Medium - CVE-2025-7369 - The WP Shortcodes Plugin — Shortcodes Ultimate...
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.4.2. This is due to missing or incorrect...
NA - CVE-2024-6107 - Due to insufficient verification, an attacker...
Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the...
High - CVE-2025-1469 - Authorization Bypass Through User-Controlled...
Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025.
High - CVE-2025-41673 - A high privileged remote attacker can execute...
A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.
High - CVE-2025-41674 - A high privileged remote attacker can execute...
A high privileged remote attacker can execute arbitrary system commands via POST requests in the diagnostic action due to improper neutralization of special elements used in an OS command.
High - CVE-2025-41675 - A high privileged remote attacker can execute...
A high privileged remote attacker can execute arbitrary system commands via GET requests in the cloud server communication script due to improper neutralization of special elements used in an OS...
Medium - CVE-2025-41676 - A high privileged remote attacker can exhaust...
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.
Medium - CVE-2025-41677 - A high privileged remote attacker can exhaust...
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.
Medium - CVE-2025-41678 - A high privileged remote attacker can alter the...
A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.
Medium - CVE-2025-41679 - An unauthenticated remote attacker could...
An unauthenticated remote attacker could exploit a buffer overflow vulnerability in the device causing a denial of service that affects only the network initializing wizard (Conftool) service.