Search Results (9959 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-7330 1 Rockwellautomation 2 1783-natr, 1783-natr Firmware 2025-10-30 6.5 Medium
A cross-site request forgery security issue exists in the product and version listed. The vulnerability stems from missing CSRF checks on the impacted form. This allows for unintended configuration modification if an attacker can convince a logged in admin to visit a crafted link.
CVE-2025-10759 1 Webkul 1 Qloapps 2025-10-30 5.3 Medium
A vulnerability was detected in Webkul QloApps up to 1.7.0. This affects an unknown function of the component CSRF Token Handler. Performing manipulation of the argument token results in authorization bypass. The attack may be initiated remotely. The exploit is now public and may be used. The vendor explains: "As We are already aware about this vulnerability and our Internal team are already working on this issue. (...) We'll implement the fix for this vulnerability in our next major release."
CVE-2025-10457 2 Zephyrproject, Zephyrproject-rtos 2 Zephyr, Zephyr 2025-10-29 4.3 Medium
The function responsible for handling BLE connection responses does not verify whether a response is expected—that is, whether the device has initiated a connection request. Instead, it relies solely on identifier matching.
CVE-2021-43158 1 Projectworlds 1 Online Shopping System 2025-10-29 4.3 Medium
In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart.
CVE-2025-27441 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2025-10-28 4.6 Medium
Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access.
CVE-2025-27442 1 Zoom 6 Meeting Software Development Kit, Rooms, Rooms Controller and 3 more 2025-10-28 4.6 Medium
Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access.
CVE-2025-8051 1 Opentext 1 Flipper 2025-10-28 6.5 Medium
Path Traversal vulnerability in opentext Flipper allows Absolute Path Traversal.  The vulnerability could allow a user to access files hosted on the server. This issue affects Flipper: 3.1.2.
CVE-2025-26352 1 Q-free 1 Maxtime 2025-10-28 6.5 Medium
A CWE-35 "Path Traversal" in the template deletion mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to delete sensitive files via crafted HTTP requests.
CVE-2025-26353 1 Q-free 1 Maxtime 2025-10-28 4.9 Medium
A CWE-35 "Path Traversal" in maxtime/api/sql/sql.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests.
CVE-2025-26354 1 Q-free 1 Maxtime 2025-10-28 7.2 High
A CWE-35 "Path Traversal" in maxtime/api/database/database.lua (copy endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to overwrite sensitive files via crafted HTTP requests.
CVE-2025-26355 1 Q-free 1 Maxtime 2025-10-28 6.5 Medium
A CWE-35 "Path Traversal" in maxtime/api/database/database.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to delete sensitive files via crafted HTTP requests.
CVE-2025-26356 1 Q-free 1 Maxtime 2025-10-28 7.2 High
A CWE-35 "Path Traversal" in maxtime/api/database/database.lua (setActive endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to overwrite sensitive files via crafted HTTP requests.
CVE-2025-26357 1 Q-free 1 Maxtime 2025-10-28 4.9 Medium
A CWE-35 "Path Traversal" in maxtime/api/database/database.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests.
CVE-2020-16013 2 Google, Redhat 2 Chrome, Rhel Extras 2025-10-24 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2017-17552 1 Zohocorp 1 Manageengine Admanager Plus 2025-10-24 8.8 High
/LoadFrame in Zoho ManageEngine AD Manager Plus build 6590 - 6613 allows attackers to conduct URL Redirection attacks via the src parameter, resulting in a bypass of CSRF protection, or potentially masquerading a malicious URL as trusted.
CVE-2025-26351 1 Q-free 1 Maxtime 2025-10-24 4.9 Medium
A CWE-35 "Path Traversal" in the template download mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to read sensitive files via crafted HTTP requests.
CVE-2024-7965 2 Google, Microsoft 2 Chrome, Edge Chromium 2025-10-24 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-7756 1 Fabian 1 E-commerce Site 2025-10-23 4.3 Medium
A vulnerability classified as problematic has been found in code-projects E-Commerce Site 1.0. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-10448 1 Fabian 1 Blood Bank Management System 2025-10-23 4.3 Medium
A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /file/delete.php. The manipulation of the argument bid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other endpoints might be affected as well.
CVE-2024-10557 2 Code-projects, Fabian 2 Blood Bank Management System, Blood Bank Management System 2025-10-23 4.3 Medium
A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /file/updateprofile.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.