{"instruction": "Please provide detailed information about CVE-2025-0168", "inputs": "", "outputs": "CVE:CVE-2025-0168\nDescription:A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. This affects an unknown part of the file /_parse/_feedback_system.php. The manipulation of the argument person leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-01T14:15:23.590"} {"instruction": "Please provide detailed information about CVE-2025-22214", "inputs": "", "outputs": "CVE:CVE-2025-22214\nDescription:Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection.\npublished:2025-01-02T04:15:06.277"} {"instruction": "Please provide detailed information about CVE-2025-0171", "inputs": "", "outputs": "CVE:CVE-2025-0171\nDescription:A vulnerability, which was classified as critical, was found in code-projects Chat System 1.0. Affected is an unknown function of the file /admin/deleteuser.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-02T15:15:25.550"} {"instruction": "Please provide detailed information about CVE-2025-0172", "inputs": "", "outputs": "CVE:CVE-2025-0172\nDescription:A vulnerability has been found in code-projects Chat System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/deleteroom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-02T16:15:09.103"} {"instruction": "Please provide detailed information about CVE-2025-0173", "inputs": "", "outputs": "CVE:CVE-2025-0173\nDescription:A vulnerability was found in SourceCodester Online Eyewear Shop 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /orders/view_order.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-02T18:15:21.630"} {"instruction": "Please provide detailed information about CVE-2025-0174", "inputs": "", "outputs": "CVE:CVE-2025-0174\nDescription:A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /user/search_result2.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T01:15:08.100"} {"instruction": "Please provide detailed information about CVE-2025-0175", "inputs": "", "outputs": "CVE:CVE-2025-0175\nDescription:A vulnerability was found in code-projects Online Shop 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /view.php. The manipulation of the argument name/details leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T01:15:08.263"} {"instruction": "Please provide detailed information about CVE-2025-0176", "inputs": "", "outputs": "CVE:CVE-2025-0176\nDescription:A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T02:15:07.870"} {"instruction": "Please provide detailed information about CVE-2025-22275", "inputs": "", "outputs": "CVE:CVE-2025-22275\nDescription:iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation.\npublished:2025-01-03T05:15:08.243"} {"instruction": "Please provide detailed information about CVE-2025-21609", "inputs": "", "outputs": "CVE:CVE-2025-21609\nDescription:SiYuan is self-hosted, open source personal knowledge management software. SiYuan Note version 3.1.18 has an arbitrary file deletion vulnerability. The vulnerability exists in the `POST /api/history/getDocHistoryContent` endpoint. An attacker can craft a payload to exploit this vulnerability, resulting in the deletion of arbitrary files on the server. Commit d9887aeec1b27073bec66299a9a4181dc42969f3 fixes this vulnerability and is expected to be available in version 3.1.19.\npublished:2025-01-03T17:15:09.147"} {"instruction": "Please provide detailed information about CVE-2025-21610", "inputs": "", "outputs": "CVE:CVE-2025-21610\nDescription:Trix is a what-you-see-is-what-you-get rich text editor for everyday writing. Versions prior to 2.1.12 are vulnerable to cross-site scripting when pasting malicious code in the link field. An attacker could trick the user to copy&paste a malicious `javascript:` URL as a link that would execute arbitrary JavaScript code within the context of the user's session, potentially leading to unauthorized actions being performed or sensitive information being disclosed. Users should upgrade to Trix editor version 2.1.12 or later to receive a patch. In addition to upgrading, affected users can disallow browsers that don't support a Content Security Policy (CSP) as a workaround for this and other cross-site scripting vulnerabilities. Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin are executed, and explicitly prohibit inline scripts using script-src-elem.\npublished:2025-01-03T17:15:09.290"} {"instruction": "Please provide detailed information about CVE-2025-0195", "inputs": "", "outputs": "CVE:CVE-2025-0195\nDescription:A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/del_product.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T18:15:17.317"} {"instruction": "Please provide detailed information about CVE-2025-0196", "inputs": "", "outputs": "CVE:CVE-2025-0196\nDescription:A vulnerability classified as critical has been found in code-projects Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file /user/plist.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T19:15:12.793"} {"instruction": "Please provide detailed information about CVE-2025-0197", "inputs": "", "outputs": "CVE:CVE-2025-0197\nDescription:A vulnerability classified as critical was found in code-projects Point of Sales and Inventory Management System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T20:15:28.873"} {"instruction": "Please provide detailed information about CVE-2025-0198", "inputs": "", "outputs": "CVE:CVE-2025-0198\nDescription:A vulnerability, which was classified as critical, has been found in code-projects Point of Sales and Inventory Management System 1.0. This issue affects some unknown processing of the file /user/search_result.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T21:15:14.053"} {"instruction": "Please provide detailed information about CVE-2025-22376", "inputs": "", "outputs": "CVE:CVE-2025-22376\nDescription:In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong.\npublished:2025-01-03T22:15:07.917"} {"instruction": "Please provide detailed information about CVE-2025-0199", "inputs": "", "outputs": "CVE:CVE-2025-0199\nDescription:A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-03T23:15:08.707"} {"instruction": "Please provide detailed information about CVE-2025-22383", "inputs": "", "outputs": "CVE:CVE-2025-22383\nDescription:An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity input validation issue exists in the Commerce B2B application, affecting the Contact Us functionality. This allows visitors to send e-mail messages that could contain unfiltered HTML markup in specific scenarios.\npublished:2025-01-04T02:15:06.797"} {"instruction": "Please provide detailed information about CVE-2025-22384", "inputs": "", "outputs": "CVE:CVE-2025-22384\nDescription:An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue concerning business logic exists in the Commerce B2B application, which allows storefront visitors to purchase discontinued products in specific scenarios where requests are altered before reaching the server.\npublished:2025-01-04T02:15:06.937"} {"instruction": "Please provide detailed information about CVE-2025-22385", "inputs": "", "outputs": "CVE:CVE-2025-22385\nDescription:An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors.\npublished:2025-01-04T02:15:07.080"} {"instruction": "Please provide detailed information about CVE-2025-22386", "inputs": "", "outputs": "CVE:CVE-2025-22386\nDescription:An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable.\npublished:2025-01-04T02:15:07.230"} {"instruction": "Please provide detailed information about CVE-2025-22387", "inputs": "", "outputs": "CVE:CVE-2025-22387\nDescription:An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking.\npublished:2025-01-04T02:15:07.343"} {"instruction": "Please provide detailed information about CVE-2025-22388", "inputs": "", "outputs": "CVE:CVE-2025-22388\nDescription:An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads.\npublished:2025-01-04T02:15:07.480"} {"instruction": "Please provide detailed information about CVE-2025-22389", "inputs": "", "outputs": "CVE:CVE-2025-22389\nDescription:An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems.\npublished:2025-01-04T02:15:07.600"} {"instruction": "Please provide detailed information about CVE-2025-22390", "inputs": "", "outputs": "CVE:CVE-2025-22390\nDescription:An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking.\npublished:2025-01-04T02:15:07.747"} {"instruction": "Please provide detailed information about CVE-2025-0200", "inputs": "", "outputs": "CVE:CVE-2025-0200\nDescription:A vulnerability has been found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /user/search_num.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T03:15:07.020"} {"instruction": "Please provide detailed information about CVE-2025-0201", "inputs": "", "outputs": "CVE:CVE-2025-0201\nDescription:A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user/update_account.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T04:15:05.620"} {"instruction": "Please provide detailed information about CVE-2025-0202", "inputs": "", "outputs": "CVE:CVE-2025-0202\nDescription:A vulnerability was found in TCS BaNCS 10. It has been classified as problematic. This affects an unknown part of the file /REPORTS/REPORTS_SHOW_FILE.jsp. The manipulation of the argument FilePath leads to file inclusion. The real existence of this vulnerability is still doubted at the moment.\npublished:2025-01-04T05:15:07.660"} {"instruction": "Please provide detailed information about CVE-2025-0203", "inputs": "", "outputs": "CVE:CVE-2025-0203\nDescription:A vulnerability was found in code-projects Student Management System 1.0. It has been declared as critical. This vulnerability affects the function showSubject1 of the file /config/DbFunction.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-04T07:15:18.153"} {"instruction": "Please provide detailed information about CVE-2025-0204", "inputs": "", "outputs": "CVE:CVE-2025-0204\nDescription:A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file /details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T08:15:06.923"} {"instruction": "Please provide detailed information about CVE-2025-0205", "inputs": "", "outputs": "CVE:CVE-2025-0205\nDescription:A vulnerability classified as critical has been found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /details2.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T09:15:06.280"} {"instruction": "Please provide detailed information about CVE-2025-0206", "inputs": "", "outputs": "CVE:CVE-2025-0206\nDescription:A vulnerability classified as critical was found in code-projects Online Shoe Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T12:15:24.830"} {"instruction": "Please provide detailed information about CVE-2025-0207", "inputs": "", "outputs": "CVE:CVE-2025-0207\nDescription:A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T13:15:07.383"} {"instruction": "Please provide detailed information about CVE-2025-0208", "inputs": "", "outputs": "CVE:CVE-2025-0208\nDescription:A vulnerability, which was classified as critical, was found in code-projects Online Shoe Store 1.0. This affects an unknown part of the file /summary.php. The manipulation of the argument tid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T13:15:07.557"} {"instruction": "Please provide detailed information about CVE-2025-0210", "inputs": "", "outputs": "CVE:CVE-2025-0210\nDescription:A vulnerability has been found in Campcodes School Faculty Scheduling System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T14:15:22.590"} {"instruction": "Please provide detailed information about CVE-2025-0211", "inputs": "", "outputs": "CVE:CVE-2025-0211\nDescription:A vulnerability was found in Campcodes School Faculty Scheduling System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/index.php. The manipulation of the argument page leads to file inclusion. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T15:15:07.277"} {"instruction": "Please provide detailed information about CVE-2025-0212", "inputs": "", "outputs": "CVE:CVE-2025-0212\nDescription:A vulnerability was found in Campcodes Student Grading System 1.0. It has been classified as critical. This affects an unknown part of the file /view_students.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T16:15:23.003"} {"instruction": "Please provide detailed information about CVE-2025-0213", "inputs": "", "outputs": "CVE:CVE-2025-0213\nDescription:A vulnerability was found in Campcodes Project Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forms/update_forms.php?action=change_pic2&id=4. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-04T17:15:06.743"} {"instruction": "Please provide detailed information about CVE-2025-0214", "inputs": "", "outputs": "CVE:CVE-2025-0214\nDescription:A vulnerability was found in TMD Custom Header Menu 4.0.0.1 on OpenCart. It has been rated as problematic. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument headermenu_id leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.\npublished:2025-01-04T17:15:07.507"} {"instruction": "Please provide detailed information about CVE-2025-0219", "inputs": "", "outputs": "CVE:CVE-2025-0219\nDescription:A vulnerability, which was classified as problematic, has been found in Trimble SPS851 488.01. Affected by this issue is some unknown functionality of the component Receiver Status Identity Tab. The manipulation of the argument System Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-05T06:15:05.183"} {"instruction": "Please provide detailed information about CVE-2025-0220", "inputs": "", "outputs": "CVE:CVE-2025-0220\nDescription:A vulnerability, which was classified as problematic, was found in Trimble SPS851 488.01. This affects an unknown part of the component Ethernet Configuration Menu. The manipulation of the argument Hostname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-05T13:15:05.850"} {"instruction": "Please provide detailed information about CVE-2025-0221", "inputs": "", "outputs": "CVE:CVE-2025-0221\nDescription:A vulnerability has been found in IOBit Protected Folder up to 1.3.0 and classified as problematic. This vulnerability affects the function 0x22200c in the library pffilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-05T15:15:17.473"} {"instruction": "Please provide detailed information about CVE-2025-0222", "inputs": "", "outputs": "CVE:CVE-2025-0222\nDescription:A vulnerability was found in IObit Protected Folder up to 13.6.0.5 and classified as problematic. This issue affects the function 0x8001E000/0x8001E004 in the library IUProcessFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-05T16:15:05.217"} {"instruction": "Please provide detailed information about CVE-2025-0223", "inputs": "", "outputs": "CVE:CVE-2025-0223\nDescription:A vulnerability was found in IObit Protected Folder up to 13.6.0.5. It has been classified as problematic. Affected is the function 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 in the library IURegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-05T16:15:05.497"} {"instruction": "Please provide detailed information about CVE-2025-0224", "inputs": "", "outputs": "CVE:CVE-2025-0224\nDescription:A vulnerability was found in Provision-ISR SH-4050A-2, SH-4100A-2L(MM), SH-8100A-2L(MM), SH-16200A-2(1U), SH-16200A-5(1U) and NVR5-8200PX up to 20241220. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /server.js. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T17:15:06.027"} {"instruction": "Please provide detailed information about CVE-2025-0225", "inputs": "", "outputs": "CVE:CVE-2025-0225\nDescription:A vulnerability classified as problematic was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this vulnerability is an unknown functionality of the file /setting/ClassFy/exampleDownload.html. The manipulation of the argument name leads to path traversal: '/../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T17:15:06.620"} {"instruction": "Please provide detailed information about CVE-2025-0226", "inputs": "", "outputs": "CVE:CVE-2025-0226\nDescription:A vulnerability, which was classified as problematic, has been found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this issue is the function download of the file /collect/PortV4/downLoad.html. The manipulation of the argument path leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T18:15:05.573"} {"instruction": "Please provide detailed information about CVE-2025-0227", "inputs": "", "outputs": "CVE:CVE-2025-0227\nDescription:A vulnerability, which was classified as problematic, was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). This affects an unknown part of the file /Logs/Annals/downLoad.html. The manipulation of the argument path leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T18:15:06.570"} {"instruction": "Please provide detailed information about CVE-2025-0228", "inputs": "", "outputs": "CVE:CVE-2025-0228\nDescription:A vulnerability has been found in code-projects Local Storage Todo App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /js-todo-app/index.html. The manipulation of the argument Add leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T19:15:06.320"} {"instruction": "Please provide detailed information about CVE-2025-0229", "inputs": "", "outputs": "CVE:CVE-2025-0229\nDescription:A vulnerability, which was classified as critical, has been found in code-projects Travel Management System 1.0. This issue affects some unknown processing of the file /enquiry.php. The manipulation of the argument pid/t1/t2/t3/t4/t5/t6/t7 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T20:15:05.383"} {"instruction": "Please provide detailed information about CVE-2025-0230", "inputs": "", "outputs": "CVE:CVE-2025-0230\nDescription:A vulnerability, which was classified as critical, was found in code-projects Responsive Hotel Site 1.0. Affected is an unknown function of the file /admin/print.php. The manipulation of the argument pid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T21:15:06.267"} {"instruction": "Please provide detailed information about CVE-2025-0231", "inputs": "", "outputs": "CVE:CVE-2025-0231\nDescription:A vulnerability has been found in Codezips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/submit_payments.php. The manipulation of the argument m_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T22:15:05.540"} {"instruction": "Please provide detailed information about CVE-2025-0232", "inputs": "", "outputs": "CVE:CVE-2025-0232\nDescription:A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /successadmin.php. The manipulation of the argument psw leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T22:15:05.767"} {"instruction": "Please provide detailed information about CVE-2025-0233", "inputs": "", "outputs": "CVE:CVE-2025-0233\nDescription:A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/course.php. The manipulation of the argument course_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-05T23:15:07.320"} {"instruction": "Please provide detailed information about CVE-2025-21604", "inputs": "", "outputs": "CVE:CVE-2025-21604\nDescription:LangChain4j-AIDeepin is a Retrieval enhancement generation (RAG) project. Prior to 3.5.0, LangChain4j-AIDeepin uses MD5 to hash files, which may cause file upload conflicts. This issue is fixed in 3.5.0.\npublished:2025-01-06T16:15:30.927"} {"instruction": "Please provide detailed information about CVE-2025-21611", "inputs": "", "outputs": "CVE:CVE-2025-21611\nDescription:tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.\npublished:2025-01-06T16:15:31.413"} {"instruction": "Please provide detailed information about CVE-2025-21612", "inputs": "", "outputs": "CVE:CVE-2025-21612\nDescription:TabberNeue is a MediaWiki extension that allows the wiki to create tabs. Prior to 2.7.2, TabberTransclude.php doesn't escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here. This vulnerability is fixed in 2.7.2.\npublished:2025-01-06T16:15:31.633"} {"instruction": "Please provide detailed information about CVE-2025-21613", "inputs": "", "outputs": "CVE:CVE-2025-21613\nDescription:go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.\npublished:2025-01-06T17:15:47.043"} {"instruction": "Please provide detailed information about CVE-2025-21614", "inputs": "", "outputs": "CVE:CVE-2025-21614\nDescription:go-git is a highly extensible git implementation library written in pure Go. A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.13. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability.\npublished:2025-01-06T17:15:47.310"} {"instruction": "Please provide detailed information about CVE-2025-21615", "inputs": "", "outputs": "CVE:CVE-2025-21615\nDescription:AAT (Another Activity Tracker) is a GPS-tracking application for tracking sportive activities, with emphasis on cycling. Versions lower than v1.26 of AAT are vulnerable to data exfiltration from malicious apps installed on the same device.\npublished:2025-01-06T17:15:47.510"} {"instruction": "Please provide detailed information about CVE-2025-21618", "inputs": "", "outputs": "CVE:CVE-2025-21618\nDescription:NiceGUI is an easy-to-use, Python-based UI framework. Prior to 2.9.1, authenticating with NiceGUI logged in the user for all browsers, including browsers in incognito mode. This vulnerability is fixed in 2.9.1.\npublished:2025-01-06T17:15:47.660"} {"instruction": "Please provide detailed information about CVE-2025-21617", "inputs": "", "outputs": "CVE:CVE-2025-21617\nDescription:Guzzle OAuth Subscriber signs Guzzle requests using OAuth 1.0. Prior to 0.8.1, Nonce generation does not use sufficient entropy nor a cryptographically secure pseudorandom source. This can leave servers vulnerable to replay attacks when TLS is not used. This vulnerability is fixed in 0.8.1.\npublished:2025-01-06T20:15:39.453"} {"instruction": "Please provide detailed information about CVE-2025-21616", "inputs": "", "outputs": "CVE:CVE-2025-21616\nDescription:Plane is an open-source project management tool. A cross-site scripting (XSS) vulnerability has been identified in Plane versions prior to 0.23. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image.\npublished:2025-01-06T22:15:11.023"} {"instruction": "Please provide detailed information about CVE-2025-21620", "inputs": "", "outputs": "CVE:CVE-2025-21620\nDescription:Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2.\npublished:2025-01-06T23:15:07.770"} {"instruction": "Please provide detailed information about CVE-2025-22395", "inputs": "", "outputs": "CVE:CVE-2025-22395\nDescription:Dell Update Package Framework, versions prior to 22.01.02, contain(s) a Local Privilege Escalation Vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary remote scripts on the server. Exploitation may lead to a denial of service by an attacker.\npublished:2025-01-07T03:15:06.047"} {"instruction": "Please provide detailed information about CVE-2025-22261", "inputs": "", "outputs": "CVE:CVE-2025-22261\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite WP FullCalendar wp-fullcalendar allows Stored XSS.This issue affects WP FullCalendar: from n/a through 1.5.\npublished:2025-01-07T11:15:13.290"} {"instruction": "Please provide detailed information about CVE-2025-22293", "inputs": "", "outputs": "CVE:CVE-2025-22293\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gutentor Gutentor allows DOM-Based XSS.This issue affects Gutentor: from n/a through 3.4.0.\npublished:2025-01-07T11:15:13.473"} {"instruction": "Please provide detailed information about CVE-2025-22297", "inputs": "", "outputs": "CVE:CVE-2025-22297\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in AIpost AI WP Writer allows Cross Site Request Forgery.This issue affects AI WP Writer: from n/a through 3.8.4.4.\npublished:2025-01-07T11:15:13.630"} {"instruction": "Please provide detailed information about CVE-2025-22298", "inputs": "", "outputs": "CVE:CVE-2025-22298\nDescription:Missing Authorization vulnerability in Hive Support Hive Support – WordPress Help Desk allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Hive Support – WordPress Help Desk: from n/a through 1.1.6.\npublished:2025-01-07T11:15:13.783"} {"instruction": "Please provide detailed information about CVE-2025-22299", "inputs": "", "outputs": "CVE:CVE-2025-22299\nDescription:Missing Authorization vulnerability in spacecodes AI for SEO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AI for SEO: from n/a through 1.2.9.\npublished:2025-01-07T11:15:13.943"} {"instruction": "Please provide detailed information about CVE-2025-22300", "inputs": "", "outputs": "CVE:CVE-2025-22300\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in PixelYourSite PixelYourSite – Your smart PIXEL (TAG) Manager allows Cross Site Request Forgery.This issue affects PixelYourSite – Your smart PIXEL (TAG) Manager: from n/a through 10.0.1.2.\npublished:2025-01-07T11:15:14.100"} {"instruction": "Please provide detailed information about CVE-2025-22301", "inputs": "", "outputs": "CVE:CVE-2025-22301\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore allows Cross Site Request Forgery.This issue affects MyBookTable Bookstore: from n/a through 3.5.3.\npublished:2025-01-07T11:15:14.240"} {"instruction": "Please provide detailed information about CVE-2025-22302", "inputs": "", "outputs": "CVE:CVE-2025-22302\nDescription:Missing Authorization vulnerability in WP Wand WP Wand allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Wand: from n/a through 1.2.5.\npublished:2025-01-07T11:15:14.387"} {"instruction": "Please provide detailed information about CVE-2025-22303", "inputs": "", "outputs": "CVE:CVE-2025-22303\nDescription:Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data.This issue affects WP Mailster: from n/a through 1.8.17.0.\npublished:2025-01-07T11:15:14.563"} {"instruction": "Please provide detailed information about CVE-2025-22304", "inputs": "", "outputs": "CVE:CVE-2025-22304\nDescription:Missing Authorization vulnerability in osamaesh WP Visitor Statistics (Real Time Traffic) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 7.3.\npublished:2025-01-07T11:15:14.740"} {"instruction": "Please provide detailed information about CVE-2025-22305", "inputs": "", "outputs": "CVE:CVE-2025-22305\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP OnlineSupport, Essential Plugin Hero Banner Ultimate allows PHP Local File Inclusion.This issue affects Hero Banner Ultimate: from n/a through 1.4.2.\npublished:2025-01-07T11:15:14.907"} {"instruction": "Please provide detailed information about CVE-2025-22308", "inputs": "", "outputs": "CVE:CVE-2025-22308\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in inc2734 Smart Custom Fields allows Stored XSS.This issue affects Smart Custom Fields: from n/a through 5.0.0.\npublished:2025-01-07T11:15:15.043"} {"instruction": "Please provide detailed information about CVE-2025-22309", "inputs": "", "outputs": "CVE:CVE-2025-22309\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Steve D SpeakOut! Email Petitions allows DOM-Based XSS.This issue affects SpeakOut! Email Petitions: from n/a through 4.4.2.\npublished:2025-01-07T11:15:15.190"} {"instruction": "Please provide detailed information about CVE-2025-22310", "inputs": "", "outputs": "CVE:CVE-2025-22310\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TemplatesNext TemplatesNext ToolKit allows Stored XSS.This issue affects TemplatesNext ToolKit: from n/a through 3.2.9.\npublished:2025-01-07T11:15:15.320"} {"instruction": "Please provide detailed information about CVE-2025-22312", "inputs": "", "outputs": "CVE:CVE-2025-22312\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress Thim Elementor Kit allows DOM-Based XSS.This issue affects Thim Elementor Kit: from n/a through 1.2.8.\npublished:2025-01-07T11:15:15.480"} {"instruction": "Please provide detailed information about CVE-2025-22315", "inputs": "", "outputs": "CVE:CVE-2025-22315\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Typing Text allows Stored XSS.This issue affects Typing Text: from n/a through 1.2.7.\npublished:2025-01-07T11:15:15.627"} {"instruction": "Please provide detailed information about CVE-2025-22316", "inputs": "", "outputs": "CVE:CVE-2025-22316\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBits WPBITS Addons For Elementor Page Builder allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through 1.5.1.\npublished:2025-01-07T11:15:15.763"} {"instruction": "Please provide detailed information about CVE-2025-22320", "inputs": "", "outputs": "CVE:CVE-2025-22320\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ProductDyno ProductDyno allows Reflected XSS.This issue affects ProductDyno: from n/a through 1.0.24.\npublished:2025-01-07T11:15:15.910"} {"instruction": "Please provide detailed information about CVE-2025-22321", "inputs": "", "outputs": "CVE:CVE-2025-22321\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TheInnovs ElementsCSS Addons for Elementor allows Stored XSS.This issue affects ElementsCSS Addons for Elementor: from n/a through 1.0.8.7.\npublished:2025-01-07T11:15:16.073"} {"instruction": "Please provide detailed information about CVE-2025-22323", "inputs": "", "outputs": "CVE:CVE-2025-22323\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jewel Theme Image Hover Effects for Elementor allows Stored XSS.This issue affects Image Hover Effects for Elementor: from n/a through 1.0.2.3.\npublished:2025-01-07T11:15:16.297"} {"instruction": "Please provide detailed information about CVE-2025-22324", "inputs": "", "outputs": "CVE:CVE-2025-22324\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andon Ivanov OZ Canonical allows Reflected XSS.This issue affects OZ Canonical: from n/a through 0.5.\npublished:2025-01-07T11:15:16.437"} {"instruction": "Please provide detailed information about CVE-2025-22325", "inputs": "", "outputs": "CVE:CVE-2025-22325\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Nik Chankov Autocompleter allows Stored XSS.This issue affects Autocompleter: from n/a through 1.3.5.2.\npublished:2025-01-07T11:15:16.577"} {"instruction": "Please provide detailed information about CVE-2025-22326", "inputs": "", "outputs": "CVE:CVE-2025-22326\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5centsCDN 5centsCDN allows Reflected XSS.This issue affects 5centsCDN: from n/a through 24.8.16.\npublished:2025-01-07T11:15:16.730"} {"instruction": "Please provide detailed information about CVE-2025-22327", "inputs": "", "outputs": "CVE:CVE-2025-22327\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer EO4WP allows Stored XSS.This issue affects EO4WP: from n/a through 1.0.7.\npublished:2025-01-07T11:15:16.870"} {"instruction": "Please provide detailed information about CVE-2025-22328", "inputs": "", "outputs": "CVE:CVE-2025-22328\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Elevio Elevio allows Stored XSS.This issue affects Elevio: from n/a through 4.4.1.\npublished:2025-01-07T11:15:17.020"} {"instruction": "Please provide detailed information about CVE-2025-22333", "inputs": "", "outputs": "CVE:CVE-2025-22333\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor allows Stored XSS.This issue affects Piotnet Addons For Elementor: from n/a through 2.4.31.\npublished:2025-01-07T11:15:17.160"} {"instruction": "Please provide detailed information about CVE-2025-22336", "inputs": "", "outputs": "CVE:CVE-2025-22336\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in WordPress 智库 Wizhi Multi Filters by Wenprise allows Stored XSS.This issue affects Wizhi Multi Filters by Wenprise: from n/a through 1.8.6.\npublished:2025-01-07T11:15:17.313"} {"instruction": "Please provide detailed information about CVE-2025-22339", "inputs": "", "outputs": "CVE:CVE-2025-22339\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aThemeArt Store Commerce allows DOM-Based XSS.This issue affects Store Commerce: from n/a through 1.2.3.\npublished:2025-01-07T11:15:17.463"} {"instruction": "Please provide detailed information about CVE-2025-22342", "inputs": "", "outputs": "CVE:CVE-2025-22342\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Jens Törnell WP Simple Sitemap allows Stored XSS.This issue affects WP Simple Sitemap: from n/a through 0.2.\npublished:2025-01-07T11:15:17.610"} {"instruction": "Please provide detailed information about CVE-2025-22343", "inputs": "", "outputs": "CVE:CVE-2025-22343\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Dennis Koot wpSOL allows Stored XSS.This issue affects wpSOL: from n/a through 1.2.0.\npublished:2025-01-07T11:15:17.743"} {"instruction": "Please provide detailed information about CVE-2025-22347", "inputs": "", "outputs": "CVE:CVE-2025-22347\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in BannerSky.com BSK Forms Blacklist allows Blind SQL Injection.This issue affects BSK Forms Blacklist: from n/a through 3.9.\npublished:2025-01-07T11:15:17.897"} {"instruction": "Please provide detailed information about CVE-2025-22348", "inputs": "", "outputs": "CVE:CVE-2025-22348\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RTO GmbH DynamicTags allows Blind SQL Injection.This issue affects DynamicTags: from n/a through 1.4.0.\npublished:2025-01-07T11:15:18.037"} {"instruction": "Please provide detailed information about CVE-2025-22349", "inputs": "", "outputs": "CVE:CVE-2025-22349\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Owen Cutajar & Hyder Jaffari WordPress Auction Plugin allows SQL Injection.This issue affects WordPress Auction Plugin: from n/a through 3.7.\npublished:2025-01-07T11:15:18.183"} {"instruction": "Please provide detailed information about CVE-2025-22351", "inputs": "", "outputs": "CVE:CVE-2025-22351\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PenguinArts Contact Form 7 Database – CFDB7 allows SQL Injection.This issue affects Contact Form 7 Database – CFDB7: from n/a through 1.0.0.\npublished:2025-01-07T11:15:18.330"} {"instruction": "Please provide detailed information about CVE-2025-22352", "inputs": "", "outputs": "CVE:CVE-2025-22352\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ELEXtensions ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes allows Blind SQL Injection.This issue affects ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes: from n/a through 1.4.8.\npublished:2025-01-07T11:15:18.527"} {"instruction": "Please provide detailed information about CVE-2025-22353", "inputs": "", "outputs": "CVE:CVE-2025-22353\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Balcom-Vetillo Design, Inc. BVD Easy Gallery Manager allows Reflected XSS.This issue affects BVD Easy Gallery Manager: from n/a through 1.0.6.\npublished:2025-01-07T11:15:18.693"} {"instruction": "Please provide detailed information about CVE-2025-22355", "inputs": "", "outputs": "CVE:CVE-2025-22355\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kiKx Kikx Simple Post Author Filter allows Reflected XSS.This issue affects Kikx Simple Post Author Filter: from n/a through 1.0.\npublished:2025-01-07T11:15:18.857"} {"instruction": "Please provide detailed information about CVE-2025-22357", "inputs": "", "outputs": "CVE:CVE-2025-22357\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Simple Plugins Target Notifications allows Reflected XSS.This issue affects Target Notifications: from n/a through 1.1.1.\npublished:2025-01-07T11:15:19.013"} {"instruction": "Please provide detailed information about CVE-2025-22358", "inputs": "", "outputs": "CVE:CVE-2025-22358\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcon Simone Wp advertising management allows Reflected XSS.This issue affects Wp advertising management: from n/a through 1.0.3.\npublished:2025-01-07T11:15:19.167"} {"instruction": "Please provide detailed information about CVE-2025-22359", "inputs": "", "outputs": "CVE:CVE-2025-22359\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PJFC SyncFields allows Reflected XSS.This issue affects SyncFields: from n/a through 2.1.\npublished:2025-01-07T11:15:19.310"} {"instruction": "Please provide detailed information about CVE-2025-22362", "inputs": "", "outputs": "CVE:CVE-2025-22362\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Powerfusion WPAchievements Free allows Stored XSS.This issue affects WPAchievements Free: from n/a through 1.2.0.\npublished:2025-01-07T11:15:19.453"} {"instruction": "Please provide detailed information about CVE-2025-22364", "inputs": "", "outputs": "CVE:CVE-2025-22364\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Service Shogun Ach Invoice App allows PHP Local File Inclusion.This issue affects Ach Invoice App: from n/a through 1.0.1.\npublished:2025-01-07T11:15:19.600"} {"instruction": "Please provide detailed information about CVE-2025-0294", "inputs": "", "outputs": "CVE:CVE-2025-0294\nDescription:A vulnerability has been found in SourceCodester Home Clean Services Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /public_html/admin/process.php. The manipulation of the argument type/length/business leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-07T14:15:24.277"} {"instruction": "Please provide detailed information about CVE-2025-0295", "inputs": "", "outputs": "CVE:CVE-2025-0295\nDescription:A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T15:15:12.320"} {"instruction": "Please provide detailed information about CVE-2025-0296", "inputs": "", "outputs": "CVE:CVE-2025-0296\nDescription:A vulnerability was found in code-projects Online Book Shop 1.0. It has been classified as critical. This affects an unknown part of the file /booklist.php. The manipulation of the argument subcatid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T15:15:12.530"} {"instruction": "Please provide detailed information about CVE-2025-0237", "inputs": "", "outputs": "CVE:CVE-2025-0237\nDescription:The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.323"} {"instruction": "Please provide detailed information about CVE-2025-0238", "inputs": "", "outputs": "CVE:CVE-2025-0238\nDescription:Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.470"} {"instruction": "Please provide detailed information about CVE-2025-0239", "inputs": "", "outputs": "CVE:CVE-2025-0239\nDescription:When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.563"} {"instruction": "Please provide detailed information about CVE-2025-0240", "inputs": "", "outputs": "CVE:CVE-2025-0240\nDescription:Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.663"} {"instruction": "Please provide detailed information about CVE-2025-0241", "inputs": "", "outputs": "CVE:CVE-2025-0241\nDescription:When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.767"} {"instruction": "Please provide detailed information about CVE-2025-0242", "inputs": "", "outputs": "CVE:CVE-2025-0242\nDescription:Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.860"} {"instruction": "Please provide detailed information about CVE-2025-0243", "inputs": "", "outputs": "CVE:CVE-2025-0243\nDescription:Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.\npublished:2025-01-07T16:15:38.973"} {"instruction": "Please provide detailed information about CVE-2025-0244", "inputs": "", "outputs": "CVE:CVE-2025-0244\nDescription:When redirecting to an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 134.\npublished:2025-01-07T16:15:39.073"} {"instruction": "Please provide detailed information about CVE-2025-0245", "inputs": "", "outputs": "CVE:CVE-2025-0245\nDescription:Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed. This vulnerability affects Firefox < 134.\npublished:2025-01-07T16:15:39.167"} {"instruction": "Please provide detailed information about CVE-2025-0246", "inputs": "", "outputs": "CVE:CVE-2025-0246\nDescription:When using an invalid protocol scheme, an attacker could spoof the address bar. *Note: This issue only affected Android operating systems. Other operating systems are unaffected.* *Note: This issue is a different issue from CVE-2025-0244. This vulnerability affects Firefox < 134.\npublished:2025-01-07T16:15:39.260"} {"instruction": "Please provide detailed information about CVE-2025-0247", "inputs": "", "outputs": "CVE:CVE-2025-0247\nDescription:Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Thunderbird < 134.\npublished:2025-01-07T16:15:39.357"} {"instruction": "Please provide detailed information about CVE-2025-0297", "inputs": "", "outputs": "CVE:CVE-2025-0297\nDescription:A vulnerability was found in code-projects Online Book Shop 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T16:15:39.887"} {"instruction": "Please provide detailed information about CVE-2025-0298", "inputs": "", "outputs": "CVE:CVE-2025-0298\nDescription:A vulnerability was found in code-projects Online Book Shop 1.0. It has been rated as critical. This issue affects some unknown processing of the file /process_login.php. The manipulation of the argument usernm leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T16:15:40.167"} {"instruction": "Please provide detailed information about CVE-2025-21622", "inputs": "", "outputs": "CVE:CVE-2025-21622\nDescription:ClipBucket V5 provides open source video hosting with PHP. During the user avatar upload workflow, a user can choose to upload and change their avatar at any time. During deletion, ClipBucket checks for the avatar_url as a filepath within the avatars subdirectory. If the URL path exists within the avatars directory, ClipBucket will delete it. There is no check for path traversal sequences in the provided user input (stored in the DB as avatar_url) therefore the final $file variable could be tainted with path traversal sequences. This leads to file deletion outside of the intended scope of the avatars folder. This vulnerability is fixed in 5.5.1 - 237.\npublished:2025-01-07T16:15:40.510"} {"instruction": "Please provide detailed information about CVE-2025-21623", "inputs": "", "outputs": "CVE:CVE-2025-21623\nDescription:ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 238, ClipBucket V5 allows unauthenticated attackers to change the template directory via a directory traversal, which results in a denial of service.\npublished:2025-01-07T16:15:40.690"} {"instruction": "Please provide detailed information about CVE-2025-21624", "inputs": "", "outputs": "CVE:CVE-2025-21624\nDescription:ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 239, a file upload vulnerability exists in the Manage Playlist functionality of the application, specifically surrounding the uploading of playlist cover images. Without proper checks, an attacker can upload a PHP script file instead of an image file, thus allowing a webshell or other malicious files to be stored and executed on the server. This attack vector exists in both the admin area and low-level user area. This vulnerability is fixed in 5.5.1 - 239.\npublished:2025-01-07T16:15:40.853"} {"instruction": "Please provide detailed information about CVE-2025-22294", "inputs": "", "outputs": "CVE:CVE-2025-22294\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master Custom Field For WP Job Manager allows Reflected XSS.This issue affects Custom Field For WP Job Manager: from n/a through 1.3.\npublished:2025-01-07T16:15:41.137"} {"instruction": "Please provide detailed information about CVE-2025-22335", "inputs": "", "outputs": "CVE:CVE-2025-22335\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Md. Rajib Dewan Opencart Product in WP allows Reflected XSS.This issue affects Opencart Product in WP: from n/a through 1.0.1.\npublished:2025-01-07T16:15:42.703"} {"instruction": "Please provide detailed information about CVE-2025-22338", "inputs": "", "outputs": "CVE:CVE-2025-22338\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in lich_wang WP-tagMaker allows Reflected XSS.This issue affects WP-tagMaker: from n/a through 0.2.2.\npublished:2025-01-07T16:15:44.117"} {"instruction": "Please provide detailed information about CVE-2025-22502", "inputs": "", "outputs": "CVE:CVE-2025-22502\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mindvalley MindValley Super PageMash allows SQL Injection.This issue affects MindValley Super PageMash: from n/a through 1.1.\npublished:2025-01-07T16:15:45.717"} {"instruction": "Please provide detailed information about CVE-2025-22503", "inputs": "", "outputs": "CVE:CVE-2025-22503\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Digital Zoom Studio Admin debug wordpress – enable debug allows Cross Site Request Forgery.This issue affects Admin debug wordpress – enable debug: from n/a through 1.0.13.\npublished:2025-01-07T16:15:45.877"} {"instruction": "Please provide detailed information about CVE-2025-22507", "inputs": "", "outputs": "CVE:CVE-2025-22507\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Benjamin Santalucia (ben@woow-fr.com) WPMU Prefill Post allows SQL Injection.This issue affects WPMU Prefill Post: from n/a through 1.02.\npublished:2025-01-07T16:15:46.040"} {"instruction": "Please provide detailed information about CVE-2025-22511", "inputs": "", "outputs": "CVE:CVE-2025-22511\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ella van Durpe Slides & Presentations allows Stored XSS.This issue affects Slides & Presentations: from n/a through 0.0.39.\npublished:2025-01-07T16:15:46.180"} {"instruction": "Please provide detailed information about CVE-2025-22512", "inputs": "", "outputs": "CVE:CVE-2025-22512\nDescription:Missing Authorization vulnerability in Sprout Apps Help Scout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Help Scout: from n/a through 6.5.1.\npublished:2025-01-07T16:15:46.320"} {"instruction": "Please provide detailed information about CVE-2025-22515", "inputs": "", "outputs": "CVE:CVE-2025-22515\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Simon Chuang Show Google Analytics widget allows Stored XSS.This issue affects Show Google Analytics widget: from n/a through 1.5.4.\npublished:2025-01-07T16:15:46.497"} {"instruction": "Please provide detailed information about CVE-2025-22516", "inputs": "", "outputs": "CVE:CVE-2025-22516\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hitesh Patel Metadata SEO allows Stored XSS.This issue affects Metadata SEO: from n/a through 2.3.\npublished:2025-01-07T16:15:46.653"} {"instruction": "Please provide detailed information about CVE-2025-22517", "inputs": "", "outputs": "CVE:CVE-2025-22517\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ben Huson List Pages at Depth allows Stored XSS.This issue affects List Pages at Depth: from n/a through 1.5.\npublished:2025-01-07T16:15:46.820"} {"instruction": "Please provide detailed information about CVE-2025-22518", "inputs": "", "outputs": "CVE:CVE-2025-22518\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in KentoThemes Justified Image Gallery allows Stored XSS.This issue affects Justified Image Gallery: from n/a through 1.0.\npublished:2025-01-07T16:15:46.990"} {"instruction": "Please provide detailed information about CVE-2025-22519", "inputs": "", "outputs": "CVE:CVE-2025-22519\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in eDoc Intelligence LLC eDoc Easy Tables allows SQL Injection.This issue affects eDoc Easy Tables: from n/a through 1.29.\npublished:2025-01-07T16:15:47.140"} {"instruction": "Please provide detailed information about CVE-2025-22520", "inputs": "", "outputs": "CVE:CVE-2025-22520\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Tock Tock Widget allows Cross Site Request Forgery.This issue affects Tock Widget: from n/a through 1.1.\npublished:2025-01-07T16:15:47.310"} {"instruction": "Please provide detailed information about CVE-2025-22522", "inputs": "", "outputs": "CVE:CVE-2025-22522\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roya Khosravi SingSong allows Stored XSS.This issue affects SingSong: from n/a through 1.2.\npublished:2025-01-07T16:15:47.513"} {"instruction": "Please provide detailed information about CVE-2025-22524", "inputs": "", "outputs": "CVE:CVE-2025-22524\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in instaform.ir فرم ساز فرم افزار allows Stored XSS.This issue affects فرم ساز فرم افزار: from n/a through 2.0.\npublished:2025-01-07T16:15:47.680"} {"instruction": "Please provide detailed information about CVE-2025-22525", "inputs": "", "outputs": "CVE:CVE-2025-22525\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bharatkambariya Donation Block For PayPal allows Stored XSS.This issue affects Donation Block For PayPal: from n/a through 2.2.0.\npublished:2025-01-07T16:15:47.830"} {"instruction": "Please provide detailed information about CVE-2025-22528", "inputs": "", "outputs": "CVE:CVE-2025-22528\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Huurkalender Huurkalender WP allows Stored XSS.This issue affects Huurkalender WP: from n/a through 1.5.6.\npublished:2025-01-07T16:15:47.987"} {"instruction": "Please provide detailed information about CVE-2025-22529", "inputs": "", "outputs": "CVE:CVE-2025-22529\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WORDPRESTEEM WE Blocks allows Stored XSS.This issue affects WE Blocks: from n/a through 1.3.5.\npublished:2025-01-07T16:15:48.180"} {"instruction": "Please provide detailed information about CVE-2025-22530", "inputs": "", "outputs": "CVE:CVE-2025-22530\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SIOT 아임포트 결제버튼 생성 플러그인 allows Stored XSS.This issue affects 아임포트 결제버튼 생성 플러그인: from n/a through 1.1.19.\npublished:2025-01-07T16:15:48.350"} {"instruction": "Please provide detailed information about CVE-2025-22531", "inputs": "", "outputs": "CVE:CVE-2025-22531\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M Bilal M Urdu Formatter – Shamil allows Stored XSS.This issue affects Urdu Formatter – Shamil: from n/a through 0.1.\npublished:2025-01-07T16:15:48.520"} {"instruction": "Please provide detailed information about CVE-2025-22532", "inputs": "", "outputs": "CVE:CVE-2025-22532\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nagy Sandor Simple Photo Sphere allows Stored XSS.This issue affects Simple Photo Sphere: from n/a through 0.0.10.\npublished:2025-01-07T16:15:48.747"} {"instruction": "Please provide detailed information about CVE-2025-22533", "inputs": "", "outputs": "CVE:CVE-2025-22533\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WOOEXIM.COM WOOEXIM allows SQL Injection.This issue affects WOOEXIM: from n/a through 5.0.0.\npublished:2025-01-07T16:15:48.980"} {"instruction": "Please provide detailed information about CVE-2025-22534", "inputs": "", "outputs": "CVE:CVE-2025-22534\nDescription:Missing Authorization vulnerability in Ella van Durpe Slides & Presentations allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Slides & Presentations: from n/a through 0.0.39.\npublished:2025-01-07T16:15:49.130"} {"instruction": "Please provide detailed information about CVE-2025-22536", "inputs": "", "outputs": "CVE:CVE-2025-22536\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hiren Patel WP Music Player allows SQL Injection.This issue affects WP Music Player: from n/a through 1.3.\npublished:2025-01-07T16:15:49.293"} {"instruction": "Please provide detailed information about CVE-2025-22538", "inputs": "", "outputs": "CVE:CVE-2025-22538\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Ofek Nakar Virtual Bot allows Stored XSS.This issue affects Virtual Bot: from n/a through 1.0.0.\npublished:2025-01-07T16:15:49.460"} {"instruction": "Please provide detailed information about CVE-2025-22541", "inputs": "", "outputs": "CVE:CVE-2025-22541\nDescription:Missing Authorization vulnerability in Etruel Developments LLC WP Delete Post Copies allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Delete Post Copies: from n/a through 5.5.\npublished:2025-01-07T16:15:49.670"} {"instruction": "Please provide detailed information about CVE-2025-22543", "inputs": "", "outputs": "CVE:CVE-2025-22543\nDescription:Missing Authorization vulnerability in Beautiful Templates ST Gallery WP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ST Gallery WP: from n/a through 1.0.8.\npublished:2025-01-07T16:15:49.830"} {"instruction": "Please provide detailed information about CVE-2025-22544", "inputs": "", "outputs": "CVE:CVE-2025-22544\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mind Doodle Mind Doodle Visual Sitemaps & Tasks allows Stored XSS.This issue affects Mind Doodle Visual Sitemaps & Tasks: from n/a through 1.6.\npublished:2025-01-07T16:15:50.003"} {"instruction": "Please provide detailed information about CVE-2025-22545", "inputs": "", "outputs": "CVE:CVE-2025-22545\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sw-galati.ro iframe to embed allows Stored XSS.This issue affects iframe to embed: from n/a through 1.2.\npublished:2025-01-07T16:15:50.140"} {"instruction": "Please provide detailed information about CVE-2025-22546", "inputs": "", "outputs": "CVE:CVE-2025-22546\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in One Plus Solution jQuery TwentyTwenty allows Stored XSS.This issue affects jQuery TwentyTwenty: from n/a through 1.0.\npublished:2025-01-07T16:15:50.300"} {"instruction": "Please provide detailed information about CVE-2025-22547", "inputs": "", "outputs": "CVE:CVE-2025-22547\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jay Krishnan G JK Html To Pdf allows Stored XSS.This issue affects JK Html To Pdf: from n/a through 1.0.0.\npublished:2025-01-07T16:15:50.463"} {"instruction": "Please provide detailed information about CVE-2025-22548", "inputs": "", "outputs": "CVE:CVE-2025-22548\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Frank Koenen ldap_login_password_and_role_manager allows Stored XSS.This issue affects ldap_login_password_and_role_manager: from n/a through 1.0.12.\npublished:2025-01-07T16:15:50.623"} {"instruction": "Please provide detailed information about CVE-2025-22549", "inputs": "", "outputs": "CVE:CVE-2025-22549\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pablo Cornehl WP Github allows Stored XSS.This issue affects WP Github: from n/a through 1.3.3.\npublished:2025-01-07T16:15:50.790"} {"instruction": "Please provide detailed information about CVE-2025-22550", "inputs": "", "outputs": "CVE:CVE-2025-22550\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AddFunc AddFunc Mobile Detect allows Stored XSS.This issue affects AddFunc Mobile Detect: from n/a through 3.1.\npublished:2025-01-07T16:15:50.960"} {"instruction": "Please provide detailed information about CVE-2025-22551", "inputs": "", "outputs": "CVE:CVE-2025-22551\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Julien Crego Boot-Modal allows Stored XSS.This issue affects Boot-Modal: from n/a through 1.9.1.\npublished:2025-01-07T16:15:51.127"} {"instruction": "Please provide detailed information about CVE-2025-22552", "inputs": "", "outputs": "CVE:CVE-2025-22552\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Jason Keeley, Bryan Nielsen Affiliate Disclosure Statement allows Cross Site Request Forgery.This issue affects Affiliate Disclosure Statement: from n/a through 0.3.\npublished:2025-01-07T16:15:51.277"} {"instruction": "Please provide detailed information about CVE-2025-22554", "inputs": "", "outputs": "CVE:CVE-2025-22554\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric Franklin Video Embed Optimizer allows Stored XSS.This issue affects Video Embed Optimizer: from n/a through 1.0.0.\npublished:2025-01-07T16:15:51.443"} {"instruction": "Please provide detailed information about CVE-2025-22555", "inputs": "", "outputs": "CVE:CVE-2025-22555\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Noel Jarencio. Smoothness Slider Shortcode allows Cross Site Request Forgery.This issue affects Smoothness Slider Shortcode: from n/a through v1.2.2.\npublished:2025-01-07T16:15:51.627"} {"instruction": "Please provide detailed information about CVE-2025-22556", "inputs": "", "outputs": "CVE:CVE-2025-22556\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Greg Whitehead Norse Rune Oracle Plugin allows Cross Site Request Forgery.This issue affects Norse Rune Oracle Plugin: from n/a through 1.4.1.\npublished:2025-01-07T16:15:51.780"} {"instruction": "Please provide detailed information about CVE-2025-22557", "inputs": "", "outputs": "CVE:CVE-2025-22557\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in WPMagic News Publisher Autopilot allows Cross Site Request Forgery.This issue affects News Publisher Autopilot: from n/a through 2.1.4.\npublished:2025-01-07T16:15:51.920"} {"instruction": "Please provide detailed information about CVE-2025-22558", "inputs": "", "outputs": "CVE:CVE-2025-22558\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcus C. J. Hartmann mcjh button shortcode allows Stored XSS.This issue affects mcjh button shortcode: from n/a through 1.6.4.\npublished:2025-01-07T16:15:52.080"} {"instruction": "Please provide detailed information about CVE-2025-22559", "inputs": "", "outputs": "CVE:CVE-2025-22559\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mario Mansour and Geoff Peters TubePress.NET allows Cross Site Request Forgery.This issue affects TubePress.NET: from n/a through 4.0.1.\npublished:2025-01-07T16:15:52.243"} {"instruction": "Please provide detailed information about CVE-2025-22560", "inputs": "", "outputs": "CVE:CVE-2025-22560\nDescription:Missing Authorization vulnerability in Saoshyant.1994 Saoshyant Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Saoshyant Page Builder: from n/a through 3.8.\npublished:2025-01-07T16:15:52.380"} {"instruction": "Please provide detailed information about CVE-2025-22562", "inputs": "", "outputs": "CVE:CVE-2025-22562\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Jason Funk Title Experiments Free allows Cross Site Request Forgery.This issue affects Title Experiments Free: from n/a through 9.0.4.\npublished:2025-01-07T16:15:52.540"} {"instruction": "Please provide detailed information about CVE-2025-22563", "inputs": "", "outputs": "CVE:CVE-2025-22563\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Faaiq Pretty Url allows Cross Site Request Forgery.This issue affects Pretty Url: from n/a through 1.5.4.\npublished:2025-01-07T16:15:52.940"} {"instruction": "Please provide detailed information about CVE-2025-22571", "inputs": "", "outputs": "CVE:CVE-2025-22571\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Instabot Instabot allows Cross Site Request Forgery.This issue affects Instabot: from n/a through 1.10.\npublished:2025-01-07T16:15:53.187"} {"instruction": "Please provide detailed information about CVE-2025-22572", "inputs": "", "outputs": "CVE:CVE-2025-22572\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brianmiyaji Legacy ePlayer allows Stored XSS.This issue affects Legacy ePlayer: from n/a through 0.9.9.\npublished:2025-01-07T16:15:53.357"} {"instruction": "Please provide detailed information about CVE-2025-22573", "inputs": "", "outputs": "CVE:CVE-2025-22573\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in copist Icons Enricher allows Stored XSS.This issue affects Icons Enricher: from n/a through 1.0.8.\npublished:2025-01-07T16:15:53.520"} {"instruction": "Please provide detailed information about CVE-2025-22574", "inputs": "", "outputs": "CVE:CVE-2025-22574\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Motacek ICS Button allows Stored XSS.This issue affects ICS Button: from n/a through 0.6.\npublished:2025-01-07T16:15:53.667"} {"instruction": "Please provide detailed information about CVE-2025-22577", "inputs": "", "outputs": "CVE:CVE-2025-22577\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Damion Armentrout Able Player allows DOM-Based XSS.This issue affects Able Player: from n/a through 1.0.\npublished:2025-01-07T16:15:53.823"} {"instruction": "Please provide detailed information about CVE-2025-22578", "inputs": "", "outputs": "CVE:CVE-2025-22578\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AazzTech WP Cookie allows Stored XSS.This issue affects WP Cookie: from n/a through 1.0.0.\npublished:2025-01-07T16:15:53.970"} {"instruction": "Please provide detailed information about CVE-2025-22579", "inputs": "", "outputs": "CVE:CVE-2025-22579\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arefly WP Header Notification allows Stored XSS.This issue affects WP Header Notification: from n/a through 1.2.7.\npublished:2025-01-07T16:15:54.130"} {"instruction": "Please provide detailed information about CVE-2025-22580", "inputs": "", "outputs": "CVE:CVE-2025-22580\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biltorvet A/S Biltorvet Dealer Tools allows Stored XSS.This issue affects Biltorvet Dealer Tools: from n/a through 1.0.22.\npublished:2025-01-07T16:15:54.303"} {"instruction": "Please provide detailed information about CVE-2025-22581", "inputs": "", "outputs": "CVE:CVE-2025-22581\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bytephp Arcade Ready allows Stored XSS.This issue affects Arcade Ready: from n/a through 1.1.\npublished:2025-01-07T16:15:54.467"} {"instruction": "Please provide detailed information about CVE-2025-22582", "inputs": "", "outputs": "CVE:CVE-2025-22582\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Scott Nellé Uptime Robot allows Stored XSS.This issue affects Uptime Robot: from n/a through 0.1.3.\npublished:2025-01-07T16:15:54.640"} {"instruction": "Please provide detailed information about CVE-2025-22584", "inputs": "", "outputs": "CVE:CVE-2025-22584\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pluginspoint Timeline Pro allows DOM-Based XSS.This issue affects Timeline Pro: from n/a through 1.3.\npublished:2025-01-07T16:15:54.780"} {"instruction": "Please provide detailed information about CVE-2025-22585", "inputs": "", "outputs": "CVE:CVE-2025-22585\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themebon Ultimate Image Hover Effects allows DOM-Based XSS.This issue affects Ultimate Image Hover Effects: from n/a through 1.1.2.\npublished:2025-01-07T16:15:54.923"} {"instruction": "Please provide detailed information about CVE-2025-22589", "inputs": "", "outputs": "CVE:CVE-2025-22589\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in bozdoz Quote Tweet allows Stored XSS.This issue affects Quote Tweet: from n/a through 0.7.\npublished:2025-01-07T16:15:55.053"} {"instruction": "Please provide detailed information about CVE-2025-22590", "inputs": "", "outputs": "CVE:CVE-2025-22590\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in mmrs151 Prayer Times Anywhere allows Stored XSS.This issue affects Prayer Times Anywhere: from n/a through 2.0.1.\npublished:2025-01-07T16:15:55.200"} {"instruction": "Please provide detailed information about CVE-2025-22591", "inputs": "", "outputs": "CVE:CVE-2025-22591\nDescription:Missing Authorization vulnerability in Lenderd 1003 Mortgage Application allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 1003 Mortgage Application: from n/a through 1.87.\npublished:2025-01-07T16:15:55.337"} {"instruction": "Please provide detailed information about CVE-2025-22592", "inputs": "", "outputs": "CVE:CVE-2025-22592\nDescription:Missing Authorization vulnerability in Lenderd 1003 Mortgage Application allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects 1003 Mortgage Application: from n/a through 1.87.\npublished:2025-01-07T16:15:55.470"} {"instruction": "Please provide detailed information about CVE-2025-22593", "inputs": "", "outputs": "CVE:CVE-2025-22593\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Burria Laika Pedigree Tree allows Stored XSS.This issue affects Laika Pedigree Tree: from n/a through 1.4.\npublished:2025-01-07T16:15:55.627"} {"instruction": "Please provide detailed information about CVE-2025-0299", "inputs": "", "outputs": "CVE:CVE-2025-0299\nDescription:A vulnerability classified as critical has been found in code-projects Online Book Shop 1.0. Affected is an unknown function of the file /search_result.php. The manipulation of the argument s leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T17:15:31.903"} {"instruction": "Please provide detailed information about CVE-2025-0300", "inputs": "", "outputs": "CVE:CVE-2025-0300\nDescription:A vulnerability classified as critical was found in code-projects Online Book Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /subcat.php. The manipulation of the argument cat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T17:15:32.090"} {"instruction": "Please provide detailed information about CVE-2025-22296", "inputs": "", "outputs": "CVE:CVE-2025-22296\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements.This issue affects Hash Elements: from n/a through 1.4.9.\npublished:2025-01-07T17:15:32.520"} {"instruction": "Please provide detailed information about CVE-2025-22306", "inputs": "", "outputs": "CVE:CVE-2025-22306\nDescription:Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Link Whisper Link Whisper Free.This issue affects Link Whisper Free: from n/a through 0.7.7.\npublished:2025-01-07T17:15:32.663"} {"instruction": "Please provide detailed information about CVE-2025-22319", "inputs": "", "outputs": "CVE:CVE-2025-22319\nDescription:Missing Authorization vulnerability in DearHive Social Media Share Buttons | MashShare.This issue affects Social Media Share Buttons | MashShare: from n/a through 4.0.47.\npublished:2025-01-07T17:15:32.810"} {"instruction": "Please provide detailed information about CVE-2025-22334", "inputs": "", "outputs": "CVE:CVE-2025-22334\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FilaThemes Education LMS allows Stored XSS.This issue affects Education LMS: from n/a through 0.0.7.\npublished:2025-01-07T17:15:32.953"} {"instruction": "Please provide detailed information about CVE-2025-22350", "inputs": "", "outputs": "CVE:CVE-2025-22350\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpIndeed Ultimate Learning Pro allows SQL Injection.This issue affects Ultimate Learning Pro: from n/a through 3.9.\npublished:2025-01-07T17:15:33.093"} {"instruction": "Please provide detailed information about CVE-2025-22354", "inputs": "", "outputs": "CVE:CVE-2025-22354\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Themes Digi Store allows DOM-Based XSS.This issue affects Digi Store: from n/a through 1.1.4.\npublished:2025-01-07T17:15:33.230"} {"instruction": "Please provide detailed information about CVE-2025-22363", "inputs": "", "outputs": "CVE:CVE-2025-22363\nDescription:Missing Authorization vulnerability in ORION Allada T-shirt Designer for Woocommerce.This issue affects Allada T-shirt Designer for Woocommerce: from n/a through 1.1.\npublished:2025-01-07T17:15:33.377"} {"instruction": "Please provide detailed information about CVE-2025-22365", "inputs": "", "outputs": "CVE:CVE-2025-22365\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric McNiece EMC2 Alert Boxes allows Stored XSS.This issue affects EMC2 Alert Boxes: from n/a through 1.3.\npublished:2025-01-07T17:15:33.510"} {"instruction": "Please provide detailed information about CVE-2025-22500", "inputs": "", "outputs": "CVE:CVE-2025-22500\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ali Ali Alpha Price Table For Elementor allows DOM-Based XSS.This issue affects Alpha Price Table For Elementor: from n/a through 1.0.8.\npublished:2025-01-07T17:15:33.657"} {"instruction": "Please provide detailed information about CVE-2025-22621", "inputs": "", "outputs": "CVE:CVE-2025-22621\nDescription:In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the \"admin\" Splunk roles.\npublished:2025-01-07T17:15:35.710"} {"instruction": "Please provide detailed information about CVE-2025-0301", "inputs": "", "outputs": "CVE:CVE-2025-0301\nDescription:A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-07T18:15:21.460"} {"instruction": "Please provide detailed information about CVE-2025-0218", "inputs": "", "outputs": "CVE:CVE-2025-0218\nDescription:When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks.\npublished:2025-01-07T20:15:30.710"} {"instruction": "Please provide detailed information about CVE-2025-22132", "inputs": "", "outputs": "CVE:CVE-2025-22132\nDescription:WeGIA is a web manager for charitable institutions. A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. By uploading a file containing malicious JavaScript code, an attacker can execute arbitrary scripts in the context of a victim's browser. This can lead to information theft, session hijacking, and other forms of client-side exploitation. This vulnerability is fixed in 3.2.7.\npublished:2025-01-07T22:15:31.590"} {"instruction": "Please provide detailed information about CVE-2025-22133", "inputs": "", "outputs": "CVE:CVE-2025-22133\nDescription:WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8.\npublished:2025-01-07T22:15:31.740"} {"instruction": "Please provide detailed information about CVE-2025-21603", "inputs": "", "outputs": "CVE:CVE-2025-21603\nDescription:Cross-site scripting vulnerability exists in MZK-DP300N firmware versions 1.05 and earlier. If an attacker logs in to the affected product and manipulates the device settings, an arbitrary script may be executed on the logged-in user's web browser when accessing a crafted URL.\npublished:2025-01-08T04:15:08.407"} {"instruction": "Please provide detailed information about CVE-2024-9673", "inputs": "", "outputs": "CVE:CVE-2024-9673\nDescription:Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22333. Reason: This candidate is a reservation duplicate of CVE-2025-22333. Notes: All CVE users should reference CVE-2025-22333 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.\npublished:2025-01-08T07:15:27.980"} {"instruction": "Please provide detailed information about CVE-2025-22215", "inputs": "", "outputs": "CVE:CVE-2025-22215\nDescription:VMware Aria Automation contains a server-side request forgery (SSRF) vulnerability. A malicious actor with \"Organization Member\" access to Aria Automation may exploit this vulnerability enumerate internal services running on the host/network.\npublished:2025-01-08T07:15:28.180"} {"instruction": "Please provide detailed information about CVE-2025-21102", "inputs": "", "outputs": "CVE:CVE-2025-21102\nDescription:Dell VxRail, versions 7.0.000 through 7.0.532, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.\npublished:2025-01-08T12:15:22.850"} {"instruction": "Please provide detailed information about CVE-2025-20123", "inputs": "", "outputs": "CVE:CVE-2025-20123\nDescription:Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system.\r \r These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.\r Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\npublished:2025-01-08T16:15:38.150"} {"instruction": "Please provide detailed information about CVE-2025-20126", "inputs": "", "outputs": "CVE:CVE-2025-20126\nDescription:A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information.\r \r This vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client.\npublished:2025-01-08T16:15:38.357"} {"instruction": "Please provide detailed information about CVE-2025-22130", "inputs": "", "outputs": "CVE:CVE-2025-22130\nDescription:Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2.\npublished:2025-01-08T16:15:38.543"} {"instruction": "Please provide detailed information about CVE-2025-22136", "inputs": "", "outputs": "CVE:CVE-2025-22136\nDescription:Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.217 , Tabby enables several high-risk Electron Fuses, including RunAsNode, EnableNodeCliInspectArguments, and EnableNodeOptionsEnvironmentVariable. These fuses create potential code injection vectors even though the application is signed with hardened runtime and lacks dangerous entitlements such as com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables. This vulnerability is fixed in 1.0.217.\npublished:2025-01-08T16:15:38.770"} {"instruction": "Please provide detailed information about CVE-2025-22137", "inputs": "", "outputs": "CVE:CVE-2025-22137\nDescription:Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0.\npublished:2025-01-08T16:15:38.920"} {"instruction": "Please provide detailed information about CVE-2025-20166", "inputs": "", "outputs": "CVE:CVE-2025-20166\nDescription:A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r \r This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\npublished:2025-01-08T17:15:16.990"} {"instruction": "Please provide detailed information about CVE-2025-20167", "inputs": "", "outputs": "CVE:CVE-2025-20167\nDescription:A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r \r This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\npublished:2025-01-08T17:15:17.163"} {"instruction": "Please provide detailed information about CVE-2025-20168", "inputs": "", "outputs": "CVE:CVE-2025-20168\nDescription:A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r \r This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\npublished:2025-01-08T17:15:17.323"} {"instruction": "Please provide detailed information about CVE-2025-21111", "inputs": "", "outputs": "CVE:CVE-2025-21111\nDescription:Dell VxRail, versions 8.0.000 through 8.0.311, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.\npublished:2025-01-08T18:15:20.157"} {"instruction": "Please provide detailed information about CVE-2025-0291", "inputs": "", "outputs": "CVE:CVE-2025-0291\nDescription:Type Confusion in V8 in Google Chrome prior to 131.0.6778.264 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-08T19:15:38.420"} {"instruction": "Please provide detailed information about CVE-2025-22139", "inputs": "", "outputs": "CVE:CVE-2025-22139\nDescription:WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_geral.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8.\npublished:2025-01-08T19:15:38.717"} {"instruction": "Please provide detailed information about CVE-2025-22140", "inputs": "", "outputs": "CVE:CVE-2025-22140\nDescription:WeGIA is a web manager for charitable institutions. A SQL Injection vulnerability was identified in the /html/funcionario/dependente_listar_um.php endpoint, specifically in the id_dependente parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.2.8.\npublished:2025-01-08T19:15:38.863"} {"instruction": "Please provide detailed information about CVE-2025-22141", "inputs": "", "outputs": "CVE:CVE-2025-22141\nDescription:WeGIA is a web manager for charitable institutions. A SQL Injection vulnerability was identified in the /dao/verificar_recursos_cargo.php endpoint, specifically in the cargo parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.2.8.\npublished:2025-01-08T19:15:39.017"} {"instruction": "Please provide detailed information about CVE-2025-0194", "inputs": "", "outputs": "CVE:CVE-2025-0194\nDescription:An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner.\npublished:2025-01-08T20:15:29.193"} {"instruction": "Please provide detailed information about CVE-2025-22143", "inputs": "", "outputs": "CVE:CVE-2025-22143\nDescription:WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the listar_permissoes.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_e parameter. This vulnerability is fixed in 3.2.8.\npublished:2025-01-08T20:15:30.003"} {"instruction": "Please provide detailed information about CVE-2025-22145", "inputs": "", "outputs": "CVE:CVE-2025-22145\nDescription:Carbon is an international PHP extension for DateTime. Application passing unsanitized user input to Carbon::setLocale are at risk of arbitrary file include, if the application allows users to upload files with .php extension in an folder that allows include or require to read it, then they are at risk of arbitrary code ran on their servers. This vulnerability is fixed in 3.8.4 and 2.72.6.\npublished:2025-01-08T21:15:13.480"} {"instruction": "Please provide detailed information about CVE-2025-0282", "inputs": "", "outputs": "CVE:CVE-2025-0282\nDescription:A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.\npublished:2025-01-08T23:15:09.763"} {"instruction": "Please provide detailed information about CVE-2025-0283", "inputs": "", "outputs": "CVE:CVE-2025-0283\nDescription:A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges.\npublished:2025-01-08T23:15:09.920"} {"instruction": "Please provide detailed information about CVE-2025-0306", "inputs": "", "outputs": "CVE:CVE-2025-0306\nDescription:A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service.\npublished:2025-01-09T04:15:13.000"} {"instruction": "Please provide detailed information about CVE-2025-0328", "inputs": "", "outputs": "CVE:CVE-2025-0328\nDescription:A vulnerability, which was classified as critical, has been found in KaiYuanTong ECT Platform up to 2.0.0. Affected by this issue is some unknown functionality of the file /public/server/runCode.php of the component HTTP POST Request Handler. The manipulation of the argument code leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-09T05:15:07.997"} {"instruction": "Please provide detailed information about CVE-2025-0331", "inputs": "", "outputs": "CVE:CVE-2025-0331\nDescription:A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-09T05:15:08.237"} {"instruction": "Please provide detailed information about CVE-2025-0333", "inputs": "", "outputs": "CVE:CVE-2025-0333\nDescription:A vulnerability, which was classified as critical, was found in leiyuxi cy-fast 1.0. Affected is the function listData of the file /sys/role/listData. The manipulation of the argument order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T05:15:08.453"} {"instruction": "Please provide detailed information about CVE-2025-0334", "inputs": "", "outputs": "CVE:CVE-2025-0334\nDescription:A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /sys/user/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T06:15:15.610"} {"instruction": "Please provide detailed information about CVE-2025-0335", "inputs": "", "outputs": "CVE:CVE-2025-0335\nDescription:A vulnerability was found in code-projects Online Bike Rental System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the component Change Image Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other endpoints might be affected as well.