NA - CVE-2025-4569 - An insecure sensitive key storage issue was...
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services. Refer to the...
NA - CVE-2025-4570 - An insecure sensitive key storage issue was...
An insecure sensitive key storage issue was found in MyASUS. potentially allowing unauthorized actor to obtain a token that could be used to communicate with certain services. Refer to the...
Medium - CVE-2025-4685 - The Gutentor – Gutenberg Blocks – Page Builder...
The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML data attributes of multiple widgets, in all...
Medium - CVE-2025-7354 - The WP Shortcodes Plugin — Shortcodes Ultimate...
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 7.4.2 due to...
Medium - CVE-2025-7369 - The WP Shortcodes Plugin — Shortcodes Ultimate...
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.4.2. This is due to missing or incorrect...
NA - CVE-2024-6107 - Due to insufficient verification, an attacker...
Due to insufficient verification, an attacker could use a malicious client to bypass authentication checks and run RPC commands in a region. This has been addressed in MAAS and updated in the...
High - CVE-2025-1469 - Authorization Bypass Through User-Controlled...
Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025.
High - CVE-2025-41673 - A high privileged remote attacker can execute...
A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.
High - CVE-2025-41674 - A high privileged remote attacker can execute...
A high privileged remote attacker can execute arbitrary system commands via POST requests in the diagnostic action due to improper neutralization of special elements used in an OS command.
High - CVE-2025-41675 - A high privileged remote attacker can execute...
A high privileged remote attacker can execute arbitrary system commands via GET requests in the cloud server communication script due to improper neutralization of special elements used in an OS...