General-Purpose System Vulnerabilities
Vulnerabilities related to traditional IT systems, servers, and desktop applications.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2025-23972 | Cross-Site Request Forgery (CSRF) vulnerability in Brian S. Reed Contact Form 7 reCAPTCHA allows Cross Site Request For… | Medium (4.3) | 2025-07-04 | General-Purpose |
| CVE-2024-9453 | A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially … | Medium (6.5) | 2025-07-04 | General-Purpose |
| CVE-2025-6673 | The Easy restaurant menu manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's nsc… | Medium (6.4) | 2025-07-04 | General-Purpose |
| CVE-2025-53600 | Whale browser before 4.32.315.22 allow an attacker to bypass the Same-Origin Policy in a dual-tab environment. | High (7.5) | 2025-07-04 | General-Purpose |
| CVE-2024-11937 | The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's lin… | Medium (6.4) | 2025-07-04 | General-Purpose |