\npublished:2025-01-09T06:15:15.850"} {"instruction": "Please provide detailed information about CVE-2025-0336", "inputs": "", "outputs": "CVE:CVE-2025-0336\nDescription:A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/teacher.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T07:15:27.860"} {"instruction": "Please provide detailed information about CVE-2025-0339", "inputs": "", "outputs": "CVE:CVE-2025-0339\nDescription:A vulnerability classified as problematic has been found in code-projects Online Bike Rental 1.0. Affected is an unknown function of the file /vehical-details.php of the component HTTP GET Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely.\npublished:2025-01-09T07:15:28.080"} {"instruction": "Please provide detailed information about CVE-2025-0340", "inputs": "", "outputs": "CVE:CVE-2025-0340\nDescription:A vulnerability classified as critical was found in code-projects Cinema Seat Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/deleteBooking.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T07:15:28.260"} {"instruction": "Please provide detailed information about CVE-2025-20033", "inputs": "", "outputs": "CVE:CVE-2025-20033\nDescription:Mattermost versions 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post types, which allows attackers to deny service to users with the sysconsole_read_plugins permission via creating a post with the custom_pl_notification type and specific props.\npublished:2025-01-09T07:15:28.450"} {"instruction": "Please provide detailed information about CVE-2025-22445", "inputs": "", "outputs": "CVE:CVE-2025-22445\nDescription:Mattermost versions 10.x <= 10.2 fail to accurately reflect missing settings, which allows confusion for admins regarding a Calls security-sensitive configuration via incorrect UI reporting.\npublished:2025-01-09T07:15:28.617"} {"instruction": "Please provide detailed information about CVE-2025-22449", "inputs": "", "outputs": "CVE:CVE-2025-22449\nDescription:Mattermost versions 9.11.x <= 9.11.5 fail to enforce invite permissions, which allows team admins, with no permission to invite users to their team, to invite users by updating the \"allow_open_invite\" field via making their team public.\npublished:2025-01-09T07:15:28.777"} {"instruction": "Please provide detailed information about CVE-2025-0341", "inputs": "", "outputs": "CVE:CVE-2025-0341\nDescription:A vulnerability, which was classified as critical, has been found in CampCodes Computer Laboratory Management System 1.0. Affected by this issue is some unknown functionality of the file /class/edit/edit. The manipulation of the argument e_photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T08:15:30.060"} {"instruction": "Please provide detailed information about CVE-2025-0342", "inputs": "", "outputs": "CVE:CVE-2025-0342\nDescription:A vulnerability, which was classified as problematic, was found in CampCodes Computer Laboratory Management System 1.0. This affects an unknown part of the file /class/edit/edit. The manipulation of the argument s_lname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-09T08:15:30.310"} {"instruction": "Please provide detailed information about CVE-2025-0344", "inputs": "", "outputs": "CVE:CVE-2025-0344\nDescription:A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /commpara/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T08:15:30.517"} {"instruction": "Please provide detailed information about CVE-2025-0345", "inputs": "", "outputs": "CVE:CVE-2025-0345\nDescription:A vulnerability was found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this issue is the function listData of the file /sys/menu/listData. The manipulation of the argument order leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T09:15:09.220"} {"instruction": "Please provide detailed information about CVE-2025-0346", "inputs": "", "outputs": "CVE:CVE-2025-0346\nDescription:A vulnerability was found in code-projects Content Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/publishnews.php of the component Publish News Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T09:15:09.393"} {"instruction": "Please provide detailed information about CVE-2025-0347", "inputs": "", "outputs": "CVE:CVE-2025-0347\nDescription:A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T10:15:07.170"} {"instruction": "Please provide detailed information about CVE-2025-0348", "inputs": "", "outputs": "CVE:CVE-2025-0348\nDescription:A vulnerability was found in CampCodes DepEd Equipment Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /data/add_employee.php. The manipulation of the argument data leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-09T10:15:07.700"} {"instruction": "Please provide detailed information about CVE-2025-0349", "inputs": "", "outputs": "CVE:CVE-2025-0349\nDescription:A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src/mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-09T11:15:16.547"} {"instruction": "Please provide detailed information about CVE-2025-22295", "inputs": "", "outputs": "CVE:CVE-2025-22295\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tripetto WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto allows Stored XSS.This issue affects WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto: from n/a through 8.0.5.\npublished:2025-01-09T16:16:25.140"} {"instruction": "Please provide detailed information about CVE-2025-22307", "inputs": "", "outputs": "CVE:CVE-2025-22307\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeAstrology Team Product Table for WooCommerce allows Reflected XSS.This issue affects Product Table for WooCommerce: from n/a through 3.5.6.\npublished:2025-01-09T16:16:25.347"} {"instruction": "Please provide detailed information about CVE-2025-22313", "inputs": "", "outputs": "CVE:CVE-2025-22313\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS.This issue affects Widgetize Pages Light: from n/a through 3.0.\npublished:2025-01-09T16:16:25.653"} {"instruction": "Please provide detailed information about CVE-2025-22330", "inputs": "", "outputs": "CVE:CVE-2025-22330\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Waghmare MG Parallax Slider allows Reflected XSS.This issue affects MG Parallax Slider: from n/a through 1.0..\npublished:2025-01-09T16:16:25.840"} {"instruction": "Please provide detailed information about CVE-2025-22331", "inputs": "", "outputs": "CVE:CVE-2025-22331\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in P3JX Cf7Save Extension allows Reflected XSS.This issue affects Cf7Save Extension: from n/a through 1.\npublished:2025-01-09T16:16:26.180"} {"instruction": "Please provide detailed information about CVE-2025-22345", "inputs": "", "outputs": "CVE:CVE-2025-22345\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tobias Spiess TS Comfort DB allows Reflected XSS.This issue affects TS Comfort DB: from n/a through 2.0.7.\npublished:2025-01-09T16:16:26.620"} {"instruction": "Please provide detailed information about CVE-2025-22361", "inputs": "", "outputs": "CVE:CVE-2025-22361\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Opentracker Opentracker Analytics allows Reflected XSS.This issue affects Opentracker Analytics: from n/a through 1.3.\npublished:2025-01-09T16:16:26.830"} {"instruction": "Please provide detailed information about CVE-2025-22504", "inputs": "", "outputs": "CVE:CVE-2025-22504\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in jumpdemand 4ECPS Web Forms allows Upload a Web Shell to a Web Server.This issue affects 4ECPS Web Forms: from n/a through 0.2.18.\npublished:2025-01-09T16:16:27.110"} {"instruction": "Please provide detailed information about CVE-2025-22505", "inputs": "", "outputs": "CVE:CVE-2025-22505\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nabaraj Chapagain NC Wishlist for Woocommerce allows SQL Injection.This issue affects NC Wishlist for Woocommerce: from n/a through 1.0.1.\npublished:2025-01-09T16:16:27.280"} {"instruction": "Please provide detailed information about CVE-2025-22508", "inputs": "", "outputs": "CVE:CVE-2025-22508\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roninwp FAT Event Lite allows PHP Local File Inclusion.This issue affects FAT Event Lite: from n/a through 1.1.\npublished:2025-01-09T16:16:27.433"} {"instruction": "Please provide detailed information about CVE-2025-22510", "inputs": "", "outputs": "CVE:CVE-2025-22510\nDescription:Deserialization of Untrusted Data vulnerability in Konrad Karpieszuk WC Price History for Omnibus allows Object Injection.This issue affects WC Price History for Omnibus: from n/a through 2.1.4.\npublished:2025-01-09T16:16:27.590"} {"instruction": "Please provide detailed information about CVE-2025-22521", "inputs": "", "outputs": "CVE:CVE-2025-22521\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Farrell wp Hosting Performance Check allows Reflected XSS.This issue affects wp Hosting Performance Check: from n/a through 2.18.8.\npublished:2025-01-09T16:16:27.743"} {"instruction": "Please provide detailed information about CVE-2025-22527", "inputs": "", "outputs": "CVE:CVE-2025-22527\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yamna Khawaja Mailing Group Listserv allows SQL Injection.This issue affects Mailing Group Listserv: from n/a through 2.0.9.\npublished:2025-01-09T16:16:27.890"} {"instruction": "Please provide detailed information about CVE-2025-22535", "inputs": "", "outputs": "CVE:CVE-2025-22535\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jonathan Kern WPListCal allows SQL Injection.This issue affects WPListCal: from n/a through 1.3.5.\npublished:2025-01-09T16:16:28.047"} {"instruction": "Please provide detailed information about CVE-2025-22537", "inputs": "", "outputs": "CVE:CVE-2025-22537\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in traveller11 Google Maps Travel Route allows SQL Injection.This issue affects Google Maps Travel Route: from n/a through 1.3.1.\npublished:2025-01-09T16:16:28.210"} {"instruction": "Please provide detailed information about CVE-2025-22539", "inputs": "", "outputs": "CVE:CVE-2025-22539\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ka2 Custom DataBase Tables allows Reflected XSS.This issue affects Custom DataBase Tables: from n/a through 2.1.34.\npublished:2025-01-09T16:16:28.350"} {"instruction": "Please provide detailed information about CVE-2025-22540", "inputs": "", "outputs": "CVE:CVE-2025-22540\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sebastian Orellana Emailing Subscription allows Blind SQL Injection.This issue affects Emailing Subscription: from n/a through 1.4.1.\npublished:2025-01-09T16:16:28.503"} {"instruction": "Please provide detailed information about CVE-2025-22542", "inputs": "", "outputs": "CVE:CVE-2025-22542\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ofek Nakar Virtual Bot allows Blind SQL Injection.This issue affects Virtual Bot: from n/a through 1.0.0.\npublished:2025-01-09T16:16:28.670"} {"instruction": "Please provide detailed information about CVE-2025-22561", "inputs": "", "outputs": "CVE:CVE-2025-22561\nDescription:Missing Authorization vulnerability in Jason Funk Title Experiments Free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Title Experiments Free: from n/a through 9.0.4.\npublished:2025-01-09T16:16:28.827"} {"instruction": "Please provide detailed information about CVE-2025-22594", "inputs": "", "outputs": "CVE:CVE-2025-22594\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder – Sándor Fodor Better User Shortcodes allows Reflected XSS.This issue affects Better User Shortcodes: from n/a through 1.0.\npublished:2025-01-09T16:16:28.983"} {"instruction": "Please provide detailed information about CVE-2025-22595", "inputs": "", "outputs": "CVE:CVE-2025-22595\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Khawaja Mailing Group Listserv allows Reflected XSS.This issue affects Mailing Group Listserv: from n/a through 2.0.9.\npublished:2025-01-09T16:16:29.160"} {"instruction": "Please provide detailed information about CVE-2025-22801", "inputs": "", "outputs": "CVE:CVE-2025-22801\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes Free WooCommerce Theme 99fy Extension allows Stored XSS.This issue affects Free WooCommerce Theme 99fy Extension: from n/a through 1.2.8.\npublished:2025-01-09T16:16:29.323"} {"instruction": "Please provide detailed information about CVE-2025-22802", "inputs": "", "outputs": "CVE:CVE-2025-22802\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org Email Templates Customizer for WordPress – Drag And Drop Email Templates Builder – YeeMail allows Stored XSS.This issue affects Email Templates Customizer for WordPress – Drag And Drop Email Templates Builder – YeeMail: from n/a through 2.1.4.\npublished:2025-01-09T16:16:29.470"} {"instruction": "Please provide detailed information about CVE-2025-22803", "inputs": "", "outputs": "CVE:CVE-2025-22803\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme Advanced Product Information for WooCommerce allows Stored XSS.This issue affects Advanced Product Information for WooCommerce: from n/a through 1.1.4.\npublished:2025-01-09T16:16:29.627"} {"instruction": "Please provide detailed information about CVE-2025-22804", "inputs": "", "outputs": "CVE:CVE-2025-22804\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.23.\npublished:2025-01-09T16:16:29.787"} {"instruction": "Please provide detailed information about CVE-2025-22805", "inputs": "", "outputs": "CVE:CVE-2025-22805\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemePoints Skill Bar allows Stored XSS.This issue affects Skill Bar: from n/a through 1.2.\npublished:2025-01-09T16:16:29.937"} {"instruction": "Please provide detailed information about CVE-2025-22806", "inputs": "", "outputs": "CVE:CVE-2025-22806\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows DOM-Based XSS.This issue affects Black Widgets For Elementor: from n/a through 1.3.8.\npublished:2025-01-09T16:16:30.090"} {"instruction": "Please provide detailed information about CVE-2025-22807", "inputs": "", "outputs": "CVE:CVE-2025-22807\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Robert Peake Responsive Flickr Slideshow allows Stored XSS.This issue affects Responsive Flickr Slideshow: from n/a through 2.6.0.\npublished:2025-01-09T16:16:30.253"} {"instruction": "Please provide detailed information about CVE-2025-22808", "inputs": "", "outputs": "CVE:CVE-2025-22808\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Surbma Surbma | Premium WP allows DOM-Based XSS.This issue affects Surbma | Premium WP: from n/a through 9.0.\npublished:2025-01-09T16:16:30.403"} {"instruction": "Please provide detailed information about CVE-2025-22809", "inputs": "", "outputs": "CVE:CVE-2025-22809\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gravity Master PDF Catalog Woocommerce allows DOM-Based XSS.This issue affects PDF Catalog Woocommerce: from n/a through 2.0.\npublished:2025-01-09T16:16:30.557"} {"instruction": "Please provide detailed information about CVE-2025-22810", "inputs": "", "outputs": "CVE:CVE-2025-22810\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CBB Team Content Blocks Builder allows Stored XSS.This issue affects Content Blocks Builder: from n/a through 2.7.6.\npublished:2025-01-09T16:16:30.713"} {"instruction": "Please provide detailed information about CVE-2025-22811", "inputs": "", "outputs": "CVE:CVE-2025-22811\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Modeltheme MT Addons for Elementor allows Stored XSS.This issue affects MT Addons for Elementor: from n/a through 1.0.6.\npublished:2025-01-09T16:16:30.880"} {"instruction": "Please provide detailed information about CVE-2025-22812", "inputs": "", "outputs": "CVE:CVE-2025-22812\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs News Ticker Widget for Elementor allows Stored XSS.This issue affects News Ticker Widget for Elementor: from n/a through 1.3.2.\npublished:2025-01-09T16:16:31.047"} {"instruction": "Please provide detailed information about CVE-2025-22813", "inputs": "", "outputs": "CVE:CVE-2025-22813\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ChatBot for WordPress - WPBot Conversational Forms for ChatBot allows Stored XSS.This issue affects Conversational Forms for ChatBot: from n/a through 1.4.2.\npublished:2025-01-09T16:16:31.200"} {"instruction": "Please provide detailed information about CVE-2025-22814", "inputs": "", "outputs": "CVE:CVE-2025-22814\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Admin Theme allows Cross Site Request Forgery.This issue affects Zephyr Admin Theme: from n/a through 1.4.1.\npublished:2025-01-09T16:16:31.370"} {"instruction": "Please provide detailed information about CVE-2025-22815", "inputs": "", "outputs": "CVE:CVE-2025-22815\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins LLC Button Block allows Stored XSS.This issue affects Button Block: from n/a through 1.1.6.\npublished:2025-01-09T16:16:31.543"} {"instruction": "Please provide detailed information about CVE-2025-22817", "inputs": "", "outputs": "CVE:CVE-2025-22817\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Venutius BP Profile Shortcodes Extra allows Stored XSS.This issue affects BP Profile Shortcodes Extra: from n/a through 2.6.0.\npublished:2025-01-09T16:16:31.693"} {"instruction": "Please provide detailed information about CVE-2025-22818", "inputs": "", "outputs": "CVE:CVE-2025-22818\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in S3Bubble S3Player – WooCommerce & Elementor Integration allows Stored XSS.This issue affects S3Player – WooCommerce & Elementor Integration: from n/a through 4.2.1.\npublished:2025-01-09T16:16:31.850"} {"instruction": "Please provide detailed information about CVE-2025-22819", "inputs": "", "outputs": "CVE:CVE-2025-22819\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 4wpbari Qr Code and Barcode Scanner Reader allows Stored XSS.This issue affects Qr Code and Barcode Scanner Reader: from n/a through 1.0.0.\npublished:2025-01-09T16:16:32.000"} {"instruction": "Please provide detailed information about CVE-2025-22820", "inputs": "", "outputs": "CVE:CVE-2025-22820\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Walmsley VR Views allows Stored XSS.This issue affects VR Views: from n/a through 1.5.1.\npublished:2025-01-09T16:16:32.173"} {"instruction": "Please provide detailed information about CVE-2025-22821", "inputs": "", "outputs": "CVE:CVE-2025-22821\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vfthemes StorePress allows DOM-Based XSS.This issue affects StorePress: from n/a through 1.0.12.\npublished:2025-01-09T16:16:32.363"} {"instruction": "Please provide detailed information about CVE-2025-22822", "inputs": "", "outputs": "CVE:CVE-2025-22822\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bishawjit Das wp custom countdown allows Stored XSS.This issue affects wp custom countdown: from n/a through 2.8.\npublished:2025-01-09T16:16:32.557"} {"instruction": "Please provide detailed information about CVE-2025-22823", "inputs": "", "outputs": "CVE:CVE-2025-22823\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Twerdy Genesis Style Shortcodes allows DOM-Based XSS.This issue affects Genesis Style Shortcodes: from n/a through 1.0.\npublished:2025-01-09T16:16:32.717"} {"instruction": "Please provide detailed information about CVE-2025-22824", "inputs": "", "outputs": "CVE:CVE-2025-22824\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lucia Intelisano Live Flight Radar allows Stored XSS.This issue affects Live Flight Radar: from n/a through 1.0.\npublished:2025-01-09T16:16:32.893"} {"instruction": "Please provide detailed information about CVE-2025-22826", "inputs": "", "outputs": "CVE:CVE-2025-22826\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpecommerce, wp.insider Sell Digital Downloads allows Stored XSS.This issue affects Sell Digital Downloads: from n/a through 2.2.7.\npublished:2025-01-09T16:16:33.047"} {"instruction": "Please provide detailed information about CVE-2025-22827", "inputs": "", "outputs": "CVE:CVE-2025-22827\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joomag. WP Joomag allows DOM-Based XSS.This issue affects WP Joomag: from n/a through 2.5.2.\npublished:2025-01-09T16:16:33.200"} {"instruction": "Please provide detailed information about CVE-2025-21592", "inputs": "", "outputs": "CVE:CVE-2025-21592\nDescription:An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system. Through the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system. This issue affects Junos OS SRX Series: * All versions before 21.4R3-S8, * from 22.2 before 22.2R3-S5, * from 22.3 before 22.3R3-S3, * from 22.4 before 22.4R3-S2, * from 23.2 before 23.2R2-S1, * from 23.4 before 23.4R2.\npublished:2025-01-09T17:15:18.203"} {"instruction": "Please provide detailed information about CVE-2025-21593", "inputs": "", "outputs": "CVE:CVE-2025-21593\nDescription:An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS). On devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet which will cause the rpd to crash and restart. Continued receipt of these UPDATE packets will cause a sustained DoS condition.  This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects Junos OS:  * All versions before 21.2R3-S9,  * from 21.4 before 21.4R3-S10,  * from 22.2 before 22.2R3-S5,  * from 22.3 before 22.3R3-S4,  * from 22.4 before 22.4R3-S3,  * from 23.2 before 23.2R2-S2,  * from 23.4 before 23.4R2; and Junos OS Evolved:  * All versions before 21.2R3-S9-EVO,  * from 21.4-EVO before 21.4R3-S10-EVO,  * from 22.2-EVO before 22.2R3-S5-EVO,  * from 22.3-EVO before 22.3R3-S4-EVO,  * from 22.4-EVO before 22.4R3-S3-EVO, * from 23.2-EVO before 23.2R2-S2-EVO,  * from 23.4-EVO before 23.4R2-EVO.\npublished:2025-01-09T17:15:18.380"} {"instruction": "Please provide detailed information about CVE-2025-21596", "inputs": "", "outputs": "CVE:CVE-2025-21596\nDescription:An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system. This issue affects Junos OS on SRX1500, SRX4100, SRX4200:  * All versions before 21.4R3-S9,  * from 22.2 before 22.2R3-S5,  * from 22.3 before 22.3R3-S4,  * from 22.4 before 22.4R3-S4,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S1.\npublished:2025-01-09T17:15:18.593"} {"instruction": "Please provide detailed information about CVE-2025-21599", "inputs": "", "outputs": "CVE:CVE-2025-21599\nDescription:A Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.  Receipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS). Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition. This issue only affects systems configured with IPv6. This issue affects Junos OS Evolved:  * from 22.4-EVO before 22.4R3-S5-EVO,  * from 23.2-EVO before 23.2R2-S2-EVO,  * from 23.4-EVO before 23.4R2-S2-EVO,  * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO.\npublished:2025-01-09T17:15:18.770"} {"instruction": "Please provide detailed information about CVE-2025-21600", "inputs": "", "outputs": "CVE:CVE-2025-21600\nDescription:An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems configured in either of two ways: * systems with BGP traceoptions enabled * systems with BGP family traffic-engineering (BGP-LS) configured and can be exploited from a directly connected and configured BGP peer.  This issue affects iBGP and eBGP with any address family configured, and both IPv4 and IPv6 are affected by this vulnerability. This issue affects: Junos OS:  * from 21.4 before 21.4R3-S9,  * from 22.2 before 22.2R3-S5,  * from 22.3 before 22.3R3-S4,  * from 22.4 before 22.4R3-S5,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S3,  * from 24.2 before 24.2R1-S2, 24.2R2;  Junos OS Evolved:  * from 21.4-EVO before 21.4R3-S9-EVO,  * from 22.2-EVO before 22.2R3-S5-EVO,  * from 22.3-EVO before 22.3R3-S4-EVO,  * from 22.4-EVO before 22.4R3-S5-EVO,  * from 23.2-EVO before 23.2R2-S3-EVO,  * from 23.4-EVO before 23.4R2-S2-EVO,  * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue does not affect versions of Junos OS prior to 21.3R1. This issue does not affect versions of Junos OS Evolved prior to 21.3R1-EVO. This is a similar, but different vulnerability than the issue reported as CVE-2024-39516.\npublished:2025-01-09T17:15:18.960"} {"instruction": "Please provide detailed information about CVE-2025-21602", "inputs": "", "outputs": "CVE:CVE-2025-21602\nDescription:An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability. This issue affects Junos OS:  * from 21.4 before 21.4R3-S9,  * from 22.2 before 22.2R3-S5,  * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S5,  * from 23.2 before 23.2R2-S3,  * from 23.4 before 23.4R2-S3,  * from 24.2 before 24.2R1-S2, 24.2R2;  This issue does not affect versions prior to 21.1R1. Junos OS Evolved:  * from 21.4 before 21.4R3-S9-EVO,  * from 22.2 before 22.2R3-S5-EVO,  * from 22.3 before 22.3R3-S4-EVO, * from 22.4 before 22.4R3-S5-EVO,  * from 23.2 before 23.2R2-S3-EVO,  * from 23.4 before 23.4R2-S3-EVO,  * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO. This issue does not affect versions prior to 21.1R1-EVO\npublished:2025-01-09T17:15:19.150"} {"instruction": "Please provide detailed information about CVE-2025-21628", "inputs": "", "outputs": "CVE:CVE-2025-21628\nDescription:Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.\npublished:2025-01-09T18:15:30.070"} {"instruction": "Please provide detailed information about CVE-2025-22149", "inputs": "", "outputs": "CVE:CVE-2025-22149\nDescription:JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value).\npublished:2025-01-09T18:15:30.233"} {"instruction": "Please provide detailed information about CVE-2025-21598", "inputs": "", "outputs": "CVE:CVE-2025-21598\nDescription:An Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd. This issue affects: Junos OS:  * from 21.2R3-S8 before 21.2R3-S9,  * from 21.4R3-S7 before 21.4R3-S9,  * from 22.2R3-S4 before 22.2R3-S5,  * from 22.3R3-S2 before 22.3R3-S4,  * from 22.4R3 before 22.4R3-S5,  * from 23.2R2 before 23.2R2-S2,  * from 23.4R1 before 23.4R2-S1,  * from 24.2R1 before 24.2R1-S1, 24.2R2. Junos OS Evolved: * from 21.4R3-S7-EVO before 21.4R3-S9-EVO,  * from 22.2R3-S4-EVO before 22.2R3-S5-EVO,  * from 22.3R3-S2-EVO before 22.3R3-S4-EVO,  * from 22.4R3-EVO before 22.4R3-S5-EVO,  * from 23.2R2-EVO before 23.2R2-S2-EVO,  * from 23.4R1-EVO before 23.4R2-S1-EVO,  * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO. This issue requires a BGP session to be established. This issue can propagate and multiply through multiple ASes until reaching vulnerable devices. This issue affects iBGP and eBGP. This issue affects IPv4 and IPv6. An indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue: For example, by issuing the command on the neighboring device:  show log messages Reviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:   rpd[]: Received malformed update from (External AS ) and   rpd[]: Malformed Attribute\npublished:2025-01-09T19:15:20.123"} {"instruction": "Please provide detailed information about CVE-2025-22151", "inputs": "", "outputs": "CVE:CVE-2025-22151\nDescription:Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0.\npublished:2025-01-09T19:15:20.410"} {"instruction": "Please provide detailed information about CVE-2025-21385", "inputs": "", "outputs": "CVE:CVE-2025-21385\nDescription:A Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows an authorized attacker to disclose information over a network.\npublished:2025-01-09T22:15:29.980"} {"instruction": "Please provide detailed information about CVE-2025-21380", "inputs": "", "outputs": "CVE:CVE-2025-21380\nDescription:Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network.\npublished:2025-01-09T23:15:08.340"} {"instruction": "Please provide detailed information about CVE-2025-0311", "inputs": "", "outputs": "CVE:CVE-2025-0311\nDescription:The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table widget in all versions up to, and including, 2.10.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-10T07:15:08.507"} {"instruction": "Please provide detailed information about CVE-2025-23016", "inputs": "", "outputs": "CVE:CVE-2025-23016\nDescription:FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.\npublished:2025-01-10T12:15:25.480"} {"instruction": "Please provide detailed information about CVE-2025-22946", "inputs": "", "outputs": "CVE:CVE-2025-22946\nDescription:Tenda ac9 v1.0 firmware v15.03.05.19 contains a stack overflow vulnerability in /goform/SetOnlineDevName, which may lead to remote arbitrary code execution.\npublished:2025-01-10T15:15:16.710"} {"instruction": "Please provide detailed information about CVE-2025-23022", "inputs": "", "outputs": "CVE:CVE-2025-23022\nDescription:FreeType 2.8.1 has a signed integer overflow in cf2_doFlex in cff/cf2intrp.c.\npublished:2025-01-10T15:15:16.967"} {"instruction": "Please provide detailed information about CVE-2025-22152", "inputs": "", "outputs": "CVE:CVE-2025-22152\nDescription:Atheos is a self-hosted browser-based cloud IDE. Prior to v600, the $path and $target parameters are not properly validated across multiple components, allowing an attacker to read, modify, or execute arbitrary files on the server. These vulnerabilities can be exploited through various attack vectors present in multiple PHP files. This vulnerability is fixed in v600.\npublished:2025-01-10T16:15:29.910"} {"instruction": "Please provide detailed information about CVE-2025-22596", "inputs": "", "outputs": "CVE:CVE-2025-22596\nDescription:WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the modulos_visiveis.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8.\npublished:2025-01-10T16:15:30.143"} {"instruction": "Please provide detailed information about CVE-2025-22597", "inputs": "", "outputs": "CVE:CVE-2025-22597\nDescription:WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the CobrancaController.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8.\npublished:2025-01-10T16:15:30.343"} {"instruction": "Please provide detailed information about CVE-2025-22598", "inputs": "", "outputs": "CVE:CVE-2025-22598\nDescription:WeGIA is a web manager for charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the cadastrarSocio.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the local_recepcao parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.8.\npublished:2025-01-10T16:15:30.540"} {"instruction": "Please provide detailed information about CVE-2025-22599", "inputs": "", "outputs": "CVE:CVE-2025-22599\nDescription:WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the home.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the msg_c parameter. This vulnerability is fixed in 3.2.8.\npublished:2025-01-10T16:15:30.737"} {"instruction": "Please provide detailed information about CVE-2025-22600", "inputs": "", "outputs": "CVE:CVE-2025-22600\nDescription:WeGIA is a web manager for charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the configuracao_doacao.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the avulso parameter. This vulnerability is fixed in 3.2.8.\npublished:2025-01-10T16:15:30.940"} {"instruction": "Please provide detailed information about CVE-2025-22949", "inputs": "", "outputs": "CVE:CVE-2025-22949\nDescription:Tenda ac9 v1.0 firmware v15.03.05.19 is vulnerable to command injection in /goform/SetSambaCfg, which may lead to remote arbitrary code execution.\npublished:2025-01-10T16:15:31.137"} {"instruction": "Please provide detailed information about CVE-2025-23078", "inputs": "", "outputs": "CVE:CVE-2025-23078\nDescription:Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - Breadcrumbs2 extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Breadcrumbs2 extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.5, from 1.42.X before 1.42.4.\npublished:2025-01-10T18:15:26.877"} {"instruction": "Please provide detailed information about CVE-2025-23079", "inputs": "", "outputs": "CVE:CVE-2025-23079\nDescription:Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - ArticleFeedbackv5 extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - ArticleFeedbackv5 extension: from 1.42.X before 1.42.2.\npublished:2025-01-10T19:15:38.353"} {"instruction": "Please provide detailed information about CVE-2025-23110", "inputs": "", "outputs": "CVE:CVE-2025-23110\nDescription:An issue was discovered in REDCap 14.9.6. A Reflected cross-site scripting (XSS) vulnerability in the email-subject field exists while performing an upload of a CSV file containing a list of alert configurations. An attacker can send the victim a CSV file containing the XSS payload in the email-subject. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim clicks on the email-subject value, it triggers the XSS payload.\npublished:2025-01-10T22:15:27.550"} {"instruction": "Please provide detailed information about CVE-2025-23111", "inputs": "", "outputs": "CVE:CVE-2025-23111\nDescription:An issue was discovered in REDCap 14.9.6. It allows HTML Injection via the Survey field name, exposing users to a redirection to a phishing website. An attacker can exploit this to trick the user that receives the survey into clicking on the field name, which redirects them to a phishing website. Thus, this allows malicious actions to be executed without user consent.\npublished:2025-01-10T22:15:27.723"} {"instruction": "Please provide detailed information about CVE-2025-23112", "inputs": "", "outputs": "CVE:CVE-2025-23112\nDescription:An issue was discovered in REDCap 14.9.6. A stored cross-site scripting (XSS) vulnerability allows authenticated users to inject malicious scripts into the Survey field name of Survey. When a user receive the survey, if he clicks on the field name, it triggers the XSS payload.\npublished:2025-01-10T22:15:27.863"} {"instruction": "Please provide detailed information about CVE-2025-23113", "inputs": "", "outputs": "CVE:CVE-2025-23113\nDescription:An issue was discovered in REDCap 14.9.6. It has an action=myprojects&logout=1 CSRF issue in the alert-title while performing an upload of a CSV file containing a list of alert configuration. An attacker can send the victim a CSV file containing an HTML injection payload in the alert-title. Once the victim uploads the file, he automatically lands on a page to view the uploaded data. If the victim click on the alert-title value, it can trigger a logout request and terminates their session, or redirect to a phishing website. This vulnerability stems from the absence of CSRF protections on the logout functionality.\npublished:2025-01-10T22:15:28.023"} {"instruction": "Please provide detailed information about CVE-2025-0103", "inputs": "", "outputs": "CVE:CVE-2025-0103\nDescription:An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system.\npublished:2025-01-11T03:15:22.020"} {"instruction": "Please provide detailed information about CVE-2025-0104", "inputs": "", "outputs": "CVE:CVE-2025-0104\nDescription:A reflected cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition enables attackers to execute malicious JavaScript code in the context of an authenticated Expedition user’s browser if that authenticated user clicks a malicious link that allows phishing attacks and could lead to Expedition browser-session theft.\npublished:2025-01-11T03:15:22.183"} {"instruction": "Please provide detailed information about CVE-2025-0105", "inputs": "", "outputs": "CVE:CVE-2025-0105\nDescription:An arbitrary file deletion vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host filesystem.\npublished:2025-01-11T03:15:22.317"} {"instruction": "Please provide detailed information about CVE-2025-0106", "inputs": "", "outputs": "CVE:CVE-2025-0106\nDescription:A wildcard expansion vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to enumerate files on the host filesystem.\npublished:2025-01-11T03:15:22.490"} {"instruction": "Please provide detailed information about CVE-2025-0107", "inputs": "", "outputs": "CVE:CVE-2025-0107\nDescription:An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.\npublished:2025-01-11T03:15:22.637"} {"instruction": "Please provide detailed information about CVE-2025-23108", "inputs": "", "outputs": "CVE:CVE-2025-23108\nDescription:Opening Javascript links in a new tab via long-press in the Firefox iOS client could result in a malicious script spoofing the URL of the new tab. This vulnerability affects Firefox for iOS < 134.\npublished:2025-01-11T04:15:06.280"} {"instruction": "Please provide detailed information about CVE-2025-23109", "inputs": "", "outputs": "CVE:CVE-2025-23109\nDescription:Long hostnames in URLs could be leveraged to obscure the actual host of the website or spoof the website address This vulnerability affects Firefox for iOS < 134.\npublished:2025-01-11T04:15:06.367"} {"instruction": "Please provide detailed information about CVE-2025-0390", "inputs": "", "outputs": "CVE:CVE-2025-0390\nDescription:A vulnerability classified as critical was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This vulnerability affects unknown code of the file /wmOmNoticeHController.do. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component.\npublished:2025-01-11T08:15:26.527"} {"instruction": "Please provide detailed information about CVE-2025-0391", "inputs": "", "outputs": "CVE:CVE-2025-0391\nDescription:A vulnerability, which was classified as critical, has been found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This issue affects the function saveOrUpdate of the file org/jeecgframework/web/cgform/controller/build/CgFormBuildController. java. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component.\npublished:2025-01-11T09:15:05.937"} {"instruction": "Please provide detailed information about CVE-2025-0392", "inputs": "", "outputs": "CVE:CVE-2025-0392\nDescription:A vulnerability, which was classified as critical, was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. Affected is the function datagridGraph of the file /graphReportController.do. The manipulation of the argument store_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component.\npublished:2025-01-11T11:15:06.657"} {"instruction": "Please provide detailed information about CVE-2025-23124", "inputs": "", "outputs": "CVE:CVE-2025-23124\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-11T15:15:08.930"} {"instruction": "Please provide detailed information about CVE-2025-23125", "inputs": "", "outputs": "CVE:CVE-2025-23125\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-11T15:15:09.023"} {"instruction": "Please provide detailed information about CVE-2025-23126", "inputs": "", "outputs": "CVE:CVE-2025-23126\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-11T15:15:09.100"} {"instruction": "Please provide detailed information about CVE-2025-23127", "inputs": "", "outputs": "CVE:CVE-2025-23127\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-11T15:15:09.173"} {"instruction": "Please provide detailed information about CVE-2025-23128", "inputs": "", "outputs": "CVE:CVE-2025-23128\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-11T15:15:09.250"} {"instruction": "Please provide detailed information about CVE-2025-0396", "inputs": "", "outputs": "CVE:CVE-2025-0396\nDescription:A vulnerability, which was classified as critical, has been found in exelban stats up to 2.11.21. This issue affects the function shouldAcceptNewConnection of the component XPC Service. The manipulation leads to command injection. It is possible to launch the attack on the local host. Upgrading to version 2.11.22 is able to address this issue. It is recommended to upgrade the affected component.\npublished:2025-01-12T12:15:17.963"} {"instruction": "Please provide detailed information about CVE-2025-0397", "inputs": "", "outputs": "CVE:CVE-2025-0397\nDescription:A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-12T13:15:07.333"} {"instruction": "Please provide detailed information about CVE-2025-0398", "inputs": "", "outputs": "CVE:CVE-2025-0398\nDescription:A vulnerability has been found in longpi1 warehouse 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /resources/..;/inport/updateInport of the component Backend. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-12T14:15:08.993"} {"instruction": "Please provide detailed information about CVE-2025-0399", "inputs": "", "outputs": "CVE:CVE-2025-0399\nDescription:A vulnerability was found in StarSea99 starsea-mall 1.0. It has been declared as critical. This vulnerability affects the function UploadController of the file src/main/java/com/siro/mall/controller/common/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-12T23:15:07.050"} {"instruction": "Please provide detailed information about CVE-2025-0400", "inputs": "", "outputs": "CVE:CVE-2025-0400\nDescription:A vulnerability was found in StarSea99 starsea-mall 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/categories/update. The manipulation of the argument categoryName leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-12T23:15:07.260"} {"instruction": "Please provide detailed information about CVE-2025-0401", "inputs": "", "outputs": "CVE:CVE-2025-0401\nDescription:A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T00:15:06.807"} {"instruction": "Please provide detailed information about CVE-2025-0402", "inputs": "", "outputs": "CVE:CVE-2025-0402\nDescription:A vulnerability classified as critical was found in 1902756969 reggie 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T00:15:07.707"} {"instruction": "Please provide detailed information about CVE-2025-0403", "inputs": "", "outputs": "CVE:CVE-2025-0403\nDescription:A vulnerability, which was classified as problematic, has been found in 1902756969 reggie 1.0. Affected by this issue is some unknown functionality of the file /user/sendMsg of the component Phone Number Validation Handler. The manipulation of the argument code leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T00:15:07.873"} {"instruction": "Please provide detailed information about CVE-2025-0404", "inputs": "", "outputs": "CVE:CVE-2025-0404\nDescription:A vulnerability has been found in liujianview gymxmjpa 1.0 and classified as critical. This vulnerability affects the function CoachController of the file src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. The manipulation of the argument coachName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T01:15:07.227"} {"instruction": "Please provide detailed information about CVE-2025-0405", "inputs": "", "outputs": "CVE:CVE-2025-0405\nDescription:A vulnerability was found in liujianview gymxmjpa 1.0 and classified as critical. This issue affects the function GoodsDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/GoodsController.java. The manipulation of the argument goodsName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T01:15:07.430"} {"instruction": "Please provide detailed information about CVE-2025-0406", "inputs": "", "outputs": "CVE:CVE-2025-0406\nDescription:A vulnerability was found in liujianview gymxmjpa 1.0. It has been classified as critical. Affected is the function SubjectDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/SubjectController.java. The manipulation of the argument subname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T02:15:07.490"} {"instruction": "Please provide detailed information about CVE-2025-0407", "inputs": "", "outputs": "CVE:CVE-2025-0407\nDescription:A vulnerability was found in liujianview gymxmjpa 1.0. It has been declared as critical. Affected by this vulnerability is the function EquipmentDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/EquipmentController.java. The manipulation of the argument hyname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T02:15:07.667"} {"instruction": "Please provide detailed information about CVE-2025-0408", "inputs": "", "outputs": "CVE:CVE-2025-0408\nDescription:A vulnerability was found in liujianview gymxmjpa 1.0. It has been rated as critical. Affected by this issue is the function LoosDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/LoosController.java. The manipulation of the argument loosName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T02:15:07.840"} {"instruction": "Please provide detailed information about CVE-2025-0409", "inputs": "", "outputs": "CVE:CVE-2025-0409\nDescription:A vulnerability classified as critical has been found in liujianview gymxmjpa 1.0. This affects the function MembertypeDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/MembertypeController.java. The manipulation of the argument typeName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T03:15:06.667"} {"instruction": "Please provide detailed information about CVE-2025-0410", "inputs": "", "outputs": "CVE:CVE-2025-0410\nDescription:A vulnerability classified as critical was found in liujianview gymxmjpa 1.0. This vulnerability affects the function MenberDaoInpl of the file src/main/java/com/liujian/gymxmjpa/controller/MenberConntroller.java. The manipulation of the argument hyname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-13T03:15:06.847"} {"instruction": "Please provide detailed information about CVE-2025-0412", "inputs": "", "outputs": "CVE:CVE-2025-0412\nDescription:Luxion KeyShot Viewer KSP File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22139.\npublished:2025-01-13T04:15:06.477"} {"instruction": "Please provide detailed information about CVE-2025-22828", "inputs": "", "outputs": "CVE:CVE-2025-22828\nDescription:CloudStack users can add and read comments (annotations) on resources they are authorised to access.  Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource UUIDs can list and add comments (annotations) to such resources.  An attacker with a user-account and access or prior knowledge of resource UUIDs may exploit this issue to read contents of the comments (annotations) or add malicious comments (annotations) to such resources.  This may cause potential loss of confidentiality of CloudStack environments and resources if the comments (annotations) contain any privileged information. However, guessing or brute-forcing resource UUIDs are generally hard to impossible and access to listing or adding comments isn't same as access to CloudStack resources, making this issue of very low severity and general low impact. CloudStack admins may also disallow listAnnotations and addAnnotation API access to non-admin roles in their environment as an interim measure.\npublished:2025-01-13T13:16:12.233"} {"instruction": "Please provide detailed information about CVE-2025-22314", "inputs": "", "outputs": "CVE:CVE-2025-22314\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Scripts Food Store – Online Food Delivery & Pickup allows Reflected XSS.This issue affects Food Store – Online Food Delivery & Pickup: from n/a through 1.5.1.\npublished:2025-01-13T14:15:10.270"} {"instruction": "Please provide detailed information about CVE-2025-22337", "inputs": "", "outputs": "CVE:CVE-2025-22337\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Infosoft Consultant Order Audit Log for WooCommerce allows Reflected XSS.This issue affects Order Audit Log for WooCommerce: from n/a through 2.0.\npublished:2025-01-13T14:15:10.440"} {"instruction": "Please provide detailed information about CVE-2025-22344", "inputs": "", "outputs": "CVE:CVE-2025-22344\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Convoy Media Category Library allows Reflected XSS.This issue affects Media Category Library: from n/a through 2.7.\npublished:2025-01-13T14:15:10.613"} {"instruction": "Please provide detailed information about CVE-2025-22498", "inputs": "", "outputs": "CVE:CVE-2025-22498\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5.\npublished:2025-01-13T14:15:10.787"} {"instruction": "Please provide detailed information about CVE-2025-22499", "inputs": "", "outputs": "CVE:CVE-2025-22499\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FAKTOR VIER F4 Post Tree allows Reflected XSS.This issue affects F4 Post Tree: from n/a through 1.1.18.\npublished:2025-01-13T14:15:10.960"} {"instruction": "Please provide detailed information about CVE-2025-22506", "inputs": "", "outputs": "CVE:CVE-2025-22506\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SmartAgenda Smart Agenda allows Stored XSS.This issue affects Smart Agenda: from n/a through 4.7.\npublished:2025-01-13T14:15:11.127"} {"instruction": "Please provide detailed information about CVE-2025-22514", "inputs": "", "outputs": "CVE:CVE-2025-22514\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yamna Tatheer KNR Author List Widget allows Reflected XSS.This issue affects KNR Author List Widget: from n/a through 3.1.1.\npublished:2025-01-13T14:15:11.290"} {"instruction": "Please provide detailed information about CVE-2025-22567", "inputs": "", "outputs": "CVE:CVE-2025-22567\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in trustist TRUSTist REVIEWer allows Reflected XSS.This issue affects TRUSTist REVIEWer: from n/a through 2.0.\npublished:2025-01-13T14:15:11.460"} {"instruction": "Please provide detailed information about CVE-2025-22568", "inputs": "", "outputs": "CVE:CVE-2025-22568\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paramveer Singh for Arete IT Private Limited Post And Page Reactions allows Reflected XSS.This issue affects Post And Page Reactions: from n/a through 1.0.5.\npublished:2025-01-13T14:15:11.610"} {"instruction": "Please provide detailed information about CVE-2025-22569", "inputs": "", "outputs": "CVE:CVE-2025-22569\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grandslambert Featured Page Widget allows Reflected XSS.This issue affects Featured Page Widget: from n/a through 2.2.\npublished:2025-01-13T14:15:11.787"} {"instruction": "Please provide detailed information about CVE-2025-22570", "inputs": "", "outputs": "CVE:CVE-2025-22570\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Miloš Đekić Inline Tweets allows Stored XSS.This issue affects Inline Tweets: from n/a through 2.0.\npublished:2025-01-13T14:15:11.940"} {"instruction": "Please provide detailed information about CVE-2025-22576", "inputs": "", "outputs": "CVE:CVE-2025-22576\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcus Downing Site PIN allows Reflected XSS.This issue affects Site PIN: from n/a through 1.3.\npublished:2025-01-13T14:15:12.117"} {"instruction": "Please provide detailed information about CVE-2025-22583", "inputs": "", "outputs": "CVE:CVE-2025-22583\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anshul Sojatia Scan External Links allows Reflected XSS.This issue affects Scan External Links: from n/a through 1.0.\npublished:2025-01-13T14:15:12.300"} {"instruction": "Please provide detailed information about CVE-2025-22586", "inputs": "", "outputs": "CVE:CVE-2025-22586\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Detlef Stöver WPEX Replace DB Urls allows Reflected XSS.This issue affects WPEX Replace DB Urls: from n/a through 0.4.0.\npublished:2025-01-13T14:15:12.490"} {"instruction": "Please provide detailed information about CVE-2025-22588", "inputs": "", "outputs": "CVE:CVE-2025-22588\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scanventory.net Scanventory allows Reflected XSS.This issue affects Scanventory: from n/a through 1.1.3.\npublished:2025-01-13T14:15:12.660"} {"instruction": "Please provide detailed information about CVE-2025-22777", "inputs": "", "outputs": "CVE:CVE-2025-22777\nDescription:Deserialization of Untrusted Data vulnerability in GiveWP GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.19.3.\npublished:2025-01-13T14:15:12.900"} {"instruction": "Please provide detailed information about CVE-2025-22800", "inputs": "", "outputs": "CVE:CVE-2025-22800\nDescription:Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11.\npublished:2025-01-13T14:15:13.067"} {"instruction": "Please provide detailed information about CVE-2025-22963", "inputs": "", "outputs": "CVE:CVE-2025-22963\nDescription:Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin.\npublished:2025-01-13T16:15:19.367"} {"instruction": "Please provide detailed information about CVE-2025-22142", "inputs": "", "outputs": "CVE:CVE-2025-22142\nDescription:NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T20:15:29.677"} {"instruction": "Please provide detailed information about CVE-2025-22144", "inputs": "", "outputs": "CVE:CVE-2025-22144\nDescription:NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T20:15:29.817"} {"instruction": "Please provide detailed information about CVE-2025-23026", "inputs": "", "outputs": "CVE:CVE-2025-23026\nDescription:jte (Java Template Engine) is a secure and lightweight template engine for Java and Kotlin. In affected versions Jte HTML templates with `script` tags or script attributes that include a Javascript template string (backticks) are subject to XSS. The `javaScriptBlock` and `javaScriptAttribute` methods in the `Escape` class do not escape backticks, which are used for Javascript template strings. Dollar signs in template strings should also be escaped as well to prevent undesired interpolation. HTML templates rendered by Jte's `OwaspHtmlTemplateOutput` in versions less than or equal to `3.1.15` with `script` tags or script attributes that contain Javascript template strings (backticks) are vulnerable. Users are advised to upgrade to version 3.1.16 or later to resolve this issue. There are no known workarounds for this vulnerability.\npublished:2025-01-13T20:15:30.003"} {"instruction": "Please provide detailed information about CVE-2025-23027", "inputs": "", "outputs": "CVE:CVE-2025-23027\nDescription:next-forge is a Next.js project boilerplate for modern web application. The BASEHUB_TOKEN commited in apps/web/.env.example. Users should avoid use of this token and should remove any access it may have in their systems.\npublished:2025-01-13T20:15:30.150"} {"instruction": "Please provide detailed information about CVE-2025-22134", "inputs": "", "outputs": "CVE:CVE-2025-22134\nDescription:When switching to other buffers using the :all command and visual mode still being active, this may cause a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try to access a position if the position is greater than the corresponding buffer line. Impact is medium since the user must have switched on visual mode when executing the :all ex command. The Vim project would like to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch v9.1.1003\npublished:2025-01-13T21:15:14.333"} {"instruction": "Please provide detailed information about CVE-2025-22138", "inputs": "", "outputs": "CVE:CVE-2025-22138\nDescription:@codidact/qpixel is a Q&A-based community knowledge-sharing software. In affected versions when a category is set to private or limited-visibility within QPixel's admin tools, suggested edits within this category can still be viewed by unprivileged or anonymous users via the suggested edit queue. This issue has not yet been patched and no workarounds are available. Users are advised to follow the development repo for updates. ### Patches Not yet patched. ### Workarounds None available. Private or limited-visibility categories should not be considered ways to store sensitive information. ### References Internal: [SUPPORT-114](https://codidact.atlassian.net/issues/SUPPORT-114)\npublished:2025-01-13T21:15:14.500"} {"instruction": "Please provide detailed information about CVE-2025-22613", "inputs": "", "outputs": "CVE:CVE-2025-22613\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `informacao_adicional.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `informacao_adicional.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:14.837"} {"instruction": "Please provide detailed information about CVE-2025-22614", "inputs": "", "outputs": "CVE:CVE-2025-22614\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `dependente_editarInfoPessoal.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `nome` and `SobrenomeForm`parameters. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `dependente_editarInfoPessoal.php` parameters. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:14.967"} {"instruction": "Please provide detailed information about CVE-2025-22615", "inputs": "", "outputs": "CVE:CVE-2025-22615\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `Cadastro_Atendido.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `cpf` parameter. The application fails to validate and sanitize user inputs in the `cpf` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:15.110"} {"instruction": "Please provide detailed information about CVE-2025-22616", "inputs": "", "outputs": "CVE:CVE-2025-22616\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `dependente_parentesco_adicionar.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `dependente_parentesco_adicionar.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:15.237"} {"instruction": "Please provide detailed information about CVE-2025-22617", "inputs": "", "outputs": "CVE:CVE-2025-22617\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `editar_socio.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `socio` parameter. The application fails to validate and sanitize user inputs in the `socio` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.7 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:15.370"} {"instruction": "Please provide detailed information about CVE-2025-22618", "inputs": "", "outputs": "CVE:CVE-2025-22618\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_cargo.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `cargo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_cargo.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in release version 3.2.6 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:15.500"} {"instruction": "Please provide detailed information about CVE-2025-22619", "inputs": "", "outputs": "CVE:CVE-2025-22619\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `editar_permissoes.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `msg_c` parameter. The application fails to validate and sanitize user inputs in the `msg_c` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in release version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-13T21:15:15.620"} {"instruction": "Please provide detailed information about CVE-2025-0053", "inputs": "", "outputs": "CVE:CVE-2025-0053\nDescription:SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker to gain unauthorized access to system information. By using a specific URL parameter, an unauthenticated attacker could retrieve details such as system configuration. This has a limited impact on the confidentiality of the application and may be leveraged to facilitate further attacks or exploits.\npublished:2025-01-14T01:15:15.403"} {"instruction": "Please provide detailed information about CVE-2025-0055", "inputs": "", "outputs": "CVE:CVE-2025-0055\nDescription:SAP GUI for Windows stores user input on the client PC to improve usability. Under very specific circumstances an attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.\npublished:2025-01-14T01:15:15.570"} {"instruction": "Please provide detailed information about CVE-2025-0056", "inputs": "", "outputs": "CVE:CVE-2025-0056\nDescription:SAP GUI for Java saves user input on the client PC to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.\npublished:2025-01-14T01:15:15.730"} {"instruction": "Please provide detailed information about CVE-2025-0057", "inputs": "", "outputs": "CVE:CVE-2025-0057\nDescription:SAP NetWeaver AS JAVA (User Admin Application) is vulnerable to stored cross site scripting vulnerability. An attacker posing as an admin can upload a photo with malicious JS content. When a victim visits the vulnerable component, the attacker can read and modify information within the scope of victim's web browser.\npublished:2025-01-14T01:15:15.883"} {"instruction": "Please provide detailed information about CVE-2025-0058", "inputs": "", "outputs": "CVE:CVE-2025-0058\nDescription:In SAP Business Workflow and SAP Flexible Workflow, an authenticated attacker can manipulate a parameter in an otherwise legitimate resource request to view sensitive information that should otherwise be restricted. The attacker does not have the ability to modify the information or to make the information unavailable.\npublished:2025-01-14T01:15:16.040"} {"instruction": "Please provide detailed information about CVE-2025-0059", "inputs": "", "outputs": "CVE:CVE-2025-0059\nDescription:Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.\npublished:2025-01-14T01:15:16.190"} {"instruction": "Please provide detailed information about CVE-2025-0060", "inputs": "", "outputs": "CVE:CVE-2025-0060\nDescription:SAP BusinessObjects Business Intelligence Platform allows an authenticated user with restricted access to inject malicious JS code which can read sensitive information from the server and send it to the attacker. The attacker could further use this information to impersonate as a high privileged user causing high impact on confidentiality and integrity of the application.\npublished:2025-01-14T01:15:16.350"} {"instruction": "Please provide detailed information about CVE-2025-0061", "inputs": "", "outputs": "CVE:CVE-2025-0061\nDescription:SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application.\npublished:2025-01-14T01:15:16.500"} {"instruction": "Please provide detailed information about CVE-2025-0063", "inputs": "", "outputs": "CVE:CVE-2025-0063\nDescription:SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability.\npublished:2025-01-14T01:15:16.633"} {"instruction": "Please provide detailed information about CVE-2025-0066", "inputs": "", "outputs": "CVE:CVE-2025-0066\nDescription:Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application\npublished:2025-01-14T01:15:16.783"} {"instruction": "Please provide detailed information about CVE-2025-0067", "inputs": "", "outputs": "CVE:CVE-2025-0067\nDescription:Due to a missing authorization check on service endpoints in the SAP NetWeaver Application Server Java, an attacker with standard user role can create JCo connection entries, which are used for remote function calls from or to the application server. This could lead to low impact on confidentiality, integrity, and availability of the application.\npublished:2025-01-14T01:15:16.950"} {"instruction": "Please provide detailed information about CVE-2025-0068", "inputs": "", "outputs": "CVE:CVE-2025-0068\nDescription:An obsolete functionality in SAP NetWeaver Application Server ABAP did not perform necessary authorization checks. Because of this, an authenticated attacker could obtain information that would otherwise be restricted. It has no impact on integrity or availability on the application.\npublished:2025-01-14T01:15:17.107"} {"instruction": "Please provide detailed information about CVE-2025-0069", "inputs": "", "outputs": "CVE:CVE-2025-0069\nDescription:Due to DLL injection vulnerability in SAPSetup, an attacker with either local user privileges or with access to a compromised corporate user�s Windows account could gain higher privileges. With this, he could move laterally within the network and further compromise the active directory of a company. This leads to high impact on confidentiality, integrity and availability of the Windows server.\npublished:2025-01-14T01:15:17.257"} {"instruction": "Please provide detailed information about CVE-2025-0070", "inputs": "", "outputs": "CVE:CVE-2025-0070\nDescription:SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to obtain illegitimate access to the system by exploiting improper authentication checks, resulting in privilege escalation. On successful exploitation, this can result in potential security concerns. This results in a high impact on confidentiality, integrity, and availability.\npublished:2025-01-14T01:15:17.427"} {"instruction": "Please provide detailed information about CVE-2025-23030", "inputs": "", "outputs": "CVE:CVE-2025-23030\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `cadastro_funcionario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `cpf` parameter. The application fails to validate and sanitize user inputs in the `cpf` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:17.690"} {"instruction": "Please provide detailed information about CVE-2025-23031", "inputs": "", "outputs": "CVE:CVE-2025-23031\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_alergia.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `nome` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_alergia.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:17.833"} {"instruction": "Please provide detailed information about CVE-2025-23032", "inputs": "", "outputs": "CVE:CVE-2025-23032\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_escala.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `escala` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_escala.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:17.980"} {"instruction": "Please provide detailed information about CVE-2025-23033", "inputs": "", "outputs": "CVE:CVE-2025-23033\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_situacao.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `situacao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_situacao.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:18.127"} {"instruction": "Please provide detailed information about CVE-2025-23034", "inputs": "", "outputs": "CVE:CVE-2025-23034\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `tags.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `msg_e` parameter. The application fails to validate and sanitize user inputs in the `msg_e` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:18.273"} {"instruction": "Please provide detailed information about CVE-2025-23035", "inputs": "", "outputs": "CVE:CVE-2025-23035\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_tipo_quadro_horario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `tipo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `adicionar_tipo_quadro_horario.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:18.413"} {"instruction": "Please provide detailed information about CVE-2025-23036", "inputs": "", "outputs": "CVE:CVE-2025-23036\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the `pre_cadastro_funcionario.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `msg_e` parameter. The application fails to validate and sanitize user inputs in the `msg_e` parameter. This lack of validation permits the injection of malicious payloads, which are reflected back to the user's browser in the server's response and executed within the context of the victim's browser. This issue has been addressed in version 3.2.7. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:18.563"} {"instruction": "Please provide detailed information about CVE-2025-23037", "inputs": "", "outputs": "CVE:CVE-2025-23037\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `control.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `cargo` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `control.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:18.717"} {"instruction": "Please provide detailed information about CVE-2025-23038", "inputs": "", "outputs": "CVE:CVE-2025-23038\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `remuneracao.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the `descricao` parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. The application fails to properly validate and sanitize user inputs in the `remuneracao.php` parameter. This lack of validation allows attackers to inject malicious scripts, which are then stored on the server. Whenever the affected page is accessed, the malicious payload is executed in the victim's browser, potentially compromising the user's data and system. This issue has been addressed in version 3.2.6. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T01:15:18.867"} {"instruction": "Please provide detailed information about CVE-2025-23082", "inputs": "", "outputs": "CVE:CVE-2025-23082\nDescription:Veeam Backup for Microsoft Azure is vulnerable to Server-Side Request Forgery (SSRF). This may allow an unauthenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.\npublished:2025-01-14T02:15:08.163"} {"instruction": "Please provide detailed information about CVE-2024-13348", "inputs": "", "outputs": "CVE:CVE-2024-13348\nDescription:Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22506 Reason: This candidate is a reservation duplicate of CVE-2025-22506. Notes: All CVE users should reference CVE-2025-22506 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.\npublished:2025-01-14T04:15:09.200"} {"instruction": "Please provide detailed information about CVE-2025-0393", "inputs": "", "outputs": "CVE:CVE-2025-0393\nDescription:The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.1006. This is due to missing or incorrect nonce validation on the wpr_filter_grid_posts() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\npublished:2025-01-14T09:15:21.263"} {"instruction": "Please provide detailed information about CVE-2025-0394", "inputs": "", "outputs": "CVE:CVE-2025-0394\nDescription:The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gh_big_file_upload() function in all versions up to, and including, 3.7.3.5. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.\npublished:2025-01-14T09:15:21.430"} {"instruction": "Please provide detailed information about CVE-2025-20016", "inputs": "", "outputs": "CVE:CVE-2025-20016\nDescription:OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340/D440 provided by Y'S corporation. A user with an administrative privilege who logged in to the web management page of the affected product may execute an arbitrary OS command.\npublished:2025-01-14T10:15:07.500"} {"instruction": "Please provide detailed information about CVE-2025-20055", "inputs": "", "outputs": "CVE:CVE-2025-20055\nDescription:OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command.\npublished:2025-01-14T10:15:07.710"} {"instruction": "Please provide detailed information about CVE-2025-20620", "inputs": "", "outputs": "CVE:CVE-2025-20620\nDescription:SQL Injection vulnerability exists in STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may obtain the administrative password of the web management page.\npublished:2025-01-14T10:15:07.860"} {"instruction": "Please provide detailed information about CVE-2025-0458", "inputs": "", "outputs": "CVE:CVE-2025-0458\nDescription:A vulnerability classified as problematic was found in Virtual Computer Vysual RH Solution 2024.12.1. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Panel. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T16:15:34.397"} {"instruction": "Please provide detailed information about CVE-2025-0459", "inputs": "", "outputs": "CVE:CVE-2025-0459\nDescription:A vulnerability, which was classified as problematic, has been found in libretro RetroArch up to 1.19.1 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll of the component Startup. The manipulation leads to untrusted search path. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T16:15:34.617"} {"instruction": "Please provide detailed information about CVE-2025-0460", "inputs": "", "outputs": "CVE:CVE-2025-0460\nDescription:A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T16:15:34.800"} {"instruction": "Please provide detailed information about CVE-2025-0461", "inputs": "", "outputs": "CVE:CVE-2025-0461\nDescription:A vulnerability has been found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as problematic. This vulnerability affects unknown code of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. The manipulation of the argument pathfile leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T16:15:34.997"} {"instruction": "Please provide detailed information about CVE-2025-22983", "inputs": "", "outputs": "CVE:CVE-2025-22983\nDescription:An access control issue in the component /square/getAllSquare/circle of iceCMS v2.2.0 allows unauthenticated attackers to access sensitive information.\npublished:2025-01-14T16:15:35.603"} {"instruction": "Please provide detailed information about CVE-2025-22984", "inputs": "", "outputs": "CVE:CVE-2025-22984\nDescription:An access control issue in the component /api/squareComment/DelectSquareById of iceCMS v2.2.0 allows unauthenticated attackers to access sensitive information.\npublished:2025-01-14T16:15:35.710"} {"instruction": "Please provide detailed information about CVE-2025-0462", "inputs": "", "outputs": "CVE:CVE-2025-0462\nDescription:A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as critical. This issue affects some unknown processing of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1. The manipulation of the argument searchcontent leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T17:15:21.040"} {"instruction": "Please provide detailed information about CVE-2025-0463", "inputs": "", "outputs": "CVE:CVE-2025-0463\nDescription:A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0. It has been classified as critical. Affected is an unknown function of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. The manipulation of the argument name leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T17:15:21.210"} {"instruction": "Please provide detailed information about CVE-2025-0464", "inputs": "", "outputs": "CVE:CVE-2025-0464\nDescription:A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Maintenance Section. The manipulation of the argument System Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-14T17:15:21.387"} {"instruction": "Please provide detailed information about CVE-2025-23080", "inputs": "", "outputs": "CVE:CVE-2025-23080\nDescription:Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - OpenBadges Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - OpenBadges Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.\npublished:2025-01-14T17:15:21.620"} {"instruction": "Please provide detailed information about CVE-2025-23081", "inputs": "", "outputs": "CVE:CVE-2025-23081\nDescription:Cross-Site Request Forgery (CSRF), Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - DataTransfer Extension allows Cross Site Request Forgery, Cross-Site Scripting (XSS).This issue affects Mediawiki - DataTransfer Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.\npublished:2025-01-14T17:15:21.750"} {"instruction": "Please provide detailed information about CVE-2025-0465", "inputs": "", "outputs": "CVE:CVE-2025-0465\nDescription:A vulnerability was found in AquilaCMS 1.412.13. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/v2/categories. The manipulation of the argument PostBody.populate leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-14T18:15:29.883"} {"instruction": "Please provide detailed information about CVE-2025-21171", "inputs": "", "outputs": "CVE:CVE-2025-21171\nDescription:.NET Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:30.100"} {"instruction": "Please provide detailed information about CVE-2025-21172", "inputs": "", "outputs": "CVE:CVE-2025-21172\nDescription:.NET and Visual Studio Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:30.300"} {"instruction": "Please provide detailed information about CVE-2025-21173", "inputs": "", "outputs": "CVE:CVE-2025-21173\nDescription:.NET Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:30.480"} {"instruction": "Please provide detailed information about CVE-2025-21176", "inputs": "", "outputs": "CVE:CVE-2025-21176\nDescription:.