๐จ CVE-2025-7430
Zohocorp ManageEngine Exchange Reporter Plus versions 5723 and below are vulnerable to the Stored XSS Vulnerability in the Folder Message Count and Size report.
๐@cveNotify
Zohocorp ManageEngine Exchange Reporter Plus versions 5723 and below are vulnerable to the Stored XSS Vulnerability in the Folder Message Count and Size report.
๐@cveNotify
Manageengine
CVE-2025-7430 - Stored XSS vulnerability in Exchange Reporter Plus
This page provides details about the CVE-2025-7430 vulnerability in Exchange Reporter Plus and outlines the incident response plan if your system is affected.
๐จ CVE-2025-3115
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.
Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
๐@cveNotify
Injection Vulnerabilities: Attackers can inject malicious code, potentially gaining control over the system executing these functions.
Additionally, insufficient validation of filenames during file uploads can enable attackers to upload and execute malicious files, leading to arbitrary code execution
๐@cveNotify
Spotfire Community
Spotfire Security Advisory: April 08, 2025: Spotfire - CVE-2025-3115
Spotfire Data Function Vulnerability Original release date: April 08, 2025 Last revised: โ CVE-2025-3115 Source: Cloud Software Group Inc. Products Affected Spotfire Statistics Services 14.0.6 and earlier Spotfire Statistics Services 14.1.0, 14.2.0, 14.3.0โฆ
๐จ CVE-2025-11960
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Aryom Software High Technology Systems Inc. KVKNET allows Reflected XSS.This issue affects KVKNET: before 2.1.8.
๐@cveNotify
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Aryom Software High Technology Systems Inc. KVKNET allows Reflected XSS.This issue affects KVKNET: before 2.1.8.
๐@cveNotify
๐จ CVE-2025-41101
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in'/projects/save'.
๐@cveNotify
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in'/projects/save'.
๐@cveNotify
www.incibe.es
Multiple vulnerabilities in Fairsketch's RISE CRM Framework
INCIBE has coordinated the publication of 6 medium-severity vulnerabilities that affect Fairsketch's R
๐จ CVE-2025-41102
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/events/save'.
๐@cveNotify
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/events/save'.
๐@cveNotify
www.incibe.es
Multiple vulnerabilities in Fairsketch's RISE CRM Framework
INCIBE has coordinated the publication of 6 medium-severity vulnerabilities that affect Fairsketch's R
๐จ CVE-2024-25420
An issue in Ignite Realtime Openfire before 4.8.1 allows a remote attacker to escalate privileges via the admin.authorizedJIDs system property component.
๐@cveNotify
An issue in Ignite Realtime Openfire before 4.8.1 allows a remote attacker to escalate privileges via the admin.authorizedJIDs system property component.
๐@cveNotify
GitHub
Openfire/xmppserver/src/main/java/org/jivesoftware/openfire/admin/AdminManager.java at main ยท igniterealtime/Openfire
An XMPP server licensed under the Open Source Apache License. - igniterealtime/Openfire
๐จ CVE-2025-9566
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.
Binary-Affected: podman
Upstream-version-introduced: v4.0.0
Upstream-version-fixed: v5.6.1
๐@cveNotify
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.
Binary-Affected: podman
Upstream-version-introduced: v4.0.0
Upstream-version-fixed: v5.6.1
๐@cveNotify
๐จ CVE-2025-11084
A security issue exists within DataMosaixโข Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
๐@cveNotify
A security issue exists within DataMosaixโข Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
๐@cveNotify
Rockwell Automation
SD1758 | Security Advisory | Rockwell Automation | US
FactoryTalkยฎ DataMosaixโข Private Cloud โ Multiple Vulnerabilities
๐จ CVE-2025-11085
A security issue exists within DataMosaixโข Private Cloud allowing for Persistent XSS. This vulnerability can result in the execution of malicious JavaScript, allowing for account takeover, credential theft, or redirection to a malicious website.
๐@cveNotify
A security issue exists within DataMosaixโข Private Cloud allowing for Persistent XSS. This vulnerability can result in the execution of malicious JavaScript, allowing for account takeover, credential theft, or redirection to a malicious website.
๐@cveNotify
Rockwell Automation
SD1758 | Security Advisory | Rockwell Automation | US
FactoryTalkยฎ DataMosaixโข Private Cloud โ Multiple Vulnerabilities
๐จ CVE-2025-11696
A local server-side request forgery (SSRF) security issue exists within Studio 5000ยฎ Simulation Interfaceโข via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.
