Search Results (339825 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-10909 1 Mangati 1 Novosga 2025-10-20 2.4 Low
A security flaw has been discovered in Mangati NovoSGA up to 2.2.9. The impacted element is an unknown function of the file /admin of the component SVG File Handler. Performing manipulation of the argument logoNavbar/logoLogin results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
CVE-2025-10584 1 Portabilis 1 I-educar 2025-10-20 3.5 Low
A vulnerability was identified in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_calendario_anotacao_cad.php. Such manipulation of the argument nm_anotacao/descricao leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
CVE-2025-10373 1 Portabilis 1 I-educar 2025-10-20 3.5 Low
A security vulnerability has been detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /intranet/educar_turma_tipo_cad.php. Such manipulation of the argument nm_tipo leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
CVE-2025-62640 2025-10-18 N/A
Not used
CVE-2025-62639 2025-10-18 N/A
Not used
CVE-2025-62638 2025-10-18 N/A
Not used
CVE-2025-62637 2025-10-18 N/A
Not used
CVE-2025-62636 2025-10-18 N/A
Not used
CVE-2025-62635 2025-10-18 N/A
Not used
CVE-2025-62634 2025-10-18 N/A
Not used
CVE-2025-62633 2025-10-18 N/A
Not used
CVE-2025-62632 2025-10-18 N/A
Not used
CVE-2025-20357 1 Cisco 2 Cyber Vision, Cyber Vision Center 2025-10-18 5.4 Medium
A vulnerability in the web-based management interface of Cisco Cyber Vision Center could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials that allow access to the Reports page. By default, all pre-defined users have this access, as do any custom users that are configured to allow access to the Reports page.
CVE-2025-56676 1 Titansystems 1 Zender 2025-10-18 5.4 Medium
TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure.
CVE-2025-56200 2 Validator Project, Validatorjs 2 Validator, Validator.js 2025-10-18 6.1 Medium
A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
CVE-2025-20356 1 Cisco 2 Cyber Vision, Cyber Vision Center 2025-10-18 5.4 Medium
A vulnerability in the web-based management interface of Cisco Cyber Vision Center could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials that allow access to the Sensor Explorer page. By default, Admin and Product user roles have this access, as do any custom users that are configued to allow access to the Sensors page.
CVE-2025-45143 1 Devrafalko 1 String-math 2025-10-18 7 High
string-math v1.2.2 was discovered to contain a Regex Denial of Service (ReDoS) which is exploited via a crafted input.
CVE-2025-45424 1 Xinference 1 Xinference 2025-10-18 5.3 Medium
Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication.
CVE-2025-40715 1 Quiter 1 Quiter Gateway 2025-10-18 9.8 Critical
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo mensaje in /QISClient/api/v1/sucesospaginas.
CVE-2025-40716 1 Quiter 1 Quiter Gateway 2025-10-18 9.8 Critical
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the suceso.contenido mensaje in /QMSCliente/Sucesos.action.