Filter and search through 196,397 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-41016 | Inadequate access control vulnerability in Davantis DFUSION v6.177.7, which allows unauthorised actors to extract images and videos related to alarm e... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-41010 | Incorrect Cross-Origin Resource Sharing (CORS) configuration in Hiberus Sintra. Cross-Origin Resource Sharing (CORS) allows browsers to make cross-dom... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-41009 | SQL injection vulnerability in the DRED virtual campus platform. This vulnerability allows an attacker to retrieve, create, update, and delete data fr... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-41006 | Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ parameter in ‘/memsdemo/login.php’. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-41005 | Imaster's MEMS Events CRM contains an SQL injection vulnerability in‘keyword’ parameter in ‘/memsdemo/exchange_offers.php’. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-41004 | Imaster's Patient Records Management System is vulnerable to SQL Injection in the endpoint ‘/projects/hospital/admin/complaints.php’ through the ‘id’ ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-41003 | Imaster's Patient Record Management System contains a stored Cross-Site Scripting (XSS) vulnerability in the endpoint ‘/projects/hospital/admin/edit_p... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-41000 | Cross-Frame Scripting (XFS) vulnerability in BoomCMS v9.1.4 from UXB London. XFS is a web attack technique that exploits specific browser bugs to spy ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40992 | Stored XSS vulnerability in Creativeitem Sociopro due to lack of proper validation of user inputs via the endpoint '/sociopro/profile/update_profile',... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40985 | SQL injection vulnerability in SCATI Vision Web of SCATI Labs from version 4.8 to 7.2. This vulnerability allows an attacker to exfiltrate some data f... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40980 | A Stored Cross Site Scripting vulnerability has been found in UltimatePOS by UltimateFosters. This vulnerability is due to the lack of proper validati... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-4098 | Horner Automation Cscape version 10.0 (10.0.415.2) SP1 is vulnerable to an out-of-bounds read vulnerability that could allow an attacker to disclose i... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40979 | DLL search order hijacking vulnerability in the wave.exe executable for Windows 11, version 1.27.8. Exploitation of this vulnerability could allow att... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40978 | Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a stored XSS due to a lack of proper validation of user in... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40977 | Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's eCommerceGo SaaS, consisting of a lack of proper validation of user input by sending a POS... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40976 | Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's TicketGo, consisting of a lack of proper validation of user input by sending a POST reques... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40975 | Stored Cross-Site Scripting (XSS) vulnerability in WorkDo's HRMGo, consisting of a lack of proper validation of user input by sending a POST request t... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-4095 | Registry Access Management (RAM) is a security feature allowing administrators to restrict access for their developers to only allowed registries. Whe... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-40846 | Improper Input Validation, the returnUrl parameter in Account Security Settings lacks proper input validation, allowing attackers to redirect users to... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-4081 | Use of entitlement "com.apple.security.cs.disable-library-validation" and lack of launch and library load constraints allows to substitute a legitimat... | 0.0 | 0 | Neutral | No | No |