Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-1688

Description: Milestone Systems has discovered a security vulnerability in Milestone XProtect installer that resets system configuration password after the upgrading from older versions using specific installers. The system configuration password is an additional, optional protection that is enabled on the Management Server. To mitigate the issue, we highly recommend updating system configuration password via GUI with a standard procedure. Any system upgraded with 2024 R1 or 2024 R2 release installer is vulnerable to this issue. Systems upgraded from 2023 R3 or older with version 2025 R1 and newer are not affected.

CVSS: MEDIUM (5.5)

Source: CVE
April 15th, 2025 (26 minutes ago)

CVE-2022-1325

Description: Nessus Plugin ID 234347 with Medium Severity Synopsis The remote Ubuntu host is missing one or more security updates. Description The remote Ubuntu 18.04 LTS / 22.04 LTS / 24.04 LTS / 24.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-7437-1 advisory. It was discovered that the CImg library did not properly check the size of images before loading them. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-1325) It was discovered that the CImg library did not correctly handle certain memory operations, which could lead to a buffer overflow. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2024-26540)Tenable has extracted the preceding description block directly from the Ubuntu security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Update the affected cimg-dev and / or cimg-examples packages. Read more at https://www.tenable.com/plugins/nessus/234347

CVSS: MEDIUM (5.5)

Source: Tenable Plugins
April 15th, 2025 (about 1 hour ago)

CVE-2025-0149

Description: Nessus Plugin ID 234348 with Medium Severity Synopsis The remote host has an application installed that is affected by denial of service vulnerability. Description The version of Zoom Workplace Desktop App installed on the remote host is prior to 6.3.0. It is, therefore, affected by a vulnerability as referenced in the ZSB-25008 advisory. - Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access. (CVE-2025-0149)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Upgrade to Zoom Client for Meetings 6.3.0 or later. Read more at https://www.tenable.com/plugins/nessus/234348

CVSS: MEDIUM (6.5)

Source: Tenable Plugins
April 15th, 2025 (about 1 hour ago)

CVE-2025-2083

Description: The Logo Carousel Gutenberg Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘sliderId’ parameter in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS: MEDIUM (6.4)

Source: CVE
April 15th, 2025 (about 1 hour ago)

CVE-2025-3622

Description: A vulnerability, which was classified as critical, has been found in Xorbits Inference up to 1.4.1. This issue affects the function load of the file xinference/thirdparty/cosyvoice/cli/model.py. The manipulation leads to deserialization. Eine Schwachstelle wurde in Xorbits Inference bis 1.4.1 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion load der Datei xinference/thirdparty/cosyvoice/cli/model.py. Dank Manipulation mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden.

CVSS: MEDIUM (5.1)

Source: CVE
April 15th, 2025 (about 5 hours ago)

CVE-2025-3573

Description: Versions of the package jquery-validation before 1.20.0 are vulnerable to Cross-site Scripting (XSS) in the showLabel() function, which may take input from a user-controlled placeholder value. This value will populate a message via $.validator.messages in a user localizable dictionary.

CVSS: MEDIUM (5.3)

Source: CVE
April 15th, 2025 (about 5 hours ago)

CVE-2025-32993

Description: Vision Helpdesk through 5.7.0 allows Time-Based Blind SQL injection via the Forgot Password (aka index.php?/home/forgot-password) vis_username parameter. Authentication is not needed.

CVSS: MEDIUM (6.5)

Source: CVE
April 15th, 2025 (about 5 hours ago)

CVE-2025-2225

Description: The Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘rael_title_tag' parameter in all versions up to, and including, 1.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 1.6.9.

CVSS: MEDIUM (6.4)

Source: CVE
April 15th, 2025 (about 5 hours ago)

CVE-2025-29984

Description: Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

CVSS: MEDIUM (6.7)

Source: CVE
April 15th, 2025 (about 7 hours ago)

CVE-2025-29983

Description: Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

CVSS: MEDIUM (6.7)

Source: CVE
April 15th, 2025 (about 7 hours ago)