CVE-2025-45862 |
Description: TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the interfacenameds parameter in the formDhcpv6s interface.
CVSS: MEDIUM (6.5) EPSS Score: 0.06%
May 20th, 2025 (about 1 month ago)
|
CVE-2024-28022 |
Description: A vulnerability exists in the UNEM server / APIGateway that if exploited allows a malicious user to perform an arbitrary number of
authentication attempts using different passwords, and eventually
gain access to other components in the same security realm using
the targeted account.
CVSS: MEDIUM (6.5) EPSS Score: 0.1% SSVC Exploitation: none
May 20th, 2025 (about 1 month ago)
|
CVE-2025-4977 |
Description: A vulnerability, which was classified as problematic, has been found in Netgear DGND3700 1.1.00.15_1.00.15NA. Affected by this issue is some unknown functionality of the file /BRS_top.html. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other products might be affected as well. The vendor was contacted early about this disclosure. Eine problematische Schwachstelle wurde in Netgear DGND3700 1.1.00.15_1.00.15NA entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /BRS_top.html. Durch Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS: MEDIUM (5.3) EPSS Score: 0.07%
May 20th, 2025 (about 1 month ago)
|
CVE-2025-40633 |
Description: A Stored Cross-Site Scripting (XSS) vulnerability has been found in
Koibox for versions prior to e8cbce2. This vulnerability allows an
authenticated attacker to upload an image containing malicious
JavaScript code as profile picture in the
'/es/dashboard/clientes/ficha/' endpoint
CVSS: MEDIUM (5.1) EPSS Score: 0.05%
May 20th, 2025 (about 1 month ago)
|
CVE-2025-4951 |
Description: Editions of Rapid7 AppSpider Pro before version 7.5.018 is vulnerable to a stored cross-site scripting vulnerability in the "ScanName" field.
Despite the application preventing the inclusion of special characters within the "ScanName" field, this could be bypassed by modifying the configuration file directly.
This is fixed as of version 7.5.018
CVSS: MEDIUM (4.6) EPSS Score: 0.02%
May 20th, 2025 (about 1 month ago)
|
CVE-2024-5878 |
Description: Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled SimpleLightbox JavaScript library (version 2.1.5) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS: MEDIUM (6.4) EPSS Score: 0.03%
May 20th, 2025 (about 1 month ago)
|
CVE-2025-3079 |
Description: A passback vulnerability which relates to office/small office multifunction printers and laser printers.
CVSS: MEDIUM (6.3) EPSS Score: 0.04%
May 20th, 2025 (about 1 month ago)
|
CVE-2025-3078 |
Description: A passback vulnerability which relates to production printers and office multifunction printers.
CVSS: MEDIUM (6.3) EPSS Score: 0.04%
May 20th, 2025 (about 1 month ago)
|
![]() |
Description: Impact
Rendering {{ attributes }} or using any method that returns a ComponentAttributes instance (e.g. only(), defaults(), without()) ouputs attribute values directly without escaping. If these values are unsafe (e.g. contain user input), this can lead to HTML attribute injection and XSS vulnerabilities.
Patches
The issue is fixed in version 2.25.1 of symfony/ux-twig-component by using Twig's EscaperRuntime to properly escape HTML attributes in ComponentAttributes. If you use symfony/ux-live-component, you must also update it to 2.25.1 to benefit from the fix, as it reuses the ComponentAttributes class internally.
Workarounds
Until you can upgrade, avoid rendering {{ attributes }} or derived objects directly if it may contain untrusted values.
Instead, use {{ attributes.render('name') }} for safe output of individual attributes.
References
GitHub repository: symfony/ux
References
https://github.com/symfony/ux/security/advisories/GHSA-5j3w-5pcr-f8hg
https://nvd.nist.gov/vuln/detail/CVE-2025-47946
https://github.com/symfony/ux-live-component/commit/7ad44cf56d750b9f56658ed986286a10da132ee7
https://github.com/symfony/ux-twig-component/commit/b5d4e77db69315aeb18d2238e0e7c943d340ce76
https://github.com/symfony/ux/commit/b5d1c85995c128cb926d47a96cfbfbd500b643a8
https://github.com/symfony/ux/commit/c2f7738ee0969c31df7514025a7f5fc6e153932d
https://github.com/advisories/GHSA-5j3w-5pcr-f8hg
CVSS: MEDIUM (6.1) EPSS Score: 0.03%
May 19th, 2025 (about 1 month ago)
|
![]() |
Description: Impact
Rendering {{ attributes }} or using any method that returns a ComponentAttributes instance (e.g. only(), defaults(), without()) ouputs attribute values directly without escaping. If these values are unsafe (e.g. contain user input), this can lead to HTML attribute injection and XSS vulnerabilities.
Patches
The issue is fixed in version 2.25.1 of symfony/ux-twig-component by using Twig's EscaperRuntime to properly escape HTML attributes in ComponentAttributes. If you use symfony/ux-live-component, you must also update it to 2.25.1 to benefit from the fix, as it reuses the ComponentAttributes class internally.
Workarounds
Until you can upgrade, avoid rendering {{ attributes }} or derived objects directly if it may contain untrusted values.
Instead, use {{ attributes.render('name') }} for safe output of individual attributes.
References
GitHub repository: symfony/ux
References
https://github.com/symfony/ux/security/advisories/GHSA-5j3w-5pcr-f8hg
https://nvd.nist.gov/vuln/detail/CVE-2025-47946
https://github.com/symfony/ux-live-component/commit/7ad44cf56d750b9f56658ed986286a10da132ee7
https://github.com/symfony/ux-twig-component/commit/b5d4e77db69315aeb18d2238e0e7c943d340ce76
https://github.com/symfony/ux/commit/b5d1c85995c128cb926d47a96cfbfbd500b643a8
https://github.com/symfony/ux/commit/c2f7738ee0969c31df7514025a7f5fc6e153932d
https://github.com/advisories/GHSA-5j3w-5pcr-f8hg
CVSS: MEDIUM (6.1) EPSS Score: 0.03%
May 19th, 2025 (about 1 month ago)
|