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:30.650"} {"instruction": "Please provide detailed information about CVE-2025-21178", "inputs": "", "outputs": "CVE:CVE-2025-21178\nDescription:Visual Studio Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:30.847"} {"instruction": "Please provide detailed information about CVE-2025-21186", "inputs": "", "outputs": "CVE:CVE-2025-21186\nDescription:Microsoft Access Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:31.020"} {"instruction": "Please provide detailed information about CVE-2025-21187", "inputs": "", "outputs": "CVE:CVE-2025-21187\nDescription:Microsoft Power Automate Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:31.187"} {"instruction": "Please provide detailed information about CVE-2025-21189", "inputs": "", "outputs": "CVE:CVE-2025-21189\nDescription:MapUrlToZone Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:31.377"} {"instruction": "Please provide detailed information about CVE-2025-21193", "inputs": "", "outputs": "CVE:CVE-2025-21193\nDescription:Active Directory Federation Server Spoofing Vulnerability\npublished:2025-01-14T18:15:31.637"} {"instruction": "Please provide detailed information about CVE-2025-21202", "inputs": "", "outputs": "CVE:CVE-2025-21202\nDescription:Windows Recovery Environment Agent Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:31.827"} {"instruction": "Please provide detailed information about CVE-2025-21207", "inputs": "", "outputs": "CVE:CVE-2025-21207\nDescription:Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability\npublished:2025-01-14T18:15:32.027"} {"instruction": "Please provide detailed information about CVE-2025-21210", "inputs": "", "outputs": "CVE:CVE-2025-21210\nDescription:Windows BitLocker Information Disclosure Vulnerability\npublished:2025-01-14T18:15:32.207"} {"instruction": "Please provide detailed information about CVE-2025-21211", "inputs": "", "outputs": "CVE:CVE-2025-21211\nDescription:Secure Boot Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:32.410"} {"instruction": "Please provide detailed information about CVE-2025-21213", "inputs": "", "outputs": "CVE:CVE-2025-21213\nDescription:Secure Boot Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:32.600"} {"instruction": "Please provide detailed information about CVE-2025-21214", "inputs": "", "outputs": "CVE:CVE-2025-21214\nDescription:Windows BitLocker Information Disclosure Vulnerability\npublished:2025-01-14T18:15:32.777"} {"instruction": "Please provide detailed information about CVE-2025-21215", "inputs": "", "outputs": "CVE:CVE-2025-21215\nDescription:Secure Boot Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:32.973"} {"instruction": "Please provide detailed information about CVE-2025-21217", "inputs": "", "outputs": "CVE:CVE-2025-21217\nDescription:Windows NTLM Spoofing Vulnerability\npublished:2025-01-14T18:15:33.193"} {"instruction": "Please provide detailed information about CVE-2025-21218", "inputs": "", "outputs": "CVE:CVE-2025-21218\nDescription:Windows Kerberos Denial of Service Vulnerability\npublished:2025-01-14T18:15:33.370"} {"instruction": "Please provide detailed information about CVE-2025-21219", "inputs": "", "outputs": "CVE:CVE-2025-21219\nDescription:MapUrlToZone Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:33.547"} {"instruction": "Please provide detailed information about CVE-2025-21220", "inputs": "", "outputs": "CVE:CVE-2025-21220\nDescription:Microsoft Message Queuing Information Disclosure Vulnerability\npublished:2025-01-14T18:15:33.750"} {"instruction": "Please provide detailed information about CVE-2025-21223", "inputs": "", "outputs": "CVE:CVE-2025-21223\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:33.947"} {"instruction": "Please provide detailed information about CVE-2025-21224", "inputs": "", "outputs": "CVE:CVE-2025-21224\nDescription:Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:34.150"} {"instruction": "Please provide detailed information about CVE-2025-21225", "inputs": "", "outputs": "CVE:CVE-2025-21225\nDescription:Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability\npublished:2025-01-14T18:15:34.367"} {"instruction": "Please provide detailed information about CVE-2025-21226", "inputs": "", "outputs": "CVE:CVE-2025-21226\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:34.560"} {"instruction": "Please provide detailed information about CVE-2025-21227", "inputs": "", "outputs": "CVE:CVE-2025-21227\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:34.753"} {"instruction": "Please provide detailed information about CVE-2025-21228", "inputs": "", "outputs": "CVE:CVE-2025-21228\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:34.950"} {"instruction": "Please provide detailed information about CVE-2025-21229", "inputs": "", "outputs": "CVE:CVE-2025-21229\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:35.153"} {"instruction": "Please provide detailed information about CVE-2025-21230", "inputs": "", "outputs": "CVE:CVE-2025-21230\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:35.333"} {"instruction": "Please provide detailed information about CVE-2025-21231", "inputs": "", "outputs": "CVE:CVE-2025-21231\nDescription:IP Helper Denial of Service Vulnerability\npublished:2025-01-14T18:15:35.513"} {"instruction": "Please provide detailed information about CVE-2025-21232", "inputs": "", "outputs": "CVE:CVE-2025-21232\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:35.690"} {"instruction": "Please provide detailed information about CVE-2025-21233", "inputs": "", "outputs": "CVE:CVE-2025-21233\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:35.870"} {"instruction": "Please provide detailed information about CVE-2025-21234", "inputs": "", "outputs": "CVE:CVE-2025-21234\nDescription:Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:36.080"} {"instruction": "Please provide detailed information about CVE-2025-21235", "inputs": "", "outputs": "CVE:CVE-2025-21235\nDescription:Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:36.320"} {"instruction": "Please provide detailed information about CVE-2025-21236", "inputs": "", "outputs": "CVE:CVE-2025-21236\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:36.667"} {"instruction": "Please provide detailed information about CVE-2025-21237", "inputs": "", "outputs": "CVE:CVE-2025-21237\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:36.983"} {"instruction": "Please provide detailed information about CVE-2025-21238", "inputs": "", "outputs": "CVE:CVE-2025-21238\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:37.407"} {"instruction": "Please provide detailed information about CVE-2025-21239", "inputs": "", "outputs": "CVE:CVE-2025-21239\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:38.010"} {"instruction": "Please provide detailed information about CVE-2025-21240", "inputs": "", "outputs": "CVE:CVE-2025-21240\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:38.770"} {"instruction": "Please provide detailed information about CVE-2025-21241", "inputs": "", "outputs": "CVE:CVE-2025-21241\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:39.490"} {"instruction": "Please provide detailed information about CVE-2025-21242", "inputs": "", "outputs": "CVE:CVE-2025-21242\nDescription:Windows Kerberos Information Disclosure Vulnerability\npublished:2025-01-14T18:15:39.867"} {"instruction": "Please provide detailed information about CVE-2025-21243", "inputs": "", "outputs": "CVE:CVE-2025-21243\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:40.180"} {"instruction": "Please provide detailed information about CVE-2025-21244", "inputs": "", "outputs": "CVE:CVE-2025-21244\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:40.487"} {"instruction": "Please provide detailed information about CVE-2025-21245", "inputs": "", "outputs": "CVE:CVE-2025-21245\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:41.100"} {"instruction": "Please provide detailed information about CVE-2025-21246", "inputs": "", "outputs": "CVE:CVE-2025-21246\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:41.790"} {"instruction": "Please provide detailed information about CVE-2025-21248", "inputs": "", "outputs": "CVE:CVE-2025-21248\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:42.107"} {"instruction": "Please provide detailed information about CVE-2025-21249", "inputs": "", "outputs": "CVE:CVE-2025-21249\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:42.360"} {"instruction": "Please provide detailed information about CVE-2025-21250", "inputs": "", "outputs": "CVE:CVE-2025-21250\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:42.593"} {"instruction": "Please provide detailed information about CVE-2025-21251", "inputs": "", "outputs": "CVE:CVE-2025-21251\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:42.867"} {"instruction": "Please provide detailed information about CVE-2025-21252", "inputs": "", "outputs": "CVE:CVE-2025-21252\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:43.180"} {"instruction": "Please provide detailed information about CVE-2025-21255", "inputs": "", "outputs": "CVE:CVE-2025-21255\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:43.437"} {"instruction": "Please provide detailed information about CVE-2025-21256", "inputs": "", "outputs": "CVE:CVE-2025-21256\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:43.730"} {"instruction": "Please provide detailed information about CVE-2025-21257", "inputs": "", "outputs": "CVE:CVE-2025-21257\nDescription:Windows WLAN AutoConfig Service Information Disclosure Vulnerability\npublished:2025-01-14T18:15:43.990"} {"instruction": "Please provide detailed information about CVE-2025-21258", "inputs": "", "outputs": "CVE:CVE-2025-21258\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:44.660"} {"instruction": "Please provide detailed information about CVE-2025-21260", "inputs": "", "outputs": "CVE:CVE-2025-21260\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:44.927"} {"instruction": "Please provide detailed information about CVE-2025-21261", "inputs": "", "outputs": "CVE:CVE-2025-21261\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:45.137"} {"instruction": "Please provide detailed information about CVE-2025-21263", "inputs": "", "outputs": "CVE:CVE-2025-21263\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:45.337"} {"instruction": "Please provide detailed information about CVE-2025-21265", "inputs": "", "outputs": "CVE:CVE-2025-21265\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:45.583"} {"instruction": "Please provide detailed information about CVE-2025-21266", "inputs": "", "outputs": "CVE:CVE-2025-21266\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:45.797"} {"instruction": "Please provide detailed information about CVE-2025-21268", "inputs": "", "outputs": "CVE:CVE-2025-21268\nDescription:MapUrlToZone Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:46.023"} {"instruction": "Please provide detailed information about CVE-2025-21269", "inputs": "", "outputs": "CVE:CVE-2025-21269\nDescription:Windows HTML Platforms Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:46.290"} {"instruction": "Please provide detailed information about CVE-2025-21270", "inputs": "", "outputs": "CVE:CVE-2025-21270\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:46.503"} {"instruction": "Please provide detailed information about CVE-2025-21271", "inputs": "", "outputs": "CVE:CVE-2025-21271\nDescription:Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:46.747"} {"instruction": "Please provide detailed information about CVE-2025-21272", "inputs": "", "outputs": "CVE:CVE-2025-21272\nDescription:Windows COM Server Information Disclosure Vulnerability\npublished:2025-01-14T18:15:46.987"} {"instruction": "Please provide detailed information about CVE-2025-21273", "inputs": "", "outputs": "CVE:CVE-2025-21273\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:47.240"} {"instruction": "Please provide detailed information about CVE-2025-21274", "inputs": "", "outputs": "CVE:CVE-2025-21274\nDescription:Windows Event Tracing Denial of Service Vulnerability\npublished:2025-01-14T18:15:47.487"} {"instruction": "Please provide detailed information about CVE-2025-21275", "inputs": "", "outputs": "CVE:CVE-2025-21275\nDescription:Windows App Package Installer Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:47.723"} {"instruction": "Please provide detailed information about CVE-2025-21276", "inputs": "", "outputs": "CVE:CVE-2025-21276\nDescription:Windows MapUrlToZone Denial of Service Vulnerability\npublished:2025-01-14T18:15:48.013"} {"instruction": "Please provide detailed information about CVE-2025-21277", "inputs": "", "outputs": "CVE:CVE-2025-21277\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:48.260"} {"instruction": "Please provide detailed information about CVE-2025-21278", "inputs": "", "outputs": "CVE:CVE-2025-21278\nDescription:Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability\npublished:2025-01-14T18:15:48.480"} {"instruction": "Please provide detailed information about CVE-2025-21280", "inputs": "", "outputs": "CVE:CVE-2025-21280\nDescription:Windows Virtual Trusted Platform Module Denial of Service Vulnerability\npublished:2025-01-14T18:15:48.690"} {"instruction": "Please provide detailed information about CVE-2025-21281", "inputs": "", "outputs": "CVE:CVE-2025-21281\nDescription:Microsoft COM for Windows Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:48.897"} {"instruction": "Please provide detailed information about CVE-2025-21282", "inputs": "", "outputs": "CVE:CVE-2025-21282\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:49.110"} {"instruction": "Please provide detailed information about CVE-2025-21284", "inputs": "", "outputs": "CVE:CVE-2025-21284\nDescription:Windows Virtual Trusted Platform Module Denial of Service Vulnerability\npublished:2025-01-14T18:15:49.317"} {"instruction": "Please provide detailed information about CVE-2025-21285", "inputs": "", "outputs": "CVE:CVE-2025-21285\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:49.530"} {"instruction": "Please provide detailed information about CVE-2025-21286", "inputs": "", "outputs": "CVE:CVE-2025-21286\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:49.760"} {"instruction": "Please provide detailed information about CVE-2025-21287", "inputs": "", "outputs": "CVE:CVE-2025-21287\nDescription:Windows Installer Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:49.947"} {"instruction": "Please provide detailed information about CVE-2025-21288", "inputs": "", "outputs": "CVE:CVE-2025-21288\nDescription:Windows COM Server Information Disclosure Vulnerability\npublished:2025-01-14T18:15:50.173"} {"instruction": "Please provide detailed information about CVE-2025-21289", "inputs": "", "outputs": "CVE:CVE-2025-21289\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:50.363"} {"instruction": "Please provide detailed information about CVE-2025-21290", "inputs": "", "outputs": "CVE:CVE-2025-21290\nDescription:Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability\npublished:2025-01-14T18:15:50.587"} {"instruction": "Please provide detailed information about CVE-2025-21291", "inputs": "", "outputs": "CVE:CVE-2025-21291\nDescription:Windows Direct Show Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:50.767"} {"instruction": "Please provide detailed information about CVE-2025-21292", "inputs": "", "outputs": "CVE:CVE-2025-21292\nDescription:Windows Search Service Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:50.927"} {"instruction": "Please provide detailed information about CVE-2025-21293", "inputs": "", "outputs": "CVE:CVE-2025-21293\nDescription:Active Directory Domain Services Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:51.110"} {"instruction": "Please provide detailed information about CVE-2025-21294", "inputs": "", "outputs": "CVE:CVE-2025-21294\nDescription:Microsoft Digest Authentication Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:51.320"} {"instruction": "Please provide detailed information about CVE-2025-21295", "inputs": "", "outputs": "CVE:CVE-2025-21295\nDescription:SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:51.520"} {"instruction": "Please provide detailed information about CVE-2025-21296", "inputs": "", "outputs": "CVE:CVE-2025-21296\nDescription:BranchCache Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:51.710"} {"instruction": "Please provide detailed information about CVE-2025-21297", "inputs": "", "outputs": "CVE:CVE-2025-21297\nDescription:Windows Remote Desktop Services Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:51.890"} {"instruction": "Please provide detailed information about CVE-2025-21298", "inputs": "", "outputs": "CVE:CVE-2025-21298\nDescription:Windows OLE Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:52.080"} {"instruction": "Please provide detailed information about CVE-2025-21299", "inputs": "", "outputs": "CVE:CVE-2025-21299\nDescription:Windows Kerberos Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:52.270"} {"instruction": "Please provide detailed information about CVE-2025-21300", "inputs": "", "outputs": "CVE:CVE-2025-21300\nDescription:Windows upnphost.dll Denial of Service Vulnerability\npublished:2025-01-14T18:15:52.463"} {"instruction": "Please provide detailed information about CVE-2025-21301", "inputs": "", "outputs": "CVE:CVE-2025-21301\nDescription:Windows Geolocation Service Information Disclosure Vulnerability\npublished:2025-01-14T18:15:52.660"} {"instruction": "Please provide detailed information about CVE-2025-21302", "inputs": "", "outputs": "CVE:CVE-2025-21302\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:52.840"} {"instruction": "Please provide detailed information about CVE-2025-21303", "inputs": "", "outputs": "CVE:CVE-2025-21303\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:53.047"} {"instruction": "Please provide detailed information about CVE-2025-21304", "inputs": "", "outputs": "CVE:CVE-2025-21304\nDescription:Microsoft DWM Core Library Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:53.237"} {"instruction": "Please provide detailed information about CVE-2025-21305", "inputs": "", "outputs": "CVE:CVE-2025-21305\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:53.450"} {"instruction": "Please provide detailed information about CVE-2025-21306", "inputs": "", "outputs": "CVE:CVE-2025-21306\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:53.630"} {"instruction": "Please provide detailed information about CVE-2025-21307", "inputs": "", "outputs": "CVE:CVE-2025-21307\nDescription:Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:53.837"} {"instruction": "Please provide detailed information about CVE-2025-21308", "inputs": "", "outputs": "CVE:CVE-2025-21308\nDescription:Windows Themes Spoofing Vulnerability\npublished:2025-01-14T18:15:54.030"} {"instruction": "Please provide detailed information about CVE-2025-21309", "inputs": "", "outputs": "CVE:CVE-2025-21309\nDescription:Windows Remote Desktop Services Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:54.210"} {"instruction": "Please provide detailed information about CVE-2025-21310", "inputs": "", "outputs": "CVE:CVE-2025-21310\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:54.380"} {"instruction": "Please provide detailed information about CVE-2025-21311", "inputs": "", "outputs": "CVE:CVE-2025-21311\nDescription:Windows NTLM V1 Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:54.567"} {"instruction": "Please provide detailed information about CVE-2025-21312", "inputs": "", "outputs": "CVE:CVE-2025-21312\nDescription:Windows Smart Card Reader Information Disclosure Vulnerability\npublished:2025-01-14T18:15:54.770"} {"instruction": "Please provide detailed information about CVE-2025-21313", "inputs": "", "outputs": "CVE:CVE-2025-21313\nDescription:Windows Security Account Manager (SAM) Denial of Service Vulnerability\npublished:2025-01-14T18:15:55.007"} {"instruction": "Please provide detailed information about CVE-2025-21314", "inputs": "", "outputs": "CVE:CVE-2025-21314\nDescription:Windows SmartScreen Spoofing Vulnerability\npublished:2025-01-14T18:15:55.163"} {"instruction": "Please provide detailed information about CVE-2025-21315", "inputs": "", "outputs": "CVE:CVE-2025-21315\nDescription:Microsoft Brokering File System Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:55.343"} {"instruction": "Please provide detailed information about CVE-2025-21316", "inputs": "", "outputs": "CVE:CVE-2025-21316\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:55.510"} {"instruction": "Please provide detailed information about CVE-2025-21317", "inputs": "", "outputs": "CVE:CVE-2025-21317\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:55.697"} {"instruction": "Please provide detailed information about CVE-2025-21318", "inputs": "", "outputs": "CVE:CVE-2025-21318\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:55.880"} {"instruction": "Please provide detailed information about CVE-2025-21319", "inputs": "", "outputs": "CVE:CVE-2025-21319\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:56.090"} {"instruction": "Please provide detailed information about CVE-2025-21320", "inputs": "", "outputs": "CVE:CVE-2025-21320\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:56.297"} {"instruction": "Please provide detailed information about CVE-2025-21321", "inputs": "", "outputs": "CVE:CVE-2025-21321\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:56.533"} {"instruction": "Please provide detailed information about CVE-2025-21323", "inputs": "", "outputs": "CVE:CVE-2025-21323\nDescription:Windows Kernel Memory Information Disclosure Vulnerability\npublished:2025-01-14T18:15:56.760"} {"instruction": "Please provide detailed information about CVE-2025-21324", "inputs": "", "outputs": "CVE:CVE-2025-21324\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:56.970"} {"instruction": "Please provide detailed information about CVE-2025-21326", "inputs": "", "outputs": "CVE:CVE-2025-21326\nDescription:Internet Explorer Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:57.170"} {"instruction": "Please provide detailed information about CVE-2025-21327", "inputs": "", "outputs": "CVE:CVE-2025-21327\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:57.340"} {"instruction": "Please provide detailed information about CVE-2025-21328", "inputs": "", "outputs": "CVE:CVE-2025-21328\nDescription:MapUrlToZone Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:57.530"} {"instruction": "Please provide detailed information about CVE-2025-21329", "inputs": "", "outputs": "CVE:CVE-2025-21329\nDescription:MapUrlToZone Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:57.733"} {"instruction": "Please provide detailed information about CVE-2025-21330", "inputs": "", "outputs": "CVE:CVE-2025-21330\nDescription:Windows Remote Desktop Services Denial of Service Vulnerability\npublished:2025-01-14T18:15:57.940"} {"instruction": "Please provide detailed information about CVE-2025-21331", "inputs": "", "outputs": "CVE:CVE-2025-21331\nDescription:Windows Installer Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:58.120"} {"instruction": "Please provide detailed information about CVE-2025-21332", "inputs": "", "outputs": "CVE:CVE-2025-21332\nDescription:MapUrlToZone Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:58.307"} {"instruction": "Please provide detailed information about CVE-2025-21333", "inputs": "", "outputs": "CVE:CVE-2025-21333\nDescription:Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:58.530"} {"instruction": "Please provide detailed information about CVE-2025-21334", "inputs": "", "outputs": "CVE:CVE-2025-21334\nDescription:Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:58.770"} {"instruction": "Please provide detailed information about CVE-2025-21335", "inputs": "", "outputs": "CVE:CVE-2025-21335\nDescription:Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:58.960"} {"instruction": "Please provide detailed information about CVE-2025-21336", "inputs": "", "outputs": "CVE:CVE-2025-21336\nDescription:Windows Cryptographic Information Disclosure Vulnerability\npublished:2025-01-14T18:15:59.143"} {"instruction": "Please provide detailed information about CVE-2025-21338", "inputs": "", "outputs": "CVE:CVE-2025-21338\nDescription:GDI+ Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:59.300"} {"instruction": "Please provide detailed information about CVE-2025-21339", "inputs": "", "outputs": "CVE:CVE-2025-21339\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:15:59.480"} {"instruction": "Please provide detailed information about CVE-2025-21340", "inputs": "", "outputs": "CVE:CVE-2025-21340\nDescription:Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability\npublished:2025-01-14T18:15:59.673"} {"instruction": "Please provide detailed information about CVE-2025-21341", "inputs": "", "outputs": "CVE:CVE-2025-21341\nDescription:Windows Digital Media Elevation of Privilege Vulnerability\npublished:2025-01-14T18:15:59.853"} {"instruction": "Please provide detailed information about CVE-2025-21343", "inputs": "", "outputs": "CVE:CVE-2025-21343\nDescription:Windows Web Threat Defense User Service Information Disclosure Vulnerability\npublished:2025-01-14T18:16:00.053"} {"instruction": "Please provide detailed information about CVE-2025-21344", "inputs": "", "outputs": "CVE:CVE-2025-21344\nDescription:Microsoft SharePoint Server Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:00.227"} {"instruction": "Please provide detailed information about CVE-2025-21345", "inputs": "", "outputs": "CVE:CVE-2025-21345\nDescription:Microsoft Office Visio Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:00.437"} {"instruction": "Please provide detailed information about CVE-2025-21346", "inputs": "", "outputs": "CVE:CVE-2025-21346\nDescription:Microsoft Office Security Feature Bypass Vulnerability\npublished:2025-01-14T18:16:00.607"} {"instruction": "Please provide detailed information about CVE-2025-21348", "inputs": "", "outputs": "CVE:CVE-2025-21348\nDescription:Microsoft SharePoint Server Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:00.780"} {"instruction": "Please provide detailed information about CVE-2025-21354", "inputs": "", "outputs": "CVE:CVE-2025-21354\nDescription:Microsoft Excel Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:00.947"} {"instruction": "Please provide detailed information about CVE-2025-21356", "inputs": "", "outputs": "CVE:CVE-2025-21356\nDescription:Microsoft Office Visio Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:01.130"} {"instruction": "Please provide detailed information about CVE-2025-21357", "inputs": "", "outputs": "CVE:CVE-2025-21357\nDescription:Microsoft Outlook Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:01.293"} {"instruction": "Please provide detailed information about CVE-2025-21360", "inputs": "", "outputs": "CVE:CVE-2025-21360\nDescription:Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability\npublished:2025-01-14T18:16:01.470"} {"instruction": "Please provide detailed information about CVE-2025-21361", "inputs": "", "outputs": "CVE:CVE-2025-21361\nDescription:Microsoft Outlook Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:01.637"} {"instruction": "Please provide detailed information about CVE-2025-21362", "inputs": "", "outputs": "CVE:CVE-2025-21362\nDescription:Microsoft Excel Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:01.820"} {"instruction": "Please provide detailed information about CVE-2025-21363", "inputs": "", "outputs": "CVE:CVE-2025-21363\nDescription:Microsoft Word Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:01.993"} {"instruction": "Please provide detailed information about CVE-2025-21364", "inputs": "", "outputs": "CVE:CVE-2025-21364\nDescription:Microsoft Excel Security Feature Bypass Vulnerability\npublished:2025-01-14T18:16:02.150"} {"instruction": "Please provide detailed information about CVE-2025-21365", "inputs": "", "outputs": "CVE:CVE-2025-21365\nDescription:Microsoft Office Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:02.310"} {"instruction": "Please provide detailed information about CVE-2025-21366", "inputs": "", "outputs": "CVE:CVE-2025-21366\nDescription:Microsoft Access Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:02.463"} {"instruction": "Please provide detailed information about CVE-2025-21370", "inputs": "", "outputs": "CVE:CVE-2025-21370\nDescription:Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability\npublished:2025-01-14T18:16:02.650"} {"instruction": "Please provide detailed information about CVE-2025-21372", "inputs": "", "outputs": "CVE:CVE-2025-21372\nDescription:Microsoft Brokering File System Elevation of Privilege Vulnerability\npublished:2025-01-14T18:16:02.813"} {"instruction": "Please provide detailed information about CVE-2025-21374", "inputs": "", "outputs": "CVE:CVE-2025-21374\nDescription:Windows CSC Service Information Disclosure Vulnerability\npublished:2025-01-14T18:16:03.003"} {"instruction": "Please provide detailed information about CVE-2025-21378", "inputs": "", "outputs": "CVE:CVE-2025-21378\nDescription:Windows CSC Service Elevation of Privilege Vulnerability\npublished:2025-01-14T18:16:03.183"} {"instruction": "Please provide detailed information about CVE-2025-21382", "inputs": "", "outputs": "CVE:CVE-2025-21382\nDescription:Windows Graphics Component Elevation of Privilege Vulnerability\npublished:2025-01-14T18:16:03.413"} {"instruction": "Please provide detailed information about CVE-2025-21389", "inputs": "", "outputs": "CVE:CVE-2025-21389\nDescription:Windows upnphost.dll Denial of Service Vulnerability\npublished:2025-01-14T18:16:03.660"} {"instruction": "Please provide detailed information about CVE-2025-21393", "inputs": "", "outputs": "CVE:CVE-2025-21393\nDescription:Microsoft SharePoint Server Spoofing Vulnerability\npublished:2025-01-14T18:16:03.863"} {"instruction": "Please provide detailed information about CVE-2025-21395", "inputs": "", "outputs": "CVE:CVE-2025-21395\nDescription:Microsoft Access Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:04.033"} {"instruction": "Please provide detailed information about CVE-2025-21402", "inputs": "", "outputs": "CVE:CVE-2025-21402\nDescription:Microsoft Office OneNote Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:04.190"} {"instruction": "Please provide detailed information about CVE-2025-21403", "inputs": "", "outputs": "CVE:CVE-2025-21403\nDescription:On-Premises Data Gateway Information Disclosure Vulnerability\npublished:2025-01-14T18:16:04.350"} {"instruction": "Please provide detailed information about CVE-2025-21405", "inputs": "", "outputs": "CVE:CVE-2025-21405\nDescription:Visual Studio Elevation of Privilege Vulnerability\npublished:2025-01-14T18:16:04.507"} {"instruction": "Please provide detailed information about CVE-2025-21409", "inputs": "", "outputs": "CVE:CVE-2025-21409\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:04.673"} {"instruction": "Please provide detailed information about CVE-2025-21411", "inputs": "", "outputs": "CVE:CVE-2025-21411\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:04.860"} {"instruction": "Please provide detailed information about CVE-2025-21413", "inputs": "", "outputs": "CVE:CVE-2025-21413\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:05.103"} {"instruction": "Please provide detailed information about CVE-2025-21417", "inputs": "", "outputs": "CVE:CVE-2025-21417\nDescription:Windows Telephony Service Remote Code Execution Vulnerability\npublished:2025-01-14T18:16:05.307"} {"instruction": "Please provide detailed information about CVE-2025-21607", "inputs": "", "outputs": "CVE:CVE-2025-21607\nDescription:Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the precompiles EcRecover (0x1) and Identity (0x4), the success flag of the call is not checked. As a consequence an attacker can provide a specific amount of gas to make these calls fail but let the overall execution continue. Then the execution result can be incorrect. Based on EVM's rules, after the failed precompile the remaining code has only 1/64 of the pre-call-gas left (as 63/64 were forwarded and spent). Hence, only fairly simple executions can follow the failed precompile calls. Therefore, we found no significantly impacted real-world contracts. None the less an advisory has been made out of an abundance of caution. There are no actions for users to take.\npublished:2025-01-14T18:16:05.490"} {"instruction": "Please provide detailed information about CVE-2025-23025", "inputs": "", "outputs": "CVE:CVE-2025-23025\nDescription:XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. NOTE: The Realtime WYSIWYG Editor extension was **experimental**, and thus **not recommended**, in the versions affected by this vulnerability. It has become enabled by default, and thus recommended, starting with XWiki 16.9.0. A user with only **edit right** can join a realtime editing session where others, that where already there or that may join later, have **script** or **programming** access rights. This user can then insert **script rendering macros** that are executed for those users in the realtime session that have script or programming rights. The inserted scripts can be used to gain more access rights. This vulnerability has been patched in XWiki 15.10.2, 16.4.1 and 16.6.0-rc-1. Users are advised to upgrade. Users unable to upgrade may either disable the realtime WYSIWYG editing by disabling the ``xwiki-realtime`` CKEditor plugin from the WYSIWYG editor administration section or uninstall the Realtime WYSIWYG Editorextension (org.xwiki.platform:xwiki-platform-realtime-wysiwyg-ui).\npublished:2025-01-14T18:16:05.650"} {"instruction": "Please provide detailed information about CVE-2025-23051", "inputs": "", "outputs": "CVE:CVE-2025-23051\nDescription:An authenticated parameter injection vulnerability exists in the web-based management interface of the AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated user to leverage parameter injection to overwrite arbitrary system files.\npublished:2025-01-14T18:16:05.813"} {"instruction": "Please provide detailed information about CVE-2025-23052", "inputs": "", "outputs": "CVE:CVE-2025-23052\nDescription:Authenticated command injection vulnerability in the command line interface of a network management service. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands as a privileged user on the underlying operating system.\npublished:2025-01-14T18:16:05.960"} {"instruction": "Please provide detailed information about CVE-2025-23366", "inputs": "", "outputs": "CVE:CVE-2025-23366\nDescription:A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups “SuperUser”, “Admin”, or “Maintainer”.\npublished:2025-01-14T18:16:06.290"} {"instruction": "Please provide detailed information about CVE-2025-0474", "inputs": "", "outputs": "CVE:CVE-2025-0474\nDescription:Invoice Ninja is vulnerable to authenticated Server-Side Request Forgery (SSRF) allowing for arbitrary file read and network resource requests as the application user. This issue affects Invoice Ninja: from 5.8.56 through 5.11.23.\npublished:2025-01-14T19:15:32.930"} {"instruction": "Please provide detailed information about CVE-2025-21122", "inputs": "", "outputs": "CVE:CVE-2025-21122\nDescription:Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:33.070"} {"instruction": "Please provide detailed information about CVE-2025-21127", "inputs": "", "outputs": "CVE:CVE-2025-21127\nDescription:Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could lead to arbitrary code execution. An attacker could manipulate the search path environment variable to point to a malicious library, resulting in the execution of arbitrary code when the application loads. Exploitation of this issue requires user interaction in that a victim must run the vulnerable application.\npublished:2025-01-14T19:15:33.230"} {"instruction": "Please provide detailed information about CVE-2025-21128", "inputs": "", "outputs": "CVE:CVE-2025-21128\nDescription:Substance3D - Stager versions 3.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:33.387"} {"instruction": "Please provide detailed information about CVE-2025-21129", "inputs": "", "outputs": "CVE:CVE-2025-21129\nDescription:Substance3D - Stager versions 3.0.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:33.550"} {"instruction": "Please provide detailed information about CVE-2025-21130", "inputs": "", "outputs": "CVE:CVE-2025-21130\nDescription:Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:33.723"} {"instruction": "Please provide detailed information about CVE-2025-21131", "inputs": "", "outputs": "CVE:CVE-2025-21131\nDescription:Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:33.897"} {"instruction": "Please provide detailed information about CVE-2025-21132", "inputs": "", "outputs": "CVE:CVE-2025-21132\nDescription:Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:34.047"} {"instruction": "Please provide detailed information about CVE-2025-21133", "inputs": "", "outputs": "CVE:CVE-2025-21133\nDescription:Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:34.187"} {"instruction": "Please provide detailed information about CVE-2025-21134", "inputs": "", "outputs": "CVE:CVE-2025-21134\nDescription:Illustrator on iPad versions 3.0.7 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T19:15:34.337"} {"instruction": "Please provide detailed information about CVE-2025-23041", "inputs": "", "outputs": "CVE:CVE-2025-23041\nDescription:Umbraco.Forms is a web form framework written for the nuget ecosystem. Character limits configured by editors for short and long answer fields are validated only client-side, not server-side. This issue has been patched in versions 8.13.16, 10.5.7, 13.2.2, and 14.1.2. Users are advised to upgrade. There are no known workarounds for this issue.\npublished:2025-01-14T19:15:44.713"} {"instruction": "Please provide detailed information about CVE-2025-23042", "inputs": "", "outputs": "CVE:CVE-2025-23042\nDescription:Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. This issue has been addressed in release version 5.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-14T19:15:44.863"} {"instruction": "Please provide detailed information about CVE-2025-23072", "inputs": "", "outputs": "CVE:CVE-2025-23072\nDescription:Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - RefreshSpecial Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - RefreshSpecial Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.\npublished:2025-01-14T19:15:45.007"} {"instruction": "Please provide detailed information about CVE-2025-23073", "inputs": "", "outputs": "CVE:CVE-2025-23073\nDescription:Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - GlobalBlocking Extension allows Retrieve Embedded Sensitive Data. This issue briefly impacted the master branch of MediaWiki’s GlobalBlocking Extension.\npublished:2025-01-14T19:15:45.120"} {"instruction": "Please provide detailed information about CVE-2025-23074", "inputs": "", "outputs": "CVE:CVE-2025-23074\nDescription:Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - SocialProfile Extension allows Functionality Misuse.This issue affects Mediawiki - SocialProfile Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.\npublished:2025-01-14T19:15:45.223"} {"instruction": "Please provide detailed information about CVE-2025-21135", "inputs": "", "outputs": "CVE:CVE-2025-21135\nDescription:Animate versions 24.0.6, 23.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T20:15:30.853"} {"instruction": "Please provide detailed information about CVE-2025-21136", "inputs": "", "outputs": "CVE:CVE-2025-21136\nDescription:Substance3D - Designer versions 14.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T20:15:31.007"} {"instruction": "Please provide detailed information about CVE-2025-21137", "inputs": "", "outputs": "CVE:CVE-2025-21137\nDescription:Substance3D - Designer versions 14.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T20:15:31.157"} {"instruction": "Please provide detailed information about CVE-2025-21138", "inputs": "", "outputs": "CVE:CVE-2025-21138\nDescription:Substance3D - Designer versions 14.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T20:15:31.300"} {"instruction": "Please provide detailed information about CVE-2025-21139", "inputs": "", "outputs": "CVE:CVE-2025-21139\nDescription:Substance3D - Designer versions 14.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\npublished:2025-01-14T20:15:31.457"} {"instruction": "Please provide detailed information about CVE-2025-23018", "inputs": "", "outputs": "CVE:CVE-2025-23018\nDescription:IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.\npublished:2025-01-14T20:15:32.440"} {"instruction": "Please provide detailed information about CVE-2025-23019", "inputs": "", "outputs": "CVE:CVE-2025-23019\nDescription:IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof and route traffic via an exposed network interface.\npublished:2025-01-14T20:15:32.577"} {"instruction": "Please provide detailed information about CVE-2025-22996", "inputs": "", "outputs": "CVE:CVE-2025-22996\nDescription:A stored cross-site scripting (XSS) vulnerability in the spf_table_content component of Linksys E5600 Router Ver. 1.1.0.26 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the desc parameter.\npublished:2025-01-15T00:15:45.053"} {"instruction": "Please provide detailed information about CVE-2025-22997", "inputs": "", "outputs": "CVE:CVE-2025-22997\nDescription:A stored cross-site scripting (XSS) vulnerability in the prf_table_content component of Linksys E5600 Router Ver. 1.1.0.26 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the desc parameter.\npublished:2025-01-15T00:15:45.167"} {"instruction": "Please provide detailed information about CVE-2025-0343", "inputs": "", "outputs": "CVE:CVE-2025-0343\nDescription:Swift ASN.1 can be caused to crash when parsing certain BER/DER constructions. This crash is caused by a confusion in the ASN.1 library itself which assumes that certain objects can only be provided in either constructed or primitive forms, and will trigger a preconditionFailure if that constraint isn't met. Importantly, these constraints are actually required to be true in DER, but that correctness wasn't enforced on the early node parser side so it was incorrect to rely on it later on in decoding, which is what the library did. These crashes can be triggered when parsing any DER/BER format object. There is no memory-safety issue here: the crash is a graceful one from the Swift runtime. The impact of this is that it can be used as a denial-of-service vector when parsing BER/DER data from unknown sources, e.g. when parsing TLS certificates.\npublished:2025-01-15T01:15:13.673"} {"instruction": "Please provide detailed information about CVE-2025-23013", "inputs": "", "outputs": "CVE:CVE-2025-23013\nDescription:In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password.\npublished:2025-01-15T04:15:20.037"} {"instruction": "Please provide detailed information about CVE-2025-21101", "inputs": "", "outputs": "CVE:CVE-2025-21101\nDescription:Dell Display Manager, versions prior to 2.3.2.20, contain a race condition vulnerability. A local malicious user could potentially exploit this vulnerability during installation, leading to arbitrary folder or file deletion.\npublished:2025-01-15T05:15:09.097"} {"instruction": "Please provide detailed information about CVE-2025-22394", "inputs": "", "outputs": "CVE:CVE-2025-22394\nDescription:Dell Display Manager, versions prior to 2.3.2.18, contain a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to code execution and possibly privilege escalation.\npublished:2025-01-15T05:15:10.343"} {"instruction": "Please provide detailed information about CVE-2025-23061", "inputs": "", "outputs": "CVE:CVE-2025-23061\nDescription:Mongoose before 8.9.5 can improperly use a nested $where filter with a populate() match, leading to search injection. NOTE: this issue exists because of an incomplete fix for CVE-2024-53900.\npublished:2025-01-15T05:15:10.517"} {"instruction": "Please provide detailed information about CVE-2025-0354", "inputs": "", "outputs": "CVE:CVE-2025-0354\nDescription:Cross-site scripting vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to inject an arbitrary script via the network.\npublished:2025-01-15T08:15:26.330"} {"instruction": "Please provide detailed information about CVE-2025-0355", "inputs": "", "outputs": "CVE:CVE-2025-0355\nDescription:Missing Authentication for Critical Function vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WF1200CRS Ver.1.6.0 and earlier, WG1200CRS Ver.1.5.0 and earlier, GB1200PE Ver.1.3.0 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to get a Wi-Fi password via the network.\npublished:2025-01-15T08:15:26.493"} {"instruction": "Please provide detailed information about CVE-2025-0356", "inputs": "", "outputs": "CVE:CVE-2025-0356\nDescription:NEC Corporation Aterm WX1500HP Ver.1.4.2 and earlier and WX3600HP Ver.1.5.3 and earlier allows a attacker to execute arbitrary OS commands via the network.\npublished:2025-01-15T08:15:26.650"} {"instruction": "Please provide detailed information about CVE-2025-0193", "inputs": "", "outputs": "CVE:CVE-2025-0193\nDescription:A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions or other impacts, depending on the user's privileges.\npublished:2025-01-15T11:15:09.280"} {"instruction": "Please provide detailed information about CVE-2025-0434", "inputs": "", "outputs": "CVE:CVE-2025-0434\nDescription:Out of bounds memory access in V8 in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-15T11:15:09.470"} {"instruction": "Please provide detailed information about CVE-2025-0435", "inputs": "", "outputs": "CVE:CVE-2025-0435\nDescription:Inappropriate implementation in Navigation in Google Chrome on Android prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-15T11:15:09.580"} {"instruction": "Please provide detailed information about CVE-2025-0436", "inputs": "", "outputs": "CVE:CVE-2025-0436\nDescription:Integer overflow in Skia in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-15T11:15:09.673"} {"instruction": "Please provide detailed information about CVE-2025-0437", "inputs": "", "outputs": "CVE:CVE-2025-0437\nDescription:Out of bounds read in Metrics in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-15T11:15:09.800"} {"instruction": "Please provide detailed information about CVE-2025-0438", "inputs": "", "outputs": "CVE:CVE-2025-0438\nDescription:Stack buffer overflow in Tracing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-15T11:15:09.930"} {"instruction": "Please provide detailed information about CVE-2025-0439", "inputs": "", "outputs": "CVE:CVE-2025-0439\nDescription:Race in Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)\npublished:2025-01-15T11:15:10.060"} {"instruction": "Please provide detailed information about CVE-2025-0440", "inputs": "", "outputs": "CVE:CVE-2025-0440\nDescription:Inappropriate implementation in Fullscreen in Google Chrome on Windows prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)\npublished:2025-01-15T11:15:10.187"} {"instruction": "Please provide detailed information about CVE-2025-0441", "inputs": "", "outputs": "CVE:CVE-2025-0441\nDescription:Inappropriate implementation in Fenced Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to obtain potentially sensitive information from the system via a crafted HTML page. (Chromium security severity: Medium)\npublished:2025-01-15T11:15:10.287"} {"instruction": "Please provide detailed information about CVE-2025-0442", "inputs": "", "outputs": "CVE:CVE-2025-0442\nDescription:Inappropriate implementation in Payments in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)\npublished:2025-01-15T11:15:10.383"} {"instruction": "Please provide detailed information about CVE-2025-0443", "inputs": "", "outputs": "CVE:CVE-2025-0443\nDescription:Insufficient data validation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)\npublished:2025-01-15T11:15:10.483"} {"instruction": "Please provide detailed information about CVE-2025-0446", "inputs": "", "outputs": "CVE:CVE-2025-0446\nDescription:Inappropriate implementation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)\npublished:2025-01-15T11:15:10.580"} {"instruction": "Please provide detailed information about CVE-2025-0447", "inputs": "", "outputs": "CVE:CVE-2025-0447\nDescription:Inappropriate implementation in Navigation in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Low)\npublished:2025-01-15T11:15:10.673"} {"instruction": "Please provide detailed information about CVE-2025-0448", "inputs": "", "outputs": "CVE:CVE-2025-0448\nDescription:Inappropriate implementation in Compositing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)\npublished:2025-01-15T11:15:10.763"} {"instruction": "Please provide detailed information about CVE-2025-21629", "inputs": "", "outputs": "CVE:CVE-2025-21629\nDescription:In the Linux kernel, the following vulnerability has been resolved: net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets The blamed commit disabled hardware offoad of IPv6 packets with extension headers on devices that advertise NETIF_F_IPV6_CSUM, based on the definition of that feature in skbuff.h: * * - %NETIF_F_IPV6_CSUM * - Driver (device) is only able to checksum plain * TCP or UDP packets over IPv6. These are specifically * unencapsulated packets of the form IPv6|TCP or * IPv6|UDP where the Next Header field in the IPv6 * header is either TCP or UDP. IPv6 extension headers * are not supported with this feature. This feature * cannot be set in features for a device with * NETIF_F_HW_CSUM also set. This feature is being * DEPRECATED (see below). The change causes skb_warn_bad_offload to fire for BIG TCP packets. [ 496.310233] WARNING: CPU: 13 PID: 23472 at net/core/dev.c:3129 skb_warn_bad_offload+0xc4/0xe0 [ 496.310297] ? skb_warn_bad_offload+0xc4/0xe0 [ 496.310300] skb_checksum_help+0x129/0x1f0 [ 496.310303] skb_csum_hwoffload_help+0x150/0x1b0 [ 496.310306] validate_xmit_skb+0x159/0x270 [ 496.310309] validate_xmit_skb_list+0x41/0x70 [ 496.310312] sch_direct_xmit+0x5c/0x250 [ 496.310317] __qdisc_run+0x388/0x620 BIG TCP introduced an IPV6_TLV_JUMBO IPv6 extension header to communicate packet length, as this is an IPv6 jumbogram. But, the feature is only enabled on devices that support BIG TCP TSO. The header is only present for PF_PACKET taps like tcpdump, and not transmitted by physical devices. For this specific case of extension headers that are not transmitted, return to the situation before the blamed commit and support hardware offload. ipv6_has_hopopt_jumbo() tests not only whether this header is present, but also that it is the only extension header before a terminal (L4) header.\npublished:2025-01-15T13:15:15.220"} {"instruction": "Please provide detailed information about CVE-2025-21630", "inputs": "", "outputs": "CVE:CVE-2025-21630\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-15T13:15:15.330"} {"instruction": "Please provide detailed information about CVE-2025-21088", "inputs": "", "outputs": "CVE:CVE-2025-21088\nDescription:Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the frontend via crafted malicious input.\npublished:2025-01-15T16:15:32.413"} {"instruction": "Please provide detailed information about CVE-2025-22317", "inputs": "", "outputs": "CVE:CVE-2025-22317\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in galleryape Photo Gallery – Image Gallery by Ape allows Reflected XSS.This issue affects Photo Gallery – Image Gallery by Ape: from n/a through 2.2.8.\npublished:2025-01-15T16:15:34.590"} {"instruction": "Please provide detailed information about CVE-2025-22329", "inputs": "", "outputs": "CVE:CVE-2025-22329\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AGILELOGIX Free Google Maps allows Stored XSS.This issue affects Free Google Maps: from n/a through 1.0.1.\npublished:2025-01-15T16:15:34.763"} {"instruction": "Please provide detailed information about CVE-2025-22346", "inputs": "", "outputs": "CVE:CVE-2025-22346\nDescription:Server-Side Request Forgery (SSRF) vulnerability in Faizaan Gagan Course Migration for LearnDash allows Server Side Request Forgery.This issue affects Course Migration for LearnDash: from 1.0.2 through n/a.\npublished:2025-01-15T16:15:34.923"} {"instruction": "Please provide detailed information about CVE-2025-22587", "inputs": "", "outputs": "CVE:CVE-2025-22587\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NCiphers SEO Bulk Editor allows Stored XSS.This issue affects SEO Bulk Editor: from n/a through 1.1.0.\npublished:2025-01-15T16:15:35.097"} {"instruction": "Please provide detailed information about CVE-2025-22724", "inputs": "", "outputs": "CVE:CVE-2025-22724\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MojofyWP Product Carousel For WooCommerce – WoorouSell allows Stored XSS.This issue affects Product Carousel For WooCommerce – WoorouSell: from n/a through 1.1.0.\npublished:2025-01-15T16:15:35.250"} {"instruction": "Please provide detailed information about CVE-2025-22729", "inputs": "", "outputs": "CVE:CVE-2025-22729\nDescription:Missing Authorization vulnerability in Infomaniak Staff VOD Infomaniak allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VOD Infomaniak: from n/a through 1.5.9.\npublished:2025-01-15T16:15:35.400"} {"instruction": "Please provide detailed information about CVE-2025-22731", "inputs": "", "outputs": "CVE:CVE-2025-22731\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in silverplugins217 Build Private Store For Woocommerce allows Cross Site Request Forgery.This issue affects Build Private Store For Woocommerce: from n/a through 1.0.\npublished:2025-01-15T16:15:35.550"} {"instruction": "Please provide detailed information about CVE-2025-22734", "inputs": "", "outputs": "CVE:CVE-2025-22734\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Data443 Posts Footer Manager allows Stored XSS.This issue affects Posts Footer Manager: from n/a through 2.1.0.\npublished:2025-01-15T16:15:35.703"} {"instruction": "Please provide detailed information about CVE-2025-22736", "inputs": "", "outputs": "CVE:CVE-2025-22736\nDescription:Incorrect Privilege Assignment vulnerability in WPExperts User Management allows Privilege Escalation.This issue affects User Management: from n/a through 1.2.\npublished:2025-01-15T16:15:35.877"} {"instruction": "Please provide detailed information about CVE-2025-22737", "inputs": "", "outputs": "CVE:CVE-2025-22737\nDescription:Missing Authorization vulnerability in MagePeople Team WpTravelly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WpTravelly: from n/a through 1.8.5.\npublished:2025-01-15T16:15:36.030"} {"instruction": "Please provide detailed information about CVE-2025-22738", "inputs": "", "outputs": "CVE:CVE-2025-22738\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechnoWich WP ULike allows Stored XSS.This issue affects WP ULike: from n/a through 4.7.6.\npublished:2025-01-15T16:15:36.187"} {"instruction": "Please provide detailed information about CVE-2025-22742", "inputs": "", "outputs": "CVE:CVE-2025-22742\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in falldeaf WP ViewSTL allows DOM-Based XSS.This issue affects WP ViewSTL: from n/a through 1.0.\npublished:2025-01-15T16:15:36.350"} {"instruction": "Please provide detailed information about CVE-2025-22743", "inputs": "", "outputs": "CVE:CVE-2025-22743\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohsin Rasool Twitter Bootstrap Collapse aka Accordian Shortcode allows DOM-Based XSS.This issue affects Twitter Bootstrap Collapse aka Accordian Shortcode: from n/a through 1.0.\npublished:2025-01-15T16:15:36.503"} {"instruction": "Please provide detailed information about CVE-2025-22744", "inputs": "", "outputs": "CVE:CVE-2025-22744\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob von Bothmer / SeoDev S-DEV SEO allows Stored XSS.This issue affects S-DEV SEO: from n/a through 1.88.\npublished:2025-01-15T16:15:36.657"} {"instruction": "Please provide detailed information about CVE-2025-22745", "inputs": "", "outputs": "CVE:CVE-2025-22745\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Björn Weinbrenner Navigation Du Lapin Blanc allows DOM-Based XSS.This issue affects Navigation Du Lapin Blanc: from n/a through 1.1.1.\npublished:2025-01-15T16:15:36.810"} {"instruction": "Please provide detailed information about CVE-2025-22746", "inputs": "", "outputs": "CVE:CVE-2025-22746\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HireHive HireHive Job Plugin allows Stored XSS.This issue affects HireHive Job Plugin: from n/a through 2.9.0.\npublished:2025-01-15T16:15:36.980"} {"instruction": "Please provide detailed information about CVE-2025-22747", "inputs": "", "outputs": "CVE:CVE-2025-22747\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tor Morten Jensen Foundation Columns allows Stored XSS.This issue affects Foundation Columns: from n/a through 0.8.\npublished:2025-01-15T16:15:37.150"} {"instruction": "Please provide detailed information about CVE-2025-22748", "inputs": "", "outputs": "CVE:CVE-2025-22748\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SetMore Appointments SetMore Theme – Custom Post Types allows Stored XSS.This issue affects SetMore Theme – Custom Post Types: from n/a through 1.1.\npublished:2025-01-15T16:15:37.300"} {"instruction": "Please provide detailed information about CVE-2025-22749", "inputs": "", "outputs": "CVE:CVE-2025-22749\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AwoThemes Social Media Engine allows Stored XSS.This issue affects Social Media Engine: from n/a through 1.0.2.\npublished:2025-01-15T16:15:37.450"} {"instruction": "Please provide detailed information about CVE-2025-22750", "inputs": "", "outputs": "CVE:CVE-2025-22750\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel Post Carousel & Slider allows Reflected XSS.This issue affects Post Carousel & Slider: from n/a through 1.0.4.\npublished:2025-01-15T16:15:37.610"} {"instruction": "Please provide detailed information about CVE-2025-22751", "inputs": "", "outputs": "CVE:CVE-2025-22751\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mighty Digital Partners allows Reflected XSS.This issue affects Partners: from n/a through 0.2.0.\npublished:2025-01-15T16:15:37.770"} {"instruction": "Please provide detailed information about CVE-2025-22752", "inputs": "", "outputs": "CVE:CVE-2025-22752\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GSheetConnector GSheetConnector for Forminator Forms allows Reflected XSS.This issue affects GSheetConnector for Forminator Forms: from n/a through 1.0.11.\npublished:2025-01-15T16:15:37.933"} {"instruction": "Please provide detailed information about CVE-2025-22753", "inputs": "", "outputs": "CVE:CVE-2025-22753\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dueclic turboSMTP allows Reflected XSS.This issue affects turboSMTP: from n/a through 4.6.\npublished:2025-01-15T16:15:38.090"} {"instruction": "Please provide detailed information about CVE-2025-22754", "inputs": "", "outputs": "CVE:CVE-2025-22754\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berkman Center for Internet & Society Amber allows Reflected XSS.This issue affects Amber: from n/a through 1.4.4.\npublished:2025-01-15T16:15:38.260"} {"instruction": "Please provide detailed information about CVE-2025-22755", "inputs": "", "outputs": "CVE:CVE-2025-22755\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in James Bavington WP Headmaster allows Reflected XSS.This issue affects WP Headmaster: from n/a through 0.3.\npublished:2025-01-15T16:15:38.417"} {"instruction": "Please provide detailed information about CVE-2025-22758", "inputs": "", "outputs": "CVE:CVE-2025-22758\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aiwp Elementor AI Addons allows DOM-Based XSS.This issue affects Elementor AI Addons: from n/a through 2.2.1.\npublished:2025-01-15T16:15:38.577"} {"instruction": "Please provide detailed information about CVE-2025-22759", "inputs": "", "outputs": "CVE:CVE-2025-22759\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldGrid Post and Page Builder by BoldGrid – Visual Drag and Drop Editor allows Stored XSS.This issue affects Post and Page Builder by BoldGrid – Visual Drag and Drop Editor: from n/a through 1.27.4.\npublished:2025-01-15T16:15:38.733"} {"instruction": "Please provide detailed information about CVE-2025-22760", "inputs": "", "outputs": "CVE:CVE-2025-22760\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Reflected XSS.This issue affects CodeBard Help Desk: from n/a through 1.1.2.\npublished:2025-01-15T16:15:38.890"} {"instruction": "Please provide detailed information about CVE-2025-22761", "inputs": "", "outputs": "CVE:CVE-2025-22761\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through 1.2.5.1.\npublished:2025-01-15T16:15:39.053"} {"instruction": "Please provide detailed information about CVE-2025-22762", "inputs": "", "outputs": "CVE:CVE-2025-22762\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Octrace Studio WordPress HelpDesk & Support Ticket System Plugin – Octrace Support allows Stored XSS.This issue affects WordPress HelpDesk & Support Ticket System Plugin – Octrace Support: from n/a through 1.2.7.\npublished:2025-01-15T16:15:39.227"} {"instruction": "Please provide detailed information about CVE-2025-22764", "inputs": "", "outputs": "CVE:CVE-2025-22764\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpwebs Team - VA Jariwala WP Post Corrector allows Reflected XSS.This issue affects WP Post Corrector: from n/a through 1.0.2.\npublished:2025-01-15T16:15:39.373"} {"instruction": "Please provide detailed information about CVE-2025-22765", "inputs": "", "outputs": "CVE:CVE-2025-22765\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uri Weil WP Order By allows Reflected XSS.This issue affects WP Order By: from n/a through 1.4.2.\npublished:2025-01-15T16:15:39.543"} {"instruction": "Please provide detailed information about CVE-2025-22766", "inputs": "", "outputs": "CVE:CVE-2025-22766\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Masoud Amini Zarinpal Paid Download allows Reflected XSS.This issue affects Zarinpal Paid Download: from n/a through 2.3.\npublished:2025-01-15T16:15:39.700"} {"instruction": "Please provide detailed information about CVE-2025-22769", "inputs": "", "outputs": "CVE:CVE-2025-22769\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Brahma Multifox allows Stored XSS.This issue affects Multifox: from n/a through 1.3.7.\npublished:2025-01-15T16:15:39.860"} {"instruction": "Please provide detailed information about CVE-2025-22773", "inputs": "", "outputs": "CVE:CVE-2025-22773\nDescription:Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.\npublished:2025-01-15T16:15:40.027"} {"instruction": "Please provide detailed information about CVE-2025-22776", "inputs": "", "outputs": "CVE:CVE-2025-22776\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jay Carter WP Bulletin Board allows Reflected XSS.This issue affects WP Bulletin Board: from n/a through 1.1.4.\npublished:2025-01-15T16:15:40.193"} {"instruction": "Please provide detailed information about CVE-2025-22778", "inputs": "", "outputs": "CVE:CVE-2025-22778\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lijit Networks Inc. and Crowd Favorite Lijit Search allows Reflected XSS.This issue affects Lijit Search: from n/a through 1.1.\npublished:2025-01-15T16:15:40.350"} {"instruction": "Please provide detailed information about CVE-2025-22779", "inputs": "", "outputs": "CVE:CVE-2025-22779\nDescription:Missing Authorization vulnerability in Ugur CELIK WP News Sliders allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP News Sliders: from n/a through 1.0.\npublished:2025-01-15T16:15:40.510"} {"instruction": "Please provide detailed information about CVE-2025-22780", "inputs": "", "outputs": "CVE:CVE-2025-22780\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexey Yuzhakov wp-pano allows Stored XSS.This issue affects wp-pano: from n/a through 1.17.\npublished:2025-01-15T16:15:40.660"} {"instruction": "Please provide detailed information about CVE-2025-22781", "inputs": "", "outputs": "CVE:CVE-2025-22781\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nativery Developer Nativery allows DOM-Based XSS.This issue affects Nativery: from n/a through 0.1.6.\npublished:2025-01-15T16:15:40.813"} {"instruction": "Please provide detailed information about CVE-2025-22782", "inputs": "", "outputs": "CVE:CVE-2025-22782\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in Web Ready Now WR Price List Manager For Woocommerce allows Upload a Web Shell to a Web Server.This issue affects WR Price List Manager For Woocommerce: from n/a through 1.0.8.\npublished:2025-01-15T16:15:40.973"} {"instruction": "Please provide detailed information about CVE-2025-22784", "inputs": "", "outputs": "CVE:CVE-2025-22784\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Johan Ström Background Control allows Path Traversal.This issue affects Background Control: from n/a through 1.0.5.\npublished:2025-01-15T16:15:41.127"} {"instruction": "Please provide detailed information about CVE-2025-22785", "inputs": "", "outputs": "CVE:CVE-2025-22785\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ComMotion Course Booking System allows SQL Injection.This issue affects Course Booking System: from n/a through 6.0.5.\npublished:2025-01-15T16:15:41.290"} {"instruction": "Please provide detailed information about CVE-2025-22786", "inputs": "", "outputs": "CVE:CVE-2025-22786\nDescription:Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.\npublished:2025-01-15T16:15:41.440"} {"instruction": "Please provide detailed information about CVE-2025-22787", "inputs": "", "outputs": "CVE:CVE-2025-22787\nDescription:Missing Authorization vulnerability in bPlugins LLC Button Block allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Button Block: from n/a through 1.1.5.\npublished:2025-01-15T16:15:41.603"} {"instruction": "Please provide detailed information about CVE-2025-22788", "inputs": "", "outputs": "CVE:CVE-2025-22788\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codexpert, Inc CoDesigner WooCommerce Builder for Elementor allows Stored XSS.This issue affects CoDesigner WooCommerce Builder for Elementor: from n/a through 4.7.17.2.\npublished:2025-01-15T16:15:41.750"} {"instruction": "Please provide detailed information about CVE-2025-22793", "inputs": "", "outputs": "CVE:CVE-2025-22793\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bold Bold pagos en linea allows DOM-Based XSS.This issue affects Bold pagos en linea: from n/a through 3.1.0.\npublished:2025-01-15T16:15:41.897"} {"instruction": "Please provide detailed information about CVE-2025-22795", "inputs": "", "outputs": "CVE:CVE-2025-22795\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thorsten Krug Multilang Contact Form allows Reflected XSS.This issue affects Multilang Contact Form: from n/a through 1.5.\npublished:2025-01-15T16:15:42.053"} {"instruction": "Please provide detailed information about CVE-2025-22797", "inputs": "", "outputs": "CVE:CVE-2025-22797\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oğulcan Özügenç Gallery and Lightbox allows Stored XSS.This issue affects Gallery and Lightbox: from n/a through 1.0.14.\npublished:2025-01-15T16:15:42.200"} {"instruction": "Please provide detailed information about CVE-2025-22798", "inputs": "", "outputs": "CVE:CVE-2025-22798\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CHR Designer Responsive jQuery Slider allows Stored XSS.This issue affects Responsive jQuery Slider: from n/a through 1.1.1.\npublished:2025-01-15T16:15:42.343"} {"instruction": "Please provide detailed information about CVE-2025-22799", "inputs": "", "outputs": "CVE:CVE-2025-22799\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Vertim Coders Neon Product Designer allows SQL Injection.This issue affects Neon Product Designer: from n/a through 2.1.1.\npublished:2025-01-15T16:15:42.490"} {"instruction": "Please provide detailed information about CVE-2025-22968", "inputs": "", "outputs": "CVE:CVE-2025-22968\nDescription:An issue in D-Link DWR-M972V 1.05SSG allows a remote attacker to execute arbitrary code via SSH using root account without restrictions\npublished:2025-01-15T16:15:42.657"} {"instruction": "Please provide detailed information about CVE-2025-20036", "inputs": "", "outputs": "CVE:CVE-2025-20036\nDescription:Mattermost Mobile Apps versions <=2.22.0 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.\npublished:2025-01-15T17:15:18.950"} {"instruction": "Please provide detailed information about CVE-2025-20086", "inputs": "", "outputs": "CVE:CVE-2025-20086\nDescription:Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.\npublished:2025-01-15T17:15:19.107"} {"instruction": "Please provide detailed information about CVE-2025-20088", "inputs": "", "outputs": "CVE:CVE-2025-20088\nDescription:Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.\npublished:2025-01-15T17:15:19.243"} {"instruction": "Please provide detailed information about CVE-2025-21083", "inputs": "", "outputs": "CVE:CVE-2025-21083\nDescription:Mattermost Mobile Apps versions <=2.22.0 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.\npublished:2025-01-15T17:15:19.393"} {"instruction": "Please provide detailed information about CVE-2025-0480", "inputs": "", "outputs": "CVE:CVE-2025-0480\nDescription:A vulnerability classified as problematic has been found in wuzhicms 4.1.0. This affects the function test of the file coreframe/app/search/admin/config.php. The manipulation of the argument sphinxhost/sphinxport leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T18:15:24.457"} {"instruction": "Please provide detailed information about CVE-2025-0502", "inputs": "", "outputs": "CVE:CVE-2025-0502\nDescription:Transmission of Private Resources into a New Sphere ('Resource Leak') vulnerability in CrafterCMS Engine on Linux, MacOS, x86, Windows, 64 bit, ARM allows Directory Indexing, Resource Leak Exposure.This issue affects CrafterCMS: from 4.0.0 before 4.0.8, from 4.1.0 before 4.1.6.\npublished:2025-01-15T18:15:24.650"} {"instruction": "Please provide detailed information about CVE-2025-23040", "inputs": "", "outputs": "CVE:CVE-2025-23040\nDescription:GitHub Desktop is an open-source Electron-based GitHub app designed for git development. An attacker convincing a user to clone a repository directly or through a submodule can allow the attacker access to the user's credentials through the use of maliciously crafted remote URL. GitHub Desktop relies on Git to perform all network related operations (such as cloning, fetching, and pushing). When a user attempts to clone a repository GitHub Desktop will invoke `git clone` and when Git encounters a remote which requires authentication it will request the credentials for that remote host from GitHub Desktop using the git-credential protocol. Using a maliciously crafted URL it's possible to cause the credential request coming from Git to be misinterpreted by Github Desktop such that it will send credentials for a different host than the host that Git is currently communicating with thereby allowing for secret exfiltration. GitHub username and OAuth token, or credentials for other Git remote hosts stored in GitHub Desktop could be improperly transmitted to an unrelated host. Users should update to GitHub Desktop 3.4.12 or greater which fixes this vulnerability. Users who suspect they may be affected should revoke any relevant credentials.\npublished:2025-01-15T18:15:24.797"} {"instruction": "Please provide detailed information about CVE-2025-0481", "inputs": "", "outputs": "CVE:CVE-2025-0481\nDescription:A vulnerability classified as problematic has been found in D-Link DIR-878 1.03. Affected is an unknown function of the file /dllog.cgi of the component HTTP POST Request Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T19:15:26.807"} {"instruction": "Please provide detailed information about CVE-2025-0500", "inputs": "", "outputs": "CVE:CVE-2025-0500\nDescription:An issue in the native clients for Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV Clients may allow an attacker to access remote sessions via man-in-the-middle.\npublished:2025-01-15T19:15:27.003"} {"instruction": "Please provide detailed information about CVE-2025-0501", "inputs": "", "outputs": "CVE:CVE-2025-0501\nDescription:An issue in the native clients for Amazon WorkSpaces (when running PCoIP protocol) may allow an attacker to access remote sessions via man-in-the-middle.\npublished:2025-01-15T19:15:27.190"} {"instruction": "Please provide detailed information about CVE-2025-0482", "inputs": "", "outputs": "CVE:CVE-2025-0482\nDescription:A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T20:15:28.863"} {"instruction": "Please provide detailed information about CVE-2025-0483", "inputs": "", "outputs": "CVE:CVE-2025-0483\nDescription:A vulnerability has been found in Fanli2012 native-php-cms 1.0 and classified as problematic. This vulnerability affects unknown code of the file /fladmin/jump.php. The manipulation of the argument message/error leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T20:15:29.040"} {"instruction": "Please provide detailed information about CVE-2025-0484", "inputs": "", "outputs": "CVE:CVE-2025-0484\nDescription:A vulnerability was found in Fanli2012 native-php-cms 1.0 and classified as critical. This issue affects some unknown processing of the file /fladmin/sysconfig_doedit.php of the component Backend. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T20:15:29.227"} {"instruction": "Please provide detailed information about CVE-2025-0485", "inputs": "", "outputs": "CVE:CVE-2025-0485\nDescription:A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T20:15:29.400"} {"instruction": "Please provide detailed information about CVE-2025-22146", "inputs": "", "outputs": "CVE:CVE-2025-22146\nDescription:Sentry is a developer-first error tracking and performance monitoring tool. A critical vulnerability was discovered in the SAML SSO implementation of Sentry. It was reported to us via our private bug bounty program. The vulnerability allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. The victim email address must be known in order to exploit this vulnerability. The Sentry SaaS fix was deployed on Jan 14, 2025. For self hosted users; if only a single organization is allowed `(SENTRY_SINGLE_ORGANIZATION = True)`, then no action is needed. Otherwise, users should upgrade to version 25.1.0 or higher. There are no known workarounds for this vulnerability.\npublished:2025-01-15T20:15:30.557"} {"instruction": "Please provide detailed information about CVE-2025-0486", "inputs": "", "outputs": "CVE:CVE-2025-0486\nDescription:A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T21:15:14.960"} {"instruction": "Please provide detailed information about CVE-2025-0487", "inputs": "", "outputs": "CVE:CVE-2025-0487\nDescription:A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T21:15:15.160"} {"instruction": "Please provide detailed information about CVE-2025-0488", "inputs": "", "outputs": "CVE:CVE-2025-0488\nDescription:A vulnerability classified as critical has been found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file product_list.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T21:15:15.380"} {"instruction": "Please provide detailed information about CVE-2025-0489", "inputs": "", "outputs": "CVE:CVE-2025-0489\nDescription:A vulnerability classified as critical was found in Fanli2012 native-php-cms 1.0. This vulnerability affects unknown code of the file /fladmin/friendlink_dodel.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T22:15:26.660"} {"instruction": "Please provide detailed information about CVE-2025-0490", "inputs": "", "outputs": "CVE:CVE-2025-0490\nDescription:A vulnerability, which was classified as critical, has been found in Fanli2012 native-php-cms 1.0. This issue affects some unknown processing of the file /fladmin/article_dodel.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T22:15:26.820"} {"instruction": "Please provide detailed information about CVE-2025-0491", "inputs": "", "outputs": "CVE:CVE-2025-0491\nDescription:A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T22:15:26.990"} {"instruction": "Please provide detailed information about CVE-2025-0492", "inputs": "", "outputs": "CVE:CVE-2025-0492\nDescription:A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-15T22:15:27.157"} {"instruction": "Please provide detailed information about CVE-2025-0215", "inputs": "", "outputs": "CVE:CVE-2025-0215\nDescription:The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the showdata and initiate_restore parameters in all versions up to, and including, 1.24.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an admin user into performing an action such as clicking on a link.\npublished:2025-01-15T23:15:10.453"} {"instruction": "Please provide detailed information about CVE-2025-22964", "inputs": "", "outputs": "CVE:CVE-2025-22964\nDescription:DDSN Interactive cm3 Acora CMS version 10.1.1 has an unauthenticated time-based blind SQL Injection vulnerability caused by insufficient input sanitization and validation in the \"table\" parameter. This flaw allows attackers to inject malicious SQL queries by directly incorporating user-supplied input into database queries without proper escaping or validation. Exploiting this issue enables unauthorized access, manipulation of data, or exposure of sensitive information, posing significant risks to the integrity and confidentiality of the application.\npublished:2025-01-15T23:15:10.650"} {"instruction": "Please provide detailed information about CVE-2025-22976", "inputs": "", "outputs": "CVE:CVE-2025-22976\nDescription:SQL Injection vulnerability in dingfanzuCMS v.1.0 allows a local attacker to execute arbitrary code via not filtering the content correctly at the \"checkOrder.php\" shopId module.\npublished:2025-01-15T23:15:10.783"} {"instruction": "Please provide detailed information about CVE-2025-0476", "inputs": "", "outputs": "CVE:CVE-2025-0476\nDescription:Mattermost Mobile Apps versions <=2.22.0 fail to properly handle specially crafted attachment names, which allows an attacker to crash the mobile app for any user who opened a channel containing the specially crafted attachment\npublished:2025-01-16T00:15:25.217"} {"instruction": "Please provide detailed information about CVE-2025-0170", "inputs": "", "outputs": "CVE:CVE-2025-0170\nDescription:The DWT - Directory & Listing WordPress Theme is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping on the 'sort_by' and 'token' parameters. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\npublished:2025-01-16T02:15:27.043"} {"instruction": "Please provide detailed information about CVE-2025-0455", "inputs": "", "outputs": "CVE:CVE-2025-0455\nDescription:The airPASS from NetVision Information has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.