sources only
  • Monitor web page activity for signs of XSS attacks.
CVE-2025-23651 7.1
Published: 2025-02-14T13:15:45.200

What it does:

This vulnerability allows an attacker to inject malicious code into a website through the NotFound Scroll Top feature, which can then be executed by users who visit the site.

Why it's a problem:

This is a problem because it can lead to a type of attack known as cross-site scripting (XSS), which allows attackers to steal user data, take control of user sessions, or perform other malicious actions.

Steps to mitigate:

  • Update NotFound Scroll Top to a version newer than 1.3.3
  • Avoid using versions of Scroll Top between n/a and 1.3.3
  • Use a web application firewall (WAF) to filter out malicious input.
CVE-2025-23650 7.1
Published: 2025-02-14T13:15:45.063

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by other users who visit the page. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can be used to steal user data, take control of user sessions, or perform other malicious actions. It can also be used to spread malware or launch further attacks on other websites.

Steps to mitigate:

CVE-2025-23648 7.1
Published: 2025-02-14T13:15:44.930

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by unsuspecting users who visit the site. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can be used to steal user data, take control of user sessions, or trick users into performing unintended actions. It can also be used to spread malware or ransomware, leading to further compromise of user systems.

Steps to mitigate:

  • Upgrade AdsMiddle to a version newer than 1.0
  • Ensure all user input is properly validated and sanitized
  • Implement a Web Application Firewall (WAF) with XSS protection
  • Perform regular security audits and testing to identify and address any potential vulnerabilities
  • Educate users about the risks of XSS attacks and how to avoid falling victim to them.
CVE-2025-23647 7.1
Published: 2025-02-14T13:15:44.790

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by unsuspecting users who visit the page.

Why it's a problem:

This is a problem because it enables hackers to steal user data, take control of user accounts, or spread malware. This type of attack, known as cross-site scripting (XSS), can have serious consequences, including financial loss and reputational damage.

Steps to mitigate:

  • Update Ariagle WP-Clap to a version higher than 1.5
  • Validate and sanitize all user input to prevent malicious code from being injected
  • Use a web application firewall (WAF) to detect and block XSS attacks
  • Implement secure coding practices and regularly test for vulnerabilities.
CVE-2025-23646 7.1
Published: 2025-02-14T13:15:44.617

What it does:

This vulnerability allows attackers to inject malicious code into web pages generated by the Library Instruction Recorder, which can then be executed by users who visit those pages.

Why it's a problem:

This can lead to unauthorized access to sensitive information, session hijacking, or other malicious activities.

Steps to mitigate:

  • Update the Library Instruction Recorder to version 1.1.5 or later
  • Implement input validation and sanitization to prevent malicious code injection
  • Use a web application firewall (WAF) to detect and block XSS attacks
  • Educate users about the risks of clicking on suspicious links or opening untrusted emails.
CVE-2025-23598 7.1
Published: 2025-02-14T13:15:44.483

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by unsuspecting users who visit the page.

Why it's a problem:

This vulnerability, known as cross-site scripting (XSS), can lead to a range of malicious activities, including stealing user credentials, taking control of user sessions, and performing unauthorized actions on behalf of the user.

Steps to mitigate:

  • Update Recip.ly to version 1.1.9 or later
  • Use input validation and output encoding to prevent malicious code injection
  • Implement web application firewall (WAF) rules to detect and block XSS attacks
  • Use a reputable web application security scanner to identify and remediate vulnerabilities.
CVE-2025-23571 7.1
Published: 2025-02-14T13:15:44.330

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by unsuspecting users who visit the site. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability can lead to the theft of sensitive information, such as login credentials or credit card numbers, or allow an attacker to take control of a user's session. It can also be used to spread malware or phishing attacks.

Steps to mitigate:

  • Upgrade Internal Links Generator to a version higher than 3.51
  • Apply web application firewall rules to detect and block malicious input
  • Implement input validation and sanitization to prevent malicious code injection
  • Inform users to avoid interacting with suspicious links or websites.
CVE-2025-23568 7.1
Published: 2025-02-14T13:15:44.123

What it does:

This vulnerability allows an attacker to inject malicious code into a web page, which can then be executed by other users who visit the page. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

This vulnerability is a problem because it can allow an attacker to steal user data, take control of user sessions, or perform malicious actions on behalf of the user. It can also lead to further attacks, such as phishing or malware distribution.

Steps to mitigate:

CVE-2025-23534 6.5
Published: 2025-02-14T13:15:43.980

What it does:

This vulnerability allows unauthorized access to WPLingo due to a misconfiguration in access control security levels.

Why it's a problem:

This vulnerability is a problem because it can lead to sensitive information being accessed or modified by unauthorized individuals, potentially causing data breaches or system compromise.

Steps to mitigate:

  • Update WPLingo to a version later than 1.1.2
  • Review and correctly configure access control security levels in WPLingo
  • Implement additional authentication and authorization mechanisms to prevent unauthorized access.
CVE-2025-23525 7.1
Published: 2025-02-14T13:15:43.840

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by other users who visit the site. This is known as a Reflected Cross-Site Scripting (XSS) attack.

Why it's a problem:

If an attacker succeeds in exploiting this vulnerability, they could steal user data, take control of user accounts, or perform other malicious actions on behalf of the user. This could lead to serious security breaches and financial losses.

Steps to mitigate:

  • Update Kv Compose Email From Dashboard to a version higher than 1.1
  • Avoid using the affected version of Kv Compose Email From Dashboard until a patch is available
  • Implement input validation and encoding to prevent malicious code from being injected into the website.
CVE-2025-23523 7.1
Published: 2025-02-14T13:15:43.703

What it does:

This vulnerability allows an attacker to inject malicious code into a website, which can then be executed by unsuspecting users who visit the site.

Why it's a problem:

If an attacker successfully exploits this vulnerability, they can steal user data, take control of user sessions, or inject malware into the user's device. This can lead to a range of serious consequences, including identity theft, financial loss, and data breaches.

Steps to mitigate:

  • Update HSS Embed Streaming Video to a version later than 3.23
  • Ensure input validation and sanitization are properly implemented in web applications
  • Implement a Web Application Firewall (WAF) to detect and prevent XSS attacks
  • Educate users about the risks of clicking on suspicious links or providing sensitive information on untrusted websites.
CVE-2025-23492 7.1
Published: 2025-02-14T13:15:43.573

What it does:

This vulnerability allows an attacker to inject malicious code into a webpage, which can then be executed by users visiting the page. This is known as a "cross-site scripting" (XSS) attack.

Why it's a problem:

This vulnerability is a problem because it can allow an attacker to steal user data, take control of user sessions, or perform other malicious actions. This can lead to unauthorized access to sensitive information, financial loss, and damage to an organization's reputation.

Steps to mitigate:

  • Update the CantonBolo WordPress 淘宝客插件 to a version later than 1.1.2
  • Verify that all input data is properly validated and sanitized
  • Implement web application security measures such as output encoding and content security policies to prevent XSS attacks