Updated CVEs from Tenable Get the latest CVE updates from Tenable
- CVE-2025-54117on August 18, 2025 at 4:15 pm
Critical Severity Description NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Cross-site scripting (XSS) vulnerability in NamelessMC before 2.2.3 allows remote authenticated attackers to inject arbitrary web script or HTML via the dashboard text editor component. This vulnerability is fixed in 2.2.4. Read more at https://www.tenable.com/cve/CVE-2025-54117
- CVE-2025-54421on August 18, 2025 at 4:15 pm
High Severity Description NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Cross-site scripting (XSS) vulnerability in NamelessMC before 2.2.4 allows remote authenticated attackers to inject arbitrary web script or HTML via the default_keywords crafted parameter. This vulnerability is fixed in 2.2.4. Read more at https://www.tenable.com/cve/CVE-2025-54421
- CVE-2025-54118on August 18, 2025 at 4:15 pm
Medium Severity Description NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Sensitive information disclosure in NamelessMC before 2.2.4 allows unauthenticated remote attacker to gain sensitive information such as absolute path of the source code via list parameter. This vulnerability is fixed in 2.2.4. Read more at https://www.tenable.com/cve/CVE-2025-54118
- CVE-2025-4962on August 18, 2025 at 2:15 pm
High Severity Description An Insecure Direct Object Reference (IDOR) vulnerability was identified in the `POST /v1/templates` endpoint of the Lunary API, affecting versions up to 0.8.8. This vulnerability allows authenticated users to create templates in another user’s project by altering the `projectId` query parameter. The root cause of this issue is the absence of server-side validation to ensure that the authenticated user owns the specified `projectId`. The vulnerability has been addressed in version 1.9.23. Read more at https://www.tenable.com/cve/CVE-2025-4962
- CVE-2025-43732on August 18, 2025 at 2:15 pm
Medium Severity Description Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.10, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.17 and 7.4 GA through update 92 is vulnerable to Insecure Direct Object Reference (IDOR) in the groupId parameter of the _com_liferay_roles_selector_web_portlet_RolesSelectorPortlet_groupId. When an organization administrator modifies this parameter id value, they can gain unauthorized access to user lists from other organizations. Read more at https://www.tenable.com/cve/CVE-2025-43732
- CVE-2025-36120on August 18, 2025 at 2:15 pm
High Severity Description IBM Storage Virtualize 8.4, 8.5, 8.6, and 8.7 could allow an authenticated user to escalate their privileges in an SSH session due to incorrect authorization checks to access resources. Read more at https://www.tenable.com/cve/CVE-2025-36120
- CVE-2025-33100on August 18, 2025 at 2:15 pm
Medium Severity Description IBM Concert Software 1.0.0 through 1.1.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. Read more at https://www.tenable.com/cve/CVE-2025-33100
- CVE-2025-33090on August 18, 2025 at 2:15 pm
High Severity Description IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to cause a denial of service using a specially crafted regular expression that would cause excessive resource consumption. Read more at https://www.tenable.com/cve/CVE-2025-33090
- CVE-2025-27909on August 18, 2025 at 2:15 pm
Medium Severity Description IBM Concert Software 1.0.0 through 1.1.0 uses cross-origin resource sharing (CORS) which could allow an attacker to carry out privileged actions as the domain name is not being limited to only trusted domains. Read more at https://www.tenable.com/cve/CVE-2025-27909
- CVE-2025-1759on August 18, 2025 at 2:15 pm
Medium Severity Description IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to obtain sensitive information from allocated memory due to improper clearing of heap memory. Read more at https://www.tenable.com/cve/CVE-2025-1759
- CVE-2024-49827on August 18, 2025 at 2:15 pm
Low Severity Description IBM Concert Software 1.0.0 through 1.1.0 is vulnerable to excessive data exposure, allowing attackers to access sensitive information without proper filtering. Read more at https://www.tenable.com/cve/CVE-2024-49827
- CVE-2025-43733on August 18, 2025 at 1:15 pm
Low Severity Description A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.7 allows a remote authenticated attacker to inject JavaScript code via the content page’s name field. This malicious payload is then reflected and executed within the user’s browser when viewing the “document View Usages” page. Read more at https://www.tenable.com/cve/CVE-2025-43733
- CVE-2025-41242on August 18, 2025 at 9:15 am
Medium Severity Description Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container. An application can be vulnerable when all the following are true: * the application is deployed as a WAR or with an embedded Servlet container * the Servlet container does not reject suspicious sequences https://jakarta.ee/specifications/servlet/6.1/jakarta-servlet-spec-6.1.html#uri-path-canonicalization * the application serves static resources https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title with Spring resource handling We have verified that applications deployed on Apache Tomcat or Eclipse Jetty are not vulnerable, as long as default security features are not disabled in the configuration. Because we cannot check exploits against all Servlet containers and configuration variants, we strongly recommend upgrading your application. Read more at https://www.tenable.com/cve/CVE-2025-41242
