Vulnerabilities > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-05-03 | CVE-2025-4238 | Classic Buffer Overflow vulnerability in Pcman FTP Server 2.0.7 A vulnerability was found in PCMan FTP Server 2.0.7. | 9.8 |
2025-05-03 | CVE-2025-4239 | Classic Buffer Overflow vulnerability in Pcman FTP Server 2.0.7 A vulnerability was found in PCMan FTP Server 2.0.7. | 9.8 |
2025-05-03 | CVE-2025-4237 | Classic Buffer Overflow vulnerability in Pcman FTP Server 2.0.7 A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. | 9.8 |
2025-05-03 | CVE-2025-4236 | Classic Buffer Overflow vulnerability in Pcman FTP Server 2.0.7 A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. | 9.8 |
2025-05-03 | CVE-2025-4226 | SQL Injection vulnerability in PHPgurukul Cyber Cafe Management System 1.0 A vulnerability classified as critical has been found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0. | 9.8 |
2025-05-03 | CVE-2025-3918 | The Job Listings plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the register_action() function in versions 0.1 to 0.1.1. | 9.8 |
2025-05-02 | CVE-2025-4214 | Injection vulnerability in PHPgurukul Online DJ Booking Management System 1.0 A vulnerability was found in PHPGuruku Online DJ Booking Management System 1.0 and classified as critical. | 9.8 |
2025-05-02 | CVE-2025-4213 | Injection vulnerability in PHPgurukul Online Birth Certificate System 1.0 A vulnerability has been found in PHPGurukul Online Birth Certificate System 1.0 and classified as critical. | 9.8 |
2025-05-02 | CVE-2025-2421 | Code Injection vulnerability in Felisify Sambabox Improper Control of Generation of Code ('Code Injection') vulnerability in Profelis Informatics SambaBox allows Code Injection.This issue affects SambaBox: before 5.1. | 9.8 |
2025-05-02 | CVE-2025-3708 | SQL Injection vulnerability in Le-Show Le-Yan Le-show medical practice management system from Le-yan has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents. | 9.8 |