U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 269,446 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2025-27625

In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash (`\`) characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.

Published: March 05, 2025; 6:15:14 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27624

A cross-site request forgery (CSRF) vulnerability in Jenkins 2.499 and earlier, LTS 2.492.1 and earlier allows attackers to have users toggle their collapsed/expanded status of sidepanel widgets (e.g., Build Queue and Build Executor Status widgets).

Published: March 05, 2025; 6:15:14 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27623

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of views via REST API or CLI, allowing attackers with View/Read permission to view encrypted values of secrets.

Published: March 05, 2025; 6:15:14 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27622

Jenkins 2.499 and earlier, LTS 2.492.1 and earlier does not redact encrypted values of secrets when accessing `config.xml` of agents via REST API or CLI, allowing attackers with Agent/Extended Read permission to view encrypted values of secrets.

Published: March 05, 2025; 6:15:13 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27508

Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0.

Published: March 05, 2025; 5:15:35 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27516

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

Published: March 05, 2025; 4:15:20 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-25634

A vulnerability has been found in Tenda AC15 15.03.05.19 in the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src leads to stack-based buffer overflow.

Published: March 05, 2025; 4:15:19 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-25632

Tenda AC15 v15.03.05.19 is vulnerable to Command Injection via the handler function in /goform/telnet.

Published: March 05, 2025; 4:15:19 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-25362

A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field.

Published: March 05, 2025; 4:15:19 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-57174

A misconfiguration in Alphion ASEE-1443 Firmware v0.4.H.00.02.15 defines a previously unregistered domain name as the default DNS suffix. This allows attackers to register the unclaimed domain and point its wildcard DNS entry to an attacker-controlled IP address, making it possible to access sensitive information.

Published: March 05, 2025; 4:15:19 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27517

Volt is an elegantly crafted functional API for Livewire. Malicious, user-crafted request payloads could potentially lead to remote code execution within Volt components. This vulnerability is fixed in 1.7.0.

Published: March 05, 2025; 3:16:05 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-51144

Cross Site Request Forgery (CSRF) vulnerability exists in the 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete , and ajax.server.php?page=user&action=flip_follow endpoints in Ampache <= 6.6.0.

Published: March 05, 2025; 3:16:05 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-2003

Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission.

Published: March 05, 2025; 2:15:39 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27515

Laravel is a web application framework. When using wildcard validation to validate a given file or image field (`files.*`), a user-crafted malicious request could potentially bypass the validation rules. This vulnerability is fixed in 11.44.1 and 12.1.1.

Published: March 05, 2025; 2:15:39 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-27513

OpenTelemetry dotnet is a dotnet telemetry framework. A vulnerability in OpenTelemetry.Api package 1.10.0 to 1.11.1 could cause a Denial of Service (DoS) when a tracestate and traceparent header is received. Even if an application does not explicitly use trace context propagation, receiving these headers can still trigger high CPU usage. This issue impacts any application accessible over the web or backend services that process HTTP requests containing a tracestate header. Application may experience excessive resource consumption, leading to increased latency, degraded performance, or downtime. This vulnerability is fixed in 1.11.2.

Published: March 05, 2025; 2:15:39 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-48246

Vehicle Management System 1.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the "Name" parameter of /vehicle-management/booking.php.

Published: March 05, 2025; 2:15:37 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-31525

Peppermint Ticket Management 0.4.6 is vulnerable to Incorrect Access Control. A regular registered user is able to elevate his privileges to admin and gain complete access to the system as the authorization mechanism is not validated on the server side and only on the client side. This can result, for example, in creating a new admin user in the system which enables persistent access for the attacker as an administrator.

Published: March 05, 2025; 2:15:37 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2024-53458

Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.

Published: March 05, 2025; 1:15:37 PM -0500
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-20208

A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) could allow a low-privileged, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious data in a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

Published: March 05, 2025; 12:15:14 PM -0500
V4.0:(not available)
V3.1: 4.6 MEDIUM
V2.0:(not available)
CVE-2025-20206

A vulnerability in the interprocess communication (IPC) channel of Cisco Secure Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the Secure Firewall Posture Engine, formerly HostScan, is installed on Cisco Secure Client. This vulnerability is due to insufficient validation of resources that are loaded by the application at run time. An attacker could exploit this vulnerability by sending a crafted IPC message to a specific Cisco Secure Client process. A successful exploit could allow the attacker to execute arbitrary code on the affected machine with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid user credentials on the Windows system.

Published: March 05, 2025; 12:15:14 PM -0500
V4.0:(not available)
V3.1: 7.1 HIGH
V2.0:(not available)