Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : [1] 2 3 4 5 6 7 8 9 10 11 ... Result(s) : 326273

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
6.4 2025-07-08 CVE-2025-5537 cve The Lightbox & Modal Popup WordPress Plugin – FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and inc...
5.3 2025-07-08 CVE-2025-5957 cve The Guest Support – Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on th...
6.3 2025-07-08 CVE-2025-7162 cve A vulnerability, which was classified as critical, has been found in PHPGurukul Zoo Management System 2.1. This issue affects some unknown processing of the file /admin/add-fore...
6.3 2025-07-08 CVE-2025-7163 cve A vulnerability, which was classified as critical, was found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/add-animals.php. The man...
7.3 2025-07-08 CVE-2025-7164 cve A vulnerability has been found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of...
7.3 2025-07-08 CVE-2025-7165 cve A vulnerability was found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /...
8.8 2025-07-08 CVE-2025-7327 cve The Widget for Google Reviews plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.15 via the layout parameter. This makes it poss...
5.3 2025-07-08 CVE-2025-24002 cve An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-servic...
8.2 2025-07-08 CVE-2025-24003 cve An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integ...
5.2 2025-07-08 CVE-2025-24004 cve A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a...
7.8 2025-07-08 CVE-2025-24005 cve A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.
7.8 2025-07-08 CVE-2025-24006 cve A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
8.8 2025-07-08 CVE-2025-25268 cve An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
8.4 2025-07-08 CVE-2025-25269 cve An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.
9.8 2025-07-08 CVE-2025-25270 cve An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
8.8 2025-07-08 CVE-2025-25271 cve An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.
6.5 2025-07-08 CVE-2025-41665 cve An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file.
8.8 2025-07-08 CVE-2025-41666 cve A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watc...
8.8 2025-07-08 CVE-2025-41667 cve A low privileged remote attacker with file access can replace a critical file used by the arp-preinit script to get read, write and execute access to any file on the device.
8.8 2025-07-08 CVE-2025-41668 cve A low privileged remote attacker with file access can replace a critical file or folder used by the service security-profile to get read, write and execute access to any file on...
Page(s) : [1] 2 3 4 5 6 7 8 9 10 11 ... Result(s) : 326273