\npublished:2025-01-16T02:15:27.203"} {"instruction": "Please provide detailed information about CVE-2025-0456", "inputs": "", "outputs": "CVE:CVE-2025-0456\nDescription:The airPASS from NetVision Information has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access the specific administrative functionality to retrieve * all accounts and passwords.\npublished:2025-01-16T02:15:27.387"} {"instruction": "Please provide detailed information about CVE-2025-0457", "inputs": "", "outputs": "CVE:CVE-2025-0457\nDescription:The airPASS from NetVision Information has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands.\npublished:2025-01-16T02:15:27.553"} {"instruction": "Please provide detailed information about CVE-2025-22904", "inputs": "", "outputs": "CVE:CVE-2025-22904\nDescription:RE11S v1.11 was discovered to contain a stack overflow via the pptpUserName parameter in the setWAN function.\npublished:2025-01-16T03:15:06.313"} {"instruction": "Please provide detailed information about CVE-2025-22905", "inputs": "", "outputs": "CVE:CVE-2025-22905\nDescription:RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.\npublished:2025-01-16T03:15:06.430"} {"instruction": "Please provide detailed information about CVE-2025-22906", "inputs": "", "outputs": "CVE:CVE-2025-22906\nDescription:RE11S v1.11 was discovered to contain a command injection vulnerability via the L2TPUserName parameter at /goform/setWAN.\npublished:2025-01-16T03:15:06.530"} {"instruction": "Please provide detailed information about CVE-2025-22907", "inputs": "", "outputs": "CVE:CVE-2025-22907\nDescription:RE11S v1.11 was discovered to contain a stack overflow via the selSSID parameter in the formWlSiteSurvey function.\npublished:2025-01-16T03:15:06.630"} {"instruction": "Please provide detailed information about CVE-2025-22912", "inputs": "", "outputs": "CVE:CVE-2025-22912\nDescription:RE11S v1.11 was discovered to contain a command injection vulnerability via the component /goform/formAccept.\npublished:2025-01-16T03:15:06.723"} {"instruction": "Please provide detailed information about CVE-2025-22913", "inputs": "", "outputs": "CVE:CVE-2025-22913\nDescription:RE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formStaDrvSetup function.\npublished:2025-01-16T03:15:06.850"} {"instruction": "Please provide detailed information about CVE-2025-22916", "inputs": "", "outputs": "CVE:CVE-2025-22916\nDescription:RE11S v1.11 was discovered to contain a stack overflow via the pppUserName parameter in the formPPPoESetup function.\npublished:2025-01-16T03:15:06.970"} {"instruction": "Please provide detailed information about CVE-2025-0471", "inputs": "", "outputs": "CVE:CVE-2025-0471\nDescription:Unrestricted file upload vulnerability in the PMB platform, affecting versions 4.0.10 and above. This vulnerability could allow an attacker to upload a file to gain remote access to the machine, being able to access, modify and execute commands freely.\npublished:2025-01-16T13:15:06.973"} {"instruction": "Please provide detailed information about CVE-2025-0472", "inputs": "", "outputs": "CVE:CVE-2025-0472\nDescription:Information exposure in the PMB platform affecting versions 4.2.13 and earlier. This vulnerability allows an attacker to upload a file to the environment and enumerate the internal files of a machine by looking at the request response.\npublished:2025-01-16T13:15:07.353"} {"instruction": "Please provide detailed information about CVE-2025-0473", "inputs": "", "outputs": "CVE:CVE-2025-0473\nDescription:Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the ‘/pmb/authorities/import/iimport_authorities’ endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to ‘/pmb/authorities/import/iimport_authorities’. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted.\npublished:2025-01-16T13:15:07.540"} {"instruction": "Please provide detailed information about CVE-2025-0518", "inputs": "", "outputs": "CVE:CVE-2025-0518\nDescription:Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg allows Read Sensitive Constants Within an Executable. This vulnerability is associated with program files https://github.Com/FFmpeg/FFmpeg/blob/master/libavfilter/af_pan.C . This issue affects FFmpeg: 7.1. Issue was fixed:  https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a This issue was discovered by: Simcha Kosman\npublished:2025-01-16T17:15:12.577"} {"instruction": "Please provide detailed information about CVE-2025-20072", "inputs": "", "outputs": "CVE:CVE-2025-20072\nDescription:Mattermost Mobile versions <= 2.22.0 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the mobile via crafted malicious input.\npublished:2025-01-16T18:15:28.517"} {"instruction": "Please provide detailed information about CVE-2025-20621", "inputs": "", "outputs": "CVE:CVE-2025-20621\nDescription:Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the webapp to crash via creating and sending such a post to a channel.\npublished:2025-01-16T19:15:29.960"} {"instruction": "Please provide detailed information about CVE-2025-20630", "inputs": "", "outputs": "CVE:CVE-2025-20630\nDescription:Mattermost Mobile versions <=2.22.0 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the mobile to crash via creating and sending such a post to a channel.\npublished:2025-01-16T19:15:30.110"} {"instruction": "Please provide detailed information about CVE-2025-23423", "inputs": "", "outputs": "CVE:CVE-2025-23423\nDescription:Missing Authorization vulnerability in Smackcoders SendGrid for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SendGrid for WordPress: from n/a through 1.4.\npublished:2025-01-16T20:15:33.573"} {"instruction": "Please provide detailed information about CVE-2025-23424", "inputs": "", "outputs": "CVE:CVE-2025-23424\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Brian Novotny – Creative Software Design Solutions Marquee Style RSS News Ticker allows Cross Site Request Forgery.This issue affects Marquee Style RSS News Ticker: from n/a through 3.2.0.\npublished:2025-01-16T20:15:33.723"} {"instruction": "Please provide detailed information about CVE-2025-23426", "inputs": "", "outputs": "CVE:CVE-2025-23426\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wizcrew Technologies go Social allows Stored XSS.This issue affects go Social: from n/a through 1.0.\npublished:2025-01-16T20:15:33.877"} {"instruction": "Please provide detailed information about CVE-2025-23429", "inputs": "", "outputs": "CVE:CVE-2025-23429\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in altimawebsystems.com Altima Lookbook Free for WooCommerce allows Reflected XSS.This issue affects Altima Lookbook Free for WooCommerce: from n/a through 1.1.0.\npublished:2025-01-16T20:15:34.057"} {"instruction": "Please provide detailed information about CVE-2025-23430", "inputs": "", "outputs": "CVE:CVE-2025-23430\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Oren Yomtov Mass Custom Fields Manager allows Reflected XSS.This issue affects Mass Custom Fields Manager: from n/a through 1.5.\npublished:2025-01-16T20:15:34.287"} {"instruction": "Please provide detailed information about CVE-2025-23432", "inputs": "", "outputs": "CVE:CVE-2025-23432\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlTi5 AlT Report allows Reflected XSS.This issue affects AlT Report: from n/a through 1.12.0.\npublished:2025-01-16T20:15:34.467"} {"instruction": "Please provide detailed information about CVE-2025-23434", "inputs": "", "outputs": "CVE:CVE-2025-23434\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Albertolabs.com Easy EU Cookie law allows Stored XSS.This issue affects Easy EU Cookie law: from n/a through 1.3.3.1.\npublished:2025-01-16T20:15:34.607"} {"instruction": "Please provide detailed information about CVE-2025-23435", "inputs": "", "outputs": "CVE:CVE-2025-23435\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in David Marcucci Password Protect Plugin for WordPress allows Stored XSS.This issue affects Password Protect Plugin for WordPress: from n/a through 0.8.1.0.\npublished:2025-01-16T20:15:34.770"} {"instruction": "Please provide detailed information about CVE-2025-23436", "inputs": "", "outputs": "CVE:CVE-2025-23436\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Capa Wp-Scribd-List allows Stored XSS.This issue affects Wp-Scribd-List: from n/a through 1.2.\npublished:2025-01-16T20:15:34.920"} {"instruction": "Please provide detailed information about CVE-2025-23438", "inputs": "", "outputs": "CVE:CVE-2025-23438\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MarvinLabs WP PT-Viewer allows Reflected XSS.This issue affects WP PT-Viewer: from n/a through 2.0.2.\npublished:2025-01-16T20:15:35.067"} {"instruction": "Please provide detailed information about CVE-2025-23442", "inputs": "", "outputs": "CVE:CVE-2025-23442\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in matias s Shockingly Big IE6 Warning allows Stored XSS.This issue affects Shockingly Big IE6 Warning: from n/a through 1.6.3.\npublished:2025-01-16T20:15:35.210"} {"instruction": "Please provide detailed information about CVE-2025-23444", "inputs": "", "outputs": "CVE:CVE-2025-23444\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nasir Scroll Top Advanced allows Stored XSS.This issue affects Scroll Top Advanced: from n/a through 2.5.\npublished:2025-01-16T20:15:35.360"} {"instruction": "Please provide detailed information about CVE-2025-23445", "inputs": "", "outputs": "CVE:CVE-2025-23445\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Scott Swezey Easy Tynt allows Cross Site Request Forgery.This issue affects Easy Tynt: from n/a through 0.2.5.1.\npublished:2025-01-16T20:15:35.513"} {"instruction": "Please provide detailed information about CVE-2025-23452", "inputs": "", "outputs": "CVE:CVE-2025-23452\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EditionGuard Dev Team EditionGuard for WooCommerce – eBook Sales with DRM allows Reflected XSS.This issue affects EditionGuard for WooCommerce – eBook Sales with DRM: from n/a through 3.4.2.\npublished:2025-01-16T20:15:35.730"} {"instruction": "Please provide detailed information about CVE-2025-23453", "inputs": "", "outputs": "CVE:CVE-2025-23453\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Myriad Solutionz Stars SMTP Mailer allows Reflected XSS.This issue affects Stars SMTP Mailer: from n/a through 1.7.\npublished:2025-01-16T20:15:35.883"} {"instruction": "Please provide detailed information about CVE-2025-23455", "inputs": "", "outputs": "CVE:CVE-2025-23455\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in mastersoftwaresolutions WP VTiger Synchronization allows Stored XSS.This issue affects WP VTiger Synchronization: from n/a through 1.1.1.\npublished:2025-01-16T20:15:36.033"} {"instruction": "Please provide detailed information about CVE-2025-23456", "inputs": "", "outputs": "CVE:CVE-2025-23456\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Somethinkodd.com Development Team EmailShroud allows Reflected XSS.This issue affects EmailShroud: from n/a through 2.2.1.\npublished:2025-01-16T20:15:36.247"} {"instruction": "Please provide detailed information about CVE-2025-23463", "inputs": "", "outputs": "CVE:CVE-2025-23463\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mukesh Dak MD Custom content after or before of post allows Stored XSS.This issue affects MD Custom content after or before of post: from n/a through 1.0.\npublished:2025-01-16T20:15:36.397"} {"instruction": "Please provide detailed information about CVE-2025-23467", "inputs": "", "outputs": "CVE:CVE-2025-23467\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Vimal Ghorecha RSS News Scroller allows Stored XSS.This issue affects RSS News Scroller: from n/a through 2.0.0.\npublished:2025-01-16T20:15:36.547"} {"instruction": "Please provide detailed information about CVE-2025-23470", "inputs": "", "outputs": "CVE:CVE-2025-23470\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in X Villamuera Visit Site Link enhanced allows Stored XSS.This issue affects Visit Site Link enhanced: from n/a through 1.0.\npublished:2025-01-16T20:15:36.700"} {"instruction": "Please provide detailed information about CVE-2025-23471", "inputs": "", "outputs": "CVE:CVE-2025-23471\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Andy Chapman ECT Add to Cart Button allows Stored XSS.This issue affects ECT Add to Cart Button: from n/a through 1.4.\npublished:2025-01-16T20:15:36.840"} {"instruction": "Please provide detailed information about CVE-2025-23476", "inputs": "", "outputs": "CVE:CVE-2025-23476\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in isnowfy my-related-posts allows Stored XSS.This issue affects my-related-posts: from n/a through 1.1.\npublished:2025-01-16T20:15:36.990"} {"instruction": "Please provide detailed information about CVE-2025-23483", "inputs": "", "outputs": "CVE:CVE-2025-23483\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Niklas Olsson Universal Analytics Injector allows Stored XSS.This issue affects Universal Analytics Injector: from n/a through 1.0.3.\npublished:2025-01-16T20:15:37.133"} {"instruction": "Please provide detailed information about CVE-2025-23497", "inputs": "", "outputs": "CVE:CVE-2025-23497\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Albdesign Simple Project Manager allows Stored XSS.This issue affects Simple Project Manager: from n/a through 1.2.2.\npublished:2025-01-16T20:15:37.293"} {"instruction": "Please provide detailed information about CVE-2025-23499", "inputs": "", "outputs": "CVE:CVE-2025-23499\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier Board Election allows Stored XSS.This issue affects Board Election: from n/a through 1.0.1.\npublished:2025-01-16T20:15:37.440"} {"instruction": "Please provide detailed information about CVE-2025-23501", "inputs": "", "outputs": "CVE:CVE-2025-23501\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in SpruceJoy Cookie Consent & Autoblock for GDPR/CCPA allows Stored XSS.This issue affects Cookie Consent & Autoblock for GDPR/CCPA: from n/a through 1.0.1.\npublished:2025-01-16T20:15:37.593"} {"instruction": "Please provide detailed information about CVE-2025-23508", "inputs": "", "outputs": "CVE:CVE-2025-23508\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in EdesaC Extra Options – Favicons allows Stored XSS.This issue affects Extra Options – Favicons: from n/a through 1.1.0.\npublished:2025-01-16T20:15:37.737"} {"instruction": "Please provide detailed information about CVE-2025-23510", "inputs": "", "outputs": "CVE:CVE-2025-23510\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Zaantar WordPress Logging Service allows Stored XSS.This issue affects WordPress Logging Service: from n/a through 1.5.4.\npublished:2025-01-16T20:15:37.890"} {"instruction": "Please provide detailed information about CVE-2025-23511", "inputs": "", "outputs": "CVE:CVE-2025-23511\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Viktoria Rei Bauer WP-BlackCheck allows Stored XSS.This issue affects WP-BlackCheck: from n/a through 2.7.2.\npublished:2025-01-16T20:15:38.040"} {"instruction": "Please provide detailed information about CVE-2025-23513", "inputs": "", "outputs": "CVE:CVE-2025-23513\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Joshua Wieczorek Bible Embed allows Stored XSS.This issue affects Bible Embed: from n/a through 0.0.4.\npublished:2025-01-16T20:15:38.193"} {"instruction": "Please provide detailed information about CVE-2025-23514", "inputs": "", "outputs": "CVE:CVE-2025-23514\nDescription:Missing Authorization vulnerability in Sanjaysolutions Loginplus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Loginplus: from n/a through 1.2.\npublished:2025-01-16T20:15:38.337"} {"instruction": "Please provide detailed information about CVE-2025-23528", "inputs": "", "outputs": "CVE:CVE-2025-23528\nDescription:Incorrect Privilege Assignment vulnerability in Wouter Dijkstra DD Roles allows Privilege Escalation.This issue affects DD Roles: from n/a through 4.1.\npublished:2025-01-16T20:15:38.480"} {"instruction": "Please provide detailed information about CVE-2025-23530", "inputs": "", "outputs": "CVE:CVE-2025-23530\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Yonatan Reinberg of Social Ink Custom Post Type Lockdown allows Privilege Escalation.This issue affects Custom Post Type Lockdown: from n/a through 1.11.\npublished:2025-01-16T20:15:38.630"} {"instruction": "Please provide detailed information about CVE-2025-23532", "inputs": "", "outputs": "CVE:CVE-2025-23532\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Regios MyAnime Widget allows Privilege Escalation.This issue affects MyAnime Widget: from n/a through 1.0.\npublished:2025-01-16T20:15:38.783"} {"instruction": "Please provide detailed information about CVE-2025-23533", "inputs": "", "outputs": "CVE:CVE-2025-23533\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Adrian Moreno WP Lyrics allows Stored XSS.This issue affects WP Lyrics: from n/a through 0.4.1.\npublished:2025-01-16T20:15:38.930"} {"instruction": "Please provide detailed information about CVE-2025-23537", "inputs": "", "outputs": "CVE:CVE-2025-23537\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Oren hahiashvili add custom google tag manager allows Stored XSS.This issue affects add custom google tag manager: from n/a through 1.0.3.\npublished:2025-01-16T20:15:39.070"} {"instruction": "Please provide detailed information about CVE-2025-23547", "inputs": "", "outputs": "CVE:CVE-2025-23547\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Shaw LH Login Page allows Reflected XSS.This issue affects LH Login Page: from n/a through 2.14.\npublished:2025-01-16T20:15:39.220"} {"instruction": "Please provide detailed information about CVE-2025-23557", "inputs": "", "outputs": "CVE:CVE-2025-23557\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Kathleen Malone Find Your Reps allows Stored XSS.This issue affects Find Your Reps: from n/a through 1.2.\npublished:2025-01-16T20:15:39.363"} {"instruction": "Please provide detailed information about CVE-2025-23558", "inputs": "", "outputs": "CVE:CVE-2025-23558\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in digfish Geotagged Media allows Stored XSS.This issue affects Geotagged Media: from n/a through 0.3.0.\npublished:2025-01-16T20:15:39.503"} {"instruction": "Please provide detailed information about CVE-2025-23559", "inputs": "", "outputs": "CVE:CVE-2025-23559\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Stepan Stepasyuk MemeOne allows Stored XSS.This issue affects MemeOne: from n/a through 2.0.5.\npublished:2025-01-16T20:15:39.650"} {"instruction": "Please provide detailed information about CVE-2025-23560", "inputs": "", "outputs": "CVE:CVE-2025-23560\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Elke Hinze, Plumeria Web Design Web Testimonials allows Stored XSS.This issue affects Web Testimonials: from n/a through 1.2.\npublished:2025-01-16T20:15:39.797"} {"instruction": "Please provide detailed information about CVE-2025-23566", "inputs": "", "outputs": "CVE:CVE-2025-23566\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Syed Amir Hussain Custom Post allows Stored XSS.This issue affects Custom Post: from n/a through 1.0.\npublished:2025-01-16T20:15:39.947"} {"instruction": "Please provide detailed information about CVE-2025-23567", "inputs": "", "outputs": "CVE:CVE-2025-23567\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Intuitive Design GDReseller allows Stored XSS.This issue affects GDReseller: from n/a through 1.6.\npublished:2025-01-16T20:15:40.090"} {"instruction": "Please provide detailed information about CVE-2025-23569", "inputs": "", "outputs": "CVE:CVE-2025-23569\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Kelvin Ng Shortcode in Comment allows Stored XSS.This issue affects Shortcode in Comment: from n/a through 1.1.1.\npublished:2025-01-16T20:15:40.230"} {"instruction": "Please provide detailed information about CVE-2025-23572", "inputs": "", "outputs": "CVE:CVE-2025-23572\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Dave Konopka, Martin Scharm UpDownUpDown allows Stored XSS.This issue affects UpDownUpDown: from n/a through 1.1.\npublished:2025-01-16T20:15:40.403"} {"instruction": "Please provide detailed information about CVE-2025-23573", "inputs": "", "outputs": "CVE:CVE-2025-23573\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Sam Burdge WP Background Tile allows Stored XSS.This issue affects WP Background Tile: from n/a through 1.0.\npublished:2025-01-16T20:15:40.740"} {"instruction": "Please provide detailed information about CVE-2025-23577", "inputs": "", "outputs": "CVE:CVE-2025-23577\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Sourov Amin Word Freshener allows Stored XSS.This issue affects Word Freshener: from n/a through 1.3.\npublished:2025-01-16T20:15:40.877"} {"instruction": "Please provide detailed information about CVE-2025-23617", "inputs": "", "outputs": "CVE:CVE-2025-23617\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal Floatbox Plus allows Stored XSS.This issue affects Floatbox Plus: from n/a through 1.4.4.\npublished:2025-01-16T20:15:41.027"} {"instruction": "Please provide detailed information about CVE-2025-23618", "inputs": "", "outputs": "CVE:CVE-2025-23618\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Andrea Brandi Twitter Shortcode allows Stored XSS.This issue affects Twitter Shortcode: from n/a through 0.9.\npublished:2025-01-16T20:15:41.193"} {"instruction": "Please provide detailed information about CVE-2025-23620", "inputs": "", "outputs": "CVE:CVE-2025-23620\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexey Trofimov Captchelfie – Captcha by Selfie allows Reflected XSS.This issue affects Captchelfie – Captcha by Selfie: from n/a through 1.0.7.\npublished:2025-01-16T20:15:41.340"} {"instruction": "Please provide detailed information about CVE-2025-23623", "inputs": "", "outputs": "CVE:CVE-2025-23623\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mahesh Bisen Contact Form 7 – CCAvenue Add-on allows Reflected XSS.This issue affects Contact Form 7 – CCAvenue Add-on: from n/a through 1.0.\npublished:2025-01-16T20:15:41.480"} {"instruction": "Please provide detailed information about CVE-2025-23627", "inputs": "", "outputs": "CVE:CVE-2025-23627\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Gordon French Comment-Emailer allows Stored XSS.This issue affects Comment-Emailer: from n/a through 1.0.5.\npublished:2025-01-16T20:15:41.617"} {"instruction": "Please provide detailed information about CVE-2025-23639", "inputs": "", "outputs": "CVE:CVE-2025-23639\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan MDC YouTube Downloader allows Stored XSS.This issue affects MDC YouTube Downloader: from n/a through 3.0.0.\npublished:2025-01-16T20:15:41.763"} {"instruction": "Please provide detailed information about CVE-2025-23640", "inputs": "", "outputs": "CVE:CVE-2025-23640\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Nazmul Ahsan Rename Author Slug allows Stored XSS.This issue affects Rename Author Slug: from n/a through 1.2.0.\npublished:2025-01-16T20:15:41.900"} {"instruction": "Please provide detailed information about CVE-2025-23641", "inputs": "", "outputs": "CVE:CVE-2025-23641\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thomas Ehrhardt Powie's pLinks PagePeeker allows DOM-Based XSS.This issue affects Powie's pLinks PagePeeker: from n/a through 1.0.2.\npublished:2025-01-16T20:15:42.037"} {"instruction": "Please provide detailed information about CVE-2025-23642", "inputs": "", "outputs": "CVE:CVE-2025-23642\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pflonk Sidebar-Content from Shortcode allows DOM-Based XSS.This issue affects Sidebar-Content from Shortcode: from n/a through 2.0.\npublished:2025-01-16T20:15:42.190"} {"instruction": "Please provide detailed information about CVE-2025-23644", "inputs": "", "outputs": "CVE:CVE-2025-23644\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Kuepper QuoteMedia Tools allows DOM-Based XSS.This issue affects QuoteMedia Tools: from n/a through 1.0.\npublished:2025-01-16T20:15:42.323"} {"instruction": "Please provide detailed information about CVE-2025-23649", "inputs": "", "outputs": "CVE:CVE-2025-23649\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Kreg Steppe Auphonic Importer allows Stored XSS.This issue affects Auphonic Importer: from n/a through 1.5.1.\npublished:2025-01-16T20:15:42.463"} {"instruction": "Please provide detailed information about CVE-2025-23654", "inputs": "", "outputs": "CVE:CVE-2025-23654\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Vinícius Krolow Twitter Post allows Stored XSS.This issue affects Twitter Post: from n/a through 0.1.\npublished:2025-01-16T20:15:42.607"} {"instruction": "Please provide detailed information about CVE-2025-23659", "inputs": "", "outputs": "CVE:CVE-2025-23659\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Hernan Javier Hegykozi MercadoLibre Integration allows Stored XSS.This issue affects MercadoLibre Integration: from n/a through 1.1.\npublished:2025-01-16T20:15:42.750"} {"instruction": "Please provide detailed information about CVE-2025-23660", "inputs": "", "outputs": "CVE:CVE-2025-23660\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Walter Cerrudo MFPlugin allows Stored XSS.This issue affects MFPlugin: from n/a through 1.3.\npublished:2025-01-16T20:15:42.893"} {"instruction": "Please provide detailed information about CVE-2025-23661", "inputs": "", "outputs": "CVE:CVE-2025-23661\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana NV Slider allows Stored XSS.This issue affects NV Slider: from n/a through 1.6.\npublished:2025-01-16T20:15:43.037"} {"instruction": "Please provide detailed information about CVE-2025-23662", "inputs": "", "outputs": "CVE:CVE-2025-23662\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Ryan Sutana WP Panoramio allows Stored XSS.This issue affects WP Panoramio: from n/a through 1.5.0.\npublished:2025-01-16T20:15:43.167"} {"instruction": "Please provide detailed information about CVE-2025-23664", "inputs": "", "outputs": "CVE:CVE-2025-23664\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Real Seguro Viagem Real Seguro Viagem allows Stored XSS.This issue affects Real Seguro Viagem: from n/a through 2.0.5.\npublished:2025-01-16T20:15:43.320"} {"instruction": "Please provide detailed information about CVE-2025-23665", "inputs": "", "outputs": "CVE:CVE-2025-23665\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Rapid Sort RSV GMaps allows Stored XSS.This issue affects RSV GMaps: from n/a through 1.5.\npublished:2025-01-16T20:15:43.460"} {"instruction": "Please provide detailed information about CVE-2025-23673", "inputs": "", "outputs": "CVE:CVE-2025-23673\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Don Kukral Email on Publish allows Stored XSS.This issue affects Email on Publish: from n/a through 1.5.\npublished:2025-01-16T20:15:43.620"} {"instruction": "Please provide detailed information about CVE-2025-23675", "inputs": "", "outputs": "CVE:CVE-2025-23675\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in SandyIN Import Users to MailChimp allows Stored XSS.This issue affects Import Users to MailChimp: from n/a through 1.0.\npublished:2025-01-16T20:15:43.753"} {"instruction": "Please provide detailed information about CVE-2025-23677", "inputs": "", "outputs": "CVE:CVE-2025-23677\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in DSmidgy HTTP to HTTPS link changer by Eyga.net allows Stored XSS.This issue affects HTTP to HTTPS link changer by Eyga.net: from n/a through 0.2.4.\npublished:2025-01-16T20:15:43.900"} {"instruction": "Please provide detailed information about CVE-2025-23689", "inputs": "", "outputs": "CVE:CVE-2025-23689\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Poco Blogger Image Import allows Stored XSS.This issue affects Blogger Image Import: from 2.1 through n/a.\npublished:2025-01-16T20:15:44.040"} {"instruction": "Please provide detailed information about CVE-2025-23690", "inputs": "", "outputs": "CVE:CVE-2025-23690\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in ArtkanMedia Book a Place allows Stored XSS.This issue affects Book a Place: from n/a through 0.7.1.\npublished:2025-01-16T20:15:44.197"} {"instruction": "Please provide detailed information about CVE-2025-23691", "inputs": "", "outputs": "CVE:CVE-2025-23691\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Braulio Aquino García Send to Twitter allows Stored XSS.This issue affects Send to Twitter: from n/a through 1.7.2.\npublished:2025-01-16T20:15:44.353"} {"instruction": "Please provide detailed information about CVE-2025-23692", "inputs": "", "outputs": "CVE:CVE-2025-23692\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Slider for Writers allows Stored XSS.This issue affects Slider for Writers: from n/a through 1.3.\npublished:2025-01-16T20:15:44.503"} {"instruction": "Please provide detailed information about CVE-2025-23693", "inputs": "", "outputs": "CVE:CVE-2025-23693\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Stanisław Skonieczny Secure CAPTCHA allows Stored XSS.This issue affects Secure CAPTCHA: from n/a through 1.2.\npublished:2025-01-16T20:15:44.637"} {"instruction": "Please provide detailed information about CVE-2025-23694", "inputs": "", "outputs": "CVE:CVE-2025-23694\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Shabbos Commerce Shabbos and Yom Tov allows Stored XSS.This issue affects Shabbos and Yom Tov: from n/a through 1.9.\npublished:2025-01-16T20:15:44.780"} {"instruction": "Please provide detailed information about CVE-2025-23698", "inputs": "", "outputs": "CVE:CVE-2025-23698\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Iván R. Delgado Martínez WP Custom Google Search allows Stored XSS.This issue affects WP Custom Google Search: from n/a through 1.0.\npublished:2025-01-16T20:15:44.910"} {"instruction": "Please provide detailed information about CVE-2025-23699", "inputs": "", "outputs": "CVE:CVE-2025-23699\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechMix Event Countdown Timer Plugin by TechMix allows Reflected XSS.This issue affects Event Countdown Timer Plugin by TechMix: from n/a through 1.4.\npublished:2025-01-16T20:15:45.060"} {"instruction": "Please provide detailed information about CVE-2025-23702", "inputs": "", "outputs": "CVE:CVE-2025-23702\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Schalk Burger Anonymize Links allows Stored XSS.This issue affects Anonymize Links: from n/a through 1.1.\npublished:2025-01-16T20:15:45.213"} {"instruction": "Please provide detailed information about CVE-2025-23703", "inputs": "", "outputs": "CVE:CVE-2025-23703\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in CS : ABS-Hosting.nl / Walchum.net Free MailClient FMC allows Stored XSS.This issue affects Free MailClient FMC: from n/a through 1.0.\npublished:2025-01-16T20:15:45.350"} {"instruction": "Please provide detailed information about CVE-2025-23708", "inputs": "", "outputs": "CVE:CVE-2025-23708\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Dominic Fallows DF Draggable allows Stored XSS.This issue affects DF Draggable: from n/a through 1.13.2.\npublished:2025-01-16T20:15:45.493"} {"instruction": "Please provide detailed information about CVE-2025-23710", "inputs": "", "outputs": "CVE:CVE-2025-23710\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mayur Sojitra Flying Twitter Birds allows Stored XSS.This issue affects Flying Twitter Birds: from n/a through 1.8.\npublished:2025-01-16T20:15:45.643"} {"instruction": "Please provide detailed information about CVE-2025-23712", "inputs": "", "outputs": "CVE:CVE-2025-23712\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Kapost Kapost allows Stored XSS.This issue affects Kapost: from n/a through 2.2.9.\npublished:2025-01-16T20:15:45.800"} {"instruction": "Please provide detailed information about CVE-2025-23713", "inputs": "", "outputs": "CVE:CVE-2025-23713\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Hack me if you can allows Stored XSS.This issue affects Hack me if you can: from n/a through 1.2.\npublished:2025-01-16T20:15:45.940"} {"instruction": "Please provide detailed information about CVE-2025-23715", "inputs": "", "outputs": "CVE:CVE-2025-23715\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in RaymondDesign Post & Page Notes allows Stored XSS.This issue affects Post & Page Notes: from n/a through 0.1.1.\npublished:2025-01-16T20:15:46.083"} {"instruction": "Please provide detailed information about CVE-2025-23717", "inputs": "", "outputs": "CVE:CVE-2025-23717\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in ITMOOTI Theme My Ontraport Smartform allows Stored XSS.This issue affects Theme My Ontraport Smartform: from n/a through 1.2.11.\npublished:2025-01-16T20:15:46.247"} {"instruction": "Please provide detailed information about CVE-2025-23720", "inputs": "", "outputs": "CVE:CVE-2025-23720\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mozilla Web Push allows Stored XSS.This issue affects Web Push: from n/a through 1.4.0.\npublished:2025-01-16T20:15:46.397"} {"instruction": "Please provide detailed information about CVE-2025-23743", "inputs": "", "outputs": "CVE:CVE-2025-23743\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Martijn Scheybeler Social Analytics allows Stored XSS.This issue affects Social Analytics: from n/a through 0.2.\npublished:2025-01-16T20:15:46.550"} {"instruction": "Please provide detailed information about CVE-2025-23745", "inputs": "", "outputs": "CVE:CVE-2025-23745\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Tussendoor internet & marketing Call me Now allows Stored XSS.This issue affects Call me Now: from n/a through 1.0.5.\npublished:2025-01-16T20:15:46.687"} {"instruction": "Please provide detailed information about CVE-2025-23749", "inputs": "", "outputs": "CVE:CVE-2025-23749\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mahdi Khaksar mybb Last Topics allows Stored XSS.This issue affects mybb Last Topics: from n/a through 1.0.\npublished:2025-01-16T20:15:46.830"} {"instruction": "Please provide detailed information about CVE-2025-23767", "inputs": "", "outputs": "CVE:CVE-2025-23767\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Revolutionart Marmoset Viewer allows Stored XSS.This issue affects Marmoset Viewer: from n/a through 1.9.3.\npublished:2025-01-16T20:15:46.967"} {"instruction": "Please provide detailed information about CVE-2025-23783", "inputs": "", "outputs": "CVE:CVE-2025-23783\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in carrotbits Greek Namedays Widget From Eortologio.Net allows Stored XSS.This issue affects Greek Namedays Widget From Eortologio.Net: from n/a through 20191113.\npublished:2025-01-16T20:15:47.100"} {"instruction": "Please provide detailed information about CVE-2025-23760", "inputs": "", "outputs": "CVE:CVE-2025-23760\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Volkov Chatter allows Stored XSS. This issue affects Chatter: from n/a through 1.0.1.\npublished:2025-01-16T21:15:18.257"} {"instruction": "Please provide detailed information about CVE-2025-23761", "inputs": "", "outputs": "CVE:CVE-2025-23761\nDescription:Missing Authorization vulnerability in Alex Volkov Woo Tuner allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Woo Tuner: from n/a through 0.1.2.\npublished:2025-01-16T21:15:18.410"} {"instruction": "Please provide detailed information about CVE-2025-23764", "inputs": "", "outputs": "CVE:CVE-2025-23764\nDescription:Missing Authorization vulnerability in Ujjaval Jani Copy Move Posts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Copy Move Posts: from n/a through 1.6.\npublished:2025-01-16T21:15:18.550"} {"instruction": "Please provide detailed information about CVE-2025-23765", "inputs": "", "outputs": "CVE:CVE-2025-23765\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER allows Cross Site Request Forgery.This issue affects W3SPEEDSTER: from n/a through 7.33.\npublished:2025-01-16T21:15:18.700"} {"instruction": "Please provide detailed information about CVE-2025-23772", "inputs": "", "outputs": "CVE:CVE-2025-23772\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eugenio Petullà imaGenius allows Stored XSS.This issue affects imaGenius: from n/a through 1.7.\npublished:2025-01-16T21:15:18.860"} {"instruction": "Please provide detailed information about CVE-2025-23775", "inputs": "", "outputs": "CVE:CVE-2025-23775\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WWP GMAPS for WPBakery Page Builder Free allows Stored XSS.This issue affects GMAPS for WPBakery Page Builder Free: from n/a through 1.2.\npublished:2025-01-16T21:15:19.007"} {"instruction": "Please provide detailed information about CVE-2025-23776", "inputs": "", "outputs": "CVE:CVE-2025-23776\nDescription:Missing Authorization vulnerability in Thorn Technologies LLC Cache Sniper for Nginx allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cache Sniper for Nginx: from n/a through 1.0.4.2.\npublished:2025-01-16T21:15:19.160"} {"instruction": "Please provide detailed information about CVE-2025-23777", "inputs": "", "outputs": "CVE:CVE-2025-23777\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Willows Consulting Ltd. GDPR Personal Data Reports allows Stored XSS.This issue affects GDPR Personal Data Reports: from n/a through 1.0.5.\npublished:2025-01-16T21:15:19.323"} {"instruction": "Please provide detailed information about CVE-2025-23778", "inputs": "", "outputs": "CVE:CVE-2025-23778\nDescription:Missing Authorization vulnerability in Pravin Durugkar User Sync ActiveCampaign allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Sync ActiveCampaign: from n/a through 1.3.2.\npublished:2025-01-16T21:15:19.483"} {"instruction": "Please provide detailed information about CVE-2025-23779", "inputs": "", "outputs": "CVE:CVE-2025-23779\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in web-mv.de ResAds allows SQL Injection.This issue affects ResAds: from n/a through 2.0.5.\npublished:2025-01-16T21:15:19.640"} {"instruction": "Please provide detailed information about CVE-2025-23780", "inputs": "", "outputs": "CVE:CVE-2025-23780\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AlphaBPO Easy Code Snippets allows SQL Injection.This issue affects Easy Code Snippets: from n/a through 1.0.2.\npublished:2025-01-16T21:15:19.800"} {"instruction": "Please provide detailed information about CVE-2025-23785", "inputs": "", "outputs": "CVE:CVE-2025-23785\nDescription:Missing Authorization vulnerability in August Infotech AI Responsive Gallery Album allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AI Responsive Gallery Album: from n/a through 1.4.\npublished:2025-01-16T21:15:19.967"} {"instruction": "Please provide detailed information about CVE-2025-23791", "inputs": "", "outputs": "CVE:CVE-2025-23791\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RocaPress Horizontal Line Shortcode allows Stored XSS.This issue affects Horizontal Line Shortcode: from n/a through 1.0.\npublished:2025-01-16T21:15:20.113"} {"instruction": "Please provide detailed information about CVE-2025-23793", "inputs": "", "outputs": "CVE:CVE-2025-23793\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Auto FTP allows Stored XSS. This issue affects Auto FTP: from n/a through 1.0.1.\npublished:2025-01-16T21:15:20.267"} {"instruction": "Please provide detailed information about CVE-2025-23794", "inputs": "", "outputs": "CVE:CVE-2025-23794\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rccoder wp_amaps allows Stored XSS.This issue affects wp_amaps: from n/a through 1.7.\npublished:2025-01-16T21:15:20.397"} {"instruction": "Please provide detailed information about CVE-2025-23795", "inputs": "", "outputs": "CVE:CVE-2025-23795\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gold Plugins Easy FAQs allows Stored XSS.This issue affects Easy FAQs: from n/a through 3.2.1.\npublished:2025-01-16T21:15:20.567"} {"instruction": "Please provide detailed information about CVE-2025-23796", "inputs": "", "outputs": "CVE:CVE-2025-23796\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tushar Patel Easy Portfolio allows Stored XSS.This issue affects Easy Portfolio: from n/a through 1.3.\npublished:2025-01-16T21:15:20.727"} {"instruction": "Please provide detailed information about CVE-2025-23797", "inputs": "", "outputs": "CVE:CVE-2025-23797\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mike Selander WP Options Editor allows Privilege Escalation.This issue affects WP Options Editor: from n/a through 1.1.\npublished:2025-01-16T21:15:20.877"} {"instruction": "Please provide detailed information about CVE-2025-23800", "inputs": "", "outputs": "CVE:CVE-2025-23800\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in David Hamilton OrangeBox allows Cross Site Request Forgery.This issue affects OrangeBox: from n/a through 3.0.0.\npublished:2025-01-16T21:15:21.040"} {"instruction": "Please provide detailed information about CVE-2025-23801", "inputs": "", "outputs": "CVE:CVE-2025-23801\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Benjamin Guy Style Admin allows Stored XSS.This issue affects Style Admin: from n/a through 1.4.3.\npublished:2025-01-16T21:15:21.190"} {"instruction": "Please provide detailed information about CVE-2025-23802", "inputs": "", "outputs": "CVE:CVE-2025-23802\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Steven Soehl WP-Revive Adserver allows Stored XSS.This issue affects WP-Revive Adserver: from n/a through 2.2.1.\npublished:2025-01-16T21:15:21.350"} {"instruction": "Please provide detailed information about CVE-2025-23804", "inputs": "", "outputs": "CVE:CVE-2025-23804\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Shiv Prakash Tiwari WP Service Payment Form With Authorize.net allows Reflected XSS.This issue affects WP Service Payment Form With Authorize.net: from n/a through 2.6.0.\npublished:2025-01-16T21:15:21.497"} {"instruction": "Please provide detailed information about CVE-2025-23805", "inputs": "", "outputs": "CVE:CVE-2025-23805\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in SEOReseller Team SEOReseller Partner allows Cross Site Request Forgery.This issue affects SEOReseller Partner: from n/a through 1.3.15.\npublished:2025-01-16T21:15:21.643"} {"instruction": "Please provide detailed information about CVE-2025-23807", "inputs": "", "outputs": "CVE:CVE-2025-23807\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jimmy Hu Spiderpowa Embed PDF allows Stored XSS.This issue affects Spiderpowa Embed PDF: from n/a through 1.0.\npublished:2025-01-16T21:15:21.800"} {"instruction": "Please provide detailed information about CVE-2025-23808", "inputs": "", "outputs": "CVE:CVE-2025-23808\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Matt van Andel Custom List Table Example allows Reflected XSS.This issue affects Custom List Table Example: from n/a through 1.4.1.\npublished:2025-01-16T21:15:21.957"} {"instruction": "Please provide detailed information about CVE-2025-23810", "inputs": "", "outputs": "CVE:CVE-2025-23810\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Igor Sazonov Len Slider allows Reflected XSS.This issue affects Len Slider: from n/a through 2.0.11.\npublished:2025-01-16T21:15:22.107"} {"instruction": "Please provide detailed information about CVE-2025-23815", "inputs": "", "outputs": "CVE:CVE-2025-23815\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in linickx root Cookie allows Cross Site Request Forgery. This issue affects root Cookie: from n/a through 1.6.\npublished:2025-01-16T21:15:22.257"} {"instruction": "Please provide detailed information about CVE-2025-23816", "inputs": "", "outputs": "CVE:CVE-2025-23816\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in metaphorcreations Metaphor Widgets allows Stored XSS. This issue affects Metaphor Widgets: from n/a through 2.4.\npublished:2025-01-16T21:15:22.407"} {"instruction": "Please provide detailed information about CVE-2025-23817", "inputs": "", "outputs": "CVE:CVE-2025-23817\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Mahadir Ahmad MHR-Custom-Anti-Copy allows Stored XSS.This issue affects MHR-Custom-Anti-Copy: from n/a through 2.0.\npublished:2025-01-16T21:15:22.560"} {"instruction": "Please provide detailed information about CVE-2025-23818", "inputs": "", "outputs": "CVE:CVE-2025-23818\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Peggy Kuo More Link Modifier allows Stored XSS.This issue affects More Link Modifier: from n/a through 1.0.3.\npublished:2025-01-16T21:15:22.693"} {"instruction": "Please provide detailed information about CVE-2025-23820", "inputs": "", "outputs": "CVE:CVE-2025-23820\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Laxman Thapa Content Security Policy Pro allows Cross Site Request Forgery.This issue affects Content Security Policy Pro: from n/a through 1.3.5.\npublished:2025-01-16T21:15:22.847"} {"instruction": "Please provide detailed information about CVE-2025-23821", "inputs": "", "outputs": "CVE:CVE-2025-23821\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Aleapp WP Cookies Alert allows Cross Site Request Forgery.This issue affects WP Cookies Alert: from n/a through 1.1.1.\npublished:2025-01-16T21:15:22.997"} {"instruction": "Please provide detailed information about CVE-2025-23822", "inputs": "", "outputs": "CVE:CVE-2025-23822\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Cornea Alexandru Category Custom Fields allows Cross Site Request Forgery.This issue affects Category Custom Fields: from n/a through 1.0.\npublished:2025-01-16T21:15:23.143"} {"instruction": "Please provide detailed information about CVE-2025-23823", "inputs": "", "outputs": "CVE:CVE-2025-23823\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in jprintf CNZZ&51LA for WordPress allows Cross Site Request Forgery.This issue affects CNZZ&51LA for WordPress: from n/a through 1.0.1.\npublished:2025-01-16T21:15:23.297"} {"instruction": "Please provide detailed information about CVE-2025-23824", "inputs": "", "outputs": "CVE:CVE-2025-23824\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexander Weleczka FontAwesome.io ShortCodes allows Stored XSS.This issue affects FontAwesome.io ShortCodes: from n/a through 1.0.\npublished:2025-01-16T21:15:23.437"} {"instruction": "Please provide detailed information about CVE-2025-23825", "inputs": "", "outputs": "CVE:CVE-2025-23825\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Thorpe Easy Shortcode Buttons allows Stored XSS.This issue affects Easy Shortcode Buttons: from n/a through 1.2.\npublished:2025-01-16T21:15:23.577"} {"instruction": "Please provide detailed information about CVE-2025-23826", "inputs": "", "outputs": "CVE:CVE-2025-23826\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Predrag Supurović Stop Comment Spam allows Stored XSS.This issue affects Stop Comment Spam: from n/a through 0.5.3.\npublished:2025-01-16T21:15:23.720"} {"instruction": "Please provide detailed information about CVE-2025-23827", "inputs": "", "outputs": "CVE:CVE-2025-23827\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Strx Strx Magic Floating Sidebar Maker allows Stored XSS.This issue affects Strx Magic Floating Sidebar Maker: from n/a through 1.4.1.\npublished:2025-01-16T21:15:23.873"} {"instruction": "Please provide detailed information about CVE-2025-23828", "inputs": "", "outputs": "CVE:CVE-2025-23828\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OriginalTips.com WordPress Data Guard allows Stored XSS.This issue affects WordPress Data Guard: from n/a through 8.\npublished:2025-01-16T21:15:24.047"} {"instruction": "Please provide detailed information about CVE-2025-23830", "inputs": "", "outputs": "CVE:CVE-2025-23830\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jobair JB Horizontal Scroller News Ticker allows DOM-Based XSS.This issue affects JB Horizontal Scroller News Ticker: from n/a through 1.0.\npublished:2025-01-16T21:15:24.213"} {"instruction": "Please provide detailed information about CVE-2025-23831", "inputs": "", "outputs": "CVE:CVE-2025-23831\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rene Hermenau QR Code Generator allows DOM-Based XSS.This issue affects QR Code Generator: from n/a through 1.2.6.\npublished:2025-01-16T21:15:24.360"} {"instruction": "Please provide detailed information about CVE-2025-23832", "inputs": "", "outputs": "CVE:CVE-2025-23832\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Matt Gibbs Admin Cleanup allows Stored XSS.This issue affects Admin Cleanup: from n/a through 1.0.2.\npublished:2025-01-16T21:15:24.510"} {"instruction": "Please provide detailed information about CVE-2025-23833", "inputs": "", "outputs": "CVE:CVE-2025-23833\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RaminMT Links/Problem Reporter allows DOM-Based XSS.This issue affects Links/Problem Reporter: from n/a through 2.6.0.\npublished:2025-01-16T21:15:24.653"} {"instruction": "Please provide detailed information about CVE-2025-23841", "inputs": "", "outputs": "CVE:CVE-2025-23841\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nikos M. Top Flash Embed allows Stored XSS.This issue affects Top Flash Embed: from n/a through 0.3.4.\npublished:2025-01-16T21:15:24.793"} {"instruction": "Please provide detailed information about CVE-2025-23842", "inputs": "", "outputs": "CVE:CVE-2025-23842\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Nilesh Shiragave WordPress Gallery Plugin allows Cross Site Request Forgery.This issue affects WordPress Gallery Plugin: from n/a through 1.4.\npublished:2025-01-16T21:15:24.940"} {"instruction": "Please provide detailed information about CVE-2025-23844", "inputs": "", "outputs": "CVE:CVE-2025-23844\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in wellwisher Custom Widget Classes allows Cross Site Request Forgery.This issue affects Custom Widget Classes: from n/a through 1.1.\npublished:2025-01-16T21:15:25.080"} {"instruction": "Please provide detailed information about CVE-2025-23848", "inputs": "", "outputs": "CVE:CVE-2025-23848\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Hotspots Analytics allows Stored XSS.This issue affects Hotspots Analytics: from n/a through 4.0.12.\npublished:2025-01-16T21:15:25.220"} {"instruction": "Please provide detailed information about CVE-2025-23854", "inputs": "", "outputs": "CVE:CVE-2025-23854\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YesStreaming.com Shoutcast and Icecast Internet Radio Hosting Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com allows Stored XSS.This issue affects Shoutcast and Icecast HTML5 Web Radio Player by YesStreaming.com: from n/a through 3.3.\npublished:2025-01-16T21:15:25.357"} {"instruction": "Please provide detailed information about CVE-2025-23856", "inputs": "", "outputs": "CVE:CVE-2025-23856\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alessandro Staniscia Simple Vertical Timeline allows DOM-Based XSS.This issue affects Simple Vertical Timeline: from n/a through 0.1.\npublished:2025-01-16T21:15:25.507"} {"instruction": "Please provide detailed information about CVE-2025-23859", "inputs": "", "outputs": "CVE:CVE-2025-23859\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joshua Wieczorek Daily Proverb allows Stored XSS.This issue affects Daily Proverb: from n/a through 2.0.3.\npublished:2025-01-16T21:15:25.667"} {"instruction": "Please provide detailed information about CVE-2025-23860", "inputs": "", "outputs": "CVE:CVE-2025-23860\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eyouth { rob.panes } Charity-thermometer allows Stored XSS.This issue affects Charity-thermometer: from n/a through 1.1.2.\npublished:2025-01-16T21:15:25.810"} {"instruction": "Please provide detailed information about CVE-2025-23861", "inputs": "", "outputs": "CVE:CVE-2025-23861\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Katz Web Services, Inc. Debt Calculator allows Cross Site Request Forgery.This issue affects Debt Calculator: from n/a through 1.0.1.\npublished:2025-01-16T21:15:25.967"} {"instruction": "Please provide detailed information about CVE-2025-23862", "inputs": "", "outputs": "CVE:CVE-2025-23862\nDescription:Missing Authorization vulnerability in SzMake Contact Form 7 Anti Spambot allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form 7 Anti Spambot: from n/a through 1.0.1.\npublished:2025-01-16T21:15:26.127"} {"instruction": "Please provide detailed information about CVE-2025-23863", "inputs": "", "outputs": "CVE:CVE-2025-23863\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eiji ‘Sabaoh’ Yamada Rollover Tab allows Stored XSS.This issue affects Rollover Tab: from n/a through 1.3.2.\npublished:2025-01-16T21:15:26.290"} {"instruction": "Please provide detailed information about CVE-2025-23864", "inputs": "", "outputs": "CVE:CVE-2025-23864\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Code Snippets (Luke America) WCS QR Code Generator allows Stored XSS.This issue affects WCS QR Code Generator: from n/a through 1.0.\npublished:2025-01-16T21:15:26.430"} {"instruction": "Please provide detailed information about CVE-2025-23865", "inputs": "", "outputs": "CVE:CVE-2025-23865\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pressfore Winning Portfolio allows Stored XSS.This issue affects Winning Portfolio: from n/a through 1.1.\npublished:2025-01-16T21:15:26.583"} {"instruction": "Please provide detailed information about CVE-2025-23868", "inputs": "", "outputs": "CVE:CVE-2025-23868\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Markus Liebelt Chess Tempo Viewer allows Stored XSS.This issue affects Chess Tempo Viewer: from n/a through 0.9.5.\npublished:2025-01-16T21:15:26.730"} {"instruction": "Please provide detailed information about CVE-2025-23869", "inputs": "", "outputs": "CVE:CVE-2025-23869\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Shibu Lijack a.k.a CyberJack CJ Custom Content allows Stored XSS.This issue affects CJ Custom Content: from n/a through 2.0.\npublished:2025-01-16T21:15:26.893"} {"instruction": "Please provide detailed information about CVE-2025-23870", "inputs": "", "outputs": "CVE:CVE-2025-23870\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Robert Nicholson Copyright Safeguard Footer Notice allows Stored XSS.This issue affects Copyright Safeguard Footer Notice: from n/a through 3.0.\npublished:2025-01-16T21:15:27.040"} {"instruction": "Please provide detailed information about CVE-2025-23871", "inputs": "", "outputs": "CVE:CVE-2025-23871\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Bas Matthee LSD Google Maps Embedder allows Cross Site Request Forgery.This issue affects LSD Google Maps Embedder: from n/a through 1.1.\npublished:2025-01-16T21:15:27.200"} {"instruction": "Please provide detailed information about CVE-2025-23872", "inputs": "", "outputs": "CVE:CVE-2025-23872\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in PayForm PayForm allows Stored XSS.This issue affects PayForm: from n/a through 2.0.\npublished:2025-01-16T21:15:27.357"} {"instruction": "Please provide detailed information about CVE-2025-23873", "inputs": "", "outputs": "CVE:CVE-2025-23873\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anshi Solutions Category D3 Tree allows Stored XSS.This issue affects Category D3 Tree: from n/a through 1.1.\npublished:2025-01-16T21:15:27.863"} {"instruction": "Please provide detailed information about CVE-2025-23875", "inputs": "", "outputs": "CVE:CVE-2025-23875\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Tim Ridgway Better Protected Pages allows Stored XSS.This issue affects Better Protected Pages: from n/a through 1.0.\npublished:2025-01-16T21:15:28.323"} {"instruction": "Please provide detailed information about CVE-2025-23876", "inputs": "", "outputs": "CVE:CVE-2025-23876\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jens Remus WP krpano allows Stored XSS.This issue affects WP krpano: from n/a through 1.2.1.\npublished:2025-01-16T21:15:28.763"} {"instruction": "Please provide detailed information about CVE-2025-23877", "inputs": "", "outputs": "CVE:CVE-2025-23877\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nitethemes Nite Shortcodes allows Stored XSS.This issue affects Nite Shortcodes: from n/a through 1.0.\npublished:2025-01-16T21:15:28.963"} {"instruction": "Please provide detailed information about CVE-2025-23878", "inputs": "", "outputs": "CVE:CVE-2025-23878\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Post-to-Post Links allows Stored XSS.This issue affects Post-to-Post Links: from n/a through 4.2.\npublished:2025-01-16T21:15:29.140"} {"instruction": "Please provide detailed information about CVE-2025-23880", "inputs": "", "outputs": "CVE:CVE-2025-23880\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in anmari amr personalise allows Cross Site Request Forgery.This issue affects amr personalise: from n/a through 2.10.\npublished:2025-01-16T21:15:29.310"} {"instruction": "Please provide detailed information about CVE-2025-23884", "inputs": "", "outputs": "CVE:CVE-2025-23884\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Chris Roberts Annie allows Cross Site Request Forgery.This issue affects Annie: from n/a through 2.1.1.\npublished:2025-01-16T21:15:29.730"} {"instruction": "Please provide detailed information about CVE-2025-23886", "inputs": "", "outputs": "CVE:CVE-2025-23886\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chris Roberts Annie allows Stored XSS.This issue affects Annie: from n/a through 2.1.1.\npublished:2025-01-16T21:15:29.927"} {"instruction": "Please provide detailed information about CVE-2025-23887", "inputs": "", "outputs": "CVE:CVE-2025-23887\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Allan Wallick Blog Summary allows Stored XSS.This issue affects Blog Summary: from n/a through 0.1.2 β.\npublished:2025-01-16T21:15:30.087"} {"instruction": "Please provide detailed information about CVE-2025-23890", "inputs": "", "outputs": "CVE:CVE-2025-23890\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tom Ewer and Tito Pandu Easy Tweet Embed allows DOM-Based XSS.This issue affects Easy Tweet Embed: from n/a through 1.7.\npublished:2025-01-16T21:15:30.253"} {"instruction": "Please provide detailed information about CVE-2025-23891", "inputs": "", "outputs": "CVE:CVE-2025-23891\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vincent Loy Yet Another Countdown allows DOM-Based XSS.This issue affects Yet Another Countdown: from n/a through 1.0.1.\npublished:2025-01-16T21:15:30.417"} {"instruction": "Please provide detailed information about CVE-2025-23892", "inputs": "", "outputs": "CVE:CVE-2025-23892\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Furr and Simon Ward Progress Tracker allows DOM-Based XSS.This issue affects Progress Tracker: from n/a through 0.9.3.\npublished:2025-01-16T21:15:30.580"} {"instruction": "Please provide detailed information about CVE-2025-23893", "inputs": "", "outputs": "CVE:CVE-2025-23893\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Manuel Costales GMap Shortcode allows DOM-Based XSS.This issue affects GMap Shortcode: from n/a through 2.0.\npublished:2025-01-16T21:15:30.797"} {"instruction": "Please provide detailed information about CVE-2025-23895", "inputs": "", "outputs": "CVE:CVE-2025-23895\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Dan Cameron Add RSS allows Stored XSS.This issue affects Add RSS: from n/a through 1.5.\npublished:2025-01-16T21:15:30.967"} {"instruction": "Please provide detailed information about CVE-2025-23896", "inputs": "", "outputs": "CVE:CVE-2025-23896\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oncle Tom Mindmeister Shortcode allows DOM-Based XSS.This issue affects Mindmeister Shortcode: from n/a through 1.0.\npublished:2025-01-16T21:15:31.137"} {"instruction": "Please provide detailed information about CVE-2025-23897", "inputs": "", "outputs": "CVE:CVE-2025-23897\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivo Brett – ApplyMetrics Apply with LinkedIn buttons allows DOM-Based XSS.This issue affects Apply with LinkedIn buttons: from n/a through 2.3.\npublished:2025-01-16T21:15:31.310"} {"instruction": "Please provide detailed information about CVE-2025-23898", "inputs": "", "outputs": "CVE:CVE-2025-23898\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Ivo Brett – ApplyMetrics Apply with LinkedIn buttons allows Stored XSS.This issue affects Apply with LinkedIn buttons: from n/a through 2.3.\npublished:2025-01-16T21:15:31.497"} {"instruction": "Please provide detailed information about CVE-2025-23899", "inputs": "", "outputs": "CVE:CVE-2025-23899\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BnB Select Ltd Bookalet allows Stored XSS.This issue affects Bookalet: from n/a through 1.0.3.\npublished:2025-01-16T21:15:31.680"} {"instruction": "Please provide detailed information about CVE-2025-23900", "inputs": "", "outputs": "CVE:CVE-2025-23900\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Genkisan Genki Announcement allows Cross Site Request Forgery.This issue affects Genki Announcement: from n/a through 1.4.1.\npublished:2025-01-16T21:15:31.857"} {"instruction": "Please provide detailed information about CVE-2025-23901", "inputs": "", "outputs": "CVE:CVE-2025-23901\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Oliver Schaal GravatarLocalCache allows Cross Site Request Forgery.This issue affects GravatarLocalCache: from n/a through 1.1.2.\npublished:2025-01-16T21:15:32.027"} {"instruction": "Please provide detailed information about CVE-2025-23902", "inputs": "", "outputs": "CVE:CVE-2025-23902\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Taras Dashkevych Error Notification allows Cross Site Request Forgery.This issue affects Error Notification: from n/a through 0.2.7.\npublished:2025-01-16T21:15:32.173"} {"instruction": "Please provide detailed information about CVE-2025-23907", "inputs": "", "outputs": "CVE:CVE-2025-23907\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in closed SOCIAL.NINJA allows Stored XSS. This issue affects SOCIAL.NINJA: from n/a through 0.2.\npublished:2025-01-16T21:15:32.333"} {"instruction": "Please provide detailed information about CVE-2025-23908", "inputs": "", "outputs": "CVE:CVE-2025-23908\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rami Yushuvaev Pastebin allows Stored XSS.This issue affects Pastebin: from n/a through 1.5.\npublished:2025-01-16T21:15:32.480"} {"instruction": "Please provide detailed information about CVE-2025-23909", "inputs": "", "outputs": "CVE:CVE-2025-23909\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Common Ninja Compare Ninja allows Stored XSS.This issue affects Compare Ninja: from n/a through 2.1.0.\npublished:2025-01-16T21:15:32.637"} {"instruction": "Please provide detailed information about CVE-2025-23911", "inputs": "", "outputs": "CVE:CVE-2025-23911\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Solidres Team Solidres – Hotel booking plugin allows SQL Injection.This issue affects Solidres – Hotel booking plugin: from n/a through 0.9.4.\npublished:2025-01-16T21:15:32.780"} {"instruction": "Please provide detailed information about CVE-2025-23912", "inputs": "", "outputs": "CVE:CVE-2025-23912\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Typomedia Foundation WordPress Custom Sidebar allows Blind SQL Injection.This issue affects WordPress Custom Sidebar: from n/a through 2.3.\npublished:2025-01-16T21:15:32.930"} {"instruction": "Please provide detailed information about CVE-2025-23913", "inputs": "", "outputs": "CVE:CVE-2025-23913\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in pankajpragma, rahulpragma WordPress Google Map Professional allows SQL Injection.This issue affects WordPress Google Map Professional: from n/a through 1.0.\npublished:2025-01-16T21:15:33.100"} {"instruction": "Please provide detailed information about CVE-2025-23915", "inputs": "", "outputs": "CVE:CVE-2025-23915\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roninwp FAT Event Lite allows PHP Local File Inclusion.This issue affects FAT Event Lite: from n/a through 1.1.\npublished:2025-01-16T21:15:33.253"} {"instruction": "Please provide detailed information about CVE-2025-23916", "inputs": "", "outputs": "CVE:CVE-2025-23916\nDescription:Missing Authorization vulnerability in Nuanced Media WP Meetup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Meetup: from n/a through 2.3.0.\npublished:2025-01-16T21:15:33.433"} {"instruction": "Please provide detailed information about CVE-2025-23917", "inputs": "", "outputs": "CVE:CVE-2025-23917\nDescription:Missing Authorization vulnerability in Chandrika Guntur, Morgan Kay Chamber Dashboard Business Directory allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chamber Dashboard Business Directory: from n/a through 3.3.8.\npublished:2025-01-16T21:15:33.580"} {"instruction": "Please provide detailed information about CVE-2025-23919", "inputs": "", "outputs": "CVE:CVE-2025-23919\nDescription:Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Ella van Durpe Slides & Presentations allows Code Injection.This issue affects Slides & Presentations: from n/a through 0.0.39.\npublished:2025-01-16T21:15:33.743"} {"instruction": "Please provide detailed information about CVE-2025-23922", "inputs": "", "outputs": "CVE:CVE-2025-23922\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Harsh iSpring Embedder allows Upload a Web Shell to a Web Server.This issue affects iSpring Embedder: from n/a through 1.0.\npublished:2025-01-16T21:15:33.890"} {"instruction": "Please provide detailed information about CVE-2025-23924", "inputs": "", "outputs": "CVE:CVE-2025-23924\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jérémy Heleine WP Photo Sphere allows Stored XSS.This issue affects WP Photo Sphere: from n/a through 3.8.\npublished:2025-01-16T21:15:34.040"} {"instruction": "Please provide detailed information about CVE-2025-23925", "inputs": "", "outputs": "CVE:CVE-2025-23925\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jimmy Peña Feedburner Optin Form allows Stored XSS.This issue affects Feedburner Optin Form: from n/a through 0.2.8.\npublished:2025-01-16T21:15:34.187"} {"instruction": "Please provide detailed information about CVE-2025-23926", "inputs": "", "outputs": "CVE:CVE-2025-23926\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TC Ajax WP Query Search Filter allows Stored XSS.This issue affects Ajax WP Query Search Filter: from n/a through 1.0.7.\npublished:2025-01-16T21:15:34.343"} {"instruction": "Please provide detailed information about CVE-2025-23927", "inputs": "", "outputs": "CVE:CVE-2025-23927\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Massimo Serpilli Incredible Font Awesome allows Stored XSS.This issue affects Incredible Font Awesome: from n/a through 1.0.\npublished:2025-01-16T21:15:34.507"} {"instruction": "Please provide detailed information about CVE-2025-23928", "inputs": "", "outputs": "CVE:CVE-2025-23928\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Arsovski Google Org Chart allows Stored XSS.This issue affects Google Org Chart: from n/a through 1.0.1.\npublished:2025-01-16T21:15:34.663"} {"instruction": "Please provide detailed information about CVE-2025-23929", "inputs": "", "outputs": "CVE:CVE-2025-23929\nDescription:Missing Authorization vulnerability in wishfulthemes Email Capture & Lead Generation allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Email Capture & Lead Generation: from n/a through 1.0.2.\npublished:2025-01-16T21:15:34.817"} {"instruction": "Please provide detailed information about CVE-2025-23930", "inputs": "", "outputs": "CVE:CVE-2025-23930\nDescription:Missing Authorization vulnerability in iTechArt-Group PayPal Marketing Solutions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PayPal Marketing Solutions: from n/a through 1.2.\npublished:2025-01-16T21:15:34.987"} {"instruction": "Please provide detailed information about CVE-2025-23933", "inputs": "", "outputs": "CVE:CVE-2025-23933\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WpFreeware WpF Ultimate Carousel allows Stored XSS.This issue affects WpF Ultimate Carousel: from n/a through 1.0.11.\npublished:2025-01-16T21:15:35.210"} {"instruction": "Please provide detailed information about CVE-2025-23934", "inputs": "", "outputs": "CVE:CVE-2025-23934\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PromoSimple Giveaways and Contests by PromoSimple allows Stored XSS.This issue affects Giveaways and Contests by PromoSimple: from n/a through 1.24.\npublished:2025-01-16T21:15:35.367"} {"instruction": "Please provide detailed information about CVE-2025-23935", "inputs": "", "outputs": "CVE:CVE-2025-23935\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magic Plugin Factory Magic Google Maps allows Stored XSS. This issue affects Magic Google Maps: from n/a through 1.0.4.\npublished:2025-01-16T21:15:35.513"} {"instruction": "Please provide detailed information about CVE-2025-23936", "inputs": "", "outputs": "CVE:CVE-2025-23936\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Harun R. Rayhan (Cr@zy Coder) CC Circle Progress Bar allows Stored XSS.This issue affects CC Circle Progress Bar: from n/a through 1.0.0.\npublished:2025-01-16T21:15:35.677"} {"instruction": "Please provide detailed information about CVE-2025-23939", "inputs": "", "outputs": "CVE:CVE-2025-23939\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiem Khan Image Switcher allows Stored XSS.This issue affects Image Switcher: from n/a through 1.1.\npublished:2025-01-16T21:15:35.910"} {"instruction": "Please provide detailed information about CVE-2025-23940", "inputs": "", "outputs": "CVE:CVE-2025-23940\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiem Khan Image Switcher allows Stored XSS.This issue affects Image Switcher: from n/a through 0.1.1.\npublished:2025-01-16T21:15:36.087"} {"instruction": "Please provide detailed information about CVE-2025-23941", "inputs": "", "outputs": "CVE:CVE-2025-23941\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meinturnierplan.de Team MeinTurnierplan.de Widget Viewer allows Stored XSS.This issue affects MeinTurnierplan.de Widget Viewer: from n/a through 1.1.\npublished:2025-01-16T21:15:36.230"} {"instruction": "Please provide detailed information about CVE-2025-23943", "inputs": "", "outputs": "CVE:CVE-2025-23943\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in arul PDF.js Shortcode allows Stored XSS.This issue affects PDF.js Shortcode: from n/a through 1.0.\npublished:2025-01-16T21:15:36.373"} {"instruction": "Please provide detailed information about CVE-2025-23946", "inputs": "", "outputs": "CVE:CVE-2025-23946\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in le Pixel Solitaire Enhanced YouTube Shortcode allows Stored XSS.This issue affects Enhanced YouTube Shortcode: from n/a through 2.0.1.\npublished:2025-01-16T21:15:36.520"} {"instruction": "Please provide detailed information about CVE-2025-23947", "inputs": "", "outputs": "CVE:CVE-2025-23947\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in M.J WP-Player allows Stored XSS.This issue affects WP-Player: from n/a through 2.6.1.\npublished:2025-01-16T21:15:36.670"} {"instruction": "Please provide detailed information about CVE-2025-23950", "inputs": "", "outputs": "CVE:CVE-2025-23950\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Said Shiripour EZPlayer allows Stored XSS.This issue affects EZPlayer: from n/a through 1.0.10.\npublished:2025-01-16T21:15:36.817"} {"instruction": "Please provide detailed information about CVE-2025-23951", "inputs": "", "outputs": "CVE:CVE-2025-23951\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DivEngine Gallery: Hybrid – Advanced Visual Gallery allows Stored XSS.This issue affects Gallery: Hybrid – Advanced Visual Gallery: from n/a through 1.4.0.2.\npublished:2025-01-16T21:15:36.983"} {"instruction": "Please provide detailed information about CVE-2025-23954", "inputs": "", "outputs": "CVE:CVE-2025-23954\nDescription:Missing Authorization vulnerability in AWcode & KingfisherFox Salvador – AI Image Generator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Salvador – AI Image Generator: from n/a through 1.0.11.\npublished:2025-01-16T21:15:37.133"} {"instruction": "Please provide detailed information about CVE-2025-23955", "inputs": "", "outputs": "CVE:CVE-2025-23955\nDescription:Missing Authorization vulnerability in xola.com Xola allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Xola: from n/a through 1.6.\npublished:2025-01-16T21:15:37.277"} {"instruction": "Please provide detailed information about CVE-2025-23957", "inputs": "", "outputs": "CVE:CVE-2025-23957\nDescription:Missing Authorization vulnerability in Sur.ly Sur.ly allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sur.ly: from n/a through 3.0.3.\npublished:2025-01-16T21:15:37.420"} {"instruction": "Please provide detailed information about CVE-2025-23961", "inputs": "", "outputs": "CVE:CVE-2025-23961\nDescription:Missing Authorization vulnerability in WP Tasker WordPress Graphs & Charts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Graphs & Charts: from n/a through 2.0.8.\npublished:2025-01-16T21:15:37.573"} {"instruction": "Please provide detailed information about CVE-2025-23962", "inputs": "", "outputs": "CVE:CVE-2025-23962\nDescription:Missing Authorization vulnerability in Goldstar Goldstar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Goldstar: from n/a through 2.1.1.\npublished:2025-01-16T21:15:37.730"} {"instruction": "Please provide detailed information about CVE-2025-23963", "inputs": "", "outputs": "CVE:CVE-2025-23963\nDescription:Missing Authorization vulnerability in Sven Hofmann & Michael Schoenrock Mark Posts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mark Posts: from n/a through 2.2.3.\npublished:2025-01-16T21:15:37.873"} {"instruction": "Please provide detailed information about CVE-2025-23965", "inputs": "", "outputs": "CVE:CVE-2025-23965\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kopatheme Kopa Nictitate Toolkit allows Stored XSS.This issue affects Kopa Nictitate Toolkit: from n/a through 1.0.2.\npublished:2025-01-16T21:15:38.023"} {"instruction": "Please provide detailed information about CVE-2025-23198", "inputs": "", "outputs": "CVE:CVE-2025-23198\nDescription:librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-16T23:15:08.410"} {"instruction": "Please provide detailed information about CVE-2025-23199", "inputs": "", "outputs": "CVE:CVE-2025-23199\nDescription:librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameter: `/ajax_form.php` -> param: descr. Librenms version up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-16T23:15:08.567"} {"instruction": "Please provide detailed information about CVE-2025-23200", "inputs": "", "outputs": "CVE:CVE-2025-23200\nDescription:librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to a stored XSS on the parameter: `ajax_form.php` -> param: state. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-16T23:15:08.720"} {"instruction": "Please provide detailed information about CVE-2025-23201", "inputs": "", "outputs": "CVE:CVE-2025-23201\nDescription:librenms is a community-based GPL-licensed network monitoring system. Affected versions are subject to Cross-site Scripting (XSS) on the parameters:`/addhost` -> param: community. Librenms versions up to 24.10.1 allow remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure. This issue has been addressed in release version 24.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-16T23:15:08.880"} {"instruction": "Please provide detailed information about CVE-2025-21325", "inputs": "", "outputs": "CVE:CVE-2025-21325\nDescription:Windows Secure Kernel Mode Elevation of Privilege Vulnerability\npublished:2025-01-17T01:15:31.073"} {"instruction": "Please provide detailed information about CVE-2025-0527", "inputs": "", "outputs": "CVE:CVE-2025-0527\nDescription:A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-17T14:15:32.840"} {"instruction": "Please provide detailed information about CVE-2025-0528", "inputs": "", "outputs": "CVE:CVE-2025-0528\nDescription:A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T15:15:12.430"} {"instruction": "Please provide detailed information about CVE-2025-0529", "inputs": "", "outputs": "CVE:CVE-2025-0529\nDescription:A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T15:15:12.670"} {"instruction": "Please provide detailed information about CVE-2025-0530", "inputs": "", "outputs": "CVE:CVE-2025-0530\nDescription:A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/_feedback_system.php. The manipulation of the argument type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T16:15:33.937"} {"instruction": "Please provide detailed information about CVE-2025-0531", "inputs": "", "outputs": "CVE:CVE-2025-0531\nDescription:A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/leaveroom.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T16:15:34.250"} {"instruction": "Please provide detailed information about CVE-2025-0430", "inputs": "", "outputs": "CVE:CVE-2025-0430\nDescription:Belledonne Communications Linphone-Desktop is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition.\npublished:2025-01-17T18:15:30.920"} {"instruction": "Please provide detailed information about CVE-2025-0532", "inputs": "", "outputs": "CVE:CVE-2025-0532\nDescription:A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/new_submit.php. The manipulation of the argument m_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T18:15:31.237"} {"instruction": "Please provide detailed information about CVE-2025-0533", "inputs": "", "outputs": "CVE:CVE-2025-0533\nDescription:A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Code/sc_login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T18:15:31.577"} {"instruction": "Please provide detailed information about CVE-2025-0534", "inputs": "", "outputs": "CVE:CVE-2025-0534\nDescription:A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Code/loginnew.