CVE-2025-4632

Known exploited
Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to write arbitrary file as system authority.
Source: Samsung TV & Appliance
Max CVSS
9.8
EPSS Score
59.88%
Published
2025-05-13
Updated
2025-05-23
CISA KEV Added
2025-05-22

CVE-2025-27920

Known exploited
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Source: MITRE
Max CVSS
7.2
EPSS Score
59.61%
Published
2025-05-05
Updated
2025-05-21
CISA KEV Added
2025-05-19

CVE-2025-4428

Known exploited
Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.
Source: ivanti
Max CVSS
8.8
EPSS Score
15.64%
Published
2025-05-13
Updated
2025-05-21
CISA KEV Added
2025-05-19

CVE-2025-4427

Known exploited
An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API.
Source: ivanti
Max CVSS
7.5
EPSS Score
61.10%
Published
2025-05-13
Updated
2025-05-21
CISA KEV Added
2025-05-19

CVE-2024-27443

Known exploited
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
Source: MITRE
Max CVSS
6.1
EPSS Score
11.81%
Published
2024-08-12
Updated
2025-05-21
CISA KEV Added
2025-05-19

CVE-2024-11182

Known exploited
An XSS issue was discovered in MDaemon Email Server before version 24.5.1c. An attacker can send an HTML e-mail message with JavaScript in an img tag. This could allow a remote attacker to load arbitrary JavaScript code in the context of a webmail user's browser window.
Source: ESET
Max CVSS
6.1
EPSS Score
39.83%
Published
2024-11-15
Updated
2025-05-21
CISA KEV Added
2025-05-19

CVE-2023-38950

Known exploited
A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.
Source: MITRE
Max CVSS
7.5
EPSS Score
75.12%
Published
2023-08-03
Updated
2025-05-21
CISA KEV Added
2025-05-19

CVE-2025-42999

Known exploited
SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
Source: SAP SE
Max CVSS
9.1
EPSS Score
14.71%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-15

CVE-2025-4664

Known exploited
Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
Source: Chrome
Max CVSS
4.3
EPSS Score
5.65%
Published
2025-05-14
Updated
2025-05-16
CISA KEV Added
2025-05-15

CVE-2024-12987

Known exploited
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component.
Source: VulDB
Max CVSS
9.8
EPSS Score
72.05%
Published
2024-12-27
Updated
2025-05-16
CISA KEV Added
2025-05-15

CVE-2025-32756

Known exploited
A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.
Source: Fortinet, Inc.
Max CVSS
9.8
EPSS Score
8.83%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-14

CVE-2025-32709

Known exploited
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Source: Microsoft Corporation
Max CVSS
7.8
EPSS Score
3.75%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-13

CVE-2025-32706

Known exploited
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Source: Microsoft Corporation
Max CVSS
7.8
EPSS Score
9.30%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-13

CVE-2025-32701

Known exploited
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Source: Microsoft Corporation
Max CVSS
7.8
EPSS Score
3.71%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-13

CVE-2025-30400

Known exploited
Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
Source: Microsoft Corporation
Max CVSS
7.8
EPSS Score
3.71%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-13

CVE-2025-30397

Known exploited
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
Source: Microsoft Corporation
Max CVSS
7.5
EPSS Score
10.45%
Published
2025-05-13
Updated
2025-05-16
CISA KEV Added
2025-05-13

CVE-2025-47729

Known exploited
The TeleMessage archiving backend through 2025-05-05 holds cleartext copies of messages from TM SGNL (aka Archive Signal) app users, which is different functionality than described in the TeleMessage "End-to-End encryption from the mobile phone through to the corporate archive" documentation, as exploited in the wild in May 2025.
Source: MITRE
Max CVSS
4.9
EPSS Score
7.65%
Published
2025-05-08
Updated
2025-05-14
CISA KEV Added
2025-05-12

CVE-2024-11120

Known exploited
Potential exploit
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
Source: TWCERT/CC
Max CVSS
9.8
EPSS Score
54.56%
Published
2024-11-15
Updated
2025-05-09
CISA KEV Added
2025-05-07

CVE-2024-6047

Known exploited
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Source: TWCERT/CC
Max CVSS
9.8
EPSS Score
75.40%
Published
2024-06-17
Updated
2025-05-09
CISA KEV Added
2025-05-07

CVE-2025-27363

Known exploited
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
Source: Facebook, Inc.
Max CVSS
8.1
EPSS Score
63.31%
Published
2025-03-11
Updated
2025-05-07
CISA KEV Added
2025-05-06

CVE-2025-3248

Known exploited
Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code.
Source: VulnCheck
Max CVSS
9.8
EPSS Score
90.77%
Published
2025-04-07
Updated
2025-05-07
CISA KEV Added
2025-05-05

CVE-2025-34028

Known exploited
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
Source: VulnCheck
Max CVSS
10.0
EPSS Score
63.86%
Published
2025-04-22
Updated
2025-05-23
CISA KEV Added
2025-05-02

CVE-2024-58136

Known exploited
Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
Source: MITRE
Max CVSS
9.8
EPSS Score
27.37%
Published
2025-04-10
Updated
2025-05-03
CISA KEV Added
2025-05-02

CVE-2024-38475

Known exploited
Potential exploit
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
Source: Apache Software Foundation
Max CVSS
9.1
EPSS Score
92.40%
Published
2024-07-01
Updated
2025-05-02
CISA KEV Added
2025-05-01

CVE-2023-44221

Known exploited
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
Source: SonicWALL, Inc.
Max CVSS
7.2
EPSS Score
46.25%
Published
2023-12-05
Updated
2025-05-02
CISA KEV Added
2025-05-01
Page: 1
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!