NA - CVE-2024-52928 - Arc before 1.26.1 on Windows has a bypass issue...
Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website.
NA - CVE-2025-30131 - An issue was discovered on IROAD Dashcam FX2...
An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged to execute arbitrary commands by uploading a CGI-based webshell. Once a file is...
NA - CVE-2025-52477 - Octo-STS is a GitHub App that acts like a...
Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect...
NA - CVE-2025-53013 - Himmelblau is an interoperability suite for...
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. A vulnerability present in versions 0.9.10 through 0.9.16 allows a user to authenticate to a Linux host via...
NA - CVE-2025-52903 - File Browser provides a file managing interface...
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature...
NA - CVE-2025-52904 - File Browser provides a file managing interface...
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0 of the web application, all...
NA - CVE-2025-53121 - Multiple stored XSS were found on different...
Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on...
NA - CVE-2025-49592 - n8n is a workflow automation platform. Versions...
n8n is a workflow automation platform. Versions prior to 1.98.0 have an Open Redirect vulnerability in the login flow. Authenticated users can be redirected to untrusted, attacker-controlled...