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T19:15:28.777"} {"instruction": "Please provide detailed information about CVE-2025-0535", "inputs": "", "outputs": "CVE:CVE-2025-0535\nDescription:A vulnerability classified as critical has been found in Codezips Gym Management System 1.0. This affects an unknown part of the file /dashboard/admin/edit_mem_submit.php. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T19:15:28.990"} {"instruction": "Please provide detailed information about CVE-2025-0536", "inputs": "", "outputs": "CVE:CVE-2025-0536\nDescription:A vulnerability classified as critical was found in 1000 Projects Attendance Tracking Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_action.php. The manipulation of the argument attendance_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T20:15:29.583"} {"instruction": "Please provide detailed information about CVE-2025-0537", "inputs": "", "outputs": "CVE:CVE-2025-0537\nDescription:A vulnerability, which was classified as problematic, has been found in code-projects Car Rental Management System 1.0. This issue affects some unknown processing of the file /admin/manage-pages.php. The manipulation of the argument pgdetails leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T20:15:29.767"} {"instruction": "Please provide detailed information about CVE-2025-21185", "inputs": "", "outputs": "CVE:CVE-2025-21185\nDescription:Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability\npublished:2025-01-17T20:15:30.227"} {"instruction": "Please provide detailed information about CVE-2025-21399", "inputs": "", "outputs": "CVE:CVE-2025-21399\nDescription:Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability\npublished:2025-01-17T20:15:46.117"} {"instruction": "Please provide detailed information about CVE-2025-0538", "inputs": "", "outputs": "CVE:CVE-2025-0538\nDescription:A vulnerability, which was classified as problematic, was found in code-projects Tourism Management System 1.0. Affected is an unknown function of the file /admin/manage-pages.php. The manipulation of the argument pgedetails leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T21:15:10.847"} {"instruction": "Please provide detailed information about CVE-2025-0540", "inputs": "", "outputs": "CVE:CVE-2025-0540\nDescription:A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-17T21:15:11.037"} {"instruction": "Please provide detailed information about CVE-2025-21606", "inputs": "", "outputs": "CVE:CVE-2025-21606\nDescription:stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user’s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-17T21:15:11.420"} {"instruction": "Please provide detailed information about CVE-2025-23039", "inputs": "", "outputs": "CVE:CVE-2025-23039\nDescription:Caido is a web security auditing toolkit. A Cross-Site Scripting (XSS) vulnerability was identified in Caido v0.45.0 due to improper sanitization in the URL decoding tooltip of HTTP request and response editors. This issue could allow an attacker to execute arbitrary scripts, potentially leading to the theft of sensitive information. This issue has been addressed in version 0.45.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-17T21:15:11.560"} {"instruction": "Please provide detailed information about CVE-2025-23202", "inputs": "", "outputs": "CVE:CVE-2025-23202\nDescription:Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-17T21:15:11.713"} {"instruction": "Please provide detailed information about CVE-2025-23205", "inputs": "", "outputs": "CVE:CVE-2025-23205\nDescription:nbgrader is a system for assigning and grading notebooks. Enabling frame-ancestors: 'self' grants any JupyterHub user the ability to extract formgrader content by sending malicious links to users with access to formgrader, at least when using the default JupyterHub configuration of `enable_subdomains = False`. #1915 disables a protection which would allow user Alice to craft a page embedding formgrader in an IFrame. If Bob visits that page, his credentials will be sent and the formgrader page loaded. Because Alice's page is on the same Origin as the formgrader iframe, Javasript on Alice's page has _full access_ to the contents of the page served by formgrader using Bob's credentials. This issue has been addressed in release 0.9.5 and all users are advised to upgrade. Users unable to upgrade may disable `frame-ancestors: self`, or enable per-user and per-service subdomains with `JupyterHub.enable_subdomains = True` (then even if embedding in an IFrame is allowed, the host page does not have access to the contents of the frame).\npublished:2025-01-17T21:15:11.850"} {"instruction": "Please provide detailed information about CVE-2025-23206", "inputs": "", "outputs": "CVE:CVE-2025-23206\nDescription:The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current `tls.connect` method will always set `rejectUnauthorized: false` which is a potential security concern. CDK should follow the best practice and set `rejectUnauthorized: true`. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in `cdk.context.json` or `cdk.json`. There are no known workarounds for this vulnerability.\npublished:2025-01-17T21:15:12.003"} {"instruction": "Please provide detailed information about CVE-2025-0541", "inputs": "", "outputs": "CVE:CVE-2025-0541\nDescription:A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-17T22:15:29.337"} {"instruction": "Please provide detailed information about CVE-2025-23207", "inputs": "", "outputs": "CVE:CVE-2025-23207\nDescription:KaTeX is a fast, easy-to-use JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions with `renderToString` could encounter malicious input using `\\htmlData` that runs arbitrary JavaScript, or generate invalid HTML. Users are advised to upgrade to KaTeX v0.16.21 to remove this vulnerability. Users unable to upgrade should avoid use of or turn off the `trust` option, or set it to forbid `\\htmlData` commands, forbid inputs containing the substring `\"\\\\htmlData\"` and sanitize HTML output from KaTeX.\npublished:2025-01-17T22:15:29.523"} {"instruction": "Please provide detailed information about CVE-2025-23208", "inputs": "", "outputs": "CVE:CVE-2025-23208\nDescription:zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API. SetUserGroups is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn't obvious to me if it were the case. Any Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. This issue has been addressed in version 2.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.\npublished:2025-01-17T23:15:13.107"} {"instruction": "Please provide detailed information about CVE-2025-23209", "inputs": "", "outputs": "CVE:CVE-2025-23209\nDescription:Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.\npublished:2025-01-18T01:15:07.633"} {"instruction": "Please provide detailed information about CVE-2025-0308", "inputs": "", "outputs": "CVE:CVE-2025-0308\nDescription:The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the search parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\npublished:2025-01-18T06:15:27.880"} {"instruction": "Please provide detailed information about CVE-2025-0318", "inputs": "", "outputs": "CVE:CVE-2025-0318\nDescription:The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.9.1 through different error messages in the responses. This makes it possible for unauthenticated attackers to exfiltrate data from wp_usermeta table.\npublished:2025-01-18T06:15:28.017"} {"instruction": "Please provide detailed information about CVE-2025-0554", "inputs": "", "outputs": "CVE:CVE-2025-0554\nDescription:The Podlove Podcast Publisher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Feed Name value in version <= 4.1.25 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.\npublished:2025-01-18T06:15:28.160"} {"instruction": "Please provide detailed information about CVE-2025-0369", "inputs": "", "outputs": "CVE:CVE-2025-0369\nDescription:The JetEngine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘list_tag’ parameter in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-18T07:15:09.720"} {"instruction": "Please provide detailed information about CVE-2025-0515", "inputs": "", "outputs": "CVE:CVE-2025-0515\nDescription:The Buzz Club – Night Club, DJ and Music Festival Event WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' function in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.\npublished:2025-01-18T07:15:09.903"} {"instruction": "Please provide detailed information about CVE-2025-0557", "inputs": "", "outputs": "CVE:CVE-2025-0557\nDescription:A vulnerability classified as problematic has been found in Hyland Alfresco Community Edition and Alfresco Enterprise Edition up to 6.2.2. This affects an unknown part of the file /share/s/ of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component.\npublished:2025-01-18T09:15:07.710"} {"instruction": "Please provide detailed information about CVE-2025-0558", "inputs": "", "outputs": "CVE:CVE-2025-0558\nDescription:A vulnerability classified as critical was found in TDuckCloud tduck-platform up to 4.0. This vulnerability affects the function QueryProThemeRequest of the file src/main/java/com/tduck/cloud/form/request/QueryProThemeRequest.java. The manipulation of the argument color leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-18T13:15:20.417"} {"instruction": "Please provide detailed information about CVE-2025-0559", "inputs": "", "outputs": "CVE:CVE-2025-0559\nDescription:A vulnerability, which was classified as problematic, has been found in Campcodes School Management Software 1.0. This issue affects some unknown processing of the file /create-id-card of the component Create Id Card Page. The manipulation of the argument ID Card Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-18T14:15:25.420"} {"instruction": "Please provide detailed information about CVE-2025-0560", "inputs": "", "outputs": "CVE:CVE-2025-0560\nDescription:A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /photo-gallery of the component Photo Gallery Page. The manipulation of the argument Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-18T15:15:08.343"} {"instruction": "Please provide detailed information about CVE-2025-0561", "inputs": "", "outputs": "CVE:CVE-2025-0561\nDescription:A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-19T00:15:25.077"} {"instruction": "Please provide detailed information about CVE-2025-0562", "inputs": "", "outputs": "CVE:CVE-2025-0562\nDescription:A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-19T02:15:24.380"} {"instruction": "Please provide detailed information about CVE-2025-0563", "inputs": "", "outputs": "CVE:CVE-2025-0563\nDescription:A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-19T02:15:24.560"} {"instruction": "Please provide detailed information about CVE-2025-0564", "inputs": "", "outputs": "CVE:CVE-2025-0564\nDescription:A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /authenticate.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-19T04:15:07.090"} {"instruction": "Please provide detailed information about CVE-2025-0565", "inputs": "", "outputs": "CVE:CVE-2025-0565\nDescription:A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-19T06:15:06.820"} {"instruction": "Please provide detailed information about CVE-2025-0566", "inputs": "", "outputs": "CVE:CVE-2025-0566\nDescription:A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-19T07:15:06.407"} {"instruction": "Please provide detailed information about CVE-2025-0567", "inputs": "", "outputs": "CVE:CVE-2025-0567\nDescription:A vulnerability classified as problematic was found in Epic Games Launcher up to 17.2.1. This vulnerability affects unknown code in the library profapi.dll of the component Installer. The manipulation leads to untrusted search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation appears to be difficult.\npublished:2025-01-19T08:15:06.637"} {"instruction": "Please provide detailed information about CVE-2025-21631", "inputs": "", "outputs": "CVE:CVE-2025-21631\nDescription:In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a following UAF for v6.6: BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958 Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726 CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0-g3629d1885222 #39 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106 print_address_description.constprop.0+0x66/0x300 mm/kasan/report.c:364 print_report+0x3e/0x70 mm/kasan/report.c:475 kasan_report+0xb8/0xf0 mm/kasan/report.c:588 hlist_add_head include/linux/list.h:1023 [inline] bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958 bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271 bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323 blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660 blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143 __submit_bio+0xa0/0x6b0 block/blk-core.c:639 __submit_bio_noacct_mq block/blk-core.c:718 [inline] submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747 submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847 __ext4_read_bh fs/ext4/super.c:205 [inline] ext4_read_bh+0x15e/0x2e0 fs/ext4/super.c:230 __read_extent_tree_block+0x304/0x6f0 fs/ext4/extents.c:567 ext4_find_extent+0x479/0xd20 fs/ext4/extents.c:947 ext4_ext_map_blocks+0x1a3/0x2680 fs/ext4/extents.c:4182 ext4_map_blocks+0x929/0x15a0 fs/ext4/inode.c:660 ext4_iomap_begin_report+0x298/0x480 fs/ext4/inode.c:3569 iomap_iter+0x3dd/0x1010 fs/iomap/iter.c:91 iomap_fiemap+0x1f4/0x360 fs/iomap/fiemap.c:80 ext4_fiemap+0x181/0x210 fs/ext4/extents.c:5051 ioctl_fiemap.isra.0+0x1b4/0x290 fs/ioctl.c:220 do_vfs_ioctl+0x31c/0x11a0 fs/ioctl.c:811 __do_sys_ioctl fs/ioctl.c:869 [inline] __se_sys_ioctl+0xae/0x190 fs/ioctl.c:857 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x70/0x120 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x78/0xe2 Allocated by task 232719: kasan_save_stack+0x22/0x50 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328 kasan_slab_alloc include/linux/kasan.h:188 [inline] slab_post_alloc_hook mm/slab.h:768 [inline] slab_alloc_node mm/slub.c:3492 [inline] kmem_cache_alloc_node+0x1b8/0x6f0 mm/slub.c:3537 bfq_get_queue+0x215/0x1f00 block/bfq-iosched.c:5869 bfq_get_bfqq_handle_split+0x167/0x5f0 block/bfq-iosched.c:6776 bfq_init_rq+0x13a4/0x17a0 block/bfq-iosched.c:6938 bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271 bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323 blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660 blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143 __submit_bio+0xa0/0x6b0 block/blk-core.c:639 __submit_bio_noacct_mq block/blk-core.c:718 [inline] submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747 submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847 __ext4_read_bh fs/ext4/super.c:205 [inline] ext4_read_bh_nowait+0x15a/0x240 fs/ext4/super.c:217 ext4_read_bh_lock+0xac/0xd0 fs/ext4/super.c:242 ext4_bread_batch+0x268/0x500 fs/ext4/inode.c:958 __ext4_find_entry+0x448/0x10f0 fs/ext4/namei.c:1671 ext4_lookup_entry fs/ext4/namei.c:1774 [inline] ext4_lookup.part.0+0x359/0x6f0 fs/ext4/namei.c:1842 ext4_lookup+0x72/0x90 fs/ext4/namei.c:1839 __lookup_slow+0x257/0x480 fs/namei.c:1696 lookup_slow fs/namei.c:1713 [inline] walk_component+0x454/0x5c0 fs/namei.c:2004 link_path_walk.part.0+0x773/0xda0 fs/namei.c:2331 link_path_walk fs/namei.c:3826 [inline] path_openat+0x1b9/0x520 fs/namei.c:3826 do_filp_open+0x1b7/0x400 fs/namei.c:3857 do_sys_openat2+0x5dc/0x6e0 fs/open.c:1428 do_sys_open fs/open.c:1443 [inline] __do_sys_openat fs/open.c:1459 [inline] __se_sys_openat fs/open.c:1454 [inline] __x64_sys_openat+0x148/0x200 fs/open.c:1454 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_6 ---truncated---\npublished:2025-01-19T11:15:07.667"} {"instruction": "Please provide detailed information about CVE-2025-21632", "inputs": "", "outputs": "CVE:CVE-2025-21632\nDescription:In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure shadow stack is active before \"getting\" registers The x86 shadow stack support has its own set of registers. Those registers are XSAVE-managed, but they are \"supervisor state components\" which means that userspace can not touch them with XSAVE/XRSTOR. It also means that they are not accessible from the existing ptrace ABI for XSAVE state. Thus, there is a new ptrace get/set interface for it. The regset code that ptrace uses provides an ->active() handler in addition to the get/set ones. For shadow stack this ->active() handler verifies that shadow stack is enabled via the ARCH_SHSTK_SHSTK bit in the thread struct. The ->active() handler is checked from some call sites of the regset get/set handlers, but not the ptrace ones. This was not understood when shadow stack support was put in place. As a result, both the set/get handlers can be called with XFEATURE_CET_USER in its init state, which would cause get_xsave_addr() to return NULL and trigger a WARN_ON(). The ssp_set() handler luckily has an ssp_active() check to avoid surprising the kernel with shadow stack behavior when the kernel is not ready for it (ARCH_SHSTK_SHSTK==0). That check just happened to avoid the warning. But the ->get() side wasn't so lucky. It can be called with shadow stacks disabled, triggering the warning in practice, as reported by Christina Schimpe: WARNING: CPU: 5 PID: 1773 at arch/x86/kernel/fpu/regset.c:198 ssp_get+0x89/0xa0 [...] Call Trace: ? show_regs+0x6e/0x80 ? ssp_get+0x89/0xa0 ? __warn+0x91/0x150 ? ssp_get+0x89/0xa0 ? report_bug+0x19d/0x1b0 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x1d/0x80 ? asm_exc_invalid_op+0x1f/0x30 ? __pfx_ssp_get+0x10/0x10 ? ssp_get+0x89/0xa0 ? ssp_get+0x52/0xa0 __regset_get+0xad/0xf0 copy_regset_to_user+0x52/0xc0 ptrace_regset+0x119/0x140 ptrace_request+0x13c/0x850 ? wait_task_inactive+0x142/0x1d0 ? do_syscall_64+0x6d/0x90 arch_ptrace+0x102/0x300 [...] Ensure that shadow stacks are active in a thread before looking them up in the XSAVE buffer. Since ARCH_SHSTK_SHSTK and user_ssp[SHSTK_EN] are set at the same time, the active check ensures that there will be something to find in the XSAVE buffer. [ dhansen: changelog/subject tweaks ]\npublished:2025-01-19T11:15:08.650"} {"instruction": "Please provide detailed information about CVE-2025-21633", "inputs": "", "outputs": "CVE:CVE-2025-21633\nDescription:In the Linux kernel, the following vulnerability has been resolved: io_uring/sqpoll: zero sqd->thread on tctx errors Syzkeller reports: BUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 Read of size 8 at addr ffff88803578c510 by task syz.2.3223/27552 Call Trace: ... kasan_report+0x143/0x180 mm/kasan/report.c:602 thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639 getrusage+0x1000/0x1340 kernel/sys.c:1863 io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197 seq_show+0x608/0x770 fs/proc/fd.c:68 ... That's due to sqd->task not being cleared properly in cases where SQPOLL task tctx setup fails, which can essentially only happen with fault injection to insert allocation errors.\npublished:2025-01-19T11:15:08.773"} {"instruction": "Please provide detailed information about CVE-2025-21634", "inputs": "", "outputs": "CVE:CVE-2025-21634\nDescription:In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202 RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000 RDX: 0000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04 RBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180 R10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08 R13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0 FS: 00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kernfs_drain+0x15e/0x2f0 __kernfs_remove+0x165/0x300 kernfs_remove_by_name_ns+0x7b/0xc0 cgroup_rm_file+0x154/0x1c0 cgroup_addrm_files+0x1c2/0x1f0 css_clear_dir+0x77/0x110 kill_css+0x4c/0x1b0 cgroup_destroy_locked+0x194/0x380 cgroup_rmdir+0x2a/0x140 It can be explained by: rmdir \t\t\t\techo 1 > cpuset.cpus \t\t\t\tkernfs_fop_write_iter // active=0 cgroup_rm_file kernfs_remove_by_name_ns\tkernfs_get_active // active=1 __kernfs_remove\t\t\t\t\t // active=0x80000002 kernfs_drain\t\t\tcpuset_write_resmask wait_event //waiting (active == 0x80000001) \t\t\t\tkernfs_break_active_protection \t\t\t\t// active = 0x80000001 // continue \t\t\t\tkernfs_unbreak_active_protection \t\t\t\t// active = 0x80000002 ... kernfs_should_drain_open_files // warning occurs \t\t\t\tkernfs_put_active This warning is caused by 'kernfs_break_active_protection' when it is writing to cpuset.cpus, and the cgroup is removed concurrently. The commit 3a5a6d0c2b03 (\"cpuset: don't nest cgroup_mutex inside get_online_cpus()\") made cpuset_hotplug_workfn asynchronous, This change involves calling flush_work(), which can create a multiple processes circular locking dependency that involve cgroup_mutex, potentially leading to a deadlock. To avoid deadlock. the commit 76bb5ab8f6e3 (\"cpuset: break kernfs active protection in cpuset_write_resmask()\") added 'kernfs_break_active_protection' in the cpuset_write_resmask. This could lead to this warning. After the commit 2125c0034c5d (\"cgroup/cpuset: Make cpuset hotplug processing synchronous\"), the cpuset_write_resmask no longer needs to wait the hotplug to finish, which means that concurrent hotplug and cpuset operations are no longer possible. Therefore, the deadlock doesn't exist anymore and it does not have to 'break active protection' now. To fix this warning, just remove kernfs_break_active_protection operation in the 'cpuset_write_resmask'.\npublished:2025-01-19T11:15:08.890"} {"instruction": "Please provide detailed information about CVE-2025-21635", "inputs": "", "outputs": "CVE:CVE-2025-21635\nDescription:In the Linux kernel, the following vulnerability has been resolved: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The per-netns structure can be obtained from the table->data using container_of(), then the 'net' one can be retrieved from the listen socket (if available).\npublished:2025-01-19T11:15:09.000"} {"instruction": "Please provide detailed information about CVE-2025-21636", "inputs": "", "outputs": "CVE:CVE-2025-21636\nDescription:In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.probe_interval' is used.\npublished:2025-01-19T11:15:09.110"} {"instruction": "Please provide detailed information about CVE-2025-21637", "inputs": "", "outputs": "CVE:CVE-2025-21637\nDescription:In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure.\npublished:2025-01-19T11:15:09.217"} {"instruction": "Please provide detailed information about CVE-2025-21638", "inputs": "", "outputs": "CVE:CVE-2025-21638\nDescription:In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure.\npublished:2025-01-19T11:15:09.317"} {"instruction": "Please provide detailed information about CVE-2025-21639", "inputs": "", "outputs": "CVE:CVE-2025-21639\nDescription:In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.rto_min/max' is used.\npublished:2025-01-19T11:15:09.423"} {"instruction": "Please provide detailed information about CVE-2025-21640", "inputs": "", "outputs": "CVE:CVE-2025-21640\nDescription:In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, as this is the only member needed from the 'net' structure, but that would increase the size of this fix, to use '*data' everywhere 'net->sctp.sctp_hmac_alg' is used.\npublished:2025-01-19T11:15:09.537"} {"instruction": "Please provide detailed information about CVE-2025-21641", "inputs": "", "outputs": "CVE:CVE-2025-21641\nDescription:In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy As mentioned in the previous commit, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'pernet' structure can be obtained from the table->data using container_of().\npublished:2025-01-19T11:15:09.643"} {"instruction": "Please provide detailed information about CVE-2025-21642", "inputs": "", "outputs": "CVE:CVE-2025-21642\nDescription:In the Linux kernel, the following vulnerability has been resolved: mptcp: sysctl: sched: avoid using current->nsproxy Using the 'net' structure via 'current' is not recommended for different reasons. First, if the goal is to use it to read or write per-netns data, this is inconsistent with how the \"generic\" sysctl entries are doing: directly by only using pointers set to the table entry, e.g. table->data. Linked to that, the per-netns data should always be obtained from the table linked to the netns it had been created for, which may not coincide with the reader's or writer's netns. Another reason is that access to current->nsproxy->netns can oops if attempted when current->nsproxy had been dropped when the current task is exiting. This is what syzbot found, when using acct(2): Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] CPU: 1 UID: 0 PID: 5924 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125 Code: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 28 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 cc 02 00 00 4d 8b 7c 24 28 48 8d 84 24 c8 00 00 RSP: 0018:ffffc900034774e8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 1ffff9200068ee9e RCX: ffffc90003477620 RDX: 0000000000000005 RSI: ffffffff8b08f91e RDI: 0000000000000028 RBP: 0000000000000001 R08: ffffc90003477710 R09: 0000000000000040 R10: 0000000000000040 R11: 00000000726f7475 R12: 0000000000000000 R13: ffffc90003477620 R14: ffffc90003477710 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fee3cd452d8 CR3: 000000007d116000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: proc_sys_call_handler+0x403/0x5d0 fs/proc/proc_sysctl.c:601 __kernel_write_iter+0x318/0xa80 fs/read_write.c:612 __kernel_write+0xf6/0x140 fs/read_write.c:632 do_acct_process+0xcb0/0x14a0 kernel/acct.c:539 acct_pin_kill+0x2d/0x100 kernel/acct.c:192 pin_kill+0x194/0x7c0 fs/fs_pin.c:44 mnt_pin_kill+0x61/0x1e0 fs/fs_pin.c:81 cleanup_mnt+0x3ac/0x450 fs/namespace.c:1366 task_work_run+0x14e/0x250 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0xad8/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 get_signal+0x2576/0x2610 kernel/signal.c:3017 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fee3cb87a6a Code: Unable to access opcode bytes at 0x7fee3cb87a40. RSP: 002b:00007fffcccac688 EFLAGS: 00000202 ORIG_RAX: 0000000000000037 RAX: 0000000000000000 RBX: 00007fffcccac710 RCX: 00007fee3cb87a6a RDX: 0000000000000041 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000003 R08: 00007fffcccac6ac R09: 00007fffcccacac7 R10: 00007fffcccac710 R11: 0000000000000202 R12: 00007fee3cd49500 R13: 00007fffcccac6ac R14: 0000000000000000 R15: 00007fee3cd4b000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125 Code: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc ---truncated---\npublished:2025-01-19T11:15:09.757"} {"instruction": "Please provide detailed information about CVE-2025-21643", "inputs": "", "outputs": "CVE:CVE-2025-21643\nDescription:In the Linux kernel, the following vulnerability has been resolved: netfs: Fix kernel async DIO Netfslib needs to be able to handle kernel-initiated asynchronous DIO that is supplied with a bio_vec[] array. Currently, because of the async flag, this gets passed to netfs_extract_user_iter() which throws a warning and fails because it only handles IOVEC and UBUF iterators. This can be triggered through a combination of cifs and a loopback blockdev with something like: mount //my/cifs/share /foo dd if=/dev/zero of=/foo/m0 bs=4K count=1K losetup --sector-size 4096 --direct-io=on /dev/loop2046 /foo/m0 echo hello >/dev/loop2046 This causes the following to appear in syslog: WARNING: CPU: 2 PID: 109 at fs/netfs/iterator.c:50 netfs_extract_user_iter+0x170/0x250 [netfs] and the write to fail. Fix this by removing the check in netfs_unbuffered_write_iter_locked() that causes async kernel DIO writes to be handled as userspace writes. Note that this change relies on the kernel caller maintaining the existence of the bio_vec array (or kvec[] or folio_queue) until the op is complete.\npublished:2025-01-19T11:15:09.870"} {"instruction": "Please provide detailed information about CVE-2025-21644", "inputs": "", "outputs": "CVE:CVE-2025-21644\nDescription:In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix tlb invalidation when wedging If GuC fails to load, the driver wedges, but in the process it tries to do stuff that may not be initialized yet. This moves the xe_gt_tlb_invalidation_init() to be done earlier: as its own doc says, it's a software-only initialization and should had been named with the _early() suffix. Move it to be called by xe_gt_init_early(), so the locks and seqno are initialized, avoiding a NULL ptr deref when wedging: \txe 0000:03:00.0: [drm] *ERROR* GT0: load failed: status: Reset = 0, BootROM = 0x50, UKernel = 0x00, MIA = 0x00, Auth = 0x01 \txe 0000:03:00.0: [drm] *ERROR* GT0: firmware signature verification failed \txe 0000:03:00.0: [drm] *ERROR* CRITICAL: Xe has declared device 0000:03:00.0 as wedged. \t... \tBUG: kernel NULL pointer dereference, address: 0000000000000000 \t#PF: supervisor read access in kernel mode \t#PF: error_code(0x0000) - not-present page \tPGD 0 P4D 0 \tOops: Oops: 0000 [#1] PREEMPT SMP NOPTI \tCPU: 9 UID: 0 PID: 3908 Comm: modprobe Tainted: G U W 6.13.0-rc4-xe+ #3 \tTainted: [U]=USER, [W]=WARN \tHardware name: Intel Corporation Alder Lake Client Platform/AlderLake-S ADP-S DDR5 UDIMM CRB, BIOS ADLSFWI1.R00.3275.A00.2207010640 07/01/2022 \tRIP: 0010:xe_gt_tlb_invalidation_reset+0x75/0x110 [xe] This can be easily triggered by poking the GuC binary to force a signature failure. There will still be an extra message, \txe 0000:03:00.0: [drm] *ERROR* GT0: GuC mmio request 0x4100: no reply 0x4100 but that's better than a NULL ptr deref. (cherry picked from commit 5001ef3af8f2c972d6fd9c5221a8457556f8bea6)\npublished:2025-01-19T11:15:09.977"} {"instruction": "Please provide detailed information about CVE-2025-21645", "inputs": "", "outputs": "CVE:CVE-2025-21645\nDescription:In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it Wakeup for IRQ1 should be disabled only in cases where i8042 had actually enabled it, otherwise \"wake_depth\" for this IRQ will try to drop below zero and there will be an unpleasant WARN() logged: kernel: atkbd serio0: Disabling IRQ1 wakeup source to avoid platform firmware bug kernel: ------------[ cut here ]------------ kernel: Unbalanced IRQ 1 wake disable kernel: WARNING: CPU: 10 PID: 6431 at kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0 The PMC driver uses DEFINE_SIMPLE_DEV_PM_OPS() to define its dev_pm_ops which sets amd_pmc_suspend_handler() to the .suspend, .freeze, and .poweroff handlers. i8042_pm_suspend(), however, is only set as the .suspend handler. Fix the issue by call PMC suspend handler only from the same set of dev_pm_ops handlers as i8042_pm_suspend(), which currently means just the .suspend handler. To reproduce this issue try hibernating (S4) the machine after a fresh boot without putting it into s2idle first. [ij: edited the commit message.]\npublished:2025-01-19T11:15:10.090"} {"instruction": "Please provide detailed information about CVE-2025-21646", "inputs": "", "outputs": "CVE:CVE-2025-21646\nDescription:In the Linux kernel, the following vulnerability has been resolved: afs: Fix the maximum cell name length The kafs filesystem limits the maximum length of a cell to 256 bytes, but a problem occurs if someone actually does that: kafs tries to create a directory under /proc/net/afs/ with the name of the cell, but that fails with a warning: WARNING: CPU: 0 PID: 9 at fs/proc/generic.c:405 because procfs limits the maximum filename length to 255. However, the DNS limits the maximum lookup length and, by extension, the maximum cell name, to 255 less two (length count and trailing NUL). Fix this by limiting the maximum acceptable cellname length to 253. This also allows us to be sure we can create the \"/afs/./\" mountpoint too. Further, split the YFS VL record cell name maximum to be the 256 allowed by the protocol and ignore the record retrieved by YFSVL.GetCellName if it exceeds 253.\npublished:2025-01-19T11:15:10.197"} {"instruction": "Please provide detailed information about CVE-2025-21647", "inputs": "", "outputs": "CVE:CVE-2025-21647\nDescription:In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of the per-host bulk flow counters, leading to an out of bounds memory access. To avoid any such logic errors causing out of bounds memory accesses, this commit factors out all accesses to the per-host bulk flow counters to a series of helpers that perform bounds-checking before any increments and decrements. This also has the benefit of improving readability by moving the conditional checks for the flow mode into these helpers, instead of having them spread out throughout the code (which was the cause of the original logic error). As part of this change, the flow quantum calculation is consolidated into a helper function, which means that the dithering applied to the ost load scaling is now applied both in the DRR rotation and when a sparse flow's quantum is first initiated. The only user-visible effect of this is that the maximum packet size that can be sent while a flow stays sparse will now vary with +/- one byte in some cases. This should not make a noticeable difference in practice, and thus it's not worth complicating the code to preserve the old behaviour.\npublished:2025-01-19T11:15:10.307"} {"instruction": "Please provide detailed information about CVE-2025-21648", "inputs": "", "outputs": "CVE:CVE-2025-21648\nDescription:In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 (\"mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls\") Note: hashtable resize is only possible from init_netns.\npublished:2025-01-19T11:15:10.410"} {"instruction": "Please provide detailed information about CVE-2025-21649", "inputs": "", "outputs": "CVE:CVE-2025-21649\nDescription:In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices Currently, HIP08 devices does not register the ptp devices, so the hdev->ptp is NULL. But the tx process would still try to set hardware time stamp info with SKBTX_HW_TSTAMP flag and cause a kernel crash. [ 128.087798] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018 ... [ 128.280251] pc : hclge_ptp_set_tx_info+0x2c/0x140 [hclge] [ 128.286600] lr : hclge_ptp_set_tx_info+0x20/0x140 [hclge] [ 128.292938] sp : ffff800059b93140 [ 128.297200] x29: ffff800059b93140 x28: 0000000000003280 [ 128.303455] x27: ffff800020d48280 x26: ffff0cb9dc814080 [ 128.309715] x25: ffff0cb9cde93fa0 x24: 0000000000000001 [ 128.315969] x23: 0000000000000000 x22: 0000000000000194 [ 128.322219] x21: ffff0cd94f986000 x20: 0000000000000000 [ 128.328462] x19: ffff0cb9d2a166c0 x18: 0000000000000000 [ 128.334698] x17: 0000000000000000 x16: ffffcf1fc523ed24 [ 128.340934] x15: 0000ffffd530a518 x14: 0000000000000000 [ 128.347162] x13: ffff0cd6bdb31310 x12: 0000000000000368 [ 128.353388] x11: ffff0cb9cfbc7070 x10: ffff2cf55dd11e02 [ 128.359606] x9 : ffffcf1f85a212b4 x8 : ffff0cd7cf27dab0 [ 128.365831] x7 : 0000000000000a20 x6 : ffff0cd7cf27d000 [ 128.372040] x5 : 0000000000000000 x4 : 000000000000ffff [ 128.378243] x3 : 0000000000000400 x2 : ffffcf1f85a21294 [ 128.384437] x1 : ffff0cb9db520080 x0 : ffff0cb9db500080 [ 128.390626] Call trace: [ 128.393964] hclge_ptp_set_tx_info+0x2c/0x140 [hclge] [ 128.399893] hns3_nic_net_xmit+0x39c/0x4c4 [hns3] [ 128.405468] xmit_one.constprop.0+0xc4/0x200 [ 128.410600] dev_hard_start_xmit+0x54/0xf0 [ 128.415556] sch_direct_xmit+0xe8/0x634 [ 128.420246] __dev_queue_xmit+0x224/0xc70 [ 128.425101] dev_queue_xmit+0x1c/0x40 [ 128.429608] ovs_vport_send+0xac/0x1a0 [openvswitch] [ 128.435409] do_output+0x60/0x17c [openvswitch] [ 128.440770] do_execute_actions+0x898/0x8c4 [openvswitch] [ 128.446993] ovs_execute_actions+0x64/0xf0 [openvswitch] [ 128.453129] ovs_dp_process_packet+0xa0/0x224 [openvswitch] [ 128.459530] ovs_vport_receive+0x7c/0xfc [openvswitch] [ 128.465497] internal_dev_xmit+0x34/0xb0 [openvswitch] [ 128.471460] xmit_one.constprop.0+0xc4/0x200 [ 128.476561] dev_hard_start_xmit+0x54/0xf0 [ 128.481489] __dev_queue_xmit+0x968/0xc70 [ 128.486330] dev_queue_xmit+0x1c/0x40 [ 128.490856] ip_finish_output2+0x250/0x570 [ 128.495810] __ip_finish_output+0x170/0x1e0 [ 128.500832] ip_finish_output+0x3c/0xf0 [ 128.505504] ip_output+0xbc/0x160 [ 128.509654] ip_send_skb+0x58/0xd4 [ 128.513892] udp_send_skb+0x12c/0x354 [ 128.518387] udp_sendmsg+0x7a8/0x9c0 [ 128.522793] inet_sendmsg+0x4c/0x8c [ 128.527116] __sock_sendmsg+0x48/0x80 [ 128.531609] __sys_sendto+0x124/0x164 [ 128.536099] __arm64_sys_sendto+0x30/0x5c [ 128.540935] invoke_syscall+0x50/0x130 [ 128.545508] el0_svc_common.constprop.0+0x10c/0x124 [ 128.551205] do_el0_svc+0x34/0xdc [ 128.555347] el0_svc+0x20/0x30 [ 128.559227] el0_sync_handler+0xb8/0xc0 [ 128.563883] el0_sync+0x160/0x180\npublished:2025-01-19T11:15:10.517"} {"instruction": "Please provide detailed information about CVE-2025-21650", "inputs": "", "outputs": "CVE:CVE-2025-21650\nDescription:In the Linux kernel, the following vulnerability has been resolved: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs 1024-1279 are in different BAR space addresses. However, hclge_fetch_pf_reg does not distinguish the tqp space information when reading the tqp space information. When the number of TQPs is greater than 1024, access bar space overwriting occurs. The problem of different segments has been considered during the initialization of tqp.io_base. Therefore, tqp.io_base is directly used when the queue is read in hclge_fetch_pf_reg. The error message: Unable to handle kernel paging request at virtual address ffff800037200000 pc : hclge_fetch_pf_reg+0x138/0x250 [hclge] lr : hclge_get_regs+0x84/0x1d0 [hclge] Call trace: hclge_fetch_pf_reg+0x138/0x250 [hclge] hclge_get_regs+0x84/0x1d0 [hclge] hns3_get_regs+0x2c/0x50 [hns3] ethtool_get_regs+0xf4/0x270 dev_ethtool+0x674/0x8a0 dev_ioctl+0x270/0x36c sock_do_ioctl+0x110/0x2a0 sock_ioctl+0x2ac/0x530 __arm64_sys_ioctl+0xa8/0x100 invoke_syscall+0x4c/0x124 el0_svc_common.constprop.0+0x140/0x15c do_el0_svc+0x30/0xd0 el0_svc+0x1c/0x2c el0_sync_handler+0xb0/0xb4 el0_sync+0x168/0x180\npublished:2025-01-19T11:15:10.630"} {"instruction": "Please provide detailed information about CVE-2025-21651", "inputs": "", "outputs": "CVE:CVE-2025-21651\nDescription:In the Linux kernel, the following vulnerability has been resolved: net: hns3: don't auto enable misc vector Currently, there is a time window between misc irq enabled and service task inited. If an interrupte is reported at this time, it will cause warning like below: [ 16.324639] Call trace: [ 16.324641] __queue_delayed_work+0xb8/0xe0 [ 16.324643] mod_delayed_work_on+0x78/0xd0 [ 16.324655] hclge_errhand_task_schedule+0x58/0x90 [hclge] [ 16.324662] hclge_misc_irq_handle+0x168/0x240 [hclge] [ 16.324666] __handle_irq_event_percpu+0x64/0x1e0 [ 16.324667] handle_irq_event+0x80/0x170 [ 16.324670] handle_fasteoi_edge_irq+0x110/0x2bc [ 16.324671] __handle_domain_irq+0x84/0xfc [ 16.324673] gic_handle_irq+0x88/0x2c0 [ 16.324674] el1_irq+0xb8/0x140 [ 16.324677] arch_cpu_idle+0x18/0x40 [ 16.324679] default_idle_call+0x5c/0x1bc [ 16.324682] cpuidle_idle_call+0x18c/0x1c4 [ 16.324684] do_idle+0x174/0x17c [ 16.324685] cpu_startup_entry+0x30/0x6c [ 16.324687] secondary_start_kernel+0x1a4/0x280 [ 16.324688] ---[ end trace 6aa0bff672a964aa ]--- So don't auto enable misc vector when request irq..\npublished:2025-01-19T11:15:10.733"} {"instruction": "Please provide detailed information about CVE-2025-21652", "inputs": "", "outputs": "CVE:CVE-2025-21652\nDescription:In the Linux kernel, the following vulnerability has been resolved: ipvlan: Fix use-after-free in ipvlan_get_iflink(). syzbot presented an use-after-free report [0] regarding ipvlan and linkwatch. ipvlan does not hold a refcnt of the lower device unlike vlan and macvlan. If the linkwatch work is triggered for the ipvlan dev, the lower dev might have already been freed, resulting in UAF of ipvlan->phy_dev in ipvlan_get_iflink(). We can delay the lower dev unregistration like vlan and macvlan by holding the lower dev's refcnt in dev->netdev_ops->ndo_init() and releasing it in dev->priv_destructor(). Jakub pointed out calling .ndo_XXX after unregister_netdevice() has returned is error prone and suggested [1] addressing this UAF in the core by taking commit 750e51603395 (\"net: avoid potential UAF in default_operstate()\") further. Let's assume unregistering devices DOWN and use RCU protection in default_operstate() not to race with the device unregistration. [0]: BUG: KASAN: slab-use-after-free in ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 Read of size 4 at addr ffff0000d768c0e0 by task kworker/u8:35/6944 CPU: 0 UID: 0 PID: 6944 Comm: kworker/u8:35 Not tainted 6.13.0-rc2-g9bc5c9515b48 #12 4c3cb9e8b4565456f6a355f312ff91f4f29b3c47 Hardware name: linux,dummy-virt (DT) Workqueue: events_unbound linkwatch_event Call trace: show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:484 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x16c/0x6f0 mm/kasan/report.c:489 kasan_report+0xc0/0x120 mm/kasan/report.c:602 __asan_report_load4_noabort+0x20/0x30 mm/kasan/report_generic.c:380 ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 dev_get_iflink+0x7c/0xd8 net/core/dev.c:674 default_operstate net/core/link_watch.c:45 [inline] rfc2863_policy+0x144/0x360 net/core/link_watch.c:72 linkwatch_do_dev+0x60/0x228 net/core/link_watch.c:175 __linkwatch_run_queue+0x2f4/0x5b8 net/core/link_watch.c:239 linkwatch_event+0x64/0xa8 net/core/link_watch.c:282 process_one_work+0x700/0x1398 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x8c4/0xe10 kernel/workqueue.c:3391 kthread+0x2b0/0x360 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Allocated by task 9303: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x30/0x68 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4283 [inline] __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4289 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:650 alloc_netdev_mqs+0xb4/0x1118 net/core/dev.c:11209 rtnl_create_link+0x2b8/0xb60 net/core/rtnetlink.c:3595 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3771 __rtnl_newlink net/core/rtnetlink.c:3896 [inline] rtnl_newlink+0x122c/0x15c0 net/core/rtnetlink.c:4011 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6901 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2542 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6928 netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline] netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1347 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1891 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg net/socket.c:726 [inline] __sys_sendto+0x2ec/0x438 net/socket.c:2197 __do_sys_sendto net/socket.c:2204 [inline] __se_sys_sendto net/socket.c:2200 [inline] __arm64_sys_sendto+0xe4/0x110 net/socket.c:2200 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151 el ---truncated---\npublished:2025-01-19T11:15:10.830"} {"instruction": "Please provide detailed information about CVE-2025-21653", "inputs": "", "outputs": "CVE:CVE-2025-21653\nDescription:In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift values. UBSAN: shift-out-of-bounds in net/sched/cls_flow.c:329:23 shift exponent 9445 is too large for 32-bit type 'u32' (aka 'unsigned int') CPU: 1 UID: 0 PID: 54 Comm: kworker/u8:3 Not tainted 6.13.0-rc3-syzkaller-00180-g4f619d518db9 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: ipv6_addrconf addrconf_dad_work Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:231 [inline] __ubsan_handle_shift_out_of_bounds+0x3c8/0x420 lib/ubsan.c:468 flow_classify+0x24d5/0x25b0 net/sched/cls_flow.c:329 tc_classify include/net/tc_wrapper.h:197 [inline] __tcf_classify net/sched/cls_api.c:1771 [inline] tcf_classify+0x420/0x1160 net/sched/cls_api.c:1867 sfb_classify net/sched/sch_sfb.c:260 [inline] sfb_enqueue+0x3ad/0x18b0 net/sched/sch_sfb.c:318 dev_qdisc_enqueue+0x4b/0x290 net/core/dev.c:3793 __dev_xmit_skb net/core/dev.c:3889 [inline] __dev_queue_xmit+0xf0e/0x3f50 net/core/dev.c:4400 dev_queue_xmit include/linux/netdevice.h:3168 [inline] neigh_hh_output include/net/neighbour.h:523 [inline] neigh_output include/net/neighbour.h:537 [inline] ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236 iptunnel_xmit+0x55d/0x9b0 net/ipv4/ip_tunnel_core.c:82 udp_tunnel_xmit_skb+0x262/0x3b0 net/ipv4/udp_tunnel_core.c:173 geneve_xmit_skb drivers/net/geneve.c:916 [inline] geneve_xmit+0x21dc/0x2d00 drivers/net/geneve.c:1039 __netdev_start_xmit include/linux/netdevice.h:5002 [inline] netdev_start_xmit include/linux/netdevice.h:5011 [inline] xmit_one net/core/dev.c:3590 [inline] dev_hard_start_xmit+0x27a/0x7d0 net/core/dev.c:3606 __dev_queue_xmit+0x1b73/0x3f50 net/core/dev.c:4434\npublished:2025-01-19T11:15:10.940"} {"instruction": "Please provide detailed information about CVE-2025-21654", "inputs": "", "outputs": "CVE:CVE-2025-21654\nDescription:In the Linux kernel, the following vulnerability has been resolved: ovl: support encoding fid from inode with no alias Dmitry Safonov reported that a WARN_ON() assertion can be trigered by userspace when calling inotify_show_fdinfo() for an overlayfs watched inode, whose dentry aliases were discarded with drop_caches. The WARN_ON() assertion in inotify_show_fdinfo() was removed, because it is possible for encoding file handle to fail for other reason, but the impact of failing to encode an overlayfs file handle goes beyond this assertion. As shown in the LTP test case mentioned in the link below, failure to encode an overlayfs file handle from a non-aliased inode also leads to failure to report an fid with FAN_DELETE_SELF fanotify events. As Dmitry notes in his analyzis of the problem, ovl_encode_fh() fails if it cannot find an alias for the inode, but this failure can be fixed. ovl_encode_fh() seldom uses the alias and in the case of non-decodable file handles, as is often the case with fanotify fid info, ovl_encode_fh() never needs to use the alias to encode a file handle. Defer finding an alias until it is actually needed so ovl_encode_fh() will not fail in the common case of FAN_DELETE_SELF fanotify events.\npublished:2025-01-19T11:15:11.040"} {"instruction": "Please provide detailed information about CVE-2025-0575", "inputs": "", "outputs": "CVE:CVE-2025-0575\nDescription:A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic. This vulnerability affects unknown code of the component Rooting Detection. The manipulation leads to protection mechanism failure. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-19T23:15:20.013"} {"instruction": "Please provide detailed information about CVE-2025-0576", "inputs": "", "outputs": "CVE:CVE-2025-0576\nDescription:A vulnerability was found in Mobotix M15 4.3.4.83 and classified as problematic. This issue affects some unknown processing of the file /control/player?center&eventlist&pda&dummy_for_reload=1736177631&p_evt. The manipulation of the argument p_qual leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-20T00:15:16.320"} {"instruction": "Please provide detailed information about CVE-2025-0578", "inputs": "", "outputs": "CVE:CVE-2025-0578\nDescription:A vulnerability was found in Facile Sistemas Cloud Apps up to 20250107. It has been classified as problematic. Affected is an unknown function of the file /account/forgotpassword of the component Password Reset Handler. The manipulation of the argument reterros leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-20T02:15:18.913"} {"instruction": "Please provide detailed information about CVE-2025-0583", "inputs": "", "outputs": "CVE:CVE-2025-0583\nDescription:The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.\npublished:2025-01-20T02:15:19.767"} {"instruction": "Please provide detailed information about CVE-2025-0579", "inputs": "", "outputs": "CVE:CVE-2025-0579\nDescription:A vulnerability was found in Shiprocket Module 3/4 on OpenCart. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php?route=extension/shiprocket/module/restapi of the component REST API Module. The manipulation of the argument x-username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-20T03:15:08.353"} {"instruction": "Please provide detailed information about CVE-2025-0580", "inputs": "", "outputs": "CVE:CVE-2025-0580\nDescription:A vulnerability was found in Shiprocket Module 3 on OpenCart. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php?route=extension/module/rest_api&action=getOrders of the component REST API Module. The manipulation of the argument contentHash leads to incorrect authorization. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-20T03:15:08.540"} {"instruction": "Please provide detailed information about CVE-2025-0581", "inputs": "", "outputs": "CVE:CVE-2025-0581\nDescription:A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. This affects an unknown part of the file /chat/group/send of the component Chat History. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-20T03:15:08.737"} {"instruction": "Please provide detailed information about CVE-2025-0582", "inputs": "", "outputs": "CVE:CVE-2025-0582\nDescription:A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. The attack can be initiated remotely.\npublished:2025-01-20T03:15:08.930"} {"instruction": "Please provide detailed information about CVE-2025-0584", "inputs": "", "outputs": "CVE:CVE-2025-0584\nDescription:The a+HRD from aEnrich Technology has a Server-side Request Forgery, allowing unauthenticated remote attackers to exploit this vulnerability to probe internal network.\npublished:2025-01-20T03:15:09.120"} {"instruction": "Please provide detailed information about CVE-2025-0585", "inputs": "", "outputs": "CVE:CVE-2025-0585\nDescription:The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.\npublished:2025-01-20T03:15:09.283"} {"instruction": "Please provide detailed information about CVE-2025-0586", "inputs": "", "outputs": "CVE:CVE-2025-0586\nDescription:The a+HRD from aEnrich Technology has an Insecure Deserialization vulnerability, allowing remote attackers with database modification privileges and regular system privileges to perform arbitrary code execution.\npublished:2025-01-20T03:15:09.433"} {"instruction": "Please provide detailed information about CVE-2025-0590", "inputs": "", "outputs": "CVE:CVE-2025-0590\nDescription:Improper permission settings for mobile applications (com.transsion.carlcare) may lead to information leakage risk.\npublished:2025-01-20T07:17:10.383"} {"instruction": "Please provide detailed information about CVE-2025-0479", "inputs": "", "outputs": "CVE:CVE-2025-0479\nDescription:This vulnerability exists in the CP Plus Router due to insecure handling of cookie flags used within its web interface. A remote attacker could exploit this vulnerability by intercepting data transmissions during an HTTP session on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to obtain sensitive information and compromise the targeted system.\npublished:2025-01-20T12:15:23.563"} {"instruction": "Please provide detailed information about CVE-2025-21655", "inputs": "", "outputs": "CVE:CVE-2025-21655\nDescription:In the Linux kernel, the following vulnerability has been resolved: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period io_eventfd_do_signal() is invoked from an RCU callback, but when dropping the reference to the io_ev_fd, it calls io_eventfd_free() directly if the refcount drops to zero. This isn't correct, as any potential freeing of the io_ev_fd should be deferred another RCU grace period. Just call io_eventfd_put() rather than open-code the dec-and-test and free, which will correctly defer it another RCU grace period.\npublished:2025-01-20T14:15:27.027"} {"instruction": "Please provide detailed information about CVE-2025-24337", "inputs": "", "outputs": "CVE:CVE-2025-24337\nDescription:WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.\npublished:2025-01-20T14:15:27.130"} {"instruction": "Please provide detailed information about CVE-2025-22131", "inputs": "", "outputs": "CVE:CVE-2025-22131\nDescription:PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.\npublished:2025-01-20T16:15:27.880"} {"instruction": "Please provide detailed information about CVE-2025-22620", "inputs": "", "outputs": "CVE:CVE-2025-22620\nDescription:gitoxide is an implementation of git written in Rust. Prior to 0.17.0, gix-worktree-state specifies 0777 permissions when checking out executable files, intending that the umask will restrict them appropriately. But one of the strategies it uses to set permissions is not subject to the umask. This causes files in a repository to be world-writable in some situations. This vulnerability is fixed in 0.17.0.\npublished:2025-01-20T16:15:28.017"} {"instruction": "Please provide detailed information about CVE-2025-23044", "inputs": "", "outputs": "CVE:CVE-2025-23044\nDescription:PwnDoc is a penetration test report generator. There is no CSRF protection in pwndoc, allowing attackers to send requests on a logged-in user's behalf. This includes GET and POST requests due to the missing SameSite= attribute on cookies and the ability to refresh cookies. Commit 14acb704891245bf1703ce6296d62112e85aa995 patches the issue.\npublished:2025-01-20T16:15:28.170"} {"instruction": "Please provide detailed information about CVE-2025-23218", "inputs": "", "outputs": "CVE:CVE-2025-23218\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_especie.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.\npublished:2025-01-20T16:15:28.317"} {"instruction": "Please provide detailed information about CVE-2025-23219", "inputs": "", "outputs": "CVE:CVE-2025-23219\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_cor.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.\npublished:2025-01-20T16:15:28.460"} {"instruction": "Please provide detailed information about CVE-2025-23220", "inputs": "", "outputs": "CVE:CVE-2025-23220\nDescription:WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_raca.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.\npublished:2025-01-20T16:15:28.593"} {"instruction": "Please provide detailed information about CVE-2025-24010", "inputs": "", "outputs": "CVE:CVE-2025-24010\nDescription:Vite is a frontend tooling framework for javascript. Vite allowed any websites to send any requests to the development server and read the response due to default CORS settings and lack of validation on the Origin header for WebSocket connections. This vulnerability is fixed in 6.0.9, 5.4.12, and 4.5.6.\npublished:2025-01-20T16:15:28.730"} {"instruction": "Please provide detailed information about CVE-2025-24013", "inputs": "", "outputs": "CVE:CVE-2025-24013\nDescription:CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service’s web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8.\npublished:2025-01-20T16:15:28.877"} {"instruction": "Please provide detailed information about CVE-2025-23221", "inputs": "", "outputs": "CVE:CVE-2025-23221\nDescription:Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. This vulnerability allows a user to maneuver the Webfinger mechanism to perform a GET request to any internal resource on any Host, Port, URL combination regardless of present security mechanisms, and forcing the victim’s server into an infinite loop causing Denial of Service. Moreover, this issue can also be maneuvered into performing a Blind SSRF attack. This vulnerability is fixed in 1.0.14, 1.1.11, 1.2.11, and 1.3.4.\npublished:2025-01-20T17:15:07.987"} {"instruction": "Please provide detailed information about CVE-2025-23214", "inputs": "", "outputs": "CVE:CVE-2025-23214\nDescription:Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. By monitoring the error code returned in the login, it is possible to figure out whether a user exist or not in the database. Patched in 0.17.7.\npublished:2025-01-20T18:15:14.127"} {"instruction": "Please provide detailed information about CVE-2025-24014", "inputs": "", "outputs": "CVE:CVE-2025-24014\nDescription:Vim is an open source, command line text editor. A segmentation fault was found in Vim before 9.1.1043. In silent Ex mode (-s -e), Vim typically doesn't show a screen and just operates silently in batch mode. However, it is still possible to trigger the function that handles the scrolling of a gui version of Vim by feeding some binary characters to Vim. The function that handles the scrolling however may be triggering a redraw, which will access the ScreenLines pointer, even so this variable hasn't been allocated (since there is no screen). This vulnerability is fixed in 9.1.1043.\npublished:2025-01-20T23:15:07.730"} {"instruction": "Please provide detailed information about CVE-2025-23086", "inputs": "", "outputs": "CVE:CVE-2025-23086\nDescription:On most desktop platforms, Brave Browser versions 1.70.x-1.73.x included a feature to show a site's origin on the OS-provided file selector dialog when a site prompts the user to upload or download a file. However the origin was not correctly inferred in some cases. When combined with an open redirector vulnerability on a trusted site, this could allow a malicious site to initiate a download whose origin in the file select dialog appears as the trusted site which initiated the redirect.\npublished:2025-01-21T05:15:07.960"} {"instruction": "Please provide detailed information about CVE-2025-0371", "inputs": "", "outputs": "CVE:CVE-2025-0371\nDescription:The JetElements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 2.7.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-21T09:15:07.747"} {"instruction": "Please provide detailed information about CVE-2025-23184", "inputs": "", "outputs": "CVE:CVE-2025-23184\nDescription:A potential denial of service vulnerability is present in versions of Apache CXF before 3.5.10, 3.6.5 and 4.0.6. In some edge cases, the CachedOutputStream instances may not be closed and, if backed by temporary files, may fill up the file system (it applies to servers and clients).\npublished:2025-01-21T10:15:08.110"} {"instruction": "Please provide detailed information about CVE-2025-0450", "inputs": "", "outputs": "CVE:CVE-2025-0450\nDescription:The Betheme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's custom JS functionality in all versions up to, and including, 27.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-21T11:15:10.593"} {"instruction": "Please provide detailed information about CVE-2025-0614", "inputs": "", "outputs": "CVE:CVE-2025-0614\nDescription:Input validation vulnerability in Qualifio's Wheel of Fortune. This vulnerability could allow an attacker to modify a single email to contain upper and lower case characters in order to access the application and win prizes as many times as wanted.\npublished:2025-01-21T12:15:27.580"} {"instruction": "Please provide detailed information about CVE-2025-0615", "inputs": "", "outputs": "CVE:CVE-2025-0615\nDescription:Input validation vulnerability in Qualifio's Wheel of Fortune. This vulnerability allows an attacker to modify an email to contain the ‘+’ symbol to access the application and win prizes as many times as wanted.\npublished:2025-01-21T12:15:27.737"} {"instruction": "Please provide detailed information about CVE-2025-21656", "inputs": "", "outputs": "CVE:CVE-2025-21656\nDescription:In the Linux kernel, the following vulnerability has been resolved: hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur scsi_execute_cmd() function can return both negative (linux codes) and positive (scsi_cmnd result field) error codes. Currently the driver just passes error codes of scsi_execute_cmd() to hwmon core, which is incorrect because hwmon only checks for negative error codes. This leads to hwmon reporting uninitialized data to userspace in case of SCSI errors (for example if the disk drive was disconnected). This patch checks scsi_execute_cmd() output and returns -EIO if it's error code is positive. [groeck: Avoid inline variable declaration for portability]\npublished:2025-01-21T13:15:09.240"} {"instruction": "Please provide detailed information about CVE-2025-21657", "inputs": "", "outputs": "CVE:CVE-2025-21657\nDescription:In the Linux kernel, the following vulnerability has been resolved: sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass() scx_ops_bypass() iterates all CPUs to re-enqueue all the scx tasks. For each CPU, it acquires a lock using rq_lock() regardless of whether a CPU is offline or the CPU is currently running a task in a higher scheduler class (e.g., deadline). The rq_lock() is supposed to be used for online CPUs, and the use of rq_lock() may trigger an unnecessary warning in rq_pin_lock(). Therefore, replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass(). Without this change, we observe the following warning: ===== START ===== [ 6.615205] rq->balance_callback && rq->balance_callback != &balance_push_callback [ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90 ===== END =====\npublished:2025-01-21T13:15:09.340"} {"instruction": "Please provide detailed information about CVE-2025-21658", "inputs": "", "outputs": "CVE:CVE-2025-21658\nDescription:In the Linux kernel, the following vulnerability has been resolved: btrfs: avoid NULL pointer dereference if no valid extent tree [BUG] Syzbot reported a crash with the following call trace: BTRFS info (device loop0): scrub: started on devid 1 BUG: kernel NULL pointer dereference, address: 0000000000000208 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 106e70067 P4D 106e70067 PUD 107143067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 1 UID: 0 PID: 689 Comm: repro Kdump: loaded Tainted: G O 6.13.0-rc4-custom+ #206 Tainted: [O]=OOT_MODULE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022 RIP: 0010:find_first_extent_item+0x26/0x1f0 [btrfs] Call Trace: scrub_find_fill_first_stripe+0x13d/0x3b0 [btrfs] scrub_simple_mirror+0x175/0x260 [btrfs] scrub_stripe+0x5d4/0x6c0 [btrfs] scrub_chunk+0xbb/0x170 [btrfs] scrub_enumerate_chunks+0x2f4/0x5f0 [btrfs] btrfs_scrub_dev+0x240/0x600 [btrfs] btrfs_ioctl+0x1dc8/0x2fa0 [btrfs] ? do_sys_openat2+0xa5/0xf0 __x64_sys_ioctl+0x97/0xc0 do_syscall_64+0x4f/0x120 entry_SYSCALL_64_after_hwframe+0x76/0x7e [CAUSE] The reproducer is using a corrupted image where extent tree root is corrupted, thus forcing to use \"rescue=all,ro\" mount option to mount the image. Then it triggered a scrub, but since scrub relies on extent tree to find where the data/metadata extents are, scrub_find_fill_first_stripe() relies on an non-empty extent root. But unfortunately scrub_find_fill_first_stripe() doesn't really expect an NULL pointer for extent root, it use extent_root to grab fs_info and triggered a NULL pointer dereference. [FIX] Add an extra check for a valid extent root at the beginning of scrub_find_fill_first_stripe(). The new error path is introduced by 42437a6386ff (\"btrfs: introduce mount option rescue=ignorebadroots\"), but that's pretty old, and later commit b979547513ff (\"btrfs: scrub: introduce helper to find and fill sector info for a scrub_stripe\") changed how we do scrub. So for kernels older than 6.6, the fix will need manual backport.\npublished:2025-01-21T13:15:09.437"} {"instruction": "Please provide detailed information about CVE-2025-21659", "inputs": "", "outputs": "CVE:CVE-2025-21659\nDescription:In the Linux kernel, the following vulnerability has been resolved: netdev: prevent accessing NAPI instances from another namespace The NAPI IDs were not fully exposed to user space prior to the netlink API, so they were never namespaced. The netlink API must ensure that at the very least NAPI instance belongs to the same netns as the owner of the genl sock. napi_by_id() can become static now, but it needs to move because of dev_get_by_napi_id().\npublished:2025-01-21T13:15:09.540"} {"instruction": "Please provide detailed information about CVE-2025-21660", "inputs": "", "outputs": "CVE:CVE-2025-21660\nDescription:In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked When `ksmbd_vfs_kern_path_locked` met an error and it is not the last entry, it will exit without restoring changed path buffer. But later this buffer may be used as the filename for creation.\npublished:2025-01-21T13:15:09.643"} {"instruction": "Please provide detailed information about CVE-2025-21661", "inputs": "", "outputs": "CVE:CVE-2025-21661\nDescription:In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix missing lookup table cleanups When a virtuser device is created via configfs and the probe fails due to an incorrect lookup table, the table is not removed. This prevents subsequent probe attempts from succeeding, even if the issue is corrected, unless the device is released. Additionally, cleanup is also needed in the less likely case of platform_device_register_full() failure. Besides, a consistent memory leak in lookup_table->dev_id was spotted using kmemleak by toggling the live state between 0 and 1 with a correct lookup table. Introduce gpio_virtuser_remove_lookup_table() as the counterpart to the existing gpio_virtuser_make_lookup_table() and call it from all necessary points to ensure proper cleanup.\npublished:2025-01-21T13:15:09.747"} {"instruction": "Please provide detailed information about CVE-2025-21662", "inputs": "", "outputs": "CVE:CVE-2025-21662\nDescription:In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix variable not being completed when function returns When cmd_alloc_index(), fails cmd_work_handler() needs to complete ent->slotted before returning early. Otherwise the task which issued the command may hang: mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry INFO: task kworker/13:2:4055883 blocked for more than 120 seconds. Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. kworker/13:2 D 0 4055883 2 0x00000228 Workqueue: events mlx5e_tx_dim_work [mlx5_core] Call trace: __switch_to+0xe8/0x150 __schedule+0x2a8/0x9b8 schedule+0x2c/0x88 schedule_timeout+0x204/0x478 wait_for_common+0x154/0x250 wait_for_completion+0x28/0x38 cmd_exec+0x7a0/0xa00 [mlx5_core] mlx5_cmd_exec+0x54/0x80 [mlx5_core] mlx5_core_modify_cq+0x6c/0x80 [mlx5_core] mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core] mlx5e_tx_dim_work+0x54/0x68 [mlx5_core] process_one_work+0x1b0/0x448 worker_thread+0x54/0x468 kthread+0x134/0x138 ret_from_fork+0x10/0x18\npublished:2025-01-21T13:15:09.847"} {"instruction": "Please provide detailed information about CVE-2025-21663", "inputs": "", "outputs": "CVE:CVE-2025-21663\nDescription:In the Linux kernel, the following vulnerability has been resolved: net: stmmac: dwmac-tegra: Read iommu stream id from device tree Nvidia's Tegra MGBE controllers require the IOMMU \"Stream ID\" (SID) to be written to the MGBE_WRAP_AXI_ASID0_CTRL register. The current driver is hard coded to use MGBE0's SID for all controllers. This causes softirq time outs and kernel panics when using controllers other than MGBE0. Example dmesg errors when an ethernet cable is connected to MGBE1: [ 116.133290] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx [ 121.851283] tegra-mgbe 6910000.ethernet eth1: NETDEV WATCHDOG: CPU: 5: transmit queue 0 timed out 5690 ms [ 121.851782] tegra-mgbe 6910000.ethernet eth1: Reset adapter. [ 121.892464] tegra-mgbe 6910000.ethernet eth1: Register MEM_TYPE_PAGE_POOL RxQ-0 [ 121.905920] tegra-mgbe 6910000.ethernet eth1: PHY [stmmac-1:00] driver [Aquantia AQR113] (irq=171) [ 121.907356] tegra-mgbe 6910000.ethernet eth1: Enabling Safety Features [ 121.907578] tegra-mgbe 6910000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported [ 121.908399] tegra-mgbe 6910000.ethernet eth1: registered PTP clock [ 121.908582] tegra-mgbe 6910000.ethernet eth1: configuring for phy/10gbase-r link mode [ 125.961292] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx [ 181.921198] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 181.921404] rcu: \t7-....: (1 GPs behind) idle=540c/1/0x4000000000000002 softirq=1748/1749 fqs=2337 [ 181.921684] rcu: \t(detected by 4, t=6002 jiffies, g=1357, q=1254 ncpus=8) [ 181.921878] Sending NMI from CPU 4 to CPUs 7: [ 181.921886] NMI backtrace for cpu 7 [ 181.922131] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Kdump: loaded Not tainted 6.13.0-rc3+ #6 [ 181.922390] Hardware name: NVIDIA CTI Forge + Orin AGX/Jetson, BIOS 202402.1-Unknown 10/28/2024 [ 181.922658] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 181.922847] pc : handle_softirqs+0x98/0x368 [ 181.922978] lr : __do_softirq+0x18/0x20 [ 181.923095] sp : ffff80008003bf50 [ 181.923189] x29: ffff80008003bf50 x28: 0000000000000008 x27: 0000000000000000 [ 181.923379] x26: ffffce78ea277000 x25: 0000000000000000 x24: 0000001c61befda0 [ 181.924486] x23: 0000000060400009 x22: ffffce78e99918bc x21: ffff80008018bd70 [ 181.925568] x20: ffffce78e8bb00d8 x19: ffff80008018bc20 x18: 0000000000000000 [ 181.926655] x17: ffff318ebe7d3000 x16: ffff800080038000 x15: 0000000000000000 [ 181.931455] x14: ffff000080816680 x13: ffff318ebe7d3000 x12: 000000003464d91d [ 181.938628] x11: 0000000000000040 x10: ffff000080165a70 x9 : ffffce78e8bb0160 [ 181.945804] x8 : ffff8000827b3160 x7 : f9157b241586f343 x6 : eeb6502a01c81c74 [ 181.953068] x5 : a4acfcdd2e8096bb x4 : ffffce78ea277340 x3 : 00000000ffffd1e1 [ 181.960329] x2 : 0000000000000101 x1 : ffffce78ea277340 x0 : ffff318ebe7d3000 [ 181.967591] Call trace: [ 181.970043] handle_softirqs+0x98/0x368 (P) [ 181.974240] __do_softirq+0x18/0x20 [ 181.977743] ____do_softirq+0x14/0x28 [ 181.981415] call_on_irq_stack+0x24/0x30 [ 181.985180] do_softirq_own_stack+0x20/0x30 [ 181.989379] __irq_exit_rcu+0x114/0x140 [ 181.993142] irq_exit_rcu+0x14/0x28 [ 181.996816] el1_interrupt+0x44/0xb8 [ 182.000316] el1h_64_irq_handler+0x14/0x20 [ 182.004343] el1h_64_irq+0x80/0x88 [ 182.007755] cpuidle_enter_state+0xc4/0x4a8 (P) [ 182.012305] cpuidle_enter+0x3c/0x58 [ 182.015980] cpuidle_idle_call+0x128/0x1c0 [ 182.020005] do_idle+0xe0/0xf0 [ 182.023155] cpu_startup_entry+0x3c/0x48 [ 182.026917] secondary_start_kernel+0xdc/0x120 [ 182.031379] __secondary_switched+0x74/0x78 [ 212.971162] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 7-.... } 6103 jiffies s: 417 root: 0x80/. [ 212.985935] rcu: blocking rcu_node structures (internal RCU debug): [ 212.992758] Sending NMI from CPU 0 to CPUs 7: [ 212.998539] NMI backtrace for cpu 7 [ 213.004304] CPU: 7 UID: 0 PI ---truncated---\npublished:2025-01-21T13:15:09.947"} {"instruction": "Please provide detailed information about CVE-2025-21664", "inputs": "", "outputs": "CVE:CVE-2025-21664\nDescription:In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ONCE() of the list head. This can lead to a situation where the list_empty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification. In the case of dm-thin, this author had a production box crash from a GP fault in the process_deferred_bios path. This function saw a valid list head in get_first_thin() but when it subsequently dereferenced that and turned it into a thin_c, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcount_t being saturated, and a UBSAN error for an out-of-bounds cpuid access in the queued spinlock, prior to the fault itself. When the resulting kdump was examined, it was possible to see another thread patiently waiting in thin_dtr's synchronize_rcu. The thin_dtr call managed to pull the thin_c out of the active thins list (and have it be the last entry in the active_thins list) at just the wrong moment which lead to this crash. Fortunately, the fix here is straight forward. Switch get_first_thin() function to use list_first_or_null_rcu() which performs just a single READ_ONCE() and returns NULL if the list is already empty. This was run against the devicemapper test suite's thin-provisioning suites for delete and suspend and no regressions were observed.\npublished:2025-01-21T13:15:10.053"} {"instruction": "Please provide detailed information about CVE-2025-22262", "inputs": "", "outputs": "CVE:CVE-2025-22262\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bonjour Bar allows Stored XSS. This issue affects Bonjour Bar: from n/a through 1.0.0.\npublished:2025-01-21T14:15:09.757"} {"instruction": "Please provide detailed information about CVE-2025-22311", "inputs": "", "outputs": "CVE:CVE-2025-22311\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Private Messages for UserPro. This issue affects Private Messages for UserPro: from n/a through 4.10.0.\npublished:2025-01-21T14:15:09.930"} {"instruction": "Please provide detailed information about CVE-2025-22318", "inputs": "", "outputs": "CVE:CVE-2025-22318\nDescription:Missing Authorization vulnerability in Eniture Technology Standard Box Sizes – for WooCommerce. This issue affects Standard Box Sizes – for WooCommerce: from n/a through 1.6.13.\npublished:2025-01-21T14:15:10.110"} {"instruction": "Please provide detailed information about CVE-2025-22322", "inputs": "", "outputs": "CVE:CVE-2025-22322\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Private Messages for UserPro allows Reflected XSS. This issue affects Private Messages for UserPro: from n/a through 4.10.0.\npublished:2025-01-21T14:15:10.280"} {"instruction": "Please provide detailed information about CVE-2025-22553", "inputs": "", "outputs": "CVE:CVE-2025-22553\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Multiple Carousel allows SQL Injection. This issue affects Multiple Carousel: from n/a through 2.0.\npublished:2025-01-21T14:15:10.453"} {"instruction": "Please provide detailed information about CVE-2025-22706", "inputs": "", "outputs": "CVE:CVE-2025-22706\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iova.mihai Social Pug: Author Box allows Reflected XSS. This issue affects Social Pug: Author Box: from n/a through 1.0.0.\npublished:2025-01-21T14:15:10.640"} {"instruction": "Please provide detailed information about CVE-2025-22709", "inputs": "", "outputs": "CVE:CVE-2025-22709\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Soft8Soft LLC Verge3D allows Reflected XSS. This issue affects Verge3D: from n/a through 4.8.0.\npublished:2025-01-21T14:15:10.823"} {"instruction": "Please provide detailed information about CVE-2025-22710", "inputs": "", "outputs": "CVE:CVE-2025-22710\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StoreApps Smart Manager allows Blind SQL Injection. This issue affects Smart Manager: from n/a through 8.52.0.\npublished:2025-01-21T14:15:11.000"} {"instruction": "Please provide detailed information about CVE-2025-22711", "inputs": "", "outputs": "CVE:CVE-2025-22711\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thomas Maier Image Source Control allows Reflected XSS. This issue affects Image Source Control: from n/a through 2.29.0.\npublished:2025-01-21T14:15:11.173"} {"instruction": "Please provide detailed information about CVE-2025-22716", "inputs": "", "outputs": "CVE:CVE-2025-22716\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Taskbuilder Team Taskbuilder allows SQL Injection. This issue affects Taskbuilder: from n/a through 3.0.6.\npublished:2025-01-21T14:15:11.343"} {"instruction": "Please provide detailed information about CVE-2025-22717", "inputs": "", "outputs": "CVE:CVE-2025-22717\nDescription:Missing Authorization vulnerability in Joe Dolson My Tickets allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects My Tickets: from n/a through 2.0.9.\npublished:2025-01-21T14:15:11.527"} {"instruction": "Please provide detailed information about CVE-2025-22718", "inputs": "", "outputs": "CVE:CVE-2025-22718\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Roninwp FAT Event Lite allows Stored XSS. This issue affects FAT Event Lite: from n/a through 1.1.\npublished:2025-01-21T14:15:11.697"} {"instruction": "Please provide detailed information about CVE-2025-22719", "inputs": "", "outputs": "CVE:CVE-2025-22719\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in E4J s.r.l. VikAppointments Services Booking Calendar allows Stored XSS. This issue affects VikAppointments Services Booking Calendar: from n/a through 1.2.16.\npublished:2025-01-21T14:15:11.860"} {"instruction": "Please provide detailed information about CVE-2025-22723", "inputs": "", "outputs": "CVE:CVE-2025-22723\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in UkrSolution Barcode Scanner with Inventory & Order Manager allows Upload a Web Shell to a Web Server. This issue affects Barcode Scanner with Inventory & Order Manager: from n/a through 1.6.7.\npublished:2025-01-21T14:15:12.017"} {"instruction": "Please provide detailed information about CVE-2025-22727", "inputs": "", "outputs": "CVE:CVE-2025-22727\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PluginOps MailChimp Subscribe Forms allows Stored XSS. This issue affects MailChimp Subscribe Forms : from n/a through 4.1.\npublished:2025-01-21T14:15:12.173"} {"instruction": "Please provide detailed information about CVE-2025-22732", "inputs": "", "outputs": "CVE:CVE-2025-22732\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Admiral Ad Blocking Detector allows Stored XSS. This issue affects Ad Blocking Detector: from n/a through 3.6.0.\npublished:2025-01-21T14:15:12.387"} {"instruction": "Please provide detailed information about CVE-2025-22733", "inputs": "", "outputs": "CVE:CVE-2025-22733\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPHocus My auctions allegro allows Reflected XSS. This issue affects My auctions allegro: from n/a through 3.6.18.