Development

CVE ID : CVE-2023-41520

Published : Aug. 7, 2025, 6:15 p.m. | 5 hours, 55 minutes ago

Description : Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createClassArms.php via the classId and classArmName parameters.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2023-41521

Published : Aug. 7, 2025, 6:15 p.m. | 5 hours, 55 minutes ago

Description : Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createSessionTerm.php via the id, termId, and sessionName parameters.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2023-41531

Published : Aug. 7, 2025, 6:15 p.m. | 5 hours, 55 minutes ago

Description : Hospital Management System v4 was discovered to contain multiple SQL injection vulnerabilities in func3.php via the username1 and password2 parameters.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2023-41532

Published : Aug. 7, 2025, 6:15 p.m. | 5 hours, 55 minutes ago

Description : Hospital Management System v4 was discovered to contain a SQL injection vulnerability via the doctor_contact parameter in doctorsearch.php.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-51629

Published : Aug. 7, 2025, 6:15 p.m. | 5 hours, 55 minutes ago

Description : A cross-site scripting (XSS) vulnerability in the PdfViewer component of Agenzia Impresa Eccobook 2.81.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Temp parameter.

Severity: 8.8 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-8697

Published : Aug. 7, 2025, 7:15 p.m. | 5 hours, 34 minutes ago

Description : A vulnerability was found in agentUniverse up to 0.0.18 and classified as critical. This issue affects the function StdioServerParameters of the component MCPSessionManager/MCPTool/MCPToolkit. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Severity: 6.3 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-7195

Published : Aug. 7, 2025, 7:15 p.m. | 5 hours, 34 minutes ago

Description : Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. In affected images, the /etc/passwd file was created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Severity: 5.2 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-47183

Published : Aug. 7, 2025, 8:15 p.m. | 4 hours, 34 minutes ago

Description : In GStreamer through 1.26.1, the isomp4 plugin’s qtdemux_parse_tree function may read past the end of a heap buffer while parsing an MP4 file, leading to information disclosure.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-47219

Published : Aug. 7, 2025, 8:15 p.m. | 4 hours, 34 minutes ago

Description : In GStreamer through 1.26.1, the isomp4 plugin’s qtdemux_parse_trak function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-47806

Published : Aug. 7, 2025, 8:15 p.m. | 4 hours, 34 minutes ago

Description : In GStreamer through 1.26.1, the subparse plugin’s parse_subrip_time function may write data past the bounds of a stack buffer, leading to a crash.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-47807

Published : Aug. 7, 2025, 8:15 p.m. | 4 hours, 34 minutes ago

Description : In GStreamer through 1.26.1, the subparse plugin’s subrip_unescape_formatting function may dereference a NULL pointer while parsing a subtitle file, leading to a crash.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-47808

Published : Aug. 7, 2025, 8:15 p.m. | 4 hours, 34 minutes ago

Description : In GStreamer through 1.26.1, the subparse plugin’s tmplayer_parse_line function may dereference a NULL pointer while parsing a subtitle file, leading to a crash.

Severity: 5.6 | MEDIUM

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-48709

Published : Aug. 7, 2025, 8:15 p.m. | 4 hours, 34 minutes ago

Description : An issue was discovered in BMC Control-M 9.0.21.300. When Control-M Server has a database connection, it runs DBUStatus.exe frequently, which then calls dbu_connection_details.vbs with the username, password, database hostname, and port written in cleartext, which can be seen in event and process logs in two separate locations.

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-45765

Published : Aug. 7, 2025, 9:15 p.m. | 3 hours, 34 minutes ago

Description : ruby-jwt v3.0.0.beta1 was discovered to contain weak encryption. NOTE: the Supplier’s perspective is “keysize is not something that is enforced by this library. Currently more recent versions of OpenSSL are enforcing some key sizes and those restrictions apply to the users of this gem also.”

Severity: 0.0 | NA

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-26513

Published : Aug. 7, 2025, 9:15 p.m. | 3 hours, 34 minutes ago

Description : The installer for SAN Host Utilities for Windows versions prior to 8.0 is susceptible to a vulnerability which when successfully exploited could allow a local user to escalate their privileges.

Severity: 7.0 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-53787

Published : Aug. 7, 2025, 9:15 p.m. | 2 hours, 55 minutes ago

Description : Microsoft 365 Copilot BizChat Information Disclosure Vulnerability

Severity: 8.2 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-53792

Published : Aug. 7, 2025, 9:15 p.m. | 2 hours, 55 minutes ago

Description : Azure Portal Elevation of Privilege Vulnerability

Severity: 9.1 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-53767

Published : Aug. 7, 2025, 9:15 p.m. | 2 hours, 55 minutes ago

Description : Azure OpenAI Elevation of Privilege Vulnerability

Severity: 10.0 | CRITICAL

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

CVE ID : CVE-2025-8698

Published : Aug. 7, 2025, 9:15 p.m. | 3 hours, 34 minutes ago

Description : A vulnerability was found in Open5GS up to 2.7.5. It has been classified as problematic. Affected is the function amf_nsmf_pdusession_handle_release_sm_context of the file src/amf/nsmf-handler.c of the component AMF Service. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The name of the patch is 66bc558e417e70ae216ec155e4e81c14ae0ecf30. It is recommended to apply a patch to fix this issue.

Severity: 3.3 | LOW

Visit the link for more details, such as CVSS details, affected products, timeline, and more…