CVE-2025-33074 |
Description: Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.
CVSS: HIGH (7.5) EPSS Score: 0.02% SSVC Exploitation: none
April 30th, 2025 (about 2 months ago)
|
CVE-2025-30391 |
Description: Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.
CVSS: HIGH (8.1) EPSS Score: 0.13% SSVC Exploitation: none
April 30th, 2025 (about 2 months ago)
|
CVE-2025-30389 |
Description: Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
CVSS: HIGH (8.7) EPSS Score: 0.05% SSVC Exploitation: none
April 30th, 2025 (about 2 months ago)
|
CVE-2025-21416 |
Description: Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.
CVSS: HIGH (8.5) EPSS Score: 0.05% SSVC Exploitation: none
April 30th, 2025 (about 2 months ago)
|
![]() |
CVSS: HIGH (8.2) EPSS Score: 0.15%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-46342 |
Description: Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.13.5 and 1.14.0, it may happen that policy rules using namespace selector(s) in their match statements are mistakenly not applied during admission review request processing due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go`. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. This issue has been patched in versions 1.13.5 and 1.14.0.
CVSS: HIGH (8.5) EPSS Score: 0.08%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-27409 |
Description: Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3.
CVSS: HIGH (7.5) EPSS Score: 0.06%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-27134 |
Description: Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3.
CVSS: HIGH (8.8) EPSS Score: 0.05%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-4120 |
Description: A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been classified as critical. Affected is the function sub_4238E8. The manipulation of the argument host leads to buffer overflow. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine kritische Schwachstelle in Netgear JWNR2000v2 1.0.0.11 ausgemacht. Es betrifft die Funktion sub_4238E8. Durch Manipulieren des Arguments host mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen.
CVSS: HIGH (8.8) EPSS Score: 0.2%
April 30th, 2025 (about 2 months ago)
|
CVE-2025-30202 |
Description: vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.5.2 and prior to 0.8.5 are vulnerable to denial of service and data exposure via ZeroMQ on multi-node vLLM deployment. In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts. Any client with network access to this host can connect to this XPUB socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker. By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher. This issue has been patched in version 0.8.5.
CVSS: HIGH (7.5) EPSS Score: 0.05% SSVC Exploitation: none
April 30th, 2025 (about 2 months ago)
|