\npublished:2025-01-21T14:15:12.570"} {"instruction": "Please provide detailed information about CVE-2025-22735", "inputs": "", "outputs": "CVE:CVE-2025-22735\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TaxoPress WordPress Tag Cloud Plugin – Tag Groups allows Reflected XSS. This issue affects WordPress Tag Cloud Plugin – Tag Groups: from n/a through 2.0.4.\npublished:2025-01-21T14:15:12.737"} {"instruction": "Please provide detailed information about CVE-2025-22763", "inputs": "", "outputs": "CVE:CVE-2025-22763\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Brizy Pro allows Reflected XSS. This issue affects Brizy Pro: from n/a through 2.6.1.\npublished:2025-01-21T14:15:12.900"} {"instruction": "Please provide detailed information about CVE-2025-22825", "inputs": "", "outputs": "CVE:CVE-2025-22825\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Desk Flexible PDF Coupons allows Stored XSS. This issue affects Flexible PDF Coupons: from n/a through n/a.\npublished:2025-01-21T14:15:13.060"} {"instruction": "Please provide detailed information about CVE-2025-23997", "inputs": "", "outputs": "CVE:CVE-2025-23997\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dev@tamara.co Tamara Checkout allows Stored XSS. This issue affects Tamara Checkout: from n/a through 1.9.8.\npublished:2025-01-21T14:15:13.230"} {"instruction": "Please provide detailed information about CVE-2025-23998", "inputs": "", "outputs": "CVE:CVE-2025-23998\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rara Theme UltraLight allows Reflected XSS. This issue affects UltraLight: from n/a through 1.2.\npublished:2025-01-21T14:15:13.413"} {"instruction": "Please provide detailed information about CVE-2025-24001", "inputs": "", "outputs": "CVE:CVE-2025-24001\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in PPO Việt Nam (ppo.vn) PPO Call To Actions allows Cross Site Request Forgery. This issue affects PPO Call To Actions: from n/a through 0.1.3.\npublished:2025-01-21T14:15:13.600"} {"instruction": "Please provide detailed information about CVE-2025-0377", "inputs": "", "outputs": "CVE:CVE-2025-0377\nDescription:HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.\npublished:2025-01-21T16:15:14.290"} {"instruction": "Please provide detailed information about CVE-2025-24011", "inputs": "", "outputs": "CVE:CVE-2025-24011\nDescription:Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, it's possible to determine whether an account exists based on an analysis of response codes and timing of Umbraco management API responses. Versions 14.3.2 and 15.1.2 contain a patch. No known workarounds are available.\npublished:2025-01-21T16:15:14.760"} {"instruction": "Please provide detailed information about CVE-2025-24012", "inputs": "", "outputs": "CVE:CVE-2025-24012\nDescription:Umbraco is a free and open source .NET content management system. Starting in version 14.0.0 and prior to versions 14.3.2 and 15.1.2, authenticated users are able to exploit a cross-site scripting vulnerability when viewing certain localized backoffice components. Versions 14.3.2 and 15.1.2 contain a patch.\npublished:2025-01-21T16:15:14.923"} {"instruction": "Please provide detailed information about CVE-2025-24017", "inputs": "", "outputs": "CVE:CVE-2025-24017\nDescription:YesWiki is a wiki system written in PHP. Versions up to and including 4.4.5 are vulnerable to any end-user crafting a DOM based XSS on all of YesWiki's pages which is triggered when a user clicks on a malicious link. The vulnerability makes use of the search by tag feature. When a tag doesn't exist, the tag is reflected on the page and isn't properly sanitized on the server side which allows a malicious user to generate a link that will trigger an XSS on the client's side when clicked. This vulnerability allows any user to generate a malicious link that will trigger an account takeover when clicked, therefore allowing a user to steal other accounts, modify pages, comments, permissions, extract user data (emails), thus impacting the integrity, availability and confidentiality of a YesWiki instance. Version 4.5.0 contains a patch for the issue.\npublished:2025-01-21T16:15:15.087"} {"instruction": "Please provide detailed information about CVE-2025-0623", "inputs": "", "outputs": "CVE:CVE-2025-0623\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-21T17:15:16.817"} {"instruction": "Please provide detailed information about CVE-2025-24018", "inputs": "", "outputs": "CVE:CVE-2025-24018\nDescription:YesWiki is a wiki system written in PHP. In versions up to and including 4.4.5, it is possible for an authenticated user with rights to edit/create a page or comment to trigger a stored XSS which will be reflected on any page where the resource is loaded. The vulnerability makes use of the content edition feature and more specifically of the `{{attach}}` component allowing users to attach files/medias to a page. When a file is attached using the `{{attach}}` component, if the resource contained in the `file` attribute doesn't exist, then the server will generate a file upload button containing the filename. This vulnerability allows any malicious authenticated user that has the right to create a comment or edit a page to be able to steal accounts and therefore modify pages, comments, permissions, extract user data (emails), thus impacting the integrity, availability and confidentiality of a YesWiki instance. Version 4.5.0 contains a patch for the issue.\npublished:2025-01-21T17:15:16.917"} {"instruction": "Please provide detailed information about CVE-2025-22150", "inputs": "", "outputs": "CVE:CVE-2025-22150\nDescription:Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.\npublished:2025-01-21T18:15:14.887"} {"instruction": "Please provide detailed information about CVE-2025-22267", "inputs": "", "outputs": "CVE:CVE-2025-22267\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bruce Wampler Weaver Themes Shortcode Compatibility allows Stored XSS. This issue affects Weaver Themes Shortcode Compatibility: from n/a through 1.0.4.\npublished:2025-01-21T18:15:15.100"} {"instruction": "Please provide detailed information about CVE-2025-22276", "inputs": "", "outputs": "CVE:CVE-2025-22276\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Enguerran Weiss Related Post Shortcode allows Stored XSS. This issue affects Related Post Shortcode: from n/a through 1.2.\npublished:2025-01-21T18:15:15.303"} {"instruction": "Please provide detailed information about CVE-2025-22661", "inputs": "", "outputs": "CVE:CVE-2025-22661\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vcita.com Online Payments – Get Paid with PayPal, Square & Stripe allows Stored XSS. This issue affects Online Payments – Get Paid with PayPal, Square & Stripe: from n/a through 3.20.0.\npublished:2025-01-21T18:15:15.707"} {"instruction": "Please provide detailed information about CVE-2025-22721", "inputs": "", "outputs": "CVE:CVE-2025-22721\nDescription:Missing Authorization vulnerability in Farhan Noor ApplyOnline – Application Form Builder and Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ApplyOnline – Application Form Builder and Manager: from n/a through 2.6.7.1.\npublished:2025-01-21T18:15:15.880"} {"instruction": "Please provide detailed information about CVE-2025-22722", "inputs": "", "outputs": "CVE:CVE-2025-22722\nDescription:Missing Authorization vulnerability in Widget Options Team Widget Options allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Widget Options: from n/a through 4.0.8.\npublished:2025-01-21T18:15:16.057"} {"instruction": "Please provide detailed information about CVE-2025-23454", "inputs": "", "outputs": "CVE:CVE-2025-23454\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in flashmaniac Nature FlipBook allows Reflected XSS. This issue affects Nature FlipBook: from n/a through 1.7.\npublished:2025-01-21T18:15:16.223"} {"instruction": "Please provide detailed information about CVE-2025-23461", "inputs": "", "outputs": "CVE:CVE-2025-23461\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andrea Dotta, Jacopo Campani, di xkoll.com Social2Blog allows Reflected XSS. This issue affects Social2Blog: from n/a through 0.2.990.\npublished:2025-01-21T18:15:16.387"} {"instruction": "Please provide detailed information about CVE-2025-23477", "inputs": "", "outputs": "CVE:CVE-2025-23477\nDescription:Missing Authorization vulnerability in Realty Workstation Realty Workstation allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Realty Workstation: from n/a through 1.0.45.\npublished:2025-01-21T18:15:16.570"} {"instruction": "Please provide detailed information about CVE-2025-23489", "inputs": "", "outputs": "CVE:CVE-2025-23489\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brian Messenlehner of WebDevStudios WP-Announcements allows Reflected XSS. This issue affects WP-Announcements: from n/a through 1.8.\npublished:2025-01-21T18:15:16.740"} {"instruction": "Please provide detailed information about CVE-2025-23551", "inputs": "", "outputs": "CVE:CVE-2025-23551\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in P. Razvan SexBundle allows Reflected XSS. This issue affects SexBundle: from n/a through 1.4.\npublished:2025-01-21T18:15:16.927"} {"instruction": "Please provide detailed information about CVE-2025-23580", "inputs": "", "outputs": "CVE:CVE-2025-23580\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Garvin BizLibrary allows Reflected XSS. This issue affects BizLibrary: from n/a through 1.1.\npublished:2025-01-21T18:15:17.133"} {"instruction": "Please provide detailed information about CVE-2025-23994", "inputs": "", "outputs": "CVE:CVE-2025-23994\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Estatebud Estatebud – Properties & Listings allows Stored XSS. This issue affects Estatebud – Properties & Listings: from n/a through 5.5.0.\npublished:2025-01-21T18:15:17.313"} {"instruction": "Please provide detailed information about CVE-2025-23996", "inputs": "", "outputs": "CVE:CVE-2025-23996\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in anyroad.com AnyRoad allows Cross Site Request Forgery. This issue affects AnyRoad: from n/a through 1.3.2.\npublished:2025-01-21T18:15:17.503"} {"instruction": "Please provide detailed information about CVE-2025-24019", "inputs": "", "outputs": "CVE:CVE-2025-24019\nDescription:YesWiki is a wiki system written in PHP. In versions up to and including 4.4.5, it is possible for any authenticated user, through the use of the filemanager to delete any file owned by the user running the FastCGI Process Manager (FPM) on the host without any limitation on the filesystem's scope. This vulnerability allows any authenticated user to arbitrarily remove content from the Wiki resulting in partial loss of data and defacement/deterioration of the website. In the context of a container installation of YesWiki without any modification, the `yeswiki` files (for example .php) are not owned by the same user (root) as the one running the FPM process (www-data). However in a standard installation, www-data may also be the owner of the PHP files, allowing a malicious user to completely cut the access to the wiki by deleting all important PHP files (like index.php or core files of YesWiki). Version 4.5.0 contains a patch for this issue.\npublished:2025-01-21T18:15:17.933"} {"instruction": "Please provide detailed information about CVE-2025-24020", "inputs": "", "outputs": "CVE:CVE-2025-24020\nDescription:WeGIA is a Web manager for charitable institutions. An Open Redirect vulnerability was identified in the `control.php` endpoint of versions up to and including 3.2.10 of the WeGIA application. The vulnerability allows the `nextPage` parameter to be manipulated, redirecting authenticated users to arbitrary external URLs without validation. The issue stems from the lack of validation for the `nextPage` parameter, which accepts external URLs as redirection destinations. This vulnerability can be exploited to perform phishing attacks or redirect users to malicious websites. Version 3.2.11 contains a fix for the issue.\npublished:2025-01-21T18:15:18.157"} {"instruction": "Please provide detailed information about CVE-2025-24456", "inputs": "", "outputs": "CVE:CVE-2025-24456\nDescription:In JetBrains Hub before 2024.3.55417 privilege escalation was possible via LDAP authentication mapping\npublished:2025-01-21T18:15:18.320"} {"instruction": "Please provide detailed information about CVE-2025-24457", "inputs": "", "outputs": "CVE:CVE-2025-24457\nDescription:In JetBrains YouTrack before 2024.3.55417 permanent tokens could be exposed in logs\npublished:2025-01-21T18:15:18.520"} {"instruction": "Please provide detailed information about CVE-2025-24458", "inputs": "", "outputs": "CVE:CVE-2025-24458\nDescription:In JetBrains YouTrack before 2024.3.55417 account takeover was possible via spoofed email and Helpdesk integration\npublished:2025-01-21T18:15:18.697"} {"instruction": "Please provide detailed information about CVE-2025-24459", "inputs": "", "outputs": "CVE:CVE-2025-24459\nDescription:In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on the Vault Connection page\npublished:2025-01-21T18:15:18.890"} {"instruction": "Please provide detailed information about CVE-2025-24460", "inputs": "", "outputs": "CVE:CVE-2025-24460\nDescription:In JetBrains TeamCity before 2024.12.1 improper access control allowed to see Projects’ names in the agent pool\npublished:2025-01-21T18:15:19.067"} {"instruction": "Please provide detailed information about CVE-2025-24461", "inputs": "", "outputs": "CVE:CVE-2025-24461\nDescription:In JetBrains TeamCity before 2024.12.1 decryption of connection secrets without proper permissions was possible via Test Connection endpoint\npublished:2025-01-21T18:15:19.260"} {"instruction": "Please provide detailed information about CVE-2025-23369", "inputs": "", "outputs": "CVE:CVE-2025-23369\nDescription:An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already an existing user were not impacted. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12.14, 3.13.10, 3.14.7, 3.15.2, and 3.16.0. This vulnerability was reported via the GitHub Bug Bounty program.\npublished:2025-01-21T19:15:12.147"} {"instruction": "Please provide detailed information about CVE-2025-24024", "inputs": "", "outputs": "CVE:CVE-2025-24024\nDescription:Mjolnir is a moderation tool for Matrix. Mjolnir v1.9.0 responds to management commands from any room the bot is member of. This can allow users who aren't operators of the bot to use the bot's functions, including server administration components if enabled. Version 1.9.1 reverts the feature that introduced the bug, and version 1.9.2 reintroduces the feature safely. Downgrading to version 1.8.3 is recommended if upgrading to 1.9.1 or higher isn't possible.\npublished:2025-01-21T20:15:46.617"} {"instruction": "Please provide detailed information about CVE-2025-21489", "inputs": "", "outputs": "CVE:CVE-2025-21489\nDescription:Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: Region Mapping). Supported versions that are affected are 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data as well as unauthorized read access to a subset of Oracle Advanced Outbound Telephony accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:13.577"} {"instruction": "Please provide detailed information about CVE-2025-21490", "inputs": "", "outputs": "CVE:CVE-2025-21490\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:13.703"} {"instruction": "Please provide detailed information about CVE-2025-21491", "inputs": "", "outputs": "CVE:CVE-2025-21491\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:13.833"} {"instruction": "Please provide detailed information about CVE-2025-21492", "inputs": "", "outputs": "CVE:CVE-2025-21492\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:13.970"} {"instruction": "Please provide detailed information about CVE-2025-21493", "inputs": "", "outputs": "CVE:CVE-2025-21493\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:14.103"} {"instruction": "Please provide detailed information about CVE-2025-21494", "inputs": "", "outputs": "CVE:CVE-2025-21494\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:14.240"} {"instruction": "Please provide detailed information about CVE-2025-21495", "inputs": "", "outputs": "CVE:CVE-2025-21495\nDescription:Vulnerability in the MySQL Enterprise Firewall product of Oracle MySQL (component: Firewall). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Enterprise Firewall. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Enterprise Firewall. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:14.367"} {"instruction": "Please provide detailed information about CVE-2025-21497", "inputs": "", "outputs": "CVE:CVE-2025-21497\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\npublished:2025-01-21T21:15:14.490"} {"instruction": "Please provide detailed information about CVE-2025-21498", "inputs": "", "outputs": "CVE:CVE-2025-21498\nDescription:Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle HTTP Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:14.617"} {"instruction": "Please provide detailed information about CVE-2025-21499", "inputs": "", "outputs": "CVE:CVE-2025-21499\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:14.750"} {"instruction": "Please provide detailed information about CVE-2025-21500", "inputs": "", "outputs": "CVE:CVE-2025-21500\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:14.910"} {"instruction": "Please provide detailed information about CVE-2025-21501", "inputs": "", "outputs": "CVE:CVE-2025-21501\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:15.050"} {"instruction": "Please provide detailed information about CVE-2025-21502", "inputs": "", "outputs": "CVE:CVE-2025-21502\nDescription:Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u431-perf, 11.0.25, 17.0.13, 21.0.5, 23.0.1; Oracle GraalVM for JDK: 17.0.13, 21.0.5, 23.0.1; Oracle GraalVM Enterprise Edition: 20.3.16 and 21.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:15.180"} {"instruction": "Please provide detailed information about CVE-2025-21503", "inputs": "", "outputs": "CVE:CVE-2025-21503\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:15.313"} {"instruction": "Please provide detailed information about CVE-2025-21504", "inputs": "", "outputs": "CVE:CVE-2025-21504\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:15.447"} {"instruction": "Please provide detailed information about CVE-2025-21505", "inputs": "", "outputs": "CVE:CVE-2025-21505\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:15.573"} {"instruction": "Please provide detailed information about CVE-2025-21506", "inputs": "", "outputs": "CVE:CVE-2025-21506\nDescription:Vulnerability in the Oracle Project Foundation product of Oracle E-Business Suite (component: Technology Foundation). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Project Foundation. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Project Foundation accessible data as well as unauthorized access to critical data or complete access to all Oracle Project Foundation accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).\npublished:2025-01-21T21:15:15.707"} {"instruction": "Please provide detailed information about CVE-2025-21507", "inputs": "", "outputs": "CVE:CVE-2025-21507\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:15.847"} {"instruction": "Please provide detailed information about CVE-2025-21508", "inputs": "", "outputs": "CVE:CVE-2025-21508\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:15.973"} {"instruction": "Please provide detailed information about CVE-2025-21509", "inputs": "", "outputs": "CVE:CVE-2025-21509\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:16.107"} {"instruction": "Please provide detailed information about CVE-2025-21510", "inputs": "", "outputs": "CVE:CVE-2025-21510\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:16.243"} {"instruction": "Please provide detailed information about CVE-2025-21511", "inputs": "", "outputs": "CVE:CVE-2025-21511\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:16.363"} {"instruction": "Please provide detailed information about CVE-2025-21512", "inputs": "", "outputs": "CVE:CVE-2025-21512\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:16.497"} {"instruction": "Please provide detailed information about CVE-2025-21513", "inputs": "", "outputs": "CVE:CVE-2025-21513\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:16.623"} {"instruction": "Please provide detailed information about CVE-2025-21514", "inputs": "", "outputs": "CVE:CVE-2025-21514\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:16.753"} {"instruction": "Please provide detailed information about CVE-2025-21515", "inputs": "", "outputs": "CVE:CVE-2025-21515\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\npublished:2025-01-21T21:15:16.887"} {"instruction": "Please provide detailed information about CVE-2025-21516", "inputs": "", "outputs": "CVE:CVE-2025-21516\nDescription:Vulnerability in the Oracle Customer Care product of Oracle E-Business Suite (component: Service Requests). Supported versions that are affected are 12.2.5-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Customer Care. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Customer Care accessible data as well as unauthorized access to critical data or complete access to all Oracle Customer Care accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).\npublished:2025-01-21T21:15:17.030"} {"instruction": "Please provide detailed information about CVE-2025-21517", "inputs": "", "outputs": "CVE:CVE-2025-21517\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).\npublished:2025-01-21T21:15:17.157"} {"instruction": "Please provide detailed information about CVE-2025-21518", "inputs": "", "outputs": "CVE:CVE-2025-21518\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:17.290"} {"instruction": "Please provide detailed information about CVE-2025-21519", "inputs": "", "outputs": "CVE:CVE-2025-21519\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:17.407"} {"instruction": "Please provide detailed information about CVE-2025-21520", "inputs": "", "outputs": "CVE:CVE-2025-21520\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 1.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:17.537"} {"instruction": "Please provide detailed information about CVE-2025-21521", "inputs": "", "outputs": "CVE:CVE-2025-21521\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:17.663"} {"instruction": "Please provide detailed information about CVE-2025-21522", "inputs": "", "outputs": "CVE:CVE-2025-21522\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:17.797"} {"instruction": "Please provide detailed information about CVE-2025-21523", "inputs": "", "outputs": "CVE:CVE-2025-21523\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:17.937"} {"instruction": "Please provide detailed information about CVE-2025-21524", "inputs": "", "outputs": "CVE:CVE-2025-21524\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Monitoring and Diagnostics SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\npublished:2025-01-21T21:15:18.070"} {"instruction": "Please provide detailed information about CVE-2025-21525", "inputs": "", "outputs": "CVE:CVE-2025-21525\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:18.210"} {"instruction": "Please provide detailed information about CVE-2025-21526", "inputs": "", "outputs": "CVE:CVE-2025-21526\nDescription:Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:18.337"} {"instruction": "Please provide detailed information about CVE-2025-21527", "inputs": "", "outputs": "CVE:CVE-2025-21527\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Design Tools SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:18.467"} {"instruction": "Please provide detailed information about CVE-2025-21528", "inputs": "", "outputs": "CVE:CVE-2025-21528\nDescription:Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).\npublished:2025-01-21T21:15:18.597"} {"instruction": "Please provide detailed information about CVE-2025-21529", "inputs": "", "outputs": "CVE:CVE-2025-21529\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:18.720"} {"instruction": "Please provide detailed information about CVE-2025-21530", "inputs": "", "outputs": "CVE:CVE-2025-21530\nDescription:Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Panel Processor). Supported versions that are affected are 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:18.850"} {"instruction": "Please provide detailed information about CVE-2025-21531", "inputs": "", "outputs": "CVE:CVE-2025-21531\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:18.980"} {"instruction": "Please provide detailed information about CVE-2025-21532", "inputs": "", "outputs": "CVE:CVE-2025-21532\nDescription:Vulnerability in the Oracle Analytics Desktop product of Oracle Analytics (component: Install). Supported versions that are affected are Prior to 8.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Analytics Desktop executes to compromise Oracle Analytics Desktop. Successful attacks of this vulnerability can result in takeover of Oracle Analytics Desktop. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).\npublished:2025-01-21T21:15:19.107"} {"instruction": "Please provide detailed information about CVE-2025-21533", "inputs": "", "outputs": "CVE:CVE-2025-21533\nDescription:Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.24 and prior to 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:19.240"} {"instruction": "Please provide detailed information about CVE-2025-21534", "inputs": "", "outputs": "CVE:CVE-2025-21534\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:19.363"} {"instruction": "Please provide detailed information about CVE-2025-21535", "inputs": "", "outputs": "CVE:CVE-2025-21535\nDescription:Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\npublished:2025-01-21T21:15:19.477"} {"instruction": "Please provide detailed information about CVE-2025-21536", "inputs": "", "outputs": "CVE:CVE-2025-21536\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:19.613"} {"instruction": "Please provide detailed information about CVE-2025-21537", "inputs": "", "outputs": "CVE:CVE-2025-21537\nDescription:Vulnerability in the PeopleSoft Enterprise FIN Cash Management product of Oracle PeopleSoft (component: Cash Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN Cash Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN Cash Management accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN Cash Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:19.760"} {"instruction": "Please provide detailed information about CVE-2025-21538", "inputs": "", "outputs": "CVE:CVE-2025-21538\nDescription:Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:19.887"} {"instruction": "Please provide detailed information about CVE-2025-21539", "inputs": "", "outputs": "CVE:CVE-2025-21539\nDescription:Vulnerability in the PeopleSoft Enterprise FIN eSettlements product of Oracle PeopleSoft (component: eSettlements). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FIN eSettlements. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise FIN eSettlements accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise FIN eSettlements accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:20.023"} {"instruction": "Please provide detailed information about CVE-2025-21540", "inputs": "", "outputs": "CVE:CVE-2025-21540\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:20.153"} {"instruction": "Please provide detailed information about CVE-2025-21541", "inputs": "", "outputs": "CVE:CVE-2025-21541\nDescription:Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Admin Screens and Grants UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Workflow accessible data as well as unauthorized read access to a subset of Oracle Workflow accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:20.287"} {"instruction": "Please provide detailed information about CVE-2025-21542", "inputs": "", "outputs": "CVE:CVE-2025-21542\nDescription:Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Order and Service Management. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).\npublished:2025-01-21T21:15:20.420"} {"instruction": "Please provide detailed information about CVE-2025-21543", "inputs": "", "outputs": "CVE:CVE-2025-21543\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:20.550"} {"instruction": "Please provide detailed information about CVE-2025-21544", "inputs": "", "outputs": "CVE:CVE-2025-21544\nDescription:Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Order and Service Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:20.690"} {"instruction": "Please provide detailed information about CVE-2025-21545", "inputs": "", "outputs": "CVE:CVE-2025-21545\nDescription:Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: OpenSearch). Supported versions that are affected are 8.60 and 8.61. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:20.860"} {"instruction": "Please provide detailed information about CVE-2025-21546", "inputs": "", "outputs": "CVE:CVE-2025-21546\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:20.987"} {"instruction": "Please provide detailed information about CVE-2025-21547", "inputs": "", "outputs": "CVE:CVE-2025-21547\nDescription:Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet). Supported versions that are affected are 5.6.19.20, 5.6.25.8, 5.6.26.6 and 5.6.27.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Hospitality OPERA 5. CVSS 3.1 Base Score 9.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).\npublished:2025-01-21T21:15:21.110"} {"instruction": "Please provide detailed information about CVE-2025-21548", "inputs": "", "outputs": "CVE:CVE-2025-21548\nDescription:Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.4 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H).\npublished:2025-01-21T21:15:21.240"} {"instruction": "Please provide detailed information about CVE-2025-21549", "inputs": "", "outputs": "CVE:CVE-2025-21549\nDescription:Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP/2 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:21.377"} {"instruction": "Please provide detailed information about CVE-2025-21550", "inputs": "", "outputs": "CVE:CVE-2025-21550\nDescription:Vulnerability in the Oracle Financial Services Behavior Detection Platform product of Oracle Financial Services Applications (component: Web UI). Supported versions that are affected are 8.0.8.1, 8.1.2.7 and 8.1.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Behavior Detection Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Behavior Detection Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Behavior Detection Platform accessible data as well as unauthorized read access to a subset of Oracle Financial Services Behavior Detection Platform accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:21.510"} {"instruction": "Please provide detailed information about CVE-2025-21551", "inputs": "", "outputs": "CVE:CVE-2025-21551\nDescription:Vulnerability in the Oracle Solaris product of Oracle Systems (component: File system). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Solaris accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).\npublished:2025-01-21T21:15:21.637"} {"instruction": "Please provide detailed information about CVE-2025-21552", "inputs": "", "outputs": "CVE:CVE-2025-21552\nDescription:Vulnerability in the JD Edwards EnterpriseOne Orchestrator product of Oracle JD Edwards (component: E1 IOT Orchestrator Security). Supported versions that are affected are Prior to 9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Orchestrator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Orchestrator accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:21.763"} {"instruction": "Please provide detailed information about CVE-2025-21553", "inputs": "", "outputs": "CVE:CVE-2025-21553\nDescription:Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.25, 21.3-21.16 and 23.4-23.6. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data as well as unauthorized read access to a subset of Java VM accessible data. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:21.880"} {"instruction": "Please provide detailed information about CVE-2025-21554", "inputs": "", "outputs": "CVE:CVE-2025-21554\nDescription:Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:22.020"} {"instruction": "Please provide detailed information about CVE-2025-21555", "inputs": "", "outputs": "CVE:CVE-2025-21555\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\npublished:2025-01-21T21:15:22.163"} {"instruction": "Please provide detailed information about CVE-2025-21556", "inputs": "", "outputs": "CVE:CVE-2025-21556\nDescription:Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Agile Integration Services). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. While the vulnerability is in Oracle Agile PLM Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM Framework. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).\npublished:2025-01-21T21:15:22.290"} {"instruction": "Please provide detailed information about CVE-2025-21557", "inputs": "", "outputs": "CVE:CVE-2025-21557\nDescription:Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:22.423"} {"instruction": "Please provide detailed information about CVE-2025-21558", "inputs": "", "outputs": "CVE:CVE-2025-21558\nDescription:Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0 and 22.12.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:22.537"} {"instruction": "Please provide detailed information about CVE-2025-21559", "inputs": "", "outputs": "CVE:CVE-2025-21559\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\npublished:2025-01-21T21:15:22.667"} {"instruction": "Please provide detailed information about CVE-2025-21560", "inputs": "", "outputs": "CVE:CVE-2025-21560\nDescription:Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: SDK-Software Development Kit). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:22.793"} {"instruction": "Please provide detailed information about CVE-2025-21561", "inputs": "", "outputs": "CVE:CVE-2025-21561\nDescription:Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Purchasing). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM Purchasing accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).\npublished:2025-01-21T21:15:22.920"} {"instruction": "Please provide detailed information about CVE-2025-21562", "inputs": "", "outputs": "CVE:CVE-2025-21562\nDescription:Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Run Control Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:23.060"} {"instruction": "Please provide detailed information about CVE-2025-21563", "inputs": "", "outputs": "CVE:CVE-2025-21563\nDescription:Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Run Control Management). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).\npublished:2025-01-21T21:15:23.207"} {"instruction": "Please provide detailed information about CVE-2025-21564", "inputs": "", "outputs": "CVE:CVE-2025-21564\nDescription:Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Agile Integration Services). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Agile PLM Framework. CVSS 3.1 Base Score 8.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).\npublished:2025-01-21T21:15:23.330"} {"instruction": "Please provide detailed information about CVE-2025-21565", "inputs": "", "outputs": "CVE:CVE-2025-21565\nDescription:Vulnerability in the Oracle Agile PLM Framework product of Oracle Supply Chain (component: Install). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Agile PLM Framework accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:23.460"} {"instruction": "Please provide detailed information about CVE-2025-21566", "inputs": "", "outputs": "CVE:CVE-2025-21566\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\npublished:2025-01-21T21:15:23.590"} {"instruction": "Please provide detailed information about CVE-2025-21567", "inputs": "", "outputs": "CVE:CVE-2025-21567\nDescription:Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\npublished:2025-01-21T21:15:23.710"} {"instruction": "Please provide detailed information about CVE-2025-21568", "inputs": "", "outputs": "CVE:CVE-2025-21568\nDescription:Vulnerability in the Oracle Hyperion Data Relationship Management product of Oracle Hyperion (component: Access and Security). The supported version that is affected is 11.2.19.0.000. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Data Relationship Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Data Relationship Management accessible data. CVSS 3.1 Base Score 4.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N).\npublished:2025-01-21T21:15:23.843"} {"instruction": "Please provide detailed information about CVE-2025-21569", "inputs": "", "outputs": "CVE:CVE-2025-21569\nDescription:Vulnerability in the Oracle Hyperion Data Relationship Management product of Oracle Hyperion (component: Web Services). The supported version that is affected is 11.2.19.0.000. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hyperion Data Relationship Management. Successful attacks of this vulnerability can result in takeover of Oracle Hyperion Data Relationship Management. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).\npublished:2025-01-21T21:15:23.977"} {"instruction": "Please provide detailed information about CVE-2025-21570", "inputs": "", "outputs": "CVE:CVE-2025-21570\nDescription:Vulnerability in the Oracle Life Sciences Argus Safety product of Oracle Health Sciences Applications (component: Login). The supported version that is affected is 8.2.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Life Sciences Argus Safety. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Life Sciences Argus Safety, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Life Sciences Argus Safety accessible data as well as unauthorized read access to a subset of Oracle Life Sciences Argus Safety accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).\npublished:2025-01-21T21:15:24.113"} {"instruction": "Please provide detailed information about CVE-2025-21571", "inputs": "", "outputs": "CVE:CVE-2025-21571\nDescription:Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.24 and prior to 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L).\npublished:2025-01-21T21:15:24.260"} {"instruction": "Please provide detailed information about CVE-2025-23195", "inputs": "", "outputs": "CVE:CVE-2025-23195\nDescription:An XML External Entity (XXE) vulnerability exists in the Ambari/Oozie project, allowing an attacker to inject malicious XML entities. This vulnerability occurs due to insecure parsing of XML input using the `DocumentBuilderFactory` class without disabling external entity resolution. An attacker can exploit this vulnerability to read arbitrary files on the server or perform server-side request forgery (SSRF) attacks. The issue has been fixed in both Ambari 2.7.9 and the trunk branch.\npublished:2025-01-21T22:15:12.863"} {"instruction": "Please provide detailed information about CVE-2025-23196", "inputs": "", "outputs": "CVE:CVE-2025-23196\nDescription:A code injection vulnerability exists in the Ambari Alert Definition feature, allowing authenticated users to inject and execute arbitrary shell commands. The vulnerability arises when defining alert scripts, where the script filename field is executed using `sh -c`. An attacker with authenticated access can exploit this vulnerability to inject malicious commands, leading to remote code execution on the server. The issue has been fixed in the latest versions of Ambari.\npublished:2025-01-21T22:15:12.987"} {"instruction": "Please provide detailed information about CVE-2025-0625", "inputs": "", "outputs": "CVE:CVE-2025-0625\nDescription:A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. This affects an unknown part of the component Attachment Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.\npublished:2025-01-22T02:15:31.123"} {"instruction": "Please provide detailed information about CVE-2025-23083", "inputs": "", "outputs": "CVE:CVE-2025-23083\nDescription:With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. \r \r This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.\npublished:2025-01-22T02:15:33.930"} {"instruction": "Please provide detailed information about CVE-2025-23087", "inputs": "", "outputs": "CVE:CVE-2025-23087\nDescription:Rejected reason: This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities\npublished:2025-01-22T02:15:34.080"} {"instruction": "Please provide detailed information about CVE-2025-23088", "inputs": "", "outputs": "CVE:CVE-2025-23088\nDescription:Rejected reason: This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities\npublished:2025-01-22T02:15:34.207"} {"instruction": "Please provide detailed information about CVE-2025-23089", "inputs": "", "outputs": "CVE:CVE-2025-23089\nDescription:Rejected reason: This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities\npublished:2025-01-22T02:15:34.327"} {"instruction": "Please provide detailed information about CVE-2025-23090", "inputs": "", "outputs": "CVE:CVE-2025-23090\nDescription:With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.\npublished:2025-01-22T02:15:34.443"} {"instruction": "Please provide detailed information about CVE-2025-20617", "inputs": "", "outputs": "CVE:CVE-2025-20617\nDescription:Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If an attacker logs in to the affected product with an administrative account and manipulates requests for a certain screen operation, an arbitrary OS command may be executed. This vulnerability was reported on a different screen operation from CVE-2025-26856.\npublished:2025-01-22T06:15:14.170"} {"instruction": "Please provide detailed information about CVE-2025-22450", "inputs": "", "outputs": "CVE:CVE-2025-22450\nDescription:Inclusion of undocumented features issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. A remote attacker may disable the LAN-side firewall function of the affected products, and open specific ports.\npublished:2025-01-22T06:15:14.327"} {"instruction": "Please provide detailed information about CVE-2025-23237", "inputs": "", "outputs": "CVE:CVE-2025-23237\nDescription:Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If a user logs in to CLI of the affected product, an arbitrary OS command may be executed.\npublished:2025-01-22T06:15:14.480"} {"instruction": "Please provide detailed information about CVE-2025-0428", "inputs": "", "outputs": "CVE:CVE-2025-0428\nDescription:The \"AI Power: Complete AI Pack\" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_prompts function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.\npublished:2025-01-22T08:15:09.013"} {"instruction": "Please provide detailed information about CVE-2025-0429", "inputs": "", "outputs": "CVE:CVE-2025-0429\nDescription:The \"AI Power: Complete AI Pack\" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_ai_forms() function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.\npublished:2025-01-22T08:15:09.173"} {"instruction": "Please provide detailed information about CVE-2025-0395", "inputs": "", "outputs": "CVE:CVE-2025-0395\nDescription:When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.\npublished:2025-01-22T13:15:20.933"} {"instruction": "Please provide detailed information about CVE-2025-0604", "inputs": "", "outputs": "CVE:CVE-2025-0604\nDescription:A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions.\npublished:2025-01-22T15:15:14.827"} {"instruction": "Please provide detailed information about CVE-2025-22772", "inputs": "", "outputs": "CVE:CVE-2025-22772\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mapbox for WP Advanced allows Reflected XSS. This issue affects Mapbox for WP Advanced: from n/a through 1.0.0.\npublished:2025-01-22T15:15:14.990"} {"instruction": "Please provide detailed information about CVE-2025-22980", "inputs": "", "outputs": "CVE:CVE-2025-22980\nDescription:A SQL Injection vulnerability exists in Senayan Library Management System SLiMS 9 Bulian 9.6.1 via the tempLoanID parameter in the loan form on /admin/modules/circulation/loan.php.\npublished:2025-01-22T15:15:15.130"} {"instruction": "Please provide detailed information about CVE-2025-23449", "inputs": "", "outputs": "CVE:CVE-2025-23449\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple shortcode buttons allows Reflected XSS. This issue affects Simple shortcode buttons: from n/a through 1.3.2.\npublished:2025-01-22T15:15:15.650"} {"instruction": "Please provide detailed information about CVE-2025-23462", "inputs": "", "outputs": "CVE:CVE-2025-23462\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FWD Slider allows Reflected XSS. This issue affects FWD Slider: from n/a through 1.0.\npublished:2025-01-22T15:15:15.800"} {"instruction": "Please provide detailed information about CVE-2025-23475", "inputs": "", "outputs": "CVE:CVE-2025-23475\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound History timeline allows Reflected XSS. This issue affects History timeline: from n/a through 0.7.2.\npublished:2025-01-22T15:15:15.950"} {"instruction": "Please provide detailed information about CVE-2025-23486", "inputs": "", "outputs": "CVE:CVE-2025-23486\nDescription:Missing Authorization vulnerability in NotFound Database Sync allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Database Sync: from n/a through 0.5.1.\npublished:2025-01-22T15:15:16.093"} {"instruction": "Please provide detailed information about CVE-2025-23495", "inputs": "", "outputs": "CVE:CVE-2025-23495\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WooCommerce Order Search allows Reflected XSS. This issue affects WooCommerce Order Search: from n/a through 1.1.0.\npublished:2025-01-22T15:15:16.230"} {"instruction": "Please provide detailed information about CVE-2025-23498", "inputs": "", "outputs": "CVE:CVE-2025-23498\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Translation.Pro allows Reflected XSS. This issue affects Translation.Pro: from n/a through 1.0.0.\npublished:2025-01-22T15:15:16.370"} {"instruction": "Please provide detailed information about CVE-2025-23500", "inputs": "", "outputs": "CVE:CVE-2025-23500\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Faaiq Ahmed, Technial Architect,faaiqsj@gmail.com Simple Custom post type custom field allows Reflected XSS. This issue affects Simple Custom post type custom field: from n/a through 1.0.3.\npublished:2025-01-22T15:15:16.500"} {"instruction": "Please provide detailed information about CVE-2025-23503", "inputs": "", "outputs": "CVE:CVE-2025-23503\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Customizable Captcha and Contact Us allows Reflected XSS. This issue affects Customizable Captcha and Contact Us: from n/a through 1.0.2.\npublished:2025-01-22T15:15:16.633"} {"instruction": "Please provide detailed information about CVE-2025-23506", "inputs": "", "outputs": "CVE:CVE-2025-23506\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP IMAP Auth allows Reflected XSS. This issue affects WP IMAP Auth: from n/a through 4.0.1.\npublished:2025-01-22T15:15:16.777"} {"instruction": "Please provide detailed information about CVE-2025-23507", "inputs": "", "outputs": "CVE:CVE-2025-23507\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Blrt Blrt WP Embed allows Reflected XSS. This issue affects Blrt WP Embed: from n/a through 1.6.9.\npublished:2025-01-22T15:15:16.910"} {"instruction": "Please provide detailed information about CVE-2025-23509", "inputs": "", "outputs": "CVE:CVE-2025-23509\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound HyperComments allows Reflected XSS. This issue affects HyperComments: from n/a through 0.9.6.\npublished:2025-01-22T15:15:17.043"} {"instruction": "Please provide detailed information about CVE-2025-23512", "inputs": "", "outputs": "CVE:CVE-2025-23512\nDescription:Missing Authorization vulnerability in Team118GROUP Team 118GROUP Agent allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team 118GROUP Agent: from n/a through 1.6.0.\npublished:2025-01-22T15:15:17.160"} {"instruction": "Please provide detailed information about CVE-2025-23535", "inputs": "", "outputs": "CVE:CVE-2025-23535\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in clickandsell REAL WordPress Sidebar allows Stored XSS. This issue affects REAL WordPress Sidebar: from n/a through 0.1.\npublished:2025-01-22T15:15:17.290"} {"instruction": "Please provide detailed information about CVE-2025-23548", "inputs": "", "outputs": "CVE:CVE-2025-23548\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bilal TAS Responsivity allows Reflected XSS. This issue affects Responsivity: from n/a through 0.0.6.\npublished:2025-01-22T15:15:17.423"} {"instruction": "Please provide detailed information about CVE-2025-23562", "inputs": "", "outputs": "CVE:CVE-2025-23562\nDescription:Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound XLSXviewer allows Path Traversal. This issue affects XLSXviewer: from n/a through 2.1.1.\npublished:2025-01-22T15:15:17.557"} {"instruction": "Please provide detailed information about CVE-2025-23578", "inputs": "", "outputs": "CVE:CVE-2025-23578\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Custom CSS Addons allows Reflected XSS. This issue affects Custom CSS Addons: from n/a through 1.9.1.\npublished:2025-01-22T15:15:17.687"} {"instruction": "Please provide detailed information about CVE-2025-23583", "inputs": "", "outputs": "CVE:CVE-2025-23583\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Explara Explara Membership allows Reflected XSS. This issue affects Explara Membership: from n/a through 0.0.7.\npublished:2025-01-22T15:15:17.820"} {"instruction": "Please provide detailed information about CVE-2025-23589", "inputs": "", "outputs": "CVE:CVE-2025-23589\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ContentOptin Lite allows Reflected XSS. This issue affects ContentOptin Lite: from n/a through 1.1.\npublished:2025-01-22T15:15:17.950"} {"instruction": "Please provide detailed information about CVE-2025-23592", "inputs": "", "outputs": "CVE:CVE-2025-23592\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound dForms allows Reflected XSS. This issue affects dForms: from n/a through 1.0.\npublished:2025-01-22T15:15:18.097"} {"instruction": "Please provide detailed information about CVE-2025-23597", "inputs": "", "outputs": "CVE:CVE-2025-23597\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Riosis Private Limited Rio Photo Gallery allows Reflected XSS. This issue affects Rio Photo Gallery: from n/a through 0.1.\npublished:2025-01-22T15:15:18.230"} {"instruction": "Please provide detailed information about CVE-2025-23601", "inputs": "", "outputs": "CVE:CVE-2025-23601\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Tab My Content allows Reflected XSS. This issue affects Tab My Content: from n/a through 1.0.0.\npublished:2025-01-22T15:15:18.363"} {"instruction": "Please provide detailed information about CVE-2025-23602", "inputs": "", "outputs": "CVE:CVE-2025-23602\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EELV Newsletter allows Reflected XSS. This issue affects EELV Newsletter: from n/a through 4.8.2.\npublished:2025-01-22T15:15:18.503"} {"instruction": "Please provide detailed information about CVE-2025-23603", "inputs": "", "outputs": "CVE:CVE-2025-23603\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Group category creator allows Reflected XSS. This issue affects Group category creator: from n/a through 1.3.0.3.\npublished:2025-01-22T15:15:18.667"} {"instruction": "Please provide detailed information about CVE-2025-23604", "inputs": "", "outputs": "CVE:CVE-2025-23604\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Rezdy Reloaded allows Stored XSS. This issue affects Rezdy Reloaded: from n/a through 1.0.1.\npublished:2025-01-22T15:15:18.810"} {"instruction": "Please provide detailed information about CVE-2025-23605", "inputs": "", "outputs": "CVE:CVE-2025-23605\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LamPD Call To Action Popup allows Reflected XSS. This issue affects Call To Action Popup: from n/a through 1.0.2.\npublished:2025-01-22T15:15:18.937"} {"instruction": "Please provide detailed information about CVE-2025-23606", "inputs": "", "outputs": "CVE:CVE-2025-23606\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Calendi allows Reflected XSS. This issue affects Calendi: from n/a through 1.1.1.\npublished:2025-01-22T15:15:19.073"} {"instruction": "Please provide detailed information about CVE-2025-23607", "inputs": "", "outputs": "CVE:CVE-2025-23607\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Camoo Sarl CAMOO SMS allows Reflected XSS. This issue affects CAMOO SMS: from n/a through 3.0.1.\npublished:2025-01-22T15:15:19.200"} {"instruction": "Please provide detailed information about CVE-2025-23609", "inputs": "", "outputs": "CVE:CVE-2025-23609\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Helmuth Lammer Tagesteller allows Reflected XSS. This issue affects Tagesteller: from n/a through v.1.1.\npublished:2025-01-22T15:15:19.343"} {"instruction": "Please provide detailed information about CVE-2025-23610", "inputs": "", "outputs": "CVE:CVE-2025-23610\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Ultimate Events allows Reflected XSS. This issue affects Ultimate Events: from n/a through 1.3.3.\npublished:2025-01-22T15:15:19.473"} {"instruction": "Please provide detailed information about CVE-2025-23611", "inputs": "", "outputs": "CVE:CVE-2025-23611\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WH Cache & Security allows Reflected XSS. This issue affects WH Cache & Security: from n/a through 1.1.2.\npublished:2025-01-22T15:15:19.610"} {"instruction": "Please provide detailed information about CVE-2025-23625", "inputs": "", "outputs": "CVE:CVE-2025-23625\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AWcode, PDSonline Unique UX allows Reflected XSS. This issue affects Unique UX: from n/a through 0.9.2.\npublished:2025-01-22T15:15:19.747"} {"instruction": "Please provide detailed information about CVE-2025-23630", "inputs": "", "outputs": "CVE:CVE-2025-23630\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Cyber Slider allows Reflected XSS. This issue affects Cyber Slider: from n/a through 1.1.\npublished:2025-01-22T15:15:19.877"} {"instruction": "Please provide detailed information about CVE-2025-23631", "inputs": "", "outputs": "CVE:CVE-2025-23631\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Planner allows Reflected XSS. This issue affects Content Planner: from n/a through 1.0.\npublished:2025-01-22T15:15:20.013"} {"instruction": "Please provide detailed information about CVE-2025-23643", "inputs": "", "outputs": "CVE:CVE-2025-23643\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ReadMe Creator allows Reflected XSS. This issue affects ReadMe Creator: from n/a through 1.0.\npublished:2025-01-22T15:15:20.153"} {"instruction": "Please provide detailed information about CVE-2025-23672", "inputs": "", "outputs": "CVE:CVE-2025-23672\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Instant Appointment allows Reflected XSS. This issue affects Instant Appointment: from n/a through 1.2.\npublished:2025-01-22T15:15:20.287"} {"instruction": "Please provide detailed information about CVE-2025-23674", "inputs": "", "outputs": "CVE:CVE-2025-23674\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bit.ly linker allows Reflected XSS. This issue affects Bit.ly linker: from n/a through 1.1.\npublished:2025-01-22T15:15:20.420"} {"instruction": "Please provide detailed information about CVE-2025-23676", "inputs": "", "outputs": "CVE:CVE-2025-23676\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LH Email allows Reflected XSS. This issue affects LH Email: from n/a through 1.12.\npublished:2025-01-22T15:15:20.563"} {"instruction": "Please provide detailed information about CVE-2025-23678", "inputs": "", "outputs": "CVE:CVE-2025-23678\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LocalGrid allows Reflected XSS. This issue affects LocalGrid: from n/a through 1.0.1.\npublished:2025-01-22T15:15:20.703"} {"instruction": "Please provide detailed information about CVE-2025-23679", "inputs": "", "outputs": "CVE:CVE-2025-23679\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moshiur Rahman Mehedi FP RSS Category Excluder allows Reflected XSS. This issue affects FP RSS Category Excluder: from n/a through 1.0.0.\npublished:2025-01-22T15:15:20.840"} {"instruction": "Please provide detailed information about CVE-2025-23681", "inputs": "", "outputs": "CVE:CVE-2025-23681\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jannatqualitybacklinks.com REDIRECTION PLUS allows Reflected XSS. This issue affects REDIRECTION PLUS: from n/a through 2.0.0.\npublished:2025-01-22T15:15:20.977"} {"instruction": "Please provide detailed information about CVE-2025-23682", "inputs": "", "outputs": "CVE:CVE-2025-23682\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Preloader Quotes allows Reflected XSS. This issue affects Preloader Quotes: from n/a through 1.0.0.\npublished:2025-01-22T15:15:21.123"} {"instruction": "Please provide detailed information about CVE-2025-23683", "inputs": "", "outputs": "CVE:CVE-2025-23683\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound MACME allows Reflected XSS. This issue affects MACME: from n/a through 1.2.\npublished:2025-01-22T15:15:21.260"} {"instruction": "Please provide detailed information about CVE-2025-23684", "inputs": "", "outputs": "CVE:CVE-2025-23684\nDescription:Missing Authorization vulnerability in Eugen Bobrowski Debug Tool allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Debug Tool: from n/a through 2.2.\npublished:2025-01-22T15:15:21.403"} {"instruction": "Please provide detailed information about CVE-2025-23686", "inputs": "", "outputs": "CVE:CVE-2025-23686\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Callum Richards Admin Menu Organizer allows Reflected XSS. This issue affects Admin Menu Organizer: from n/a through 1.0.1.\npublished:2025-01-22T15:15:21.547"} {"instruction": "Please provide detailed information about CVE-2025-23695", "inputs": "", "outputs": "CVE:CVE-2025-23695\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CtyGrid Hyp3rL0cal Search allows Reflected XSS. This issue affects CtyGrid Hyp3rL0cal Search: from n/a through 0.1.1.1.\npublished:2025-01-22T15:15:21.727"} {"instruction": "Please provide detailed information about CVE-2025-23696", "inputs": "", "outputs": "CVE:CVE-2025-23696\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Staging CDN allows Reflected XSS. This issue affects Staging CDN: from n/a through 1.0.0.\npublished:2025-01-22T15:15:21.870"} {"instruction": "Please provide detailed information about CVE-2025-23697", "inputs": "", "outputs": "CVE:CVE-2025-23697\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebDeal s.r.o. Podčlánková inzerce allows Reflected XSS. This issue affects Podčlánková inzerce: from n/a through 2.4.0.\npublished:2025-01-22T15:15:22.000"} {"instruction": "Please provide detailed information about CVE-2025-23700", "inputs": "", "outputs": "CVE:CVE-2025-23700\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yonatan Reinberg yCyclista allows Reflected XSS. This issue affects yCyclista: from n/a through 1.2.3.\npublished:2025-01-22T15:15:22.120"} {"instruction": "Please provide detailed information about CVE-2025-23701", "inputs": "", "outputs": "CVE:CVE-2025-23701\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthew Blackford, LimeSquare Pty Ltd Lime Developer Login allows Reflected XSS. This issue affects Lime Developer Login: from n/a through 1.4.0.\npublished:2025-01-22T15:15:22.250"} {"instruction": "Please provide detailed information about CVE-2025-23706", "inputs": "", "outputs": "CVE:CVE-2025-23706\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Jet Skinner for BuddyPress allows Reflected XSS. This issue affects Jet Skinner for BuddyPress: from n/a through 1.2.5.\npublished:2025-01-22T15:15:22.387"} {"instruction": "Please provide detailed information about CVE-2025-23709", "inputs": "", "outputs": "CVE:CVE-2025-23709\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kiro G. Formatted post allows Reflected XSS. This issue affects Formatted post: from n/a through 1.01.\npublished:2025-01-22T15:15:22.510"} {"instruction": "Please provide detailed information about CVE-2025-23732", "inputs": "", "outputs": "CVE:CVE-2025-23732\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Filtering allows Reflected XSS. This issue affects Easy Filtering: from n/a through 2.5.0.\npublished:2025-01-22T15:15:22.640"} {"instruction": "Please provide detailed information about CVE-2025-23746", "inputs": "", "outputs": "CVE:CVE-2025-23746\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CMC MIGRATE allows Reflected XSS. This issue affects CMC MIGRATE: from n/a through 0.0.3.\npublished:2025-01-22T15:15:22.783"} {"instruction": "Please provide detailed information about CVE-2025-23758", "inputs": "", "outputs": "CVE:CVE-2025-23758\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pootle button allows Reflected XSS. This issue affects Pootle button: from n/a through 1.2.0.\npublished:2025-01-22T15:15:22.907"} {"instruction": "Please provide detailed information about CVE-2025-23768", "inputs": "", "outputs": "CVE:CVE-2025-23768\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound InFunding allows Reflected XSS. This issue affects InFunding: from n/a through 1.0.\npublished:2025-01-22T15:15:23.040"} {"instruction": "Please provide detailed information about CVE-2025-23769", "inputs": "", "outputs": "CVE:CVE-2025-23769\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Mirror allows Reflected XSS. This issue affects Content Mirror: from n/a through 1.2.\npublished:2025-01-22T15:15:23.177"} {"instruction": "Please provide detailed information about CVE-2025-23770", "inputs": "", "outputs": "CVE:CVE-2025-23770\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Fast Tube allows Reflected XSS. This issue affects Fast Tube: from n/a through 2.3.1.\npublished:2025-01-22T15:15:23.303"} {"instruction": "Please provide detailed information about CVE-2025-23774", "inputs": "", "outputs": "CVE:CVE-2025-23774\nDescription:Insertion of Sensitive Information Into Sent Data vulnerability in NotFound WPDB to Sql allows Retrieve Embedded Sensitive Data. This issue affects WPDB to Sql: from n/a through 1.2.\npublished:2025-01-22T15:15:23.440"} {"instruction": "Please provide detailed information about CVE-2025-23781", "inputs": "", "outputs": "CVE:CVE-2025-23781\nDescription:Insertion of Sensitive Information Into Sent Data vulnerability in NotFound WM Options Import Export allows Retrieve Embedded Sensitive Data. This issue affects WM Options Import Export: from n/a through 1.0.1.\npublished:2025-01-22T15:15:23.573"} {"instruction": "Please provide detailed information about CVE-2025-23784", "inputs": "", "outputs": "CVE:CVE-2025-23784\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Contact Form 7 Round Robin Lead Distribution allows SQL Injection. This issue affects Contact Form 7 Round Robin Lead Distribution: from n/a through 1.2.1.\npublished:2025-01-22T15:15:23.713"} {"instruction": "Please provide detailed information about CVE-2025-23798", "inputs": "", "outputs": "CVE:CVE-2025-23798\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eliott Robson Mass Messaging in BuddyPress allows Reflected XSS. This issue affects Mass Messaging in BuddyPress: from n/a through 2.2.1.\npublished:2025-01-22T15:15:23.873"} {"instruction": "Please provide detailed information about CVE-2025-23803", "inputs": "", "outputs": "CVE:CVE-2025-23803\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in PQINA Snippy allows Reflected XSS. This issue affects Snippy: from n/a through 1.4.1.\npublished:2025-01-22T15:15:24.020"} {"instruction": "Please provide detailed information about CVE-2025-23806", "inputs": "", "outputs": "CVE:CVE-2025-23806\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in ThemeFarmer Ultimate Subscribe allows Reflected XSS. This issue affects Ultimate Subscribe: from n/a through 1.3.\npublished:2025-01-22T15:15:24.163"} {"instruction": "Please provide detailed information about CVE-2025-23811", "inputs": "", "outputs": "CVE:CVE-2025-23811\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP2APP allows Reflected XSS. This issue affects WP2APP: from n/a through 2.6.2.\npublished:2025-01-22T15:15:24.297"} {"instruction": "Please provide detailed information about CVE-2025-23812", "inputs": "", "outputs": "CVE:CVE-2025-23812\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Contact Form 7 Round Robin Lead Distribution allows Reflected XSS. This issue affects Contact Form 7 Round Robin Lead Distribution: from n/a through 1.2.1.\npublished:2025-01-22T15:15:24.437"} {"instruction": "Please provide detailed information about CVE-2025-23846", "inputs": "", "outputs": "CVE:CVE-2025-23846\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kolja Nolte Flexible Blogtitle allows Reflected XSS. This issue affects Flexible Blogtitle: from n/a through 0.1.\npublished:2025-01-22T15:15:24.570"} {"instruction": "Please provide detailed information about CVE-2025-23866", "inputs": "", "outputs": "CVE:CVE-2025-23866\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EU DSGVO Helper allows Reflected XSS. This issue affects EU DSGVO Helper: from n/a through 1.0.6.1.\npublished:2025-01-22T15:15:24.707"} {"instruction": "Please provide detailed information about CVE-2025-23867", "inputs": "", "outputs": "CVE:CVE-2025-23867\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WordPress File Search allows Reflected XSS. This issue affects WordPress File Search: from n/a through 1.2.\npublished:2025-01-22T15:15:24.847"} {"instruction": "Please provide detailed information about CVE-2025-23874", "inputs": "", "outputs": "CVE:CVE-2025-23874\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Block Pack allows Reflected XSS. This issue affects WP Block Pack: from n/a through 1.1.6.\npublished:2025-01-22T15:15:24.980"} {"instruction": "Please provide detailed information about CVE-2025-23882", "inputs": "", "outputs": "CVE:CVE-2025-23882\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Download Codes allows Reflected XSS. This issue affects WP Download Codes: from n/a through 2.5.4.\npublished:2025-01-22T15:15:25.123"} {"instruction": "Please provide detailed information about CVE-2025-23910", "inputs": "", "outputs": "CVE:CVE-2025-23910\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Menus Plus+ allows SQL Injection. This issue affects Menus Plus+: from n/a through 1.9.6.\npublished:2025-01-22T15:15:25.267"} {"instruction": "Please provide detailed information about CVE-2025-23918", "inputs": "", "outputs": "CVE:CVE-2025-23918\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Smallerik File Browser allows Upload a Web Shell to a Web Server. This issue affects Smallerik File Browser: from n/a through 1.1.\npublished:2025-01-22T15:15:25.403"} {"instruction": "Please provide detailed information about CVE-2025-23921", "inputs": "", "outputs": "CVE:CVE-2025-23921\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Multi Uploader for Gravity Forms allows Upload a Web Shell to a Web Server. This issue affects Multi Uploader for Gravity Forms: from n/a through 1.1.3.\npublished:2025-01-22T15:15:25.547"} {"instruction": "Please provide detailed information about CVE-2025-23931", "inputs": "", "outputs": "CVE:CVE-2025-23931\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound WordPress Local SEO allows Blind SQL Injection. This issue affects WordPress Local SEO: from n/a through 2.3.\npublished:2025-01-22T15:15:25.687"} {"instruction": "Please provide detailed information about CVE-2025-23932", "inputs": "", "outputs": "CVE:CVE-2025-23932\nDescription:Deserialization of Untrusted Data vulnerability in NotFound Quick Count allows Object Injection. This issue affects Quick Count: from n/a through 3.00.\npublished:2025-01-22T15:15:25.827"} {"instruction": "Please provide detailed information about CVE-2025-23938", "inputs": "", "outputs": "CVE:CVE-2025-23938\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Image Gallery Box by CRUDLab allows PHP Local File Inclusion. This issue affects Image Gallery Box by CRUDLab: from n/a through 1.0.3.\npublished:2025-01-22T15:15:25.967"} {"instruction": "Please provide detailed information about CVE-2025-23942", "inputs": "", "outputs": "CVE:CVE-2025-23942\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in NgocCode WP Load Gallery allows Upload a Web Shell to a Web Server. This issue affects WP Load Gallery: from n/a through 2.1.6.\npublished:2025-01-22T15:15:26.103"} {"instruction": "Please provide detailed information about CVE-2025-23944", "inputs": "", "outputs": "CVE:CVE-2025-23944\nDescription:Deserialization of Untrusted Data vulnerability in WOOEXIM.COM WOOEXIM allows Object Injection. This issue affects WOOEXIM: from n/a through 5.0.0.\npublished:2025-01-22T15:15:26.240"} {"instruction": "Please provide detailed information about CVE-2025-23948", "inputs": "", "outputs": "CVE:CVE-2025-23948\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebArea Background animation blocks allows PHP Local File Inclusion. This issue affects Background animation blocks: from n/a through 2.1.5.\npublished:2025-01-22T15:15:26.383"} {"instruction": "Please provide detailed information about CVE-2025-23949", "inputs": "", "outputs": "CVE:CVE-2025-23949\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mihajlovic Nenad Improved Sale Badges – Free Version allows PHP Local File Inclusion. This issue affects Improved Sale Badges – Free Version: from n/a through 1.0.1.\npublished:2025-01-22T15:15:26.527"} {"instruction": "Please provide detailed information about CVE-2025-23953", "inputs": "", "outputs": "CVE:CVE-2025-23953\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in Innovative Solutions user files allows Upload a Web Shell to a Web Server. This issue affects user files: from n/a through 2.4.2.\npublished:2025-01-22T15:15:26.670"} {"instruction": "Please provide detailed information about CVE-2025-23959", "inputs": "", "outputs": "CVE:CVE-2025-23959\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Linus Lundahl Good Old Gallery allows Reflected XSS. This issue affects Good Old Gallery: from n/a through 2.1.2.\npublished:2025-01-22T15:15:26.810"} {"instruction": "Please provide detailed information about CVE-2025-23966", "inputs": "", "outputs": "CVE:CVE-2025-23966\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlaFalaki a Gateway for Pasargad Bank on WooCommerce allows Reflected XSS. This issue affects a Gateway for Pasargad Bank on WooCommerce: from n/a through 2.5.2.\npublished:2025-01-22T15:15:26.950"} {"instruction": "Please provide detailed information about CVE-2025-24027", "inputs": "", "outputs": "CVE:CVE-2025-24027\nDescription:ps_contactinfo, a PrestaShop module for displaying store contact information, has a cross-site scripting (XSS) vulnerability in versions up to and including 3.3.2. This can not be exploited in a fresh install of PrestaShop, only shops made vulnerable by third party modules are concerned. For example, if the shop has a third party module vulnerable to SQL injections, then ps_contactinfo might execute a stored cross-site scripting in formatting objects. Commit d60f9a5634b4fc2d3a8831fb08fe2e1f23cbfa39 keeps formatted addresses from displaying a XSS stored in the database, and the fix is expected to be available in version 3.3.3. No workarounds are available aside from applying the fix and keeping all modules maintained and update.\npublished:2025-01-22T15:15:27.090"} {"instruction": "Please provide detailed information about CVE-2025-0638", "inputs": "", "outputs": "CVE:CVE-2025-0638\nDescription:The initial code parsing the manifest did not check the content of the file names yet later code assumed that it was checked and panicked when encountering illegal characters, resulting in a crash of Routinator.\npublished:2025-01-22T16:15:29.977"} {"instruction": "Please provide detailed information about CVE-2025-23809", "inputs": "", "outputs": "CVE:CVE-2025-23809\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Blue Wrench Video Widget allows Reflected XSS. This issue affects Blue Wrench Video Widget: from n/a through 2.1.0.\npublished:2025-01-22T16:15:31.437"} {"instruction": "Please provide detailed information about CVE-2025-23914", "inputs": "", "outputs": "CVE:CVE-2025-23914\nDescription:Deserialization of Untrusted Data vulnerability in NotFound Muzaara Google Ads Report allows Object Injection. This issue affects Muzaara Google Ads Report: from n/a through 3.1.\npublished:2025-01-22T16:15:31.780"} {"instruction": "Please provide detailed information about CVE-2025-23992", "inputs": "", "outputs": "CVE:CVE-2025-23992\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leetoo Toocheke Companion allows Stored XSS. This issue affects Toocheke Companion: from n/a through 1.166.\npublished:2025-01-22T16:15:32.120"} {"instruction": "Please provide detailed information about CVE-2025-20128", "inputs": "", "outputs": "CVE:CVE-2025-20128\nDescription:A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r \r This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r For a description of this vulnerability, see the .\r Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\npublished:2025-01-22T17:15:12.583"} {"instruction": "Please provide detailed information about CVE-2025-20156", "inputs": "", "outputs": "CVE:CVE-2025-20156\nDescription:A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device.\r \r This vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management.\npublished:2025-01-22T17:15:12.800"} {"instruction": "Please provide detailed information about CVE-2025-20165", "inputs": "", "outputs": "CVE:CVE-2025-20165\nDescription:A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.\r \r This vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover.\npublished:2025-01-22T17:15:13.010"} {"instruction": "Please provide detailed information about CVE-2025-23028", "inputs": "", "outputs": "CVE:CVE-2025-23028\nDescription:Cilium is a networking, observability, and security solution with an eBPF-based dataplane. A denial of service vulnerability affects versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4. In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster. For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. No known workarounds are available.\npublished:2025-01-22T17:15:13.487"} {"instruction": "Please provide detailed information about CVE-2025-24397", "inputs": "", "outputs": "CVE:CVE-2025-24397\nDescription:An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins.\npublished:2025-01-22T17:15:13.670"} {"instruction": "Please provide detailed information about CVE-2025-24398", "inputs": "", "outputs": "CVE:CVE-2025-24398\nDescription:Jenkins Bitbucket Server Integration Plugin 2.1.0 through 4.1.3 (both inclusive) allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.\npublished:2025-01-22T17:15:13.760"} {"instruction": "Please provide detailed information about CVE-2025-24399", "inputs": "", "outputs": "CVE:CVE-2025-24399\nDescription:Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providing a username that differs only in letter case, potentially gaining administrator access to Jenkins.\npublished:2025-01-22T17:15:13.853"} {"instruction": "Please provide detailed information about CVE-2025-24400", "inputs": "", "outputs": "CVE:CVE-2025-24400\nDescription:Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same ID as a legitimate one in a different credentials store to sign an event published to RabbitMQ with the legitimate credentials.\npublished:2025-01-22T17:15:13.943"} {"instruction": "Please provide detailed information about CVE-2025-24401", "inputs": "", "outputs": "CVE:CVE-2025-24401\nDescription:Jenkins Folder-based Authorization Strategy Plugin 217.vd5b_18537403e and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they're no longer entitled to.\npublished:2025-01-22T17:15:14.027"} {"instruction": "Please provide detailed information about CVE-2025-24402", "inputs": "", "outputs": "CVE:CVE-2025-24402\nDescription:A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers to connect to a Service Fabric URL using attacker-specified credentials IDs obtained through another method.\npublished:2025-01-22T17:15:14.123"} {"instruction": "Please provide detailed information about CVE-2025-24403", "inputs": "", "outputs": "CVE:CVE-2025-24403\nDescription:A missing permission check in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of Azure credentials stored in Jenkins.\npublished:2025-01-22T17:15:14.220"} {"instruction": "Please provide detailed information about CVE-2025-0651", "inputs": "", "outputs": "CVE:CVE-2025-0651\nDescription:Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation. User with a low system privileges  can create a set of symlinks inside the C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user. This issue affects WARP: before 2024.12.492.0.\npublished:2025-01-22T18:15:20.363"} {"instruction": "Please provide detailed information about CVE-2025-23047", "inputs": "", "outputs": "CVE:CVE-2025-23047\nDescription:Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d.