General-Purpose System Vulnerabilities
Vulnerabilities related to traditional IT systems, servers, and desktop applications.
CVE ID | Description | Severity | Published | Type |
---|---|---|---|---|
CVE-2025-34106 | A buffer overflow vulnerability exists in PDF Shaper versions 3.5 and 3.6 when converting a crafted PDF file to an imag… | Unknown | 2025-07-15 | General-Purpose |
CVE-2025-34105 | A stack-based buffer overflow vulnerability exists in the built-in web interface of DiskBoss Enterprise versions 7.4.28… | Unknown | 2025-07-15 | General-Purpose |
CVE-2025-34104 | An authenticated remote code execution vulnerability exists in Piwik (now Matomo) versions prior to 3.0.3 via the plugi… | Unknown | 2025-07-15 | General-Purpose |
CVE-2025-7667 | The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and in… | High (8.1) | 2025-07-15 | General-Purpose |
CVE-2025-4369 | The Companion Auto Update plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘update_delay_days’… | Medium (5.5) | 2025-07-15 | General-Purpose |