๐@cveNotify
A local server-side request forgery (SSRF) security issue exists within Studio 5000ยฎ Simulation Interfaceโข via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.
๐@cveNotify
Rockwell Automation
SD1760 | Security Advisory | Rockwell Automation | US
Studio 5000 ยฎ Simulation Interface - Multiple Vulnerabilities
๐จ CVE-2025-11697
A local code execution security issue exists within Studio 5000ยฎ Simulation Interfaceโข via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
๐@cveNotify
A local code execution security issue exists within Studio 5000ยฎ Simulation Interfaceโข via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.
๐@cveNotify
Rockwell Automation
SD1760 | Security Advisory | Rockwell Automation | US
Studio 5000 ยฎ Simulation Interface - Multiple Vulnerabilities
๐จ CVE-2025-11862
A security issue was discovered within Verve Asset Manager allowing unauthorized read-only users to read, update, and delete users via the API.
๐@cveNotify
A security issue was discovered within Verve Asset Manager allowing unauthorized read-only users to read, update, and delete users via the API.
๐@cveNotify
Rockwell Automation
SD1759 | Security Advisory | Rockwell Automation | US
Verve Asset Manager Access Control Vulnerability
๐จ CVE-2025-12101
Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
๐@cveNotify
Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
๐@cveNotify
๐จ CVE-2025-9223
Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnerable to authenticated command injection vulnerability due to the improper configuration in the execute program action feature.
๐@cveNotify
Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnerable to authenticated command injection vulnerability due to the improper configuration in the execute program action feature.
๐@cveNotify
Manageengine
Security Updates - CVE Details - CVE-2025-9223 | ManageEngine Applications Manager
This page details security vulnerability fixes made in various releases of Applications Manager. This page lists the security updates and CVE details of CVE-2025-9223.
๐จ CVE-2025-9227
Zohocorp ManageEngine OpManager versions 128609 and below are vulnerable to Stored XSS Vulnerability in the SNMP trap processor.
๐@cveNotify
Zohocorp ManageEngine OpManager versions 128609 and below are vulnerable to Stored XSS Vulnerability in the SNMP trap processor.
๐@cveNotify
Manageengine
Security Updates - CVE-2025-9227| ManageEngine OpManager
๐จ CVE-2025-24085
A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
๐@cveNotify
A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
๐@cveNotify
Apple Support
About the security content of iOS 18.3 and iPadOS 18.3 - Apple Support
This document describes the security content of iOS 18.3 and iPadOS 18.3.
๐จ CVE-2025-24201
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
๐@cveNotify
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
๐@cveNotify
Apple Support
About the security content of iOS 18.3.2 and iPadOS 18.3.2 - Apple Support
This document describes the security content of iOS 18.3.2 and iPadOS 18.3.2.
๐จ CVE-2025-54115
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
๐@cveNotify
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
๐@cveNotify
๐จ CVE-2025-61984
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
๐@cveNotify
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
๐@cveNotify
๐จ CVE-2025-11622
Insecure deserialization in Ivanti Endpoint Manager before version 2024 SU4 allows a local authenticated attacker to escalate their privileges.
๐@cveNotify
Insecure deserialization in Ivanti Endpoint Manager before version 2024 SU4 allows a local authenticated attacker to escalate their privileges.
๐@cveNotify
Ivanti
Security Advisory Ivanti Endpoint Manager (EPM) October 2025
<div class="OutlineElement Ltr SCXW245559320 BCX0" style="margin: 0px;padding: 0px;user-select: text;clear: both;cursor: text;overflow: visible;direction: ltr;color: #000000;font-family: 'Segoe UI', 'Segoe UI Web', Arial, Verdana, sans-serif;font-size: 12px;whiteโฆ
๐จ CVE-2025-9713
Path traversal in Ivanti Endpoint Manager before version 2024 SU4 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.
๐@cveNotify
Path traversal in Ivanti Endpoint Manager before version 2024 SU4 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.
๐@cveNotify
Ivanti
Security Advisory Ivanti Endpoint Manager (EPM) October 2025
<div class="OutlineElement Ltr SCXW245559320 BCX0" style="margin: 0px;padding: 0px;user-select: text;clear: both;cursor: text;overflow: visible;direction: ltr;color: #000000;font-family: 'Segoe UI', 'Segoe UI Web', Arial, Verdana, sans-serif;font-size: 12px;whiteโฆ