\npublished:2025-01-22T18:15:21.893"} {"instruction": "Please provide detailed information about CVE-2025-0611", "inputs": "", "outputs": "CVE:CVE-2025-0611\nDescription:Object corruption in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-22T20:15:30.860"} {"instruction": "Please provide detailed information about CVE-2025-0612", "inputs": "", "outputs": "CVE:CVE-2025-0612\nDescription:Out of bounds memory access in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\npublished:2025-01-22T20:15:30.957"} {"instruction": "Please provide detailed information about CVE-2025-24030", "inputs": "", "outputs": "CVE:CVE-2025-24030\nDescription:Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.\npublished:2025-01-23T04:15:07.100"} {"instruction": "Please provide detailed information about CVE-2025-24529", "inputs": "", "outputs": "CVE:CVE-2025-24529\nDescription:An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the Insert tab.\npublished:2025-01-23T06:15:27.710"} {"instruction": "Please provide detailed information about CVE-2025-24530", "inputs": "", "outputs": "CVE:CVE-2025-24530\nDescription:An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnerability has been discovered for the check tables feature. A crafted table or database name could be used for XSS.\npublished:2025-01-23T06:15:27.893"} {"instruction": "Please provide detailed information about CVE-2025-0619", "inputs": "", "outputs": "CVE:CVE-2025-0619\nDescription:Unsafe password recovery from configuration in M-Files Server before 25.1 allows a highly privileged user to recover external connector passwords\npublished:2025-01-23T11:15:10.700"} {"instruction": "Please provide detailed information about CVE-2025-0635", "inputs": "", "outputs": "CVE:CVE-2025-0635\nDescription:Denial of service condition in M-Files Server in versions before 25.1.14445.5 allows an unauthenticated user to consume computing resources in certain conditions.\npublished:2025-01-23T11:15:10.890"} {"instruction": "Please provide detailed information about CVE-2025-0648", "inputs": "", "outputs": "CVE:CVE-2025-0648\nDescription:Unexpected server crash in database driver in M-Files Server before 25.1.14445.5 and before 24.8 LTS SR3 allows a highly privileged attacker to cause denial of service via configuration change.\npublished:2025-01-23T11:15:11.030"} {"instruction": "Please provide detailed information about CVE-2025-23006", "inputs": "", "outputs": "CVE:CVE-2025-23006\nDescription:Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.\npublished:2025-01-23T12:15:28.523"} {"instruction": "Please provide detailed information about CVE-2025-0637", "inputs": "", "outputs": "CVE:CVE-2025-0637\nDescription:It has been found that the Beta10 software does not provide for proper authorisation control in multiple areas of the application. This deficiency could allow a malicious actor, without authentication, to access private areas and/or areas intended for other roles. The vulnerability has been identified at least in the file or path ‘/app/tools.html’.\npublished:2025-01-23T16:15:36.617"} {"instruction": "Please provide detailed information about CVE-2025-22264", "inputs": "", "outputs": "CVE:CVE-2025-22264\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel WP Query Creator allows Reflected XSS. This issue affects WP Query Creator: from n/a through 1.0.\npublished:2025-01-23T16:15:37.257"} {"instruction": "Please provide detailed information about CVE-2025-22768", "inputs": "", "outputs": "CVE:CVE-2025-22768\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Qwerty23 Rocket Media Library Mime Type allows Stored XSS. This issue affects Rocket Media Library Mime Type: from n/a through 2.1.0.\npublished:2025-01-23T16:15:37.403"} {"instruction": "Please provide detailed information about CVE-2025-23540", "inputs": "", "outputs": "CVE:CVE-2025-23540\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohsin khan WP Front-end login and register allows Reflected XSS. This issue affects WP Front-end login and register: from n/a through 2.1.0.\npublished:2025-01-23T16:15:37.577"} {"instruction": "Please provide detailed information about CVE-2025-23541", "inputs": "", "outputs": "CVE:CVE-2025-23541\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in edmon Download, Downloads allows Reflected XSS. This issue affects Download, Downloads : from n/a through 1.4.2.\npublished:2025-01-23T16:15:37.737"} {"instruction": "Please provide detailed information about CVE-2025-23544", "inputs": "", "outputs": "CVE:CVE-2025-23544\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in heart5 StatPressCN allows Reflected XSS. This issue affects StatPressCN: from n/a through 1.9.1.\npublished:2025-01-23T16:15:37.897"} {"instruction": "Please provide detailed information about CVE-2025-23545", "inputs": "", "outputs": "CVE:CVE-2025-23545\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Navnish Bhardwaj WP Social Broadcast allows Reflected XSS. This issue affects WP Social Broadcast: from n/a through 1.0.0.\npublished:2025-01-23T16:15:38.070"} {"instruction": "Please provide detailed information about CVE-2025-23624", "inputs": "", "outputs": "CVE:CVE-2025-23624\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alessandro Benoit WpDevTool allows Reflected XSS. This issue affects WpDevTool: from n/a through 0.1.1.\npublished:2025-01-23T16:15:38.223"} {"instruction": "Please provide detailed information about CVE-2025-23626", "inputs": "", "outputs": "CVE:CVE-2025-23626\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hidetoshi Fukushima Kumihimo allows Reflected XSS. This issue affects Kumihimo: from n/a through 1.0.2.\npublished:2025-01-23T16:15:38.390"} {"instruction": "Please provide detailed information about CVE-2025-23628", "inputs": "", "outputs": "CVE:CVE-2025-23628\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Media One GeoDigs allows Reflected XSS. This issue affects GeoDigs: from n/a through 3.4.1.\npublished:2025-01-23T16:15:38.547"} {"instruction": "Please provide detailed information about CVE-2025-23629", "inputs": "", "outputs": "CVE:CVE-2025-23629\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Subhasis Laha Gallerio allows Reflected XSS. This issue affects Gallerio: from n/a through 1.0.1.\npublished:2025-01-23T16:15:38.690"} {"instruction": "Please provide detailed information about CVE-2025-23634", "inputs": "", "outputs": "CVE:CVE-2025-23634\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Youtube Video Grid allows Reflected XSS. This issue affects Youtube Video Grid: from n/a through 1.9.\npublished:2025-01-23T16:15:38.840"} {"instruction": "Please provide detailed information about CVE-2025-23636", "inputs": "", "outputs": "CVE:CVE-2025-23636\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dimitar Atanasov My Favorite Car allows Reflected XSS. This issue affects My Favorite Car: from n/a through 1.0.\npublished:2025-01-23T16:15:38.983"} {"instruction": "Please provide detailed information about CVE-2025-23722", "inputs": "", "outputs": "CVE:CVE-2025-23722\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mind3doM RyeBread Widgets allows Reflected XSS. This issue affects Mind3doM RyeBread Widgets: from n/a through 1.0.\npublished:2025-01-23T16:15:39.117"} {"instruction": "Please provide detailed information about CVE-2025-23723", "inputs": "", "outputs": "CVE:CVE-2025-23723\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plestar Inc Plestar Directory Listing allows Reflected XSS. This issue affects Plestar Directory Listing: from n/a through 1.0.\npublished:2025-01-23T16:15:39.260"} {"instruction": "Please provide detailed information about CVE-2025-23724", "inputs": "", "outputs": "CVE:CVE-2025-23724\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oleksandr Ustymenko University Quizzes Online allows Reflected XSS. This issue affects University Quizzes Online: from n/a through 1.4.\npublished:2025-01-23T16:15:39.387"} {"instruction": "Please provide detailed information about CVE-2025-23725", "inputs": "", "outputs": "CVE:CVE-2025-23725\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TaskMeister Accessibility Task Manager allows Reflected XSS. This issue affects Accessibility Task Manager: from n/a through 1.2.1.\npublished:2025-01-23T16:15:39.530"} {"instruction": "Please provide detailed information about CVE-2025-23727", "inputs": "", "outputs": "CVE:CVE-2025-23727\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1.\npublished:2025-01-23T16:15:39.660"} {"instruction": "Please provide detailed information about CVE-2025-23729", "inputs": "", "outputs": "CVE:CVE-2025-23729\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fures XTRA Settings allows Reflected XSS. This issue affects XTRA Settings: from n/a through 2.1.8.\npublished:2025-01-23T16:15:39.790"} {"instruction": "Please provide detailed information about CVE-2025-23730", "inputs": "", "outputs": "CVE:CVE-2025-23730\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FLX Dashboard Groups allows Reflected XSS. This issue affects FLX Dashboard Groups: from n/a through 0.0.7.\npublished:2025-01-23T16:15:39.933"} {"instruction": "Please provide detailed information about CVE-2025-23733", "inputs": "", "outputs": "CVE:CVE-2025-23733\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sayocode SC Simple Zazzle allows Reflected XSS. This issue affects SC Simple Zazzle: from n/a through 1.1.6.\npublished:2025-01-23T16:15:40.073"} {"instruction": "Please provide detailed information about CVE-2025-23834", "inputs": "", "outputs": "CVE:CVE-2025-23834\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Links/Problem Reporter allows Reflected XSS. This issue affects Links/Problem Reporter: from n/a through 2.6.0.\npublished:2025-01-23T16:15:40.203"} {"instruction": "Please provide detailed information about CVE-2025-23835", "inputs": "", "outputs": "CVE:CVE-2025-23835\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Legal + allows Reflected XSS. This issue affects Legal +: from n/a through 1.0.\npublished:2025-01-23T16:15:40.353"} {"instruction": "Please provide detailed information about CVE-2025-23836", "inputs": "", "outputs": "CVE:CVE-2025-23836\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SuryaBhan Custom Coming Soon allows Reflected XSS. This issue affects Custom Coming Soon: from n/a through 2.2.\npublished:2025-01-23T16:15:40.497"} {"instruction": "Please provide detailed information about CVE-2025-23894", "inputs": "", "outputs": "CVE:CVE-2025-23894\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tatsuya Fukata, Alexander Ovsov wp-flickr-press allows Reflected XSS. This issue affects wp-flickr-press: from n/a through 2.6.4.\npublished:2025-01-23T16:15:40.637"} {"instruction": "Please provide detailed information about CVE-2025-23960", "inputs": "", "outputs": "CVE:CVE-2025-23960\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in basteln3rk Save & Import Image from URL allows Reflected XSS. This issue affects Save & Import Image from URL: from n/a through 0.7.\npublished:2025-01-23T16:15:40.777"} {"instruction": "Please provide detailed information about CVE-2025-0650", "inputs": "", "outputs": "CVE:CVE-2025-0650\nDescription:A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network.\npublished:2025-01-23T17:15:22.163"} {"instruction": "Please provide detailed information about CVE-2025-22153", "inputs": "", "outputs": "CVE:CVE-2025-22153\nDescription:RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when using `try/except*`, RestrictedPython starting in version 6.0 and prior to version 8.0 could be bypassed. The issue is patched in version 8.0 of RestrictedPython by removing support for `try/except*` clauses. No known workarounds are available.\npublished:2025-01-23T18:15:33.267"} {"instruction": "Please provide detailed information about CVE-2025-23227", "inputs": "", "outputs": "CVE:CVE-2025-23227\nDescription:IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.11 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.\npublished:2025-01-23T18:15:33.440"} {"instruction": "Please provide detailed information about CVE-2025-24033", "inputs": "", "outputs": "CVE:CVE-2025-24033\nDescription:@fastify/multipart is a Fastify plugin for parsing the multipart content-type. Prior to versions 8.3.1 and 9.0.3, the `saveRequestFiles` function does not delete the uploaded temporary files when user cancels the request. The issue is fixed in versions 8.3.1 and 9.0.3. As a workaround, do not use `saveRequestFiles`.\npublished:2025-01-23T18:15:33.610"} {"instruction": "Please provide detailed information about CVE-2025-24034", "inputs": "", "outputs": "CVE:CVE-2025-24034\nDescription:Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data. Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled. Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Himmelblau versions 0.7.15 and 0.8.3 contain a patch that fixes both issues. Some workarounds are available for users who are unable to upgrade. For the **logon compliance script issue**, disable the `logon_script` option in `/etc/himmelblau/himmelblau.conf`, and avoid using the `-d` flag when starting the `himmelblaud` daemon. For the Kerberos CCache issue, one may disable debug logging globally by setting the `debug` option in `/etc/himmelblau/himmelblau.conf` to `false` and avoiding the `-d` parameter when starting `himmelblaud`.\npublished:2025-01-23T18:15:33.793"} {"instruction": "Please provide detailed information about CVE-2025-24353", "inputs": "", "outputs": "CVE:CVE-2025-24353\nDescription:Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise the user should not be able to see. Instances that are impacted are those that use the share feature and have specific roles hierarchy and fields that are not visible for certain roles. Version 11.2.0 contains a patch the issue.\npublished:2025-01-23T18:15:33.990"} {"instruction": "Please provide detailed information about CVE-2025-23011", "inputs": "", "outputs": "CVE:CVE-2025-23011\nDescription:Fedora Repository 3.8.1 allows path traversal when extracting uploaded archives (\"Zip Slip\"). A remote, authenticated attacker can upload a specially crafted archive that will extract an arbitrary JSP file to a location that can be executed by an unauthenticated GET request. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23).\npublished:2025-01-23T21:15:15.010"} {"instruction": "Please provide detailed information about CVE-2025-23012", "inputs": "", "outputs": "CVE:CVE-2025-23012\nDescription:Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials and privileges to read read local files by manipulating datastreams. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23).\npublished:2025-01-23T21:15:15.173"} {"instruction": "Please provide detailed information about CVE-2025-0693", "inputs": "", "outputs": "CVE:CVE-2025-0693\nDescription:Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account.\npublished:2025-01-23T22:15:15.397"} {"instruction": "Please provide detailed information about CVE-2025-0314", "inputs": "", "outputs": "CVE:CVE-2025-0314\nDescription:An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1. Improper rendering of certain file types lead to cross-site scripting.\npublished:2025-01-24T03:15:07.320"} {"instruction": "Please provide detailed information about CVE-2025-22714", "inputs": "", "outputs": "CVE:CVE-2025-22714\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MDJM MDJM Event Management allows Reflected XSS. This issue affects MDJM Event Management: from n/a through 1.7.5.5.\npublished:2025-01-24T11:15:09.823"} {"instruction": "Please provide detailed information about CVE-2025-23422", "inputs": "", "outputs": "CVE:CVE-2025-23422\nDescription:Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Store Locator allows PHP Local File Inclusion. This issue affects Store Locator: from n/a through 3.98.10.\npublished:2025-01-24T11:15:09.987"} {"instruction": "Please provide detailed information about CVE-2025-23427", "inputs": "", "outputs": "CVE:CVE-2025-23427\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dovy Paukstys Redux Converter allows Reflected XSS. This issue affects Redux Converter: from n/a through 1.1.3.1.\npublished:2025-01-24T11:15:10.140"} {"instruction": "Please provide detailed information about CVE-2025-23522", "inputs": "", "outputs": "CVE:CVE-2025-23522\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in humanmade limited, Joe Hoyle, Tom Wilmott, Matthew Haines-Young HM Portfolio allows Reflected XSS. This issue affects HM Portfolio: from n/a through 1.1.1.\npublished:2025-01-24T11:15:10.290"} {"instruction": "Please provide detailed information about CVE-2025-23621", "inputs": "", "outputs": "CVE:CVE-2025-23621\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Causes – Donation Plugin allows Reflected XSS. This issue affects Causes – Donation Plugin: from n/a through 1.0.01.\npublished:2025-01-24T11:15:10.473"} {"instruction": "Please provide detailed information about CVE-2025-23622", "inputs": "", "outputs": "CVE:CVE-2025-23622\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CBX Accounting & Bookkeeping allows Reflected XSS. This issue affects CBX Accounting & Bookkeeping: from n/a through 1.3.14.\npublished:2025-01-24T11:15:10.660"} {"instruction": "Please provide detailed information about CVE-2025-23711", "inputs": "", "outputs": "CVE:CVE-2025-23711\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Quote me allows Reflected XSS. This issue affects Quote me: from n/a through 1.0.\npublished:2025-01-24T11:15:10.813"} {"instruction": "Please provide detailed information about CVE-2025-23734", "inputs": "", "outputs": "CVE:CVE-2025-23734\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gigaom Sphinx allows Reflected XSS. This issue affects Gigaom Sphinx: from n/a through 0.1.\npublished:2025-01-24T11:15:10.967"} {"instruction": "Please provide detailed information about CVE-2025-23737", "inputs": "", "outputs": "CVE:CVE-2025-23737\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Network-Favorites allows Reflected XSS. This issue affects Network-Favorites: from n/a through 1.1.\npublished:2025-01-24T11:15:11.103"} {"instruction": "Please provide detailed information about CVE-2025-23837", "inputs": "", "outputs": "CVE:CVE-2025-23837\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound One Backend Language allows Reflected XSS. This issue affects One Backend Language: from n/a through 1.0.\npublished:2025-01-24T11:15:11.240"} {"instruction": "Please provide detailed information about CVE-2025-23838", "inputs": "", "outputs": "CVE:CVE-2025-23838\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bauernregeln allows Reflected XSS. This issue affects Bauernregeln: from n/a through 1.0.1.\npublished:2025-01-24T11:15:11.390"} {"instruction": "Please provide detailed information about CVE-2025-23839", "inputs": "", "outputs": "CVE:CVE-2025-23839\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Sticky Button allows Stored XSS. This issue affects Sticky Button: from n/a through 1.0.\npublished:2025-01-24T11:15:11.523"} {"instruction": "Please provide detailed information about CVE-2025-23885", "inputs": "", "outputs": "CVE:CVE-2025-23885\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound MJ Contact us allows Reflected XSS. This issue affects MJ Contact us: from n/a through 5.2.3.\npublished:2025-01-24T11:15:11.660"} {"instruction": "Please provide detailed information about CVE-2025-23888", "inputs": "", "outputs": "CVE:CVE-2025-23888\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Custom Page Extensions allows Reflected XSS. This issue affects Custom Page Extensions: from n/a through 0.6.\npublished:2025-01-24T11:15:11.797"} {"instruction": "Please provide detailed information about CVE-2025-23889", "inputs": "", "outputs": "CVE:CVE-2025-23889\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FooGallery Captions allows Reflected XSS. This issue affects FooGallery Captions: from n/a through 1.0.2.\npublished:2025-01-24T11:15:11.950"} {"instruction": "Please provide detailed information about CVE-2025-0697", "inputs": "", "outputs": "CVE:CVE-2025-0697\nDescription:A vulnerability, which was classified as problematic, was found in Telstra Smart Modem Gen 2 up to 20250115. This affects an unknown part of the component HTTP Header Handler. The manipulation of the argument Content-Disposition leads to injection. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-24T15:15:12.130"} {"instruction": "Please provide detailed information about CVE-2025-22605", "inputs": "", "outputs": "CVE:CVE-2025-22605\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Starting in version 4.0.0-beta.18 and prior to 4.0.0-beta.253, a vulnerability in the execution of commands on remote servers allows an authenticated user to execute arbitrary code on the local Coolify container, gaining access to data and private keys or tokens of other users/teams. The ability to inject malicious commands into the Coolify container gives authenticated attackers the ability to fully retrieve and control the data and availability of the software. Centrally hosted Coolify instances (open registration and/or multiple teams with potentially untrustworthy users) are especially at risk, as sensitive data of all users and connected servers can be leaked by any user. Additionally, attackers are able to modify the running software, potentially deploying malicious images to remote nodes or generally changing its behavior. Version 4.0.0-beta.253 patches this issue.\npublished:2025-01-24T15:15:12.330"} {"instruction": "Please provide detailed information about CVE-2025-0698", "inputs": "", "outputs": "CVE:CVE-2025-0698\nDescription:A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been classified as critical. Affected is an unknown function of the file /admin/sys/menu/list. The manipulation of the argument sort/order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.\npublished:2025-01-24T16:15:37.717"} {"instruction": "Please provide detailed information about CVE-2025-0699", "inputs": "", "outputs": "CVE:CVE-2025-0699\nDescription:A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sys/role/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.\npublished:2025-01-24T16:15:37.977"} {"instruction": "Please provide detailed information about CVE-2025-22606", "inputs": "", "outputs": "CVE:CVE-2025-22606\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In version 4.0.0-beta.358 and possibly earlier versions, when creating or updating a \"project,\" it is possible to inject arbitrary shell commands by altering the project name. If a name includes unescaped characters, such as single quotes (`'`), it breaks out of the intended command structure, allowing attackers to execute arbitrary commands on the host system. This vulnerability allows attackers to execute arbitrary commands on the host server, which could result in full system compromise; create, modify, or delete sensitive system files; and escalate privileges depending on the permissions of the executed process. Attackers with access to project management features could exploit this flaw to gain unauthorized control over the host environment. Version 4.0.0-beta.359 fixes this issue.\npublished:2025-01-24T16:15:38.307"} {"instruction": "Please provide detailed information about CVE-2025-22607", "inputs": "", "outputs": "CVE:CVE-2025-22607\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the details page for any GitHub / GitLab configuration on a Coolify instance by only knowing the UUID of the model. This exposes the \"client id\", \"client secret\" and \"webhook secret.\" Version 4.0.0-beta.361 fixes this issue.\npublished:2025-01-24T16:15:38.470"} {"instruction": "Please provide detailed information about CVE-2025-23991", "inputs": "", "outputs": "CVE:CVE-2025-23991\nDescription:Missing Authorization vulnerability in theDotstore Product Size Charts Plugin for WooCommerce.This issue affects Product Size Charts Plugin for WooCommerce: from n/a through 2.4.5.\npublished:2025-01-24T16:15:38.723"} {"instruction": "Please provide detailed information about CVE-2025-0700", "inputs": "", "outputs": "CVE:CVE-2025-0700\nDescription:A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/sys/log/list. The manipulation of the argument logId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.\npublished:2025-01-24T17:15:14.517"} {"instruction": "Please provide detailed information about CVE-2025-0701", "inputs": "", "outputs": "CVE:CVE-2025-0701\nDescription:A vulnerability classified as critical has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This affects an unknown part of the file /admin/sys/user/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.\npublished:2025-01-24T17:15:14.730"} {"instruction": "Please provide detailed information about CVE-2025-22608", "inputs": "", "outputs": "CVE:CVE-2025-22608\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to revoke any team invitations on a Coolify instance by only providing a predictable and incrementing ID, resulting in a Denial-of-Service attack (DOS). Version 4.0.0-beta.361 fixes the issue.\npublished:2025-01-24T17:15:14.960"} {"instruction": "Please provide detailed information about CVE-2025-22609", "inputs": "", "outputs": "CVE:CVE-2025-22609\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach any existing private key on a coolify instance to his own server. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can use the `Terminal` feature and execute arbitrary commands on the victim's server. Version 4.0.0-beta.361 fixes the issue.\npublished:2025-01-24T17:15:15.100"} {"instruction": "Please provide detailed information about CVE-2025-22610", "inputs": "", "outputs": "CVE:CVE-2025-22610\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the global coolify instance OAuth configuration. This exposes the \"client id\" and \"client secret\" for every custom OAuth provider. The attacker can also modify the global OAuth configuration. Version 4.0.0-beta.361 fixes the issue.\npublished:2025-01-24T17:15:15.237"} {"instruction": "Please provide detailed information about CVE-2025-22611", "inputs": "", "outputs": "CVE:CVE-2025-22611\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to escalate his or any other team members privileges to any role, including the owner role. He's also able to kick every other member out of the team, including admins and owners. This allows the attacker to access the `Terminal` feature and execute remote commands. Version 4.0.0-beta.361 fixes the issue.\npublished:2025-01-24T17:15:15.410"} {"instruction": "Please provide detailed information about CVE-2025-22612", "inputs": "", "outputs": "CVE:CVE-2025-22612\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.374, the missing authorization allows an authenticated user to retrieve any existing private keys on a coolify instance in plain text. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can execute arbitrary commands on the remote server. Version 4.0.0-beta.374 fixes the issue.\npublished:2025-01-24T17:15:15.570"} {"instruction": "Please provide detailed information about CVE-2025-23222", "inputs": "", "outputs": "CVE:CVE-2025-23222\nDescription:An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D-Bus services, and the actual D-Bus services don't know about the proxy situation (they believe that root is asking them to do things). Consequently several proxied methods, that shouldn't be accessible to non-root users, are accessible to non-root users. In situations where Polkit is involved, the caller would be treated as admin, resulting in a similar escalation of privileges.\npublished:2025-01-24T17:15:15.730"} {"instruction": "Please provide detailed information about CVE-2025-24025", "inputs": "", "outputs": "CVE:CVE-2025-24025\nDescription:Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.380, the tags page allows users to search for tags. If the search does not return any results, the query gets reflected on the error modal, which leads to cross-site scripting. Version 4.0.0-beta.380 fixes the issue.\npublished:2025-01-24T17:15:15.900"} {"instruction": "Please provide detailed information about CVE-2025-24355", "inputs": "", "outputs": "CVE:CVE-2025-24355\nDescription:Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue.\npublished:2025-01-24T17:15:16.047"} {"instruction": "Please provide detailed information about CVE-2025-24359", "inputs": "", "outputs": "CVE:CVE-2025-24359\nDescription:ASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval's restrictions and execute arbitrary Python code in the context of the application using the library. The vulnerability is rooted in how `asteval` performs handling of `FormattedValue` AST nodes. In particular, the `on_formattedvalue` value uses the dangerous format method of the str class. The code allows an attacker to manipulate the value of the string used in the dangerous call `fmt.format(__fstring__=val)`. This vulnerability can be exploited to access protected attributes by intentionally triggering an `AttributeError` exception. The attacker can then catch the exception and use its `obj` attribute to gain arbitrary access to sensitive or protected object properties. Version 1.0.6 fixes this issue.\npublished:2025-01-24T17:15:16.197"} {"instruction": "Please provide detailed information about CVE-2025-0702", "inputs": "", "outputs": "CVE:CVE-2025-0702\nDescription:A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument portraitFile leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.\npublished:2025-01-24T18:15:32.087"} {"instruction": "Please provide detailed information about CVE-2025-24362", "inputs": "", "outputs": "CVE:CVE-2025-24362\nDescription:In some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the workflow. Users with read access to the repository would be able to access this artifact, containing any secrets from the environment. This vulnerability is patched in CodeQL Action version 3.28.3 or later, or CodeQL CLI version 2.20.3 or later. For some affected workflow runs, the exposed environment variables in the debug artifacts included a valid `GITHUB_TOKEN` for the workflow run, which has access to the repository in which the workflow ran, and all the permissions specified in the workflow or job. The `GITHUB_TOKEN` is valid until the job completes or 24 hours has elapsed, whichever comes first. Environment variables are exposed only from workflow runs that satisfy all of the following conditions: - Code scanning workflow configured to scan the Java/Kotlin languages. - Running in a repository containing Kotlin source code. - Running with debug artifacts enabled. - Using CodeQL Action versions <= 3.28.2, and CodeQL CLI versions >= 2.9.2 (May 2022) and <= 2.20.2. - The workflow run fails before the CodeQL database is finalized within the `github/codeql-action/analyze` step. - Running in any GitHub environment: GitHub.com, GitHub Enterprise Cloud, and GitHub Enterprise Server. Note: artifacts are only accessible to users within the same GitHub environment with access to the scanned repo. The `GITHUB_TOKEN` exposed in this way would only have been valid for workflow runs that satisfy all of the following conditions, in addition to the conditions above: - Using CodeQL Action versions >= 3.26.11 (October 2024) and <= 3.28.2, or >= 2.26.11 and < 3. - Running in GitHub.com or GitHub Enterprise Cloud only (not valid on GitHub Enterprise Server). In rare cases during advanced setup, logging of environment variables may also occur during database creation of Java, Swift, and C/C++. Please read the corresponding CodeQL CLI advisory GHSA-gqh3-9prg-j95m for more details. In CodeQL CLI versions >= 2.9.2 and <= 2.20.2, the CodeQL Kotlin extractor logs all environment variables by default into an intermediate file during the process of creating a CodeQL database for Kotlin code. This is a part of the CodeQL CLI and is invoked by the CodeQL Action for analyzing Kotlin repositories. On Actions, the environment variables logged include GITHUB_TOKEN, which grants permissions to the repository being scanned. The intermediate file containing environment variables is deleted when finalizing the database, so it is not included in a successfully created database. It is, however, included in the debug artifact that is uploaded on a failed analysis run if the CodeQL Action was invoked in debug mode. Therefore, under these specific circumstances (incomplete database creation using the CodeQL Action in debug mode) an attacker with access to the debug artifact would gain unauthorized access to repository secrets from the environment, including both the `GITHUB_TOKEN` and any user-configured secrets made available via environment variables. The impact of the `GITHUB_TOKEN` leaked in this environment is limited: - For workflows on GitHub.com and GitHub Enterprise Cloud using CodeQL Action versions >= 3.26.11 and <= 3.28.2, or >= 2.26.11 and < 3, which in turn use the `actions/artifacts v4` library, the debug artifact is uploaded before the workflow job completes. During this time the `GITHUB_TOKEN` is still valid, providing an opportunity for attackers to gain access to the repository. - For all other workflows, the debug artifact is uploaded after the workflow job completes, at which point the leaked `GITHUB_TOKEN` has been revoked and cannot be used to access the repository.\npublished:2025-01-24T18:15:32.383"} {"instruction": "Please provide detailed information about CVE-2025-24542", "inputs": "", "outputs": "CVE:CVE-2025-24542\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in icegram Icegram allows Stored XSS. This issue affects Icegram: from n/a through 3.1.31.\npublished:2025-01-24T18:15:32.550"} {"instruction": "Please provide detailed information about CVE-2025-24543", "inputs": "", "outputs": "CVE:CVE-2025-24543\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9.\npublished:2025-01-24T18:15:32.703"} {"instruction": "Please provide detailed information about CVE-2025-24546", "inputs": "", "outputs": "CVE:CVE-2025-24546\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9.\npublished:2025-01-24T18:15:32.893"} {"instruction": "Please provide detailed information about CVE-2025-24547", "inputs": "", "outputs": "CVE:CVE-2025-24547\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthias Wagner - FALKEmedia Caching Compatible Cookie Opt-In and JavaScript allows Stored XSS. This issue affects Caching Compatible Cookie Opt-In and JavaScript: from n/a through 0.0.10.\npublished:2025-01-24T18:15:33.063"} {"instruction": "Please provide detailed information about CVE-2025-24552", "inputs": "", "outputs": "CVE:CVE-2025-24552\nDescription:Generation of Error Message Containing Sensitive Information vulnerability in David de Boer Paytium allows Retrieve Embedded Sensitive Data. This issue affects Paytium: from n/a through 4.4.11.\npublished:2025-01-24T18:15:33.257"} {"instruction": "Please provide detailed information about CVE-2025-24555", "inputs": "", "outputs": "CVE:CVE-2025-24555\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in SubscriptionDNA.com Subscription DNA allows Stored XSS. This issue affects Subscription DNA: from n/a through 2.1.\npublished:2025-01-24T18:15:33.440"} {"instruction": "Please provide detailed information about CVE-2025-24561", "inputs": "", "outputs": "CVE:CVE-2025-24561\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in ReviewsTap ReviewsTap allows Stored XSS. This issue affects ReviewsTap: from n/a through 1.1.2.\npublished:2025-01-24T18:15:33.623"} {"instruction": "Please provide detailed information about CVE-2025-24562", "inputs": "", "outputs": "CVE:CVE-2025-24562\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Optimal Access Inc. KBucket allows Stored XSS. This issue affects KBucket: from n/a through 4.1.6.\npublished:2025-01-24T18:15:33.810"} {"instruction": "Please provide detailed information about CVE-2025-24568", "inputs": "", "outputs": "CVE:CVE-2025-24568\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm Force Starter Templates allows Cross Site Request Forgery. This issue affects Starter Templates: from n/a through 4.4.9.\npublished:2025-01-24T18:15:33.987"} {"instruction": "Please provide detailed information about CVE-2025-24570", "inputs": "", "outputs": "CVE:CVE-2025-24570\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Atarim Atarim allows Stored XSS. This issue affects Atarim: from n/a through 4.0.8.\npublished:2025-01-24T18:15:34.147"} {"instruction": "Please provide detailed information about CVE-2025-24571", "inputs": "", "outputs": "CVE:CVE-2025-24571\nDescription:Missing Authorization vulnerability in Epsiloncool WP Fast Total Search allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Fast Total Search: from n/a through 1.78.258.\npublished:2025-01-24T18:15:34.320"} {"instruction": "Please provide detailed information about CVE-2025-24572", "inputs": "", "outputs": "CVE:CVE-2025-24572\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Epsiloncool WP Fast Total Search allows Cross Site Request Forgery. This issue affects WP Fast Total Search: from n/a through 1.78.258.\npublished:2025-01-24T18:15:34.477"} {"instruction": "Please provide detailed information about CVE-2025-24573", "inputs": "", "outputs": "CVE:CVE-2025-24573\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pagelayer Team PageLayer allows DOM-Based XSS. This issue affects PageLayer: from n/a through 1.9.4.\npublished:2025-01-24T18:15:34.640"} {"instruction": "Please provide detailed information about CVE-2025-24575", "inputs": "", "outputs": "CVE:CVE-2025-24575\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HelloAsso HelloAsso allows Stored XSS. This issue affects HelloAsso: from n/a through 1.1.11.\npublished:2025-01-24T18:15:34.793"} {"instruction": "Please provide detailed information about CVE-2025-24578", "inputs": "", "outputs": "CVE:CVE-2025-24578\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows DOM-Based XSS. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.0.\npublished:2025-01-24T18:15:34.947"} {"instruction": "Please provide detailed information about CVE-2025-24579", "inputs": "", "outputs": "CVE:CVE-2025-24579\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Phillips Nested Pages allows Stored XSS. This issue affects Nested Pages: from n/a through 3.2.9.\npublished:2025-01-24T18:15:35.090"} {"instruction": "Please provide detailed information about CVE-2025-24580", "inputs": "", "outputs": "CVE:CVE-2025-24580\nDescription:Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 12 Step Meeting List: from n/a through 3.16.5.\npublished:2025-01-24T18:15:35.247"} {"instruction": "Please provide detailed information about CVE-2025-24582", "inputs": "", "outputs": "CVE:CVE-2025-24582\nDescription:Insertion of Sensitive Information Into Sent Data vulnerability in Code for Recovery 12 Step Meeting List allows Retrieve Embedded Sensitive Data. This issue affects 12 Step Meeting List: from n/a through 3.16.5.\npublished:2025-01-24T18:15:35.397"} {"instruction": "Please provide detailed information about CVE-2025-24585", "inputs": "", "outputs": "CVE:CVE-2025-24585\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Event post allows Stored XSS. This issue affects Event post: from n/a through 5.9.7.\npublished:2025-01-24T18:15:35.550"} {"instruction": "Please provide detailed information about CVE-2025-24587", "inputs": "", "outputs": "CVE:CVE-2025-24587\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Blind SQL Injection. This issue affects Email Subscription Popup: from n/a through 1.2.23.\npublished:2025-01-24T18:15:35.697"} {"instruction": "Please provide detailed information about CVE-2025-24588", "inputs": "", "outputs": "CVE:CVE-2025-24588\nDescription:Missing Authorization vulnerability in Patreon Patreon WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Patreon WordPress: from n/a through 1.9.1.\npublished:2025-01-24T18:15:35.867"} {"instruction": "Please provide detailed information about CVE-2025-24589", "inputs": "", "outputs": "CVE:CVE-2025-24589\nDescription:Missing Authorization vulnerability in JS Morisset JSM Show Post Metadata allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JSM Show Post Metadata: from n/a through 4.6.0.\npublished:2025-01-24T18:15:36.013"} {"instruction": "Please provide detailed information about CVE-2025-24591", "inputs": "", "outputs": "CVE:CVE-2025-24591\nDescription:Missing Authorization vulnerability in NinjaTeam GDPR CCPA Compliance Support allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GDPR CCPA Compliance Support: from n/a through 2.7.1.\npublished:2025-01-24T18:15:36.160"} {"instruction": "Please provide detailed information about CVE-2025-24594", "inputs": "", "outputs": "CVE:CVE-2025-24594\nDescription:Missing Authorization vulnerability in Speedcomp Linet ERP-Woocommerce Integration allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.7.\npublished:2025-01-24T18:15:36.330"} {"instruction": "Please provide detailed information about CVE-2025-24595", "inputs": "", "outputs": "CVE:CVE-2025-24595\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins All Embed – Elementor Addons allows Stored XSS. This issue affects All Embed – Elementor Addons: from n/a through 1.1.3.\npublished:2025-01-24T18:15:36.497"} {"instruction": "Please provide detailed information about CVE-2025-24596", "inputs": "", "outputs": "CVE:CVE-2025-24596\nDescription:Missing Authorization vulnerability in WC Product Table WooCommerce Product Table Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Product Table Lite: from n/a through 3.8.7.\npublished:2025-01-24T18:15:36.657"} {"instruction": "Please provide detailed information about CVE-2025-24604", "inputs": "", "outputs": "CVE:CVE-2025-24604\nDescription:Missing Authorization vulnerability in Vikas Ratudi VForm allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects VForm: from n/a through 3.0.5.\npublished:2025-01-24T18:15:36.823"} {"instruction": "Please provide detailed information about CVE-2025-24610", "inputs": "", "outputs": "CVE:CVE-2025-24610\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Christian Leuenberg, L.net Web Solutions Restrict Anonymous Access allows Stored XSS. This issue affects Restrict Anonymous Access: from n/a through 1.2.\npublished:2025-01-24T18:15:36.980"} {"instruction": "Please provide detailed information about CVE-2025-24611", "inputs": "", "outputs": "CVE:CVE-2025-24611\nDescription:Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Smackcoders WP Ultimate Exporter allows Absolute Path Traversal. This issue affects WP Ultimate Exporter: from n/a through 2.9.\npublished:2025-01-24T18:15:37.133"} {"instruction": "Please provide detailed information about CVE-2025-24613", "inputs": "", "outputs": "CVE:CVE-2025-24613\nDescription:Missing Authorization vulnerability in Foliovision FV Thoughtful Comments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FV Thoughtful Comments: from n/a through 0.3.5.\npublished:2025-01-24T18:15:37.277"} {"instruction": "Please provide detailed information about CVE-2025-24618", "inputs": "", "outputs": "CVE:CVE-2025-24618\nDescription:Missing Authorization vulnerability in ElementInvader ElementInvader Addons for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.1.\npublished:2025-01-24T18:15:37.430"} {"instruction": "Please provide detailed information about CVE-2025-24622", "inputs": "", "outputs": "CVE:CVE-2025-24622\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in PickPlugins Job Board Manager allows Cross Site Request Forgery. This issue affects Job Board Manager: from n/a through 2.1.59.\npublished:2025-01-24T18:15:37.577"} {"instruction": "Please provide detailed information about CVE-2025-24623", "inputs": "", "outputs": "CVE:CVE-2025-24623\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Security Really Simple SSL allows Cross Site Request Forgery. This issue affects Really Simple SSL: from n/a through 9.1.4.\npublished:2025-01-24T18:15:37.727"} {"instruction": "Please provide detailed information about CVE-2025-24625", "inputs": "", "outputs": "CVE:CVE-2025-24625\nDescription:Missing Authorization vulnerability in Marco Almeida | Webdados Taxonomy/Term and Role based Discounts for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Taxonomy/Term and Role based Discounts for WooCommerce: from n/a through 5.1.\npublished:2025-01-24T18:15:37.897"} {"instruction": "Please provide detailed information about CVE-2025-24627", "inputs": "", "outputs": "CVE:CVE-2025-24627\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Linnea Huxford, LinSoftware Blur Text allows Stored XSS. This issue affects Blur Text: from n/a through 1.0.0.\npublished:2025-01-24T18:15:38.050"} {"instruction": "Please provide detailed information about CVE-2025-24633", "inputs": "", "outputs": "CVE:CVE-2025-24633\nDescription:Missing Authorization vulnerability in silverplugins217 Build Private Store For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Build Private Store For Woocommerce: from n/a through 1.0.\npublished:2025-01-24T18:15:38.200"} {"instruction": "Please provide detailed information about CVE-2025-24634", "inputs": "", "outputs": "CVE:CVE-2025-24634\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Svetoslav Marinov (Slavi) Orbisius Simple Notice allows Stored XSS. This issue affects Orbisius Simple Notice: from n/a through 1.1.3.\npublished:2025-01-24T18:15:38.350"} {"instruction": "Please provide detailed information about CVE-2025-24636", "inputs": "", "outputs": "CVE:CVE-2025-24636\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Laymance Technologies LLC MachForm Shortcode allows Stored XSS. This issue affects MachForm Shortcode: from n/a through 1.4.1.\npublished:2025-01-24T18:15:38.507"} {"instruction": "Please provide detailed information about CVE-2025-24638", "inputs": "", "outputs": "CVE:CVE-2025-24638\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pete Dring Create with Code allows DOM-Based XSS. This issue affects Create with Code: from n/a through 1.4.\npublished:2025-01-24T18:15:38.670"} {"instruction": "Please provide detailed information about CVE-2025-24644", "inputs": "", "outputs": "CVE:CVE-2025-24644\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebToffee WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels allows Stored XSS. This issue affects WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels: from n/a through 4.7.1.\npublished:2025-01-24T18:15:38.833"} {"instruction": "Please provide detailed information about CVE-2025-24647", "inputs": "", "outputs": "CVE:CVE-2025-24647\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in datafeedr.com WooCommerce Cloak Affiliate Links allows Cross Site Request Forgery. This issue affects WooCommerce Cloak Affiliate Links: from n/a through 1.0.35.\npublished:2025-01-24T18:15:39.007"} {"instruction": "Please provide detailed information about CVE-2025-24649", "inputs": "", "outputs": "CVE:CVE-2025-24649\nDescription:Missing Authorization vulnerability in wpase.com Admin and Site Enhancements (ASE) allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Admin and Site Enhancements (ASE): from n/a through 7.6.2.\npublished:2025-01-24T18:15:39.167"} {"instruction": "Please provide detailed information about CVE-2025-24650", "inputs": "", "outputs": "CVE:CVE-2025-24650\nDescription:Unrestricted Upload of File with Dangerous Type vulnerability in Themefic Tourfic allows Upload a Web Shell to a Web Server. This issue affects Tourfic: from n/a through 2.15.3.\npublished:2025-01-24T18:15:39.347"} {"instruction": "Please provide detailed information about CVE-2025-24652", "inputs": "", "outputs": "CVE:CVE-2025-24652\nDescription:Missing Authorization vulnerability in Revmakx WP Duplicate – WordPress Migration Plugin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Duplicate – WordPress Migration Plugin: from n/a through 1.1.6.\npublished:2025-01-24T18:15:39.517"} {"instruction": "Please provide detailed information about CVE-2025-24657", "inputs": "", "outputs": "CVE:CVE-2025-24657\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebToffee Wishlist for WooCommerce allows Stored XSS. This issue affects Wishlist for WooCommerce: from n/a through 2.1.2.\npublished:2025-01-24T18:15:39.680"} {"instruction": "Please provide detailed information about CVE-2025-24658", "inputs": "", "outputs": "CVE:CVE-2025-24658\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Hawes Auction Nudge – Your eBay on Your Site allows Stored XSS. This issue affects Auction Nudge – Your eBay on Your Site: from n/a through 7.2.0.\npublished:2025-01-24T18:15:39.853"} {"instruction": "Please provide detailed information about CVE-2025-24659", "inputs": "", "outputs": "CVE:CVE-2025-24659\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WordPress Download Manager Premium Packages allows Blind SQL Injection. This issue affects Premium Packages: from n/a through 5.9.6.\npublished:2025-01-24T18:15:40.020"} {"instruction": "Please provide detailed information about CVE-2025-24663", "inputs": "", "outputs": "CVE:CVE-2025-24663\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tips and Tricks HQ, Ruhul Amin, Josh Lobe Simple Download Monitor allows Blind SQL Injection. This issue affects Simple Download Monitor: from n/a through 3.9.25.\npublished:2025-01-24T18:15:40.203"} {"instruction": "Please provide detailed information about CVE-2025-24666", "inputs": "", "outputs": "CVE:CVE-2025-24666\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeIsle AI Chatbot for WordPress – Hyve Lite allows Stored XSS. This issue affects AI Chatbot for WordPress – Hyve Lite: from n/a through 1.2.2.\npublished:2025-01-24T18:15:40.400"} {"instruction": "Please provide detailed information about CVE-2025-24668", "inputs": "", "outputs": "CVE:CVE-2025-24668\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeisle PPOM for WooCommerce allows Stored XSS. This issue affects PPOM for WooCommerce: from n/a through 33.0.8.\npublished:2025-01-24T18:15:40.563"} {"instruction": "Please provide detailed information about CVE-2025-24669", "inputs": "", "outputs": "CVE:CVE-2025-24669\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SERPed SERPed.net allows SQL Injection. This issue affects SERPed.net: from n/a through 4.4.\npublished:2025-01-24T18:15:40.730"} {"instruction": "Please provide detailed information about CVE-2025-24672", "inputs": "", "outputs": "CVE:CVE-2025-24672\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CodePeople Form Builder CP allows SQL Injection. This issue affects Form Builder CP: from n/a through 1.2.41.\npublished:2025-01-24T18:15:40.890"} {"instruction": "Please provide detailed information about CVE-2025-24673", "inputs": "", "outputs": "CVE:CVE-2025-24673\nDescription:Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in AyeCode Ltd Ketchup Shortcodes allows Stored XSS. This issue affects Ketchup Shortcodes: from n/a through 0.1.2.\npublished:2025-01-24T18:15:41.033"} {"instruction": "Please provide detailed information about CVE-2025-24674", "inputs": "", "outputs": "CVE:CVE-2025-24674\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Teplitsa. Technologies for Social Good ShMapper by Teplitsa allows Stored XSS. This issue affects ShMapper by Teplitsa: from n/a through 1.5.0.\npublished:2025-01-24T18:15:41.190"} {"instruction": "Please provide detailed information about CVE-2025-24675", "inputs": "", "outputs": "CVE:CVE-2025-24675\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in osamaesh WP Visitor Statistics (Real Time Traffic) allows Stored XSS. This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 7.2.\npublished:2025-01-24T18:15:41.340"} {"instruction": "Please provide detailed information about CVE-2025-24678", "inputs": "", "outputs": "CVE:CVE-2025-24678\nDescription:Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Listamester Listamester allows Stored XSS. This issue affects Listamester: from n/a through 2.3.4.\npublished:2025-01-24T18:15:41.477"} {"instruction": "Please provide detailed information about CVE-2025-24679", "inputs": "", "outputs": "CVE:CVE-2025-24679\nDescription:Missing Authorization vulnerability in webraketen Internal Links Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Internal Links Manager: from n/a through 2.5.2.\npublished:2025-01-24T18:15:41.630"} {"instruction": "Please provide detailed information about CVE-2025-24681", "inputs": "", "outputs": "CVE:CVE-2025-24681\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWax Product Carousel Slider & Grid Ultimate for WooCommerce allows Stored XSS. This issue affects Product Carousel Slider & Grid Ultimate for WooCommerce: from n/a through 1.10.0.\npublished:2025-01-24T18:15:41.767"} {"instruction": "Please provide detailed information about CVE-2025-24682", "inputs": "", "outputs": "CVE:CVE-2025-24682\nDescription:Missing Authorization vulnerability in mikemmx Super Block Slider allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Super Block Slider: from n/a through 2.7.9.\npublished:2025-01-24T18:15:41.947"} {"instruction": "Please provide detailed information about CVE-2025-24683", "inputs": "", "outputs": "CVE:CVE-2025-24683\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPChill RSVP and Event Management Plugin allows SQL Injection. This issue affects RSVP and Event Management Plugin: from n/a through 2.7.14.\npublished:2025-01-24T18:15:42.133"} {"instruction": "Please provide detailed information about CVE-2025-24687", "inputs": "", "outputs": "CVE:CVE-2025-24687\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lars Wallenborn Show/Hide Shortcode allows Stored XSS. This issue affects Show/Hide Shortcode: from n/a through 1.0.0.\npublished:2025-01-24T18:15:42.283"} {"instruction": "Please provide detailed information about CVE-2025-24691", "inputs": "", "outputs": "CVE:CVE-2025-24691\nDescription:Missing Authorization vulnerability in Gagan Sandhu , Enej Bajgoric , CTLT DEV, UBC People Lists allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects People Lists: from n/a through 1.3.10.\npublished:2025-01-24T18:15:42.433"} {"instruction": "Please provide detailed information about CVE-2025-24693", "inputs": "", "outputs": "CVE:CVE-2025-24693\nDescription:Missing Authorization vulnerability in Yehi Advanced Notifications allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Advanced Notifications: from n/a through 1.2.7.\npublished:2025-01-24T18:15:42.597"} {"instruction": "Please provide detailed information about CVE-2025-24695", "inputs": "", "outputs": "CVE:CVE-2025-24695\nDescription:Server-Side Request Forgery (SSRF) vulnerability in HasThemes Extensions For CF7 allows Server Side Request Forgery. This issue affects Extensions For CF7: from n/a through 3.2.0.\npublished:2025-01-24T18:15:42.740"} {"instruction": "Please provide detailed information about CVE-2025-24696", "inputs": "", "outputs": "CVE:CVE-2025-24696\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in WP Attire Attire Blocks allows Cross Site Request Forgery. This issue affects Attire Blocks: from n/a through 1.9.6.\npublished:2025-01-24T18:15:42.900"} {"instruction": "Please provide detailed information about CVE-2025-24698", "inputs": "", "outputs": "CVE:CVE-2025-24698\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in G5Theme Essential Real Estate allows Cross Site Request Forgery. This issue affects Essential Real Estate: from n/a through 5.1.8.\npublished:2025-01-24T18:15:43.050"} {"instruction": "Please provide detailed information about CVE-2025-24701", "inputs": "", "outputs": "CVE:CVE-2025-24701\nDescription:Server-Side Request Forgery (SSRF) vulnerability in Kiboko Labs Chained Quiz allows Server Side Request Forgery. This issue affects Chained Quiz: from n/a through 1.3.2.9.\npublished:2025-01-24T18:15:43.207"} {"instruction": "Please provide detailed information about CVE-2025-24702", "inputs": "", "outputs": "CVE:CVE-2025-24702\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xagio Xagio SEO allows Stored XSS. This issue affects Xagio SEO: from n/a through 7.0.0.20.\npublished:2025-01-24T18:15:43.360"} {"instruction": "Please provide detailed information about CVE-2025-24703", "inputs": "", "outputs": "CVE:CVE-2025-24703\nDescription:Server-Side Request Forgery (SSRF) vulnerability in DLX Plugins Comment Edit Core – Simple Comment Editing allows Server Side Request Forgery. This issue affects Comment Edit Core – Simple Comment Editing: from n/a through 3.0.33.\npublished:2025-01-24T18:15:43.520"} {"instruction": "Please provide detailed information about CVE-2025-24704", "inputs": "", "outputs": "CVE:CVE-2025-24704\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sebastian Zaha Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.4.0.\npublished:2025-01-24T18:15:43.680"} {"instruction": "Please provide detailed information about CVE-2025-24705", "inputs": "", "outputs": "CVE:CVE-2025-24705\nDescription:Missing Authorization vulnerability in Arshid WooCommerce Quick View allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Quick View: from n/a through 1.1.1.\npublished:2025-01-24T18:15:43.840"} {"instruction": "Please provide detailed information about CVE-2025-24706", "inputs": "", "outputs": "CVE:CVE-2025-24706\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MultiVendorX WC Marketplace allows Stored XSS. This issue affects WC Marketplace: from n/a through 4.2.13.\npublished:2025-01-24T18:15:44.003"} {"instruction": "Please provide detailed information about CVE-2025-24709", "inputs": "", "outputs": "CVE:CVE-2025-24709\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plethora Plugins Plethora Plugins Tabs + Accordions allows Stored XSS. This issue affects Plethora Plugins Tabs + Accordions: from n/a through 1.1.5.\npublished:2025-01-24T18:15:44.170"} {"instruction": "Please provide detailed information about CVE-2025-24711", "inputs": "", "outputs": "CVE:CVE-2025-24711\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Popup Box allows Cross Site Request Forgery. This issue affects Popup Box: from n/a through 3.2.4.\npublished:2025-01-24T18:15:44.330"} {"instruction": "Please provide detailed information about CVE-2025-24712", "inputs": "", "outputs": "CVE:CVE-2025-24712\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2.\npublished:2025-01-24T18:15:44.480"} {"instruction": "Please provide detailed information about CVE-2025-24713", "inputs": "", "outputs": "CVE:CVE-2025-24713\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator – easily Button Builder allows Cross Site Request Forgery. This issue affects Button Generator – easily Button Builder: from n/a through 3.1.1.\npublished:2025-01-24T18:15:44.630"} {"instruction": "Please provide detailed information about CVE-2025-24714", "inputs": "", "outputs": "CVE:CVE-2025-24714\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Bubble Menu – circle floating menu allows Cross Site Request Forgery. This issue affects Bubble Menu – circle floating menu: from n/a through 4.0.2.\npublished:2025-01-24T18:15:44.773"} {"instruction": "Please provide detailed information about CVE-2025-24715", "inputs": "", "outputs": "CVE:CVE-2025-24715\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Counter Box allows Cross Site Request Forgery. This issue affects Counter Box: from n/a through 2.0.5.\npublished:2025-01-24T18:15:44.913"} {"instruction": "Please provide detailed information about CVE-2025-24716", "inputs": "", "outputs": "CVE:CVE-2025-24716\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Herd Effects allows Cross Site Request Forgery. This issue affects Herd Effects: from n/a through 6.2.1.\npublished:2025-01-24T18:15:45.057"} {"instruction": "Please provide detailed information about CVE-2025-24717", "inputs": "", "outputs": "CVE:CVE-2025-24717\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Modal Window allows Cross Site Request Forgery. This issue affects Modal Window: from n/a through 6.1.4.\npublished:2025-01-24T18:15:45.210"} {"instruction": "Please provide detailed information about CVE-2025-24719", "inputs": "", "outputs": "CVE:CVE-2025-24719\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevart Widget Countdown allows Stored XSS. This issue affects Widget Countdown: from n/a through 2.7.1.\npublished:2025-01-24T18:15:45.360"} {"instruction": "Please provide detailed information about CVE-2025-24720", "inputs": "", "outputs": "CVE:CVE-2025-24720\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Sticky Buttons allows Cross Site Request Forgery. This issue affects Sticky Buttons: from n/a through 4.1.1.\npublished:2025-01-24T18:15:45.523"} {"instruction": "Please provide detailed information about CVE-2025-24721", "inputs": "", "outputs": "CVE:CVE-2025-24721\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Urošević Easy YouTube Gallery allows Stored XSS. This issue affects Easy YouTube Gallery: from n/a through 1.0.4.\npublished:2025-01-24T18:15:45.667"} {"instruction": "Please provide detailed information about CVE-2025-24722", "inputs": "", "outputs": "CVE:CVE-2025-24722\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in F.A.Q Builder Team FAQ Builder AYS allows Stored XSS. This issue affects FAQ Builder AYS: from n/a through 1.7.3.\npublished:2025-01-24T18:15:45.840"} {"instruction": "Please provide detailed information about CVE-2025-24723", "inputs": "", "outputs": "CVE:CVE-2025-24723\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Booking Calendar Contact Form allows Stored XSS. This issue affects Booking Calendar Contact Form: from n/a through 1.2.55.\npublished:2025-01-24T18:15:46.000"} {"instruction": "Please provide detailed information about CVE-2025-24724", "inputs": "", "outputs": "CVE:CVE-2025-24724\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Side Menu Lite allows Cross Site Request Forgery. This issue affects Side Menu Lite: from n/a through 5.3.1.\npublished:2025-01-24T18:15:46.170"} {"instruction": "Please provide detailed information about CVE-2025-24725", "inputs": "", "outputs": "CVE:CVE-2025-24725\nDescription:Missing Authorization vulnerability in ThimPress Thim Elementor Kit allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Thim Elementor Kit: from n/a through 1.2.8.\npublished:2025-01-24T18:15:46.357"} {"instruction": "Please provide detailed information about CVE-2025-24726", "inputs": "", "outputs": "CVE:CVE-2025-24726\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HT Plugins HT Conctact Form 7 allows Stored XSS. This issue affects HT Conctact Form 7: from n/a through 1.2.1.\npublished:2025-01-24T18:15:46.530"} {"instruction": "Please provide detailed information about CVE-2025-24727", "inputs": "", "outputs": "CVE:CVE-2025-24727\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Contact Form Email allows Stored XSS. This issue affects Contact Form Email: from n/a through 1.3.52.\npublished:2025-01-24T18:15:46.707"} {"instruction": "Please provide detailed information about CVE-2025-24728", "inputs": "", "outputs": "CVE:CVE-2025-24728\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yannick Lefebvre Bug Library allows Blind SQL Injection. This issue affects Bug Library: from n/a through 2.1.4.\npublished:2025-01-24T18:15:46.877"} {"instruction": "Please provide detailed information about CVE-2025-24729", "inputs": "", "outputs": "CVE:CVE-2025-24729\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows Stored XSS. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.3.\npublished:2025-01-24T18:15:47.037"} {"instruction": "Please provide detailed information about CVE-2025-24730", "inputs": "", "outputs": "CVE:CVE-2025-24730\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rextheme WP VR allows DOM-Based XSS. This issue affects WP VR: from n/a through 8.5.14.\npublished:2025-01-24T18:15:47.193"} {"instruction": "Please provide detailed information about CVE-2025-24731", "inputs": "", "outputs": "CVE:CVE-2025-24731\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IP2Location Download IP2Location Country Blocker allows Stored XSS. This issue affects Download IP2Location Country Blocker: from n/a through 2.38.3.\npublished:2025-01-24T18:15:47.370"} {"instruction": "Please provide detailed information about CVE-2025-24732", "inputs": "", "outputs": "CVE:CVE-2025-24732\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Booking & Appointment - Repute Infosystems BookingPress allows DOM-Based XSS. This issue affects BookingPress: from n/a through 1.1.25.\npublished:2025-01-24T18:15:47.530"} {"instruction": "Please provide detailed information about CVE-2025-24733", "inputs": "", "outputs": "CVE:CVE-2025-24733\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AddonMaster Post Grid Master allows PHP Local File Inclusion. This issue affects Post Grid Master: from n/a through 3.4.12.\npublished:2025-01-24T18:15:47.697"} {"instruction": "Please provide detailed information about CVE-2025-24736", "inputs": "", "outputs": "CVE:CVE-2025-24736\nDescription:Missing Authorization vulnerability in Metaphor Creations Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Post Duplicator: from n/a through 2.35.\npublished:2025-01-24T18:15:47.850"} {"instruction": "Please provide detailed information about CVE-2025-24738", "inputs": "", "outputs": "CVE:CVE-2025-24738\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in NowButtons.com Call Now Button allows Cross Site Request Forgery. This issue affects Call Now Button: from n/a through 1.4.13.\npublished:2025-01-24T18:15:48.017"} {"instruction": "Please provide detailed information about CVE-2025-24739", "inputs": "", "outputs": "CVE:CVE-2025-24739\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in FluentSMTP & WPManageNinja Team FluentSMTP allows Cross Site Request Forgery. This issue affects FluentSMTP: from n/a through 2.2.80.\npublished:2025-01-24T18:15:48.177"} {"instruction": "Please provide detailed information about CVE-2025-24746", "inputs": "", "outputs": "CVE:CVE-2025-24746\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Popup Maker Popup Maker allows Stored XSS. This issue affects Popup Maker: from n/a through 1.20.2.\npublished:2025-01-24T18:15:48.437"} {"instruction": "Please provide detailed information about CVE-2025-24750", "inputs": "", "outputs": "CVE:CVE-2025-24750\nDescription:Missing Authorization vulnerability in ExactMetrics ExactMetrics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ExactMetrics: from n/a through 8.1.0.\npublished:2025-01-24T18:15:48.663"} {"instruction": "Please provide detailed information about CVE-2025-24751", "inputs": "", "outputs": "CVE:CVE-2025-24751\nDescription:Missing Authorization vulnerability in GoDaddy CoBlocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CoBlocks: from n/a through 3.1.13.\npublished:2025-01-24T18:15:48.810"} {"instruction": "Please provide detailed information about CVE-2025-24753", "inputs": "", "outputs": "CVE:CVE-2025-24753\nDescription:Missing Authorization vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.3.1.\npublished:2025-01-24T18:15:48.950"} {"instruction": "Please provide detailed information about CVE-2025-24755", "inputs": "", "outputs": "CVE:CVE-2025-24755\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org PDF Invoices for WooCommerce + Drag and Drop Template Builder allows Stored XSS. This issue affects PDF Invoices for WooCommerce + Drag and Drop Template Builder: from n/a through 4.6.0.\npublished:2025-01-24T18:15:49.160"} {"instruction": "Please provide detailed information about CVE-2025-24756", "inputs": "", "outputs": "CVE:CVE-2025-24756\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in mgplugin Roi Calculator allows Stored XSS. This issue affects Roi Calculator: from n/a through 1.0.\npublished:2025-01-24T18:15:49.307"} {"instruction": "Please provide detailed information about CVE-2025-0703", "inputs": "", "outputs": "CVE:CVE-2025-0703\nDescription:A vulnerability, which was classified as problematic, has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This issue affects some unknown processing of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.\npublished:2025-01-24T19:15:13.137"} {"instruction": "Please provide detailed information about CVE-2025-0704", "inputs": "", "outputs": "CVE:CVE-2025-0704\nDescription:A vulnerability, which was classified as problematic, was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. Affected is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument w/h leads to resource consumption. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.\npublished:2025-01-24T19:15:13.303"} {"instruction": "Please provide detailed information about CVE-2025-0705", "inputs": "", "outputs": "CVE:CVE-2025-0705\nDescription:A vulnerability has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this vulnerability is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument text leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.\npublished:2025-01-24T19:15:13.467"} {"instruction": "Please provide detailed information about CVE-2025-24363", "inputs": "", "outputs": "CVE:CVE-2025-24363\nDescription:The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.8.9, in CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise set to use a repo that uses a username and credential based URL, the entire URL will be included in the built Implementation Guide, exposing username and credential. This does not impact users that clone public repos without credentials, such as those using the auto-ig-build continuous integration infrastructure. This problem has been patched in release 1.8.9. Some workarounds are available. Users should ensure the IG repo they are publishing does not have username or credentials included in the `origin` URL. Running the command `git remote origin url` should return a URL that contains no username, password, or token; or users should run the IG Publisher CLI with the `-repo` parameter and specify a URL that contains no username, password, or token.\npublished:2025-01-24T19:15:13.633"} {"instruction": "Please provide detailed information about CVE-2025-0706", "inputs": "", "outputs": "CVE:CVE-2025-0706\nDescription:A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/sys/admin.html. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.\npublished:2025-01-24T20:15:33.830"} {"instruction": "Please provide detailed information about CVE-2025-0707", "inputs": "", "outputs": "CVE:CVE-2025-0707\nDescription:A vulnerability was found in Rise Group Rise Mode Temp CPU 2.1. It has been classified as critical. This affects an unknown part in the library CRYPTBASE.dll of the component Startup. The manipulation leads to untrusted search path. The attack needs to be approached locally.\npublished:2025-01-24T20:15:34.020"} {"instruction": "Please provide detailed information about CVE-2025-0708", "inputs": "", "outputs": "CVE:CVE-2025-0708\nDescription:A vulnerability was found in fumiao opencms 2.2. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/model/addOrUpdate of the component Add Model Management Page. The manipulation of the argument 模板前缀 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-24T20:15:34.200"} {"instruction": "Please provide detailed information about CVE-2025-0709", "inputs": "", "outputs": "CVE:CVE-2025-0709\nDescription:A vulnerability was found in Dcat-Admin 2.2.1-beta. It has been rated as problematic. This issue affects some unknown processing of the file /admin/auth/roles of the component Roles Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-24T21:15:11.237"} {"instruction": "Please provide detailed information about CVE-2025-0710", "inputs": "", "outputs": "CVE:CVE-2025-0710\nDescription:A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /notice-list of the component Notice Board Page. The manipulation of the argument Notice leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-24T21:15:11.420"} {"instruction": "Please provide detailed information about CVE-2025-21262", "inputs": "", "outputs": "CVE:CVE-2025-21262\nDescription:User Interface (UI) Misrepresentation of Critical Information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network\npublished:2025-01-24T22:15:38.220"} {"instruction": "Please provide detailed information about CVE-2025-24360", "inputs": "", "outputs": "CVE:CVE-2025-24360\nDescription:Nuxt is an open-source web development framework for Vue.js. Starting in version 3.8.1 and prior to version 3.15.3, Nuxt allows any websites to send any requests to the development server and read the response due to default CORS settings. Users with the default server.cors option using Vite builder may get the source code stolen by malicious websites. Version 3.15.3 fixes the vulnerability.\npublished:2025-01-25T01:15:24.047"} {"instruction": "Please provide detailed information about CVE-2025-24361", "inputs": "", "outputs": "CVE:CVE-2025-24361\nDescription:Nuxt is an open-source web development framework for Vue.js. Source code may be stolen during dev when using version 3.0.0 through 3.15.12 of the webpack builder or version 3.12.2 through 3.152 of the rspack builder and a victim opens a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. By using `Function::toString` against the values in `window.webpackChunknuxt_app`, the attacker can get the source code. Version 3.15.13 of Nuxt patches this issue.\npublished:2025-01-25T01:15:24.193"} {"instruction": "Please provide detailed information about CVE-2025-0357", "inputs": "", "outputs": "CVE:CVE-2025-0357\nDescription:The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\npublished:2025-01-25T02:15:26.990"} {"instruction": "Please provide detailed information about CVE-2025-0411", "inputs": "", "outputs": "CVE:CVE-2025-0411\nDescription:7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456.\npublished:2025-01-25T05:15:09.533"} {"instruction": "Please provide detailed information about CVE-2025-0682", "inputs": "", "outputs": "CVE:CVE-2025-0682\nDescription:The ThemeREX Addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.0 via the 'trx_sc_reviews' shortcode 'type' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.\npublished:2025-01-25T06:15:28.740"} {"instruction": "Please provide detailed information about CVE-2025-0350", "inputs": "", "outputs": "CVE:CVE-2025-0350\nDescription:The Divi Carousel Maker – Image, Logo, Testimonial, Post Carousel & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Carousel and Logo Carousel in all versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-25T10:15:08.160"} {"instruction": "Please provide detailed information about CVE-2025-0542", "inputs": "", "outputs": "CVE:CVE-2025-0542\nDescription:Local privilege escalation due to incorrect assignment of privileges of temporary files in the update mechanism of G DATA Management Server. This vulnerability allows a local, unprivileged attacker to escalate privileges on affected installations by placing a crafted ZIP archive in a globally writable directory, which gets unpacked in the context of SYSTEM and results in arbitrary file write.\npublished:2025-01-25T17:15:21.030"} {"instruction": "Please provide detailed information about CVE-2025-0543", "inputs": "", "outputs": "CVE:CVE-2025-0543\nDescription:Local privilege escalation in G DATA Security Client due to incorrect assignment of privileges to directories. This vulnerability allows a local, unprivileged attacker to escalate privileges on affected installations by placing an arbitrary executable in a globally writable directory resulting in execution by the SetupSVC.exe service in the context of SYSTEM.\npublished:2025-01-25T17:15:21.720"} {"instruction": "Please provide detailed information about CVE-2025-24858", "inputs": "", "outputs": "CVE:CVE-2025-24858\nDescription:Develocity (formerly Gradle Enterprise) before 2024.3.1 allows an attacker who has network access to a Develocity server to obtain the hashed password of the system user. The hash algorithm used by Develocity was chosen according to best practices for password storage and provides some protection against brute-force attempts. The applicable severity of this vulnerability depends on whether a Develocity server is accessible by external or unauthorized users, and the complexity of the System User password.\npublished:2025-01-26T06:15:23.470"} {"instruction": "Please provide detailed information about CVE-2025-0720", "inputs": "", "outputs": "CVE:CVE-2025-0720\nDescription:A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-26T23:15:21.547"} {"instruction": "Please provide detailed information about CVE-2025-0721", "inputs": "", "outputs": "CVE:CVE-2025-0721\nDescription:A vulnerability classified as problematic has been found in needyamin image_gallery 1.0. This affects the function image_gallery of the file /view.php. The manipulation of the argument username leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-27T00:15:26.317"} {"instruction": "Please provide detailed information about CVE-2025-0722", "inputs": "", "outputs": "CVE:CVE-2025-0722\nDescription:A vulnerability classified as critical was found in needyamin image_gallery 1.0. This vulnerability affects unknown code of the file /admin/gallery.php of the component Cover Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-27T00:15:26.517"} {"instruction": "Please provide detailed information about CVE-2025-24389", "inputs": "", "outputs": "CVE:CVE-2025-24389\nDescription:Certain errors of the upstream libraries will insert sensitive information in the OTRS or ((OTRS)) Community Edition log mechanism and mails send to the system administrator. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected\npublished:2025-01-27T06:15:24.170"} {"instruction": "Please provide detailed information about CVE-2025-24390", "inputs": "", "outputs": "CVE:CVE-2025-24390\nDescription:A vulnerability in OTRS Application Server and reverse proxy settings allows session hijacking due to missing attributes for sensitive cookie settings in HTTPS sessions. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X\npublished:2025-01-27T06:15:24.313"} {"instruction": "Please provide detailed information about CVE-2025-24814", "inputs": "", "outputs": "CVE:CVE-2025-24814\nDescription:Core creation allows users to replace \"trusted\" configset files with arbitrary configuration Solr instances that (1) use the \"FileSystemConfigSetService\" component (the default in \"standalone\" or \"user-managed\" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual \"trusted\" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as \"trusted\" and can use \"\" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from \"FileSystemConfigSetService\").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of \"\" tags by default.\npublished:2025-01-27T09:15:14.947"} {"instruction": "Please provide detailed information about CVE-2025-0695", "inputs": "", "outputs": "CVE:CVE-2025-0695\nDescription:An Allocation of Resources Without Limits or Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input.\npublished:2025-01-27T11:15:11.087"} {"instruction": "Please provide detailed information about CVE-2025-0696", "inputs": "", "outputs": "CVE:CVE-2025-0696\nDescription:A NULL Pointer Dereference vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input.\npublished:2025-01-27T11:15:11.267"} {"instruction": "Please provide detailed information about CVE-2025-22513", "inputs": "", "outputs": "CVE:CVE-2025-22513\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple Locator allows Reflected XSS. This issue affects Simple Locator: from n/a through 2.0.4.\npublished:2025-01-27T14:15:28.233"} {"instruction": "Please provide detailed information about CVE-2025-23457", "inputs": "", "outputs": "CVE:CVE-2025-23457\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Clodeo Shipdeo allows Reflected XSS. This issue affects Shipdeo: from n/a through 1.2.8.\npublished:2025-01-27T14:15:28.373"} {"instruction": "Please provide detailed information about CVE-2025-23792", "inputs": "", "outputs": "CVE:CVE-2025-23792\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Busters Passwordless WP – Login with your glance or fingerprint allows Reflected XSS. This issue affects Passwordless WP – Login with your glance or fingerprint: from n/a through 1.1.6.\npublished:2025-01-27T14:15:28.510"} {"instruction": "Please provide detailed information about CVE-2025-24533", "inputs": "", "outputs": "CVE:CVE-2025-24533\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in MetaSlider Responsive Slider by MetaSlider allows Cross Site Request Forgery. This issue affects Responsive Slider by MetaSlider: from n/a through 3.92.0.\npublished:2025-01-27T14:15:28.653"} {"instruction": "Please provide detailed information about CVE-2025-24584", "inputs": "", "outputs": "CVE:CVE-2025-24584\nDescription:Missing Authorization vulnerability in BdThemes Ultimate Store Kit Elementor Addons allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.3.0.\npublished:2025-01-27T14:15:28.797"} {"instruction": "Please provide detailed information about CVE-2025-24601", "inputs": "", "outputs": "CVE:CVE-2025-24601\nDescription:Deserialization of Untrusted Data vulnerability in ThimPress FundPress allows Object Injection. This issue affects FundPress: from n/a through 2.0.6.\npublished:2025-01-27T14:15:28.927"} {"instruction": "Please provide detailed information about CVE-2025-24612", "inputs": "", "outputs": "CVE:CVE-2025-24612\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MORKVA Shipping for Nova Poshta allows SQL Injection. This issue affects Shipping for Nova Poshta: from n/a through 1.19.6.\npublished:2025-01-27T14:15:29.063"} {"instruction": "Please provide detailed information about CVE-2025-24664", "inputs": "", "outputs": "CVE:CVE-2025-24664\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology LTL Freight Quotes – Worldwide Express Edition allows SQL Injection. This issue affects LTL Freight Quotes – Worldwide Express Edition: from n/a through 5.0.20.\npublished:2025-01-27T14:15:29.197"} {"instruction": "Please provide detailed information about CVE-2025-24685", "inputs": "", "outputs": "CVE:CVE-2025-24685\nDescription:Path Traversal vulnerability in MORKVA Morkva UA Shipping allows PHP Local File Inclusion. This issue affects Morkva UA Shipping: from n/a through 1.0.18.\npublished:2025-01-27T14:15:29.333"} {"instruction": "Please provide detailed information about CVE-2025-24754", "inputs": "", "outputs": "CVE:CVE-2025-24754\nDescription:Missing Authorization vulnerability in Houzez.co Houzez. This issue affects Houzez: from n/a through 3.4.0.\npublished:2025-01-27T14:15:29.477"} {"instruction": "Please provide detailed information about CVE-2025-23529", "inputs": "", "outputs": "CVE:CVE-2025-23529\nDescription:Missing Authorization vulnerability in Blokhaus Minterpress allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Minterpress: from n/a through 1.0.5.\npublished:2025-01-27T15:15:11.813"} {"instruction": "Please provide detailed information about CVE-2025-23531", "inputs": "", "outputs": "CVE:CVE-2025-23531\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David F. Carr RSVPMaker Volunteer Roles allows Reflected XSS. This issue affects RSVPMaker Volunteer Roles: from n/a through 1.5.1.\npublished:2025-01-27T15:15:11.963"} {"instruction": "Please provide detailed information about CVE-2025-23574", "inputs": "", "outputs": "CVE:CVE-2025-23574\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jonathan Lau CubePM allows Reflected XSS. This issue affects CubePM: from n/a through 1.0.\npublished:2025-01-27T15:15:12.123"} {"instruction": "Please provide detailed information about CVE-2025-23656", "inputs": "", "outputs": "CVE:CVE-2025-23656\nDescription:Missing Authorization vulnerability in Saul Morales Pacheco Donate visa allows Stored XSS. This issue affects Donate visa: from n/a through 1.0.0.\npublished:2025-01-27T15:15:12.267"} {"instruction": "Please provide detailed information about CVE-2025-23669", "inputs": "", "outputs": "CVE:CVE-2025-23669\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nurul Amin, Mohammad Saiful Islam WP Smart Tooltip allows Stored XSS. This issue affects WP Smart Tooltip: from n/a through 1.0.0.\npublished:2025-01-27T15:15:12.423"} {"instruction": "Please provide detailed information about CVE-2025-23752", "inputs": "", "outputs": "CVE:CVE-2025-23752\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CGD Arrange Terms allows Reflected XSS. This issue affects CGD Arrange Terms: from n/a through 1.1.3.\npublished:2025-01-27T15:15:12.570"} {"instruction": "Please provide detailed information about CVE-2025-23754", "inputs": "", "outputs": "CVE:CVE-2025-23754\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ulrich Sossou The Loops allows Reflected XSS. This issue affects The Loops: from n/a through 1.0.2.\npublished:2025-01-27T15:15:12.727"} {"instruction": "Please provide detailed information about CVE-2025-23756", "inputs": "", "outputs": "CVE:CVE-2025-23756\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivan Chernyakov LawPress – Law Firm Website Management allows Reflected XSS. This issue affects LawPress – Law Firm Website Management: from n/a through 1.4.5.\npublished:2025-01-27T15:15:12.877"} {"instruction": "Please provide detailed information about CVE-2025-23849", "inputs": "", "outputs": "CVE:CVE-2025-23849\nDescription:Missing Authorization vulnerability in Benjamin Piwowarski PAPERCITE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PAPERCITE: from n/a through 0.5.18.\npublished:2025-01-27T15:15:13.087"} {"instruction": "Please provide detailed information about CVE-2025-23982", "inputs": "", "outputs": "CVE:CVE-2025-23982\nDescription:Missing Authorization vulnerability in Marian Kanev Cab fare calculator allows Stored XSS. This issue affects Cab fare calculator: from n/a through 1.1.\npublished:2025-01-27T15:15:13.247"} {"instruction": "Please provide detailed information about CVE-2025-24537", "inputs": "", "outputs": "CVE:CVE-2025-24537\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in The Events Calendar The Events Calendar allows Cross Site Request Forgery. This issue affects The Events Calendar: from n/a through 6.7.0.\npublished:2025-01-27T15:15:13.440"} {"instruction": "Please provide detailed information about CVE-2025-24538", "inputs": "", "outputs": "CVE:CVE-2025-24538\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in slaFFik BuddyPress Groups Extras allows Cross Site Request Forgery. This issue affects BuddyPress Groups Extras: from n/a through 3.6.10.\npublished:2025-01-27T15:15:13.607"} {"instruction": "Please provide detailed information about CVE-2025-24540", "inputs": "", "outputs": "CVE:CVE-2025-24540\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd allows Cross Site Request Forgery. This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through 6.18.9.\npublished:2025-01-27T15:15:13.753"} {"instruction": "Please provide detailed information about CVE-2025-24590", "inputs": "", "outputs": "CVE:CVE-2025-24590\nDescription:Missing Authorization vulnerability in Haptiq picu – Online Photo Proofing Gallery allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects picu – Online Photo Proofing Gallery: from n/a through 2.4.0.\npublished:2025-01-27T15:15:13.947"} {"instruction": "Please provide detailed information about CVE-2025-24593", "inputs": "", "outputs": "CVE:CVE-2025-24593\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge allows Reflected XSS. This issue affects Edwiser Bridge: from n/a through 3.0.8.\npublished:2025-01-27T15:15:14.090"} {"instruction": "Please provide detailed information about CVE-2025-24600", "inputs": "", "outputs": "CVE:CVE-2025-24600\nDescription:Missing Authorization vulnerability in David F. Carr RSVPMarker . This issue affects RSVPMarker : from n/a through 11.4.5.\npublished:2025-01-27T15:15:14.233"} {"instruction": "Please provide detailed information about CVE-2025-24603", "inputs": "", "outputs": "CVE:CVE-2025-24603\nDescription:Missing Authorization vulnerability in UkrSolution Print Barcode Labels for your WooCommerce products/orders. This issue affects Print Barcode Labels for your WooCommerce products/orders: from n/a through 3.4.10.\npublished:2025-01-27T15:15:14.437"} {"instruction": "Please provide detailed information about CVE-2025-24606", "inputs": "", "outputs": "CVE:CVE-2025-24606\nDescription:Missing Authorization vulnerability in Sprout Invoices Client Invoicing by Sprout Invoices allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Client Invoicing by Sprout Invoices: from n/a through 20.8.1.\npublished:2025-01-27T15:15:14.587"} {"instruction": "Please provide detailed information about CVE-2025-24626", "inputs": "", "outputs": "CVE:CVE-2025-24626\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Music Store allows Reflected XSS. This issue affects Music Store: from n/a through 1.1.19.\npublished:2025-01-27T15:15:14.777"} {"instruction": "Please provide detailed information about CVE-2025-24628", "inputs": "", "outputs": "CVE:CVE-2025-24628\nDescription:Authentication Bypass by Spoofing vulnerability in BestWebSoft Google Captcha allows Identity Spoofing. This issue affects Google Captcha: from n/a through 1.78.\npublished:2025-01-27T15:15:14.923"} {"instruction": "Please provide detailed information about CVE-2025-24653", "inputs": "", "outputs": "CVE:CVE-2025-24653\nDescription:Missing Authorization vulnerability in NotFound Admin and Site Enhancements (ASE) Pro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Admin and Site Enhancements (ASE) Pro: from n/a through 7.6.1.1.\npublished:2025-01-27T15:15:15.070"} {"instruction": "Please provide detailed information about CVE-2025-24662", "inputs": "", "outputs": "CVE:CVE-2025-24662\nDescription:Missing Authorization vulnerability in LearnDash LearnDash LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LearnDash LMS: from n/a through 4.20.0.1.\npublished:2025-01-27T15:15:15.227"} {"instruction": "Please provide detailed information about CVE-2025-24665", "inputs": "", "outputs": "CVE:CVE-2025-24665\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Small Package Quotes – Unishippers Edition allows SQL Injection. This issue affects Small Package Quotes – Unishippers Edition: from n/a through 2.4.8.\npublished:2025-01-27T15:15:15.427"} {"instruction": "Please provide detailed information about CVE-2025-24667", "inputs": "", "outputs": "CVE:CVE-2025-24667\nDescription:Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Small Package Quotes – Worldwide Express Edition allows SQL Injection. This issue affects Small Package Quotes – Worldwide Express Edition: from n/a through 5.2.17.\npublished:2025-01-27T15:15:15.563"} {"instruction": "Please provide detailed information about CVE-2025-24671", "inputs": "", "outputs": "CVE:CVE-2025-24671\nDescription:Deserialization of Untrusted Data vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Object Injection. This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 4.4.0.\npublished:2025-01-27T15:15:15.703"} {"instruction": "Please provide detailed information about CVE-2025-24680", "inputs": "", "outputs": "CVE:CVE-2025-24680\nDescription:Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WpMultiStoreLocator WP Multi Store Locator allows Reflected XSS. This issue affects WP Multi Store Locator: from n/a through 2.4.7.\npublished:2025-01-27T15:15:15.863"} {"instruction": "Please provide detailed information about CVE-2025-24689", "inputs": "", "outputs": "CVE:CVE-2025-24689\nDescription:Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12.\npublished:2025-01-27T15:15:16.073"} {"instruction": "Please provide detailed information about CVE-2025-24708", "inputs": "", "outputs": "CVE:CVE-2025-24708\nDescription:Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks WP Dynamics CRM for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms allows Reflected XSS. This issue affects WP Dynamics CRM for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through 1.1.6.\npublished:2025-01-27T15:15:16.230"} {"instruction": "Please provide detailed information about CVE-2025-24734", "inputs": "", "outputs": "CVE:CVE-2025-24734\nDescription:Missing Authorization vulnerability in CodeSolz Better Find and Replace allows Privilege Escalation. This issue affects Better Find and Replace: from n/a through 1.6.7.\npublished:2025-01-27T15:15:16.390"} {"instruction": "Please provide detailed information about CVE-2025-24740", "inputs": "", "outputs": "CVE:CVE-2025-24740\nDescription:URL Redirection to Untrusted Site ('Open Redirect') vulnerability in ThimPress LearnPress. This issue affects LearnPress: from n/a through 4.2.7.1.\npublished:2025-01-27T15:15:16.537"} {"instruction": "Please provide detailed information about CVE-2025-24741", "inputs": "", "outputs": "CVE:CVE-2025-24741\nDescription:URL Redirection to Untrusted Site ('Open Redirect') vulnerability in KB Support KB Support. This issue affects KB Support: from n/a through 1.6.7.\npublished:2025-01-27T15:15:16.680"} {"instruction": "Please provide detailed information about CVE-2025-24742", "inputs": "", "outputs": "CVE:CVE-2025-24742\nDescription:Cross-Site Request Forgery (CSRF) vulnerability in WP Go Maps (formerly WP Google Maps) WP Go Maps. This issue affects WP Go Maps: from n/a through 9.0.40.\npublished:2025-01-27T15:15:16.830"} {"instruction": "Please provide detailed information about CVE-2025-24743", "inputs": "", "outputs": "CVE:CVE-2025-24743\nDescription:Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor. This issue affects RomethemeKit For Elementor: from n/a through 1.5.2.\npublished:2025-01-27T15:15:16.977"} {"instruction": "Please provide detailed information about CVE-2025-24744", "inputs": "", "outputs": "CVE:CVE-2025-24744\nDescription:Missing Authorization vulnerability in NotFound Bridge Core. This issue affects Bridge Core: from n/a through 3.3.\npublished:2025-01-27T15:15:17.117"} {"instruction": "Please provide detailed information about CVE-2025-24747", "inputs": "", "outputs": "CVE:CVE-2025-24747\nDescription:Missing Authorization vulnerability in Houzez.co Houzez. This issue affects Houzez: from n/a through 3.4.0.\npublished:2025-01-27T15:15:17.253"} {"instruction": "Please provide detailed information about CVE-2025-24782", "inputs": "", "outputs": "CVE:CVE-2025-24782\nDescription:Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpWax Post Grid, Slider & Carousel Ultimate allows PHP Local File Inclusion. This issue affects Post Grid, Slider & Carousel Ultimate: from n/a through 1.6.10.\npublished:2025-01-27T15:15:17.450"} {"instruction": "Please provide detailed information about CVE-2025-24783", "inputs": "", "outputs": "CVE:CVE-2025-24783\nDescription:** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon. This issue affects Apache Cocoon: all versions. When a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have been sufficiently unpredictable, and an attacker could use this to guess continuation ids and look up continuations they should not have had access to. As a mitigation, you may enable the \"session-bound-continuations\" option to make sure continuations are not shared across sessions. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\npublished:2025-01-27T15:15:17.610"} {"instruction": "Please provide detailed information about CVE-2025-0729", "inputs": "", "outputs": "CVE:CVE-2025-0729\nDescription:A vulnerability was found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to clickjacking. The attack may be initiated remotely. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.\npublished:2025-01-27T17:15:16.917"} {"instruction": "Please provide detailed information about CVE-2025-0730", "inputs": "", "outputs": "CVE:CVE-2025-0730\nDescription:A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.\npublished:2025-01-27T17:15:17.133"} {"instruction": "Please provide detailed information about CVE-2025-22604", "inputs": "", "outputs": "CVE:CVE-2025-22604\nDescription:Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.\npublished:2025-01-27T17:15:17.307"} {"instruction": "Please provide detailed information about CVE-2025-0732", "inputs": "", "outputs": "CVE:CVE-2025-0732\nDescription:A vulnerability, which was classified as problematic, has been found in Discord up to 1.0.9177 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-27T18:15:40.550"} {"instruction": "Please provide detailed information about CVE-2025-0733", "inputs": "", "outputs": "CVE:CVE-2025-0733\nDescription:A vulnerability, which was classified as problematic, was found in Postman up to 11.20 on Windows. This affects an unknown part in the library profapi.dll. The manipulation leads to untrusted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-27T18:15:40.760"} {"instruction": "Please provide detailed information about CVE-2025-23197", "inputs": "", "outputs": "CVE:CVE-2025-23197\nDescription:matrix-hookshot is a Matrix bot for connecting to external services like GitHub, GitLab, JIRA, and more. When Hookshot 6 version 6.0.1 or below, or Hookshot 5 version 5.4.1 or below, is configured with GitHub support, it is vulnerable to a Denial of Service (DoS) whereby it can crash on restart due to a missing check. The impact is greater to you untrusted users can add their own GitHub organizations to Hookshot in order to connect their room to a repository. This vulnerability is fixed in 6.0.2 and 5.4.2.\npublished:2025-01-27T18:15:41.037"} {"instruction": "Please provide detailed information about CVE-2025-24354", "inputs": "", "outputs": "CVE:CVE-2025-24354\nDescription:imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.\npublished:2025-01-27T18:15:41.197"} {"instruction": "Please provide detailed information about CVE-2025-24356", "inputs": "", "outputs": "CVE:CVE-2025-24356\nDescription:fastd is a VPN daemon which tunnels IP packets and Ethernet frames over UDP. When receiving a data packet from an unknown IP address/port combination, fastd will assume that one of its connected peers has moved to a new address and initiate a reconnect by sending a handshake packet. This \"fast reconnect\" avoids having to wait for a session timeout (up to ~90s) until a new connection is established. Even a 1-byte UDP packet just containing the fastd packet type header can trigger a much larger handshake packet (~150 bytes of UDP payload). Including IPv4 and UDP headers, the resulting amplification factor is roughly 12-13. By sending data packets with a spoofed source address to fastd instances reachable on the internet, this amplification of UDP traffic might be used to facilitate a Distributed Denial of Service attack. This vulnerability is fixed in v23.\npublished:2025-01-27T18:15:41.347"} {"instruction": "Please provide detailed information about CVE-2025-24357", "inputs": "", "outputs": "CVE:CVE-2025-24357\nDescription:vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py implements hf_model_weights_iterator to load the model checkpoint, which is downloaded from huggingface. It uses the torch.load function and the weights_only parameter defaults to False. When torch.load loads malicious pickle data, it will execute arbitrary code during unpickling. This vulnerability is fixed in v0.7.0.\npublished:2025-01-27T18:15:41.523"} {"instruction": "Please provide detailed information about CVE-2025-24364", "inputs": "", "outputs": "CVE:CVE-2025-24364\nDescription:vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker with authenticated access to the vaultwarden admin panel can execute arbitrary code in the system. The attacker could then change some settings to use sendmail as mail agent but adjust the settings in such a way that it would use a shell command. It then also needed to craft a special favicon image which would have the commands embedded to run during for example sending a test email. This vulnerability is fixed in 1.33.0.\npublished:2025-01-27T18:15:41.690"} {"instruction": "Please provide detailed information about CVE-2025-24365", "inputs": "", "outputs": "CVE:CVE-2025-24365\nDescription:vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker can obtain owner rights of other organization. Hacker should know the ID of victim organization (in real case the user can be a part of the organization as an unprivileged user) and be the owner/admin of other organization (by default you can create your own organization) in order to attack. This vulnerability is fixed in 1.33.0.\npublished:2025-01-27T18:15:41.847"} {"instruction": "Please provide detailed information about CVE-2025-24367", "inputs": "", "outputs": "CVE:CVE-2025-24367\nDescription:Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29.\npublished:2025-01-27T18:15:42.003"} {"instruction": "Please provide detailed information about CVE-2025-24368", "inputs": "", "outputs": "CVE:CVE-2025-24368\nDescription:Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29.\npublished:2025-01-27T18:15:42.157"} {"instruction": "Please provide detailed information about CVE-2025-0734", "inputs": "", "outputs": "CVE:CVE-2025-0734\nDescription:A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. This vulnerability affects the function getBeanName of the component Whitelist. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-27T19:15:19.130"} {"instruction": "Please provide detailed information about CVE-2025-0751", "inputs": "", "outputs": "CVE:CVE-2025-0751\nDescription:A vulnerability classified as critical has been found in Axiomatic Bento4 up to 1.6.0. This affects the function AP4_BitReader::ReadBits of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-27T20:15:34.587"} {"instruction": "Please provide detailed information about CVE-2025-0753", "inputs": "", "outputs": "CVE:CVE-2025-0753\nDescription:A vulnerability classified as critical was found in Axiomatic Bento4 up to 1.6.0. This vulnerability affects the function AP4_StdcFileByteStream::ReadPartial of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-27T21:15:13.653"} {"instruction": "Please provide detailed information about CVE-2025-24085", "inputs": "", "outputs": "CVE:CVE-2025-24085\nDescription:A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.\npublished:2025-01-27T22:15:14.990"} {"instruction": "Please provide detailed information about CVE-2025-24086", "inputs": "", "outputs": "CVE:CVE-2025-24086\nDescription:The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing an image may lead to a denial-of-service.\npublished:2025-01-27T22:15:15.080"} {"instruction": "Please provide detailed information about CVE-2025-24087", "inputs": "", "outputs": "CVE:CVE-2025-24087\nDescription:The issue was addressed with additional permissions checks. This issue is fixed in macOS Sequoia 15.3. An app may be able to access protected user data.\npublished:2025-01-27T22:15:15.180"} {"instruction": "Please provide detailed information about CVE-2025-24092", "inputs": "", "outputs": "CVE:CVE-2025-24092\nDescription:This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read sensitive location information.\npublished:2025-01-27T22:15:15.267"} {"instruction": "Please provide detailed information about CVE-2025-24093", "inputs": "", "outputs": "CVE:CVE-2025-24093\nDescription:A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3. An app may be able to access removable volumes without user consent.\npublished:2025-01-27T22:15:15.350"} {"instruction": "Please provide detailed information about CVE-2025-24094", "inputs": "", "outputs": "CVE:CVE-2025-24094\nDescription:A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access user-sensitive data.\npublished:2025-01-27T22:15:15.450"} {"instruction": "Please provide detailed information about CVE-2025-24096", "inputs": "", "outputs": "CVE:CVE-2025-24096\nDescription:This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. A malicious app may be able to access arbitrary files.\npublished:2025-01-27T22:15:15.533"} {"instruction": "Please provide detailed information about CVE-2025-24100", "inputs": "", "outputs": "CVE:CVE-2025-24100\nDescription:A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access information about a user's contacts.\npublished:2025-01-27T22:15:15.627"} {"instruction": "Please provide detailed information about CVE-2025-24101", "inputs": "", "outputs": "CVE:CVE-2025-24101\nDescription:This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data.\npublished:2025-01-27T22:15:15.717"} {"instruction": "Please provide detailed information about CVE-2025-24102", "inputs": "", "outputs": "CVE:CVE-2025-24102\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to determine a user’s current location.\npublished:2025-01-27T22:15:15.807"} {"instruction": "Please provide detailed information about CVE-2025-24103", "inputs": "", "outputs": "CVE:CVE-2025-24103\nDescription:This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access protected user data.\npublished:2025-01-27T22:15:15.900"} {"instruction": "Please provide detailed information about CVE-2025-24104", "inputs": "", "outputs": "CVE:CVE-2025-24104\nDescription:This issue was addressed with improved handling of symlinks. This issue is fixed in iPadOS 17.7.4, iOS 18.3 and iPadOS 18.3. Restoring a maliciously crafted backup file may lead to modification of protected system files.\npublished:2025-01-27T22:15:15.983"} {"instruction": "Please provide detailed information about CVE-2025-24106", "inputs": "", "outputs": "CVE:CVE-2025-24106\nDescription:The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:16.070"} {"instruction": "Please provide detailed information about CVE-2025-24107", "inputs": "", "outputs": "CVE:CVE-2025-24107\nDescription:A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.3, tvOS 18.3, watchOS 11.3, iOS 18.3 and iPadOS 18.3. A malicious app may be able to gain root privileges.\npublished:2025-01-27T22:15:16.170"} {"instruction": "Please provide detailed information about CVE-2025-24108", "inputs": "", "outputs": "CVE:CVE-2025-24108\nDescription:An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.3. An app may be able to access protected user data.\npublished:2025-01-27T22:15:16.263"} {"instruction": "Please provide detailed information about CVE-2025-24109", "inputs": "", "outputs": "CVE:CVE-2025-24109\nDescription:A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access sensitive user data.\npublished:2025-01-27T22:15:16.347"} {"instruction": "Please provide detailed information about CVE-2025-24112", "inputs": "", "outputs": "CVE:CVE-2025-24112\nDescription:The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:16.433"} {"instruction": "Please provide detailed information about CVE-2025-24113", "inputs": "", "outputs": "CVE:CVE-2025-24113\nDescription:The issue was addressed with improved UI. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. Visiting a malicious website may lead to user interface spoofing.\npublished:2025-01-27T22:15:16.530"} {"instruction": "Please provide detailed information about CVE-2025-24114", "inputs": "", "outputs": "CVE:CVE-2025-24114\nDescription:A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system.\npublished:2025-01-27T22:15:16.620"} {"instruction": "Please provide detailed information about CVE-2025-24115", "inputs": "", "outputs": "CVE:CVE-2025-24115\nDescription:A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox.\npublished:2025-01-27T22:15:16.713"} {"instruction": "Please provide detailed information about CVE-2025-24116", "inputs": "", "outputs": "CVE:CVE-2025-24116\nDescription:An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences.\npublished:2025-01-27T22:15:16.803"} {"instruction": "Please provide detailed information about CVE-2025-24117", "inputs": "", "outputs": "CVE:CVE-2025-24117\nDescription:This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user.\npublished:2025-01-27T22:15:16.900"} {"instruction": "Please provide detailed information about CVE-2025-24118", "inputs": "", "outputs": "CVE:CVE-2025-24118\nDescription:The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory.\npublished:2025-01-27T22:15:17.033"} {"instruction": "Please provide detailed information about CVE-2025-24120", "inputs": "", "outputs": "CVE:CVE-2025-24120\nDescription:This issue was addressed by improved management of object lifetimes. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An attacker may be able to cause unexpected app termination.\npublished:2025-01-27T22:15:17.140"} {"instruction": "Please provide detailed information about CVE-2025-24121", "inputs": "", "outputs": "CVE:CVE-2025-24121\nDescription:A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system.\npublished:2025-01-27T22:15:17.230"} {"instruction": "Please provide detailed information about CVE-2025-24122", "inputs": "", "outputs": "CVE:CVE-2025-24122\nDescription:A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system.\npublished:2025-01-27T22:15:17.323"} {"instruction": "Please provide detailed information about CVE-2025-24123", "inputs": "", "outputs": "CVE:CVE-2025-24123\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:17.413"} {"instruction": "Please provide detailed information about CVE-2025-24124", "inputs": "", "outputs": "CVE:CVE-2025-24124\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:17.510"} {"instruction": "Please provide detailed information about CVE-2025-24126", "inputs": "", "outputs": "CVE:CVE-2025-24126\nDescription:An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory.\npublished:2025-01-27T22:15:17.603"} {"instruction": "Please provide detailed information about CVE-2025-24127", "inputs": "", "outputs": "CVE:CVE-2025-24127\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:17.703"} {"instruction": "Please provide detailed information about CVE-2025-24128", "inputs": "", "outputs": "CVE:CVE-2025-24128\nDescription:The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Visiting a malicious website may lead to address bar spoofing.\npublished:2025-01-27T22:15:17.793"} {"instruction": "Please provide detailed information about CVE-2025-24129", "inputs": "", "outputs": "CVE:CVE-2025-24129\nDescription:A type confusion issue was addressed with improved checks. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected app termination.\npublished:2025-01-27T22:15:17.887"} {"instruction": "Please provide detailed information about CVE-2025-24130", "inputs": "", "outputs": "CVE:CVE-2025-24130\nDescription:The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system.\npublished:2025-01-27T22:15:17.977"} {"instruction": "Please provide detailed information about CVE-2025-24131", "inputs": "", "outputs": "CVE:CVE-2025-24131\nDescription:The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker in a privileged position may be able to perform a denial-of-service.\npublished:2025-01-27T22:15:18.070"} {"instruction": "Please provide detailed information about CVE-2025-24134", "inputs": "", "outputs": "CVE:CVE-2025-24134\nDescription:An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data.\npublished:2025-01-27T22:15:18.153"} {"instruction": "Please provide detailed information about CVE-2025-24135", "inputs": "", "outputs": "CVE:CVE-2025-24135\nDescription:This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges.\npublished:2025-01-27T22:15:18.247"} {"instruction": "Please provide detailed information about CVE-2025-24136", "inputs": "", "outputs": "CVE:CVE-2025-24136\nDescription:This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious app may be able to create symlinks to protected regions of the disk.\npublished:2025-01-27T22:15:18.340"} {"instruction": "Please provide detailed information about CVE-2025-24137", "inputs": "", "outputs": "CVE:CVE-2025-24137\nDescription:A type confusion issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected application termination or arbitrary code execution.\npublished:2025-01-27T22:15:18.433"} {"instruction": "Please provide detailed information about CVE-2025-24138", "inputs": "", "outputs": "CVE:CVE-2025-24138\nDescription:This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious application may be able to leak sensitive user information.\npublished:2025-01-27T22:15:18.530"} {"instruction": "Please provide detailed information about CVE-2025-24139", "inputs": "", "outputs": "CVE:CVE-2025-24139\nDescription:The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:18.627"} {"instruction": "Please provide detailed information about CVE-2025-24140", "inputs": "", "outputs": "CVE:CVE-2025-24140\nDescription:This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.3. Files downloaded from the internet may not have the quarantine flag applied.\npublished:2025-01-27T22:15:18.710"} {"instruction": "Please provide detailed information about CVE-2025-24141", "inputs": "", "outputs": "CVE:CVE-2025-24141\nDescription:An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.3 and iPadOS 18.3. An attacker with physical access to an unlocked device may be able to access Photos while the app is locked.\npublished:2025-01-27T22:15:18.800"} {"instruction": "Please provide detailed information about CVE-2025-24143", "inputs": "", "outputs": "CVE:CVE-2025-24143\nDescription:The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.\npublished:2025-01-27T22:15:18.893"} {"instruction": "Please provide detailed information about CVE-2025-24145", "inputs": "", "outputs": "CVE:CVE-2025-24145\nDescription:A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. An app may be able to view a contact's phone number in system logs.\npublished:2025-01-27T22:15:18.990"} {"instruction": "Please provide detailed information about CVE-2025-24146", "inputs": "", "outputs": "CVE:CVE-2025-24146\nDescription:This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Deleting a conversation in Messages may expose user contact information in system logging.\npublished:2025-01-27T22:15:19.077"} {"instruction": "Please provide detailed information about CVE-2025-24149", "inputs": "", "outputs": "CVE:CVE-2025-24149\nDescription:An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information.\npublished:2025-01-27T22:15:19.173"} {"instruction": "Please provide detailed information about CVE-2025-24150", "inputs": "", "outputs": "CVE:CVE-2025-24150\nDescription:A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.\npublished:2025-01-27T22:15:19.270"} {"instruction": "Please provide detailed information about CVE-2025-24151", "inputs": "", "outputs": "CVE:CVE-2025-24151\nDescription:The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or corrupt kernel memory.\npublished:2025-01-27T22:15:19.360"} {"instruction": "Please provide detailed information about CVE-2025-24152", "inputs": "", "outputs": "CVE:CVE-2025-24152\nDescription:The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app may be able to cause unexpected system termination or corrupt kernel memory.\npublished:2025-01-27T22:15:19.443"} {"instruction": "Please provide detailed information about CVE-2025-24153", "inputs": "", "outputs": "CVE:CVE-2025-24153\nDescription:A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges.\npublished:2025-01-27T22:15:19.537"} {"instruction": "Please provide detailed information about CVE-2025-24154", "inputs": "", "outputs": "CVE:CVE-2025-24154\nDescription:An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory.\npublished:2025-01-27T22:15:19.620"} {"instruction": "Please provide detailed information about CVE-2025-24156", "inputs": "", "outputs": "CVE:CVE-2025-24156\nDescription:An integer overflow was addressed through improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to elevate privileges.\npublished:2025-01-27T22:15:19.710"} {"instruction": "Please provide detailed information about CVE-2025-24158", "inputs": "", "outputs": "CVE:CVE-2025-24158\nDescription:The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.\npublished:2025-01-27T22:15:19.800"} {"instruction": "Please provide detailed information about CVE-2025-24159", "inputs": "", "outputs": "CVE:CVE-2025-24159\nDescription:A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges.\npublished:2025-01-27T22:15:19.897"} {"instruction": "Please provide detailed information about CVE-2025-24160", "inputs": "", "outputs": "CVE:CVE-2025-24160\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:19.987"} {"instruction": "Please provide detailed information about CVE-2025-24161", "inputs": "", "outputs": "CVE:CVE-2025-24161\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:20.083"} {"instruction": "Please provide detailed information about CVE-2025-24162", "inputs": "", "outputs": "CVE:CVE-2025-24162\nDescription:This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.\npublished:2025-01-27T22:15:20.167"} {"instruction": "Please provide detailed information about CVE-2025-24163", "inputs": "", "outputs": "CVE:CVE-2025-24163\nDescription:The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination.\npublished:2025-01-27T22:15:20.267"} {"instruction": "Please provide detailed information about CVE-2025-24166", "inputs": "", "outputs": "CVE:CVE-2025-24166\nDescription:Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\npublished:2025-01-27T22:15:20.357"} {"instruction": "Please provide detailed information about CVE-2025-24169", "inputs": "", "outputs": "CVE:CVE-2025-24169\nDescription:A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.3, Safari 18.3. A malicious app may be able to bypass browser extension authentication.\npublished:2025-01-27T22:15:20.460"} {"instruction": "Please provide detailed information about CVE-2025-24174", "inputs": "", "outputs": "CVE:CVE-2025-24174\nDescription:The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences.\npublished:2025-01-27T22:15:20.547"} {"instruction": "Please provide detailed information about CVE-2025-24176", "inputs": "", "outputs": "CVE:CVE-2025-24176\nDescription:A permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges.\npublished:2025-01-27T22:15:20.643"} {"instruction": "Please provide detailed information about CVE-2025-24177", "inputs": "", "outputs": "CVE:CVE-2025-24177\nDescription:A null pointer dereference was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. A remote attacker may be able to cause a denial-of-service.\npublished:2025-01-27T22:15:20.750"} {"instruction": "Please provide detailed information about CVE-2025-24369", "inputs": "", "outputs": "CVE:CVE-2025-24369\nDescription:Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then passes the challenge with difficulty zero. Commit e09d0226a628f04b1d80fd83bee777894a45cd02 fixes this behavior by not using a client-specified difficulty value.\npublished:2025-01-27T23:15:11.310"} {"instruction": "Please provide detailed information about CVE-2025-22865", "inputs": "", "outputs": "CVE:CVE-2025-22865\nDescription:Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.\npublished:2025-01-28T02:15:29.243"} {"instruction": "Please provide detailed information about CVE-2025-23084", "inputs": "", "outputs": "CVE:CVE-2025-23084\nDescription:A vulnerability has been identified in Node.js, specifically affecting the handling of drive names in the Windows environment. Certain Node.js functions do not treat drive names as special on Windows. As a result, although Node.js assumes a relative path, it actually refers to the root directory.\r \r On Windows, a path that does not start with the file separator is treated as relative to the current directory. \r \r This vulnerability affects Windows users of `path.join` API.\npublished:2025-01-28T05:15:11.267"} {"instruction": "Please provide detailed information about CVE-2025-24810", "inputs": "", "outputs": "CVE:CVE-2025-24810\nDescription:Cross-site scripting vulnerability exists in Simple Image Sizes 3.2.3 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege and accessing the settings screen.\npublished:2025-01-28T05:15:11.413"} {"instruction": "Please provide detailed information about CVE-2025-0321", "inputs": "", "outputs": "CVE:CVE-2025-0321\nDescription:The ElementsKit Pro plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.7.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-28T08:15:29.810"} {"instruction": "Please provide detailed information about CVE-2025-0290", "inputs": "", "outputs": "CVE:CVE-2025-0290\nDescription:An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.0 prior to 17.5.5, from 17.6 prior to 17.6.3, and from 17.7 prior to 17.7.1. Under certain conditions, processing of CI artifacts metadata could cause background jobs to become unresponsive.\npublished:2025-01-28T09:15:09.363"} {"instruction": "Please provide detailed information about CVE-2025-0736", "inputs": "", "outputs": "CVE:CVE-2025-0736\nDescription:A flaw was found in Infinispan, when using JGroups with JDBC_PING. This issue occurs when an application inadvertently exposes sensitive information, such as configuration details or credentials, through logging mechanisms. This exposure can lead to unauthorized access and exploitation by malicious actors.\npublished:2025-01-28T09:15:09.543"} {"instruction": "Please provide detailed information about CVE-2025-0750", "inputs": "", "outputs": "CVE:CVE-2025-0750\nDescription:A vulnerability was found in CRI-O. A path traversal issue in the log management functions (UnMountPodLogs and LinkContainerLogs) may allow an attacker with permissions to create and delete Pods to unmount arbitrary host paths, leading to node-level denial of service by unmounting critical system directories.\npublished:2025-01-28T10:15:09.317"} {"instruction": "Please provide detailed information about CVE-2025-0752", "inputs": "", "outputs": "CVE:CVE-2025-0752\nDescription:A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.\npublished:2025-01-28T10:15:09.493"} {"instruction": "Please provide detailed information about CVE-2025-0754", "inputs": "", "outputs": "CVE:CVE-2025-0754\nDescription:The vulnerability was found in OpenShift Service Mesh 2.6.3 and 2.5.6. This issue occurs due to improper sanitization of HTTP headers by Envoy, particularly the x-forwarded-for header. This lack of sanitization can allow attackers to inject malicious payloads into service mesh logs, leading to log injection and spoofing attacks. Such injections can mislead logging mechanisms, enabling attackers to manipulate log entries or execute reflected cross-site scripting (XSS) attacks.\npublished:2025-01-28T10:15:09.697"} {"instruction": "Please provide detailed information about CVE-2025-0065", "inputs": "", "outputs": "CVE:CVE-2025-0065\nDescription:Improper Neutralization of Argument Delimiters in the TeamViewer_service.exe component of TeamViewer Clients prior version 15.62 for Windows allows an attacker with local unprivileged access on a Windows system to elevate privileges via argument injection.\npublished:2025-01-28T11:15:07.413"} {"instruction": "Please provide detailed information about CVE-2025-0432", "inputs": "", "outputs": "CVE:CVE-2025-0432\nDescription:EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage.\npublished:2025-01-28T16:15:40.183"} {"instruction": "Please provide detailed information about CVE-2025-0659", "inputs": "", "outputs": "CVE:CVE-2025-0659\nDescription:A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. A threat actor with admin privileges could leverage this vulnerability to overwrite reports including user projects.\npublished:2025-01-28T16:15:40.360"} {"instruction": "Please provide detailed information about CVE-2025-23045", "inputs": "", "outputs": "CVE:CVE-2025-23045\nDescription:Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container. This vulnerability affects CVAT deployments that run any of the serverless functions of type tracker from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of type tracker may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such as pickle or jsonpickle, it's likely to be vulnerable. Upgrade to CVAT 2.26.0 or later. If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you're running.\npublished:2025-01-28T16:15:40.690"} {"instruction": "Please provide detailed information about CVE-2025-23211", "inputs": "", "outputs": "CVE:CVE-2025-23211\nDescription:Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24.\npublished:2025-01-28T16:15:40.937"} {"instruction": "Please provide detailed information about CVE-2025-23212", "inputs": "", "outputs": "CVE:CVE-2025-23212\nDescription:Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28.\npublished:2025-01-28T16:15:41.080"} {"instruction": "Please provide detailed information about CVE-2025-23213", "inputs": "", "outputs": "CVE:CVE-2025-23213\nDescription:Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The file upload feature allows to upload arbitrary files, including html and svg. Both can contain malicious content (XSS Payloads). This vulnerability is fixed in 1.5.28.\npublished:2025-01-28T16:15:41.217"} {"instruction": "Please provide detailed information about CVE-2025-23385", "inputs": "", "outputs": "CVE:CVE-2025-23385\nDescription:In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible\npublished:2025-01-28T16:15:41.377"} {"instruction": "Please provide detailed information about CVE-2025-24800", "inputs": "", "outputs": "CVE:CVE-2025-24800\nDescription:Hyperbridge is a hyper-scalable coprocessor for verifiable, cross-chain interoperability. A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. This could be used to steal funds or compromise other kinds of cross-chain applications. This vulnerability is fixed in 15.0.1.\npublished:2025-01-28T16:15:45.063"} {"instruction": "Please provide detailed information about CVE-2025-0781", "inputs": "", "outputs": "CVE:CVE-2025-0781\nDescription:An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.\npublished:2025-01-28T17:15:25.947"} {"instruction": "Please provide detailed information about CVE-2025-23053", "inputs": "", "outputs": "CVE:CVE-2025-23053\nDescription:A privilege escalation vulnerability exists in the web-based management interface of HPE Aruba Networking Fabric Composer. Successful exploitation could allow an authenticated low privilege operator user to change the state of certain settings of a vulnerable system.\npublished:2025-01-28T18:15:38.987"} {"instruction": "Please provide detailed information about CVE-2025-23054", "inputs": "", "outputs": "CVE:CVE-2025-23054\nDescription:A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations.\npublished:2025-01-28T18:15:39.147"} {"instruction": "Please provide detailed information about CVE-2025-23055", "inputs": "", "outputs": "CVE:CVE-2025-23055\nDescription:A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.\npublished:2025-01-28T18:15:39.317"} {"instruction": "Please provide detailed information about CVE-2025-23056", "inputs": "", "outputs": "CVE:CVE-2025-23056\nDescription:A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.\npublished:2025-01-28T18:15:39.500"} {"instruction": "Please provide detailed information about CVE-2025-23057", "inputs": "", "outputs": "CVE:CVE-2025-23057\nDescription:A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.\npublished:2025-01-28T18:15:39.677"} {"instruction": "Please provide detailed information about CVE-2025-0631", "inputs": "", "outputs": "CVE:CVE-2025-0631\nDescription:A Credential Exposure Vulnerability exists in the above-mentioned product and version. The vulnerability is due to using HTTP resulting in credentials being sent in clear text.\npublished:2025-01-28T19:15:14.270"} {"instruction": "Please provide detailed information about CVE-2025-0783", "inputs": "", "outputs": "CVE:CVE-2025-0783\nDescription:A vulnerability, which was classified as problematic, was found in pankajindevops scale up to 20241113. This affects an unknown part of the component API Endpoint. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.\npublished:2025-01-28T19:15:14.410"} {"instruction": "Please provide detailed information about CVE-2025-22217", "inputs": "", "outputs": "CVE:CVE-2025-22217\nDescription:Avi Load Balancer contains an unauthenticated blind SQL Injection vulnerability which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.  A malicious user with network access may be able to use specially crafted SQL queries to gain database access.\npublished:2025-01-28T19:15:14.640"} {"instruction": "Please provide detailed information about CVE-2025-24478", "inputs": "", "outputs": "CVE:CVE-2025-24478\nDescription:A denial-of-service vulnerability exists in the affected products. The vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service.\npublished:2025-01-28T19:15:14.777"} {"instruction": "Please provide detailed information about CVE-2025-24479", "inputs": "", "outputs": "CVE:CVE-2025-24479\nDescription:A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.\npublished:2025-01-28T19:15:14.910"} {"instruction": "Please provide detailed information about CVE-2025-24480", "inputs": "", "outputs": "CVE:CVE-2025-24480\nDescription:A Remote Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to lack of input sanitation and could allow a remote attacker to run commands or code as a high privileged user.\npublished:2025-01-28T19:15:15.033"} {"instruction": "Please provide detailed information about CVE-2025-0784", "inputs": "", "outputs": "CVE:CVE-2025-0784\nDescription:A vulnerability has been found in Intelbras InControl up to 2.21.58 and classified as problematic. This vulnerability affects unknown code of the file /v1/usuario/ of the component Registered User Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.59 is able to address this issue. It is recommended to upgrade the affected component.\npublished:2025-01-28T20:15:56.230"} {"instruction": "Please provide detailed information about CVE-2025-24481", "inputs": "", "outputs": "CVE:CVE-2025-24481\nDescription:An Incorrect Permission Assignment Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect permissions being assigned to the remote debugger port and can allow for unauthenticated access to the system configuration.\npublished:2025-01-28T21:15:18.520"} {"instruction": "Please provide detailed information about CVE-2025-24482", "inputs": "", "outputs": "CVE:CVE-2025-24482\nDescription:A Local Code Injection Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect default permissions and allows for DLLs to be executed with higher level permissions.\npublished:2025-01-28T21:15:18.687"} {"instruction": "Please provide detailed information about CVE-2025-24826", "inputs": "", "outputs": "CVE:CVE-2025-24826\nDescription:Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4625.\npublished:2025-01-28T21:15:18.817"} {"instruction": "Please provide detailed information about CVE-2025-0785", "inputs": "", "outputs": "CVE:CVE-2025-0785\nDescription:A vulnerability was found in ESAFENET CDG V5 and classified as problematic. This issue affects some unknown processing of the file /SysConfig.jsp. The manipulation of the argument help leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-28T22:15:16.227"} {"instruction": "Please provide detailed information about CVE-2025-0786", "inputs": "", "outputs": "CVE:CVE-2025-0786\nDescription:A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-28T22:15:16.423"} {"instruction": "Please provide detailed information about CVE-2025-0787", "inputs": "", "outputs": "CVE:CVE-2025-0787\nDescription:A vulnerability was found in ESAFENET CDG V5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /appDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-28T22:15:16.600"} {"instruction": "Please provide detailed information about CVE-2025-22917", "inputs": "", "outputs": "CVE:CVE-2025-22917\nDescription:A reflected cross-site scripting (XSS) vulnerability in Audemium ERP <=0.9.0 allows remote attackers to execute an arbitrary JavaScript payload in the web browser of a user by including a malicious payload into the 'type' parameter of list.php.\npublished:2025-01-28T22:15:16.770"} {"instruction": "Please provide detailed information about CVE-2025-0788", "inputs": "", "outputs": "CVE:CVE-2025-0788\nDescription:A vulnerability was found in ESAFENET CDG V5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /content_top.jsp. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-28T23:15:08.427"} {"instruction": "Please provide detailed information about CVE-2025-0789", "inputs": "", "outputs": "CVE:CVE-2025-0789\nDescription:A vulnerability classified as critical has been found in ESAFENET CDG V5. This affects an unknown part of the file /doneDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-28T23:15:08.610"} {"instruction": "Please provide detailed information about CVE-2025-0790", "inputs": "", "outputs": "CVE:CVE-2025-0790\nDescription:A vulnerability classified as problematic was found in ESAFENET CDG V5. This vulnerability affects unknown code of the file /doneDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T00:15:08.280"} {"instruction": "Please provide detailed information about CVE-2025-0791", "inputs": "", "outputs": "CVE:CVE-2025-0791\nDescription:A vulnerability, which was classified as critical, has been found in ESAFENET CDG V5. This issue affects some unknown processing of the file /sdDoneDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T00:15:08.480"} {"instruction": "Please provide detailed information about CVE-2025-0792", "inputs": "", "outputs": "CVE:CVE-2025-0792\nDescription:A vulnerability, which was classified as critical, was found in ESAFENET CDG V5. Affected is an unknown function of the file /sdTodoDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T00:15:08.653"} {"instruction": "Please provide detailed information about CVE-2025-0793", "inputs": "", "outputs": "CVE:CVE-2025-0793\nDescription:A vulnerability has been found in ESAFENET CDG V5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /todoDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T01:15:07.780"} {"instruction": "Please provide detailed information about CVE-2025-0794", "inputs": "", "outputs": "CVE:CVE-2025-0794\nDescription:A vulnerability was found in ESAFENET CDG V5 and classified as problematic. Affected by this issue is some unknown functionality of the file /todoDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T01:15:07.943"} {"instruction": "Please provide detailed information about CVE-2025-0795", "inputs": "", "outputs": "CVE:CVE-2025-0795\nDescription:A vulnerability was found in ESAFENET CDG V5. It has been classified as problematic. This affects an unknown part of the file /todolistjump.jsp. The manipulation of the argument flowId leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T02:15:26.830"} {"instruction": "Please provide detailed information about CVE-2025-0797", "inputs": "", "outputs": "CVE:CVE-2025-0797\nDescription:A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T02:15:27.010"} {"instruction": "Please provide detailed information about CVE-2025-0798", "inputs": "", "outputs": "CVE:CVE-2025-0798\nDescription:A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. This issue affects some unknown processing of the file rtscanner of the component Quarantine Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\npublished:2025-01-29T02:15:27.190"} {"instruction": "Please provide detailed information about CVE-2025-0800", "inputs": "", "outputs": "CVE:CVE-2025-0800\nDescription:A vulnerability classified as problematic has been found in SourceCodester Online Courseware 1.0. Affected is an unknown function of the file /pcci/admin/saveeditt.php of the component Edit Teacher. The manipulation of the argument fname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-29T02:15:27.373"} {"instruction": "Please provide detailed information about CVE-2025-0802", "inputs": "", "outputs": "CVE:CVE-2025-0802\nDescription:A vulnerability classified as critical was found in SourceCodester Best Employee Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/View_user.php of the component Administrative Endpoint. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-29T02:15:27.550"} {"instruction": "Please provide detailed information about CVE-2025-0803", "inputs": "", "outputs": "CVE:CVE-2025-0803\nDescription:A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/submit_plan_new.php. The manipulation of the argument planid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-29T02:15:27.723"} {"instruction": "Please provide detailed information about CVE-2025-23362", "inputs": "", "outputs": "CVE:CVE-2025-23362\nDescription:The old versions of EXIF Viewer Classic contain a cross-site scripting vulnerability caused by improper handling of EXIF meta data. When an image is rendered and crafted EXIF meta data is processed, an arbitrary script may be executed on the web browser. Versions 2.3.2 and 2.4.0 were reported as vulnerable. According to the vendor, the product has been refactored after those old versions and the version 3.0.1 is not vulnerable.\npublished:2025-01-29T02:15:27.910"} {"instruction": "Please provide detailed information about CVE-2025-0806", "inputs": "", "outputs": "CVE:CVE-2025-0806\nDescription:A vulnerability was found in code-projects Job Recruitment 1.0. It has been rated as problematic. This issue affects some unknown processing of the file _call_job_search_ajax.php. The manipulation of the argument job_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-29T03:15:06.900"} {"instruction": "Please provide detailed information about CVE-2025-0804", "inputs": "", "outputs": "CVE:CVE-2025-0804\nDescription:The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via link titles in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-29T04:15:07.193"} {"instruction": "Please provide detailed information about CVE-2025-0617", "inputs": "", "outputs": "CVE:CVE-2025-0617\nDescription:An attacker with access to an HX 10.0.0 and previous versions, may send specially-crafted data to the HX console. The malicious detection would then trigger file parsing containing exponential entity expansions in the consumer process thus causing a Denial of Service.\npublished:2025-01-29T11:15:09.330"} {"instruction": "Please provide detailed information about CVE-2025-0762", "inputs": "", "outputs": "CVE:CVE-2025-0762\nDescription:Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)\npublished:2025-01-29T11:15:09.593"} {"instruction": "Please provide detailed information about CVE-2025-0353", "inputs": "", "outputs": "CVE:CVE-2025-0353\nDescription:The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\npublished:2025-01-29T12:15:29.477"} {"instruction": "Please provide detailed information about CVE-2025-24374", "inputs": "", "outputs": "CVE:CVE-2025-24374\nDescription:Twig is a template language for PHP. When using the ?? operator, output escaping was missing for the expression on the left side of the operator. This vulnerability is fixed in 3.19.0.\npublished:2025-01-29T16:15:44.090"} {"instruction": "Please provide detailed information about CVE-2025-24792", "inputs": "", "outputs": "CVE:CVE-2025-24792\nDescription:Snowflake PHP PDO Driver is a driver that uses the PHP Data Objects (PDO) extension to connect to the Snowflake database. Snowflake discovered and remediated a vulnerability in the Snowflake PHP PDO Driver where executing unsupported queries like PUT or GET on stages causes a signed-to-unsigned conversion error that crashes the application using the Driver. This vulnerability affects versions 0.2.0 through 3.0.3. Snowflake fixed the issue in version 3.1.0.\npublished:2025-01-29T16:15:44.273"} {"instruction": "Please provide detailed information about CVE-2025-24527", "inputs": "", "outputs": "CVE:CVE-2025-24527\nDescription:An issue was discovered in Akamai Enterprise Application Access (EAA) before 2025-01-17. If an admin knows another tenant's 128-bit connector GUID, they can execute debug commands on that connector.\npublished:2025-01-29T17:15:29.873"} {"instruction": "Please provide detailed information about CVE-2025-24791", "inputs": "", "outputs": "CVE:CVE-2025-24791\nDescription:snowflake-connector-nodejs is a NodeJS driver for Snowflake. Snowflake discovered and remediated a vulnerability in the Snowflake NodeJS Driver. File permissions checks of the temporary credential cache could be bypassed by an attacker with write access to the local cache directory. This vulnerability affects versions 1.12.0 through 2.0.1 on Linux. Snowflake fixed the issue in version 2.0.2.\npublished:2025-01-29T17:15:30.020"} {"instruction": "Please provide detailed information about CVE-2025-24789", "inputs": "", "outputs": "CVE:CVE-2025-24789\nDescription:Snowflake JDBC provides a JDBC type 4 driver that supports core functionality, allowing Java program to connect to Snowflake. Snowflake discovered and remediated a vulnerability in the Snowflake JDBC Driver. When the EXTERNALBROWSER authentication method is used on Windows, an attacker with write access to a directory in the %PATH% can escalate their privileges to the user that runs the vulnerable JDBC Driver version. This vulnerability affects versions 3.2.3 through 3.21.0 on Windows. Snowflake fixed the issue in version 3.22.0.\npublished:2025-01-29T18:15:47.030"} {"instruction": "Please provide detailed information about CVE-2025-24790", "inputs": "", "outputs": "CVE:CVE-2025-24790\nDescription:Snowflake JDBC provides a JDBC type 4 driver that supports core functionality, allowing Java program to connect to Snowflake. Snowflake discovered and remediated a vulnerability in the Snowflake JDBC Driver. On Linux systems, when temporary credential caching is enabled, the Snowflake JDBC Driver will cache temporary credentials locally in a world-readable file. This vulnerability affects versions 3.6.8 through 3.21.0. Snowflake fixed the issue in version 3.22.0.\npublished:2025-01-29T18:15:47.207"} {"instruction": "Please provide detailed information about CVE-2025-24882", "inputs": "", "outputs": "CVE:CVE-2025-24882\nDescription:regclient is a Docker and OCI Registry Client in Go. A malicious registry could return a different digest for a pinned manifest without detection. This vulnerability is fixed in 0.7.1.\npublished:2025-01-29T18:15:47.570"} {"instruction": "Please provide detailed information about CVE-2025-0840", "inputs": "", "outputs": "CVE:CVE-2025-0840\nDescription:A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.\npublished:2025-01-29T20:15:35.007"} {"instruction": "Please provide detailed information about CVE-2025-20014", "inputs": "", "outputs": "CVE:CVE-2025-20014\nDescription:mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.\npublished:2025-01-29T20:15:35.207"} {"instruction": "Please provide detailed information about CVE-2025-20061", "inputs": "", "outputs": "CVE:CVE-2025-20061\nDescription:mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.\npublished:2025-01-29T20:15:35.363"} {"instruction": "Please provide detailed information about CVE-2025-0841", "inputs": "", "outputs": "CVE:CVE-2025-0841\nDescription:A vulnerability has been found in Aridius XYZ up to 20240927 on OpenCart and classified as critical. This vulnerability affects the function loadMore of the component News. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.\npublished:2025-01-29T21:15:20.973"} {"instruction": "Please provide detailed information about CVE-2025-24788", "inputs": "", "outputs": "CVE:CVE-2025-24788\nDescription:snowflake-connector-net is the Snowflake Connector for .NET. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for .NET in which files downloaded from stages are temporarily placed in a world-readable local directory, making them accessible to unauthorized users on the same machine. This vulnerability affects versions 2.0.12 through 4.2.0 on Linux and macOS. Snowflake fixed the issue in version 4.3.0.\npublished:2025-01-29T21:15:21.140"} {"instruction": "Please provide detailed information about CVE-2025-24793", "inputs": "", "outputs": "CVE:CVE-2025-24793\nDescription:The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. A function from the snowflake.connector.pandas_tools module is vulnerable to SQL injection. This vulnerability affects versions 2.2.5 through 3.13.0. Snowflake fixed the issue in version 3.13.1.\npublished:2025-01-29T21:15:21.270"} {"instruction": "Please provide detailed information about CVE-2025-24794", "inputs": "", "outputs": "CVE:CVE-2025-24794\nDescription:The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. The OCSP response cache uses pickle as the serialization format, potentially leading to local privilege escalation. This vulnerability affects versions 2.7.12 through 3.13.0. Snowflake fixed the issue in version 3.13.1.\npublished:2025-01-29T21:15:21.397"} {"instruction": "Please provide detailed information about CVE-2025-24795", "inputs": "", "outputs": "CVE:CVE-2025-24795\nDescription:The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. On Linux systems, when temporary credential caching is enabled, the Snowflake Connector for Python will cache temporary credentials locally in a world-readable file. This vulnerability affects versions 2.3.7 through 3.13.0. Snowflake fixed the issue in version 3.13.1.\npublished:2025-01-29T21:15:21.533"} {"instruction": "Please provide detailed information about CVE-2025-24884", "inputs": "", "outputs": "CVE:CVE-2025-24884\nDescription:kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the \"full-elastic-stack\" example vector configuration was used for a real cluster, the previous values of kubernetes secrets would have been disclosed in the audit messages. This vulnerability is fixed in 1.0.16.\npublished:2025-01-29T21:15:21.667"} {"instruction": "Please provide detailed information about CVE-2025-0842", "inputs": "", "outputs": "CVE:CVE-2025-0842\nDescription:A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. This issue affects some unknown processing of the file admin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-29T22:15:30.283"} {"instruction": "Please provide detailed information about CVE-2025-0851", "inputs": "", "outputs": "CVE:CVE-2025-0851\nDescription:A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.\npublished:2025-01-29T22:15:30.463"} {"instruction": "Please provide detailed information about CVE-2025-0843", "inputs": "", "outputs": "CVE:CVE-2025-0843\nDescription:A vulnerability was found in needyamin Library Card System 1.0. It has been classified as critical. Affected is an unknown function of the file admindashboard.php of the component Admin Panel. The manipulation of the argument email/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-29T23:15:23.110"} {"instruction": "Please provide detailed information about CVE-2025-21396", "inputs": "", "outputs": "CVE:CVE-2025-21396\nDescription:Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network.\npublished:2025-01-29T23:15:32.640"} {"instruction": "Please provide detailed information about CVE-2025-21415", "inputs": "", "outputs": "CVE:CVE-2025-21415\nDescription:Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network.\npublished:2025-01-29T23:15:33.190"} {"instruction": "Please provide detailed information about CVE-2025-0844", "inputs": "", "outputs": "CVE:CVE-2025-0844\nDescription:A vulnerability was found in needyamin Library Card System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file signup.php of the component Registration Page. The manipulation of the argument firstname/lastname/email/borrow/user_address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.\npublished:2025-01-30T00:15:41.920"} {"instruction": "Please provide detailed information about CVE-2025-0846", "inputs": "", "outputs": "CVE:CVE-2025-0846\nDescription:A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/AdminLogin.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-30T01:15:13.993"} {"instruction": "Please provide detailed information about CVE-2025-0847", "inputs": "", "outputs": "CVE:CVE-2025-0847\nDescription:A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /index.php of the component Login. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-30T02:15:25.403"} {"instruction": "Please provide detailed information about CVE-2025-0848", "inputs": "", "outputs": "CVE:CVE-2025-0848\nDescription:A vulnerability was found in Tenda A18 up to 15.13.07.09. It has been rated as critical. This issue affects the function SetCmdlineRun of the file /goform/SetCmdlineRun of the component HTTP POST Request Handler. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-30T02:15:25.597"} {"instruction": "Please provide detailed information about CVE-2025-0849", "inputs": "", "outputs": "CVE:CVE-2025-0849\nDescription:A vulnerability classified as critical has been found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /edit-staff/ of the component Staff Handler. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.\npublished:2025-01-30T02:15:25.783"} {"instruction": "Please provide detailed information about CVE-2025-0373", "inputs": "", "outputs": "CVE:CVE-2025-0373\nDescription:On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow. A NFS server that exports a cd9660, tarfs, or ext2fs file system can be made to panic by mounting and accessing the export with an NFS client. Further exploitation (e.g., bypassing file permission checking or remote kernel code execution) is potentially possible, though this has not been demonstrated. In particular, release kernels are compiled with stack protection enabled, and some instances of the overflow are caught by this mechanism, causing a panic.\npublished:2025-01-30T05:15:09.590"} {"instruction": "Please provide detailed information about CVE-2025-0374", "inputs": "", "outputs": "CVE:CVE-2025-0374\nDescription:When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts. This version does not preserve the mode of the input file, and is world-readable. This applies to files that would normally have restricted visibility, such as /etc/master.passwd. An unprivileged local user may be able to read encrypted root and user passwords from the temporary master.passwd file created in /var/db/etcupdate/conflicts. This is possible only when conflicts within the password file arise during an update, and the unprotected file is deleted when conflicts are resolved.\npublished:2025-01-30T05:15:10.527"} {"instruction": "Please provide detailed information about CVE-2025-0662", "inputs": "", "outputs": "CVE:CVE-2025-0662\nDescription:In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace. It is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.\npublished:2025-01-30T05:15:10.653"} {"instruction": "Please provide detailed information about CVE-2025-23374", "inputs": "", "outputs": "CVE:CVE-2025-23374\nDescription:Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.\npublished:2025-01-30T05:15:10.787"} {"instruction": "Please provide detailed information about CVE-2025-0834", "inputs": "", "outputs": "CVE:CVE-2025-0834\nDescription:Privilege escalation vulnerability has been found in Wondershare Dr.Fone version 13.5.21. This vulnerability could allow an attacker to escalate privileges by replacing the binary ‘C:\\ProgramData\\Wondershare\\wsServices\\ElevationService.exe’ with a malicious binary. This binary will be executed by SYSTEM automatically.\npublished:2025-01-30T09:15:09.703"} {"instruction": "Please provide detailed information about CVE-2025-0860", "inputs": "", "outputs": "CVE:CVE-2025-0860\nDescription:The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\npublished:2025-01-30T10:15:08.723"} {"instruction": "Please provide detailed information about CVE-2025-0861", "inputs": "", "outputs": "CVE:CVE-2025-0861\nDescription:The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 3.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\npublished:2025-01-30T10:15:08.907"} {"instruction": "Please provide detailed information about CVE-2025-21107", "inputs": "", "outputs": "CVE:CVE-2025-21107\nDescription:Dell NetWorker, version(s) prior to 19.11.0.3, all versions of 19.10 & prior versions contain(s) an Unquoted Search Path or Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.\npublished:2025-01-30T10:15:09.100"} {"instruction": "Please provide detailed information about CVE-2025-23007", "inputs": "", "outputs": "CVE:CVE-2025-23007\nDescription:A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation.\npublished:2025-01-30T10:15:09.283"} {"instruction": "Please provide detailed information about CVE-2025-0739", "inputs": "", "outputs": "CVE:CVE-2025-0739\nDescription:An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to show subscription's information of others users by changing the \"SUSCBRIPTION_ID\" param of the endpoint \"/demos/embedai/subscriptions/show/\".\npublished:2025-01-30T11:15:11.607"} {"instruction": "Please provide detailed information about CVE-2025-0740", "inputs": "", "outputs": "CVE:CVE-2025-0740\nDescription:An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain chat messages belonging to other users by changing the “CHAT_ID” of the endpoint \"/embedai/chats/load_messages?chat_id=\".\npublished:2025-01-30T11:15:11.763"} {"instruction": "Please provide detailed information about CVE-2025-0741", "inputs": "", "outputs": "CVE:CVE-2025-0741\nDescription:An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to write messages into other users chat by changing the parameter \"chat_id\" of the POST request \"/embedai/chats/send_message\".\npublished:2025-01-30T11:15:11.910"} {"instruction": "Please provide detailed information about CVE-2025-0742", "inputs": "", "outputs": "CVE:CVE-2025-0742\nDescription:An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain files stored by others users by changing the \"FILE_ID\" of the endpoint \"/embedai/files/show/\".\npublished:2025-01-30T12:15:27.560"} {"instruction": "Please provide detailed information about CVE-2025-0743", "inputs": "", "outputs": "CVE:CVE-2025-0743\nDescription:An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to leverage the endpoint \"/embedai/visits/show/\" to obtain information about the visits made by other users. The information provided by this endpoint includes IP address, userAgent and location of the user that visited the web page.\npublished:2025-01-30T12:15:27.707"} {"instruction": "Please provide detailed information about CVE-2025-0744", "inputs": "", "outputs": "CVE:CVE-2025-0744\nDescription:an Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker change his subscription plan without paying by making a POST request changing the parameters of the \"/demos/embedai/pmt_cash_on_delivery/pay\" endpoint.\npublished:2025-01-30T12:15:27.843"} {"instruction": "Please provide detailed information about CVE-2025-0745", "inputs": "", "outputs": "CVE:CVE-2025-0745\nDescription:An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain the backups of the database by requesting the \"/embedai/app/uploads/database/\" endpoint.\npublished:2025-01-30T12:15:27.973"} {"instruction": "Please provide detailed information about CVE-2025-0746", "inputs": "", "outputs": "CVE:CVE-2025-0746\nDescription:A Reflected Cross-Site Scripting vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to craft a malicious URL leveraging the\"/embedai/users/show/