- CVE-2025-47206on August 18, 2025 at 9:15 am
High Severity Description An out-of-bounds write vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4933 and later Read more at https://www.tenable.com/cve/CVE-2025-47206
- CVE-2025-5296on August 18, 2025 at 8:15 am
High Severity Description CWE-59: Improper Link Resolution Before File Access (‘Link Following’) vulnerability exists that could cause arbitrary data to be written to protected locations, potentially leading to escalation of privilege, arbitrary file corruption, exposure of application and system information or persistent denial of service when a low-privileged attacker tampers with the installation folder. Read more at https://www.tenable.com/cve/CVE-2025-5296
- CVE-2025-57702on August 18, 2025 at 7:15 am
Medium Severity Description DIAEnergie – Reflected Cross-site Scripting Read more at https://www.tenable.com/cve/CVE-2025-57702
- CVE-2025-57701on August 18, 2025 at 7:15 am
Medium Severity Description DIAEnergie – Reflected Cross-site Scripting Read more at https://www.tenable.com/cve/CVE-2025-57701
- CVE-2025-6625on August 18, 2025 at 7:15 am
High Severity Description CWE-20: Improper Input Validation vulnerability exists that could cause a Denial Of Service when specific crafted FTP command is sent to the device. Read more at https://www.tenable.com/cve/CVE-2025-6625
- CVE-2025-57703on August 18, 2025 at 7:15 am
Medium Severity Description DIAEnergie – Reflected Cross-site Scripting Read more at https://www.tenable.com/cve/CVE-2025-57703
- CVE-2025-57700on August 18, 2025 at 7:15 am
High Severity Description DIAEnergie – Stored Cross-site Scripting Read more at https://www.tenable.com/cve/CVE-2025-57700
- CVE-2025-9109on August 18, 2025 at 6:15 am
Low Severity Description A security flaw has been discovered in Portabilis i-Diario up to 1.5.0. Affected by this vulnerability is an unknown functionality of the file /password/email of the component Password Recovery Endpoint. The manipulation results in observable response discrepancy. It is possible to launch the attack remotely. This attack is characterized by high complexity. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited. Read more at https://www.tenable.com/cve/CVE-2025-9109
- CVE-2025-9108on August 18, 2025 at 6:15 am
Low Severity Description Affected is an unknown function of the component Login Page. The manipulation leads to improper restriction of rendered ui layers. It is possible to launch the attack remotely. Read more at https://www.tenable.com/cve/CVE-2025-9108
- CVE-2025-9107on August 18, 2025 at 5:15 am
Low Severity Description A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. Read more at https://www.tenable.com/cve/CVE-2025-9107
- CVE-2025-9106on August 18, 2025 at 5:15 am
Low Severity Description A vulnerability was found in Portabilis i-Diario up to 1.5.0. This affects an unknown function of the file /planos-de-ensino-por-disciplina/ of the component Informações Adicionais Page. Performing manipulation of the argument Parecer/Conteúdos/Objetivos results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. Read more at https://www.tenable.com/cve/CVE-2025-9106
- CVE-2025-9105on August 18, 2025 at 4:15 am
Low Severity Description A vulnerability has been found in Portabilis i-Diario up to 1.5.0. The impacted element is an unknown function of the file /planos-de-ensino-por-areas-de-conhecimento/ of the component Informações Adicionais Page. Such manipulation of the argument Parecer/Conteúdos/Objetivos leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Read more at https://www.tenable.com/cve/CVE-2025-9105
- CVE-2025-9104on August 18, 2025 at 4:15 am
Low Severity Description A flaw has been found in Portabilis i-Diario up to 1.5.0. The affected element is an unknown function of the file /planos-de-aulas-por-disciplina/ of the component Informações Adicionais Page. This manipulation of the argument Parecer/Objeto de Conhecimento/Habilidades causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Read more at https://www.tenable.com/cve/CVE-2025-9104
- CVE-2025-9103on August 18, 2025 at 4:15 am
Low Severity Description A vulnerability was detected in ZenCart 2.1.0. Affected by this vulnerability is an unknown functionality of the component CKEditor. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor declares this as “intended behavior, allowed for authorized administrators”. Read more at https://www.tenable.com/cve/CVE-2025-9103
- CVE-2025-9101on August 18, 2025 at 3:15 am
Low Severity Description A weakness has been identified in zhenfeng13 My-Blog up to 1.0.0. This issue affects some unknown processing of the file /admin/tags/save of the component Tag Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-9101
- CVE-2025-9102on August 18, 2025 at 3:15 am
Low Severity Description A security vulnerability has been detected in 1&1 Mail & Media mail.com App 8.8.0 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.mail.mobile.android.mail. The manipulation leads to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. Read more at https://www.tenable.com/cve/CVE-2025-9102
- CVE-2025-9100on August 18, 2025 at 2:15 am
Medium Severity Description A security flaw has been discovered in zhenfeng13 My-Blog 1.0.0. This vulnerability affects unknown code of the file /blog/comment of the component Frontend Blog Article Comment Handler. The manipulation leads to authentication bypass by capture-replay. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-9100