CVE-2025-22268 |
WordPress Uncanny Toolkit for LearnDash plugin <= 3.7.0.1 - Cross Site Scripting (XSS) vulnerability
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uncanny Owl Uncanny Toolkit for LearnDash allows Stored XSS. This issue affects Uncanny Toolkit for LearnDash: from n/a through 3.7.0.1.
CVSS: MEDIUM (6.5) EPSS Score: 0.03%
April 15th, 2025 (4 days ago)
|
CVE-2025-32012 |
Description: Jellyfin is an open source self hosted media server. In versions 10.9.0 to before 10.10.7, the /System/Restart endpoint provides administrators the ability to restart their Jellyfin server. This endpoint is intended to be admins-only, but it also authorizes requests from any device in the same local network as the Jellyfin server. Due to the method Jellyfin uses to determine the source IP of a request, an unauthenticated attacker is able to spoof their IP to appear as a LAN IP, allowing them to restart the Jellyfin server process without authentication. This means that an unauthenticated attacker could mount a denial-of-service attack on any default-configured Jellyfin server by simply sending the same spoofed request every few seconds to restart the server over and over. This method of IP spoofing also bypasses some security mechanisms, cause a denial-of-service attack, and possible bypass the admin restart requirement if combined with remote code execution. This issue is patched in version 10.10.7.
CVSS: MEDIUM (4.6) EPSS Score: 0.08% SSVC Exploitation: none
April 15th, 2025 (5 days ago)
|
CVE-2025-31949 |
Description: An authenticated attacker can obtain any plant name by knowing the plant ID.
CVSS: MEDIUM (6.9) EPSS Score: 0.03% SSVC Exploitation: none
April 15th, 2025 (5 days ago)
|
CVE-2025-31941 |
Description: An unauthenticated attacker can obtain a list of smart devices by knowing a valid username.
CVSS: MEDIUM (6.9) EPSS Score: 0.04%
April 15th, 2025 (5 days ago)
|
CVE-2025-31933 |
Description: An unauthenticated attacker can check the existence of usernames in the system by querying an API.
CVSS: MEDIUM (6.9) EPSS Score: 0.04%
April 15th, 2025 (5 days ago)
|
CVE-2025-31357 |
Description: An unauthenticated attacker can obtain a user's plant list by knowing the username.
CVSS: MEDIUM (6.9) EPSS Score: 0.04%
April 15th, 2025 (5 days ago)
|
CVE-2025-30740 |
Description: Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
CVSS: MEDIUM (6.5) EPSS Score: 0.03%
April 15th, 2025 (5 days ago)
|
CVE-2025-30737 |
Description: Vulnerability in the Oracle Smart View for Office product of Oracle Hyperion (component: Core Smart View). The supported version that is affected is 24.200. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Smart View for Office. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Smart View for Office accessible data as well as unauthorized access to critical data or complete access to all Oracle Smart View for Office accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N).
CVSS: MEDIUM (5.7) EPSS Score: 0.03%
April 15th, 2025 (5 days ago)
|
CVE-2025-30733 |
Description: Vulnerability in the RDBMS Listener component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Listener accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).
CVSS: MEDIUM (6.5) EPSS Score: 0.03%
April 15th, 2025 (5 days ago)
|
CVE-2025-30732 |
Description: Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
CVSS: MEDIUM (6.1) EPSS Score: 0.03%
April 15th, 2025 (5 days ago)
|