Newest CVEs

IDDescriptionSeverity
CVE-2024-47057SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user enumeration vulnerability exists in the "Forget your password" functionality. Differences in response times for existing and non-existing users, combined with a lack of request limiting, allow an attacker to determine the existence of usernames through a timing-based attack. MitigationPlease update to a version that addresses this timing vulnerability, where password reset responses are normalized to respond at the same time regardless of user existence.
medium
CVE-2024-47055SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference (IDOR) / Missing Authorization: A missing authorization vulnerability exists in the cloneAction of the segment management. This allows an authenticated user to bypass intended permission restrictions and clone segments even if they lack the necessary permissions to create new ones. MitigationUpdate Mautic to a version that implements proper authorization checks for the cloneAction within the ListController.php. Ensure that users attempting to clone segments possess the appropriate creation permissions.
medium
CVE-2022-43502Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-43496Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-43493Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-40970Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-38092Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-36406Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-36298Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-34860Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-34859Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-33893Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-32233Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-29924Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-27877Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-27876Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-26038Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-5257SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search engines. This could lead to the unintended disclosure of draft content or sensitive information. Unauthorized Access to Unpublished Page Previews: The page preview functionality for unpublished content, accessible via predictable URLs (e.g., /page/preview/1, /page/preview/2), lacked proper authorization checks. This allowed any unauthenticated user to view content that was not yet intended for public release, and allowed search engines to index these private preview URLs, making the content publicly discoverable. MitigationMautic has patched this vulnerability by enforcing proper permission checks on preview pages. Users should upgrade to the patched version of Mautic or later.
medium
CVE-2025-48931The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
low
CVE-2025-48930The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues.
low
CVE-2025-48929The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.
medium
CVE-2025-48928The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.
medium
CVE-2025-48927The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
medium
CVE-2025-48926The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers.
medium
CVE-2025-48925The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential.
medium
CVE-2025-48746Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function.
medium
CVE-2025-36572Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with the knowledge of the hard-coded credentials, could potentially exploit this vulnerability to gain unauthorized access based on the hardcoded account's privileges.
medium
CVE-2025-32802Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
medium
CVE-2025-32801Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
high
CVE-2024-47056SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .env configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of sensitive information, including database credentials, API keys, and other critical system configurations. Sensitive Information Disclosure via .env File Exposure: The .env file, which typically contains environment variables and sensitive application configurations, is directly accessible via a web browser due to missing web server configurations that restrict access to such files. This allows an unauthenticated attacker to view the contents of this file by simply navigating to its URL. MitigationUpdate Mautic to the latest Mautic version. By default, Mautic does not use .env files for production data. For Apache users: Ensure your web server is configured to respect .htaccess files. For Nginx users: As Nginx does not inherently support .htaccess files, you must manually add a configuration block to your Nginx server configuration to deny access to .env files. Add the following to your Nginx configuration for the Mautic site: location ~ /\.env { deny all; } After modifying your Nginx configuration, remember to reload or restart your Nginx service for the changes to take effect.
medium
CVE-2022-26424Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-26304Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-26072Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-26056Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-26037Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-25909Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-25870Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-25868Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2022-24067Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-45343An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker to execute arbitrary code via the editing functionality of the account module in the goform/setmodules route.
critical
CVE-2024-51453IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
high
CVE-2024-38341IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 through 6.1.0.0, and 6.2.0.0 through 6.2.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
high
CVE-2025-3357IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary code due to improper validation of an index value of a dynamically allocated array.
critical
CVE-2025-5277aws-mcp-server MCP server is vulnerable to command injection. An attacker can craft a prompt that once accessed by the MCP client will run arbitrary commands on the host system.
critical
CVE-2025-48734Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default. Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum’s class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum’s “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty(). Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests. This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils 1.x are recommended to upgrade to version 1.11.0, which fixes the issue. Users of the artifact org.apache.commons:commons-beanutils2 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.
high
CVE-2025-4134Lack of file validation in do_update_vps in Avast Business Antivirus for Linux 4.5 on Linux allows local user to spoof or tamper with the update file via an unverified file write.
high
CVE-2025-45997Sourcecodester Web-based Pharmacy Product Management System v.1.0 has a file upload vulnerability. An attacker can upload a PHP file disguised as an image by modifying the Content-Type header to image/jpg.
high
CVE-2025-40651Reflected Cross-Site Scripting (XSS) vulnerability in Real Easy Store. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the keyword parameter in /index.php?a=search. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
medium
CVE-2025-4493Improper privilege assignment in PAM JIT privilege sets in Devolutions Server allows a PAM user to perform PAM JIT requests on unauthorized groups by exploiting a user interface issue. This issue affects the following versions : * Devolutions Server 2025.1.3.0 through 2025.1.7.0 * Devolutions Server 2024.3.15.0 and earlier
medium
CVE-2025-5299A vulnerability was found in SourceCodester Client Database Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /user_order_customer_update.php. The manipulation of the argument uploaded_file_cancelled leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
medium