Latest CVE Feed
-
4.2
MEDIUMCVE-2025-21553
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.25, 21.3-21.16 and 23.4-23.6. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure pr... Read more
- Published: Jan. 21, 2025
- Modified: Jun. 23, 2025
- Vuln Type: Authorization
-
4.2
MEDIUMCVE-2018-12038
An issue was discovered on Samsung 840 EVO devices. Vendor-specific commands may allow access to the disk-encryption key.... Read more
- Published: Nov. 20, 2018
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2020-14546
Vulnerability in the Hyperion Financial Close Management product of Oracle Hyperion (component: Close Manager). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via ... Read more
Affected Products : hyperion_financial_close_management- Published: Jul. 15, 2020
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2019-12762
Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.... Read more
Affected Products : mi_5s_plus_firmware xperia_z4_firmware galaxy_s6_edge_firmware galaxy_s4_firmware nexus_7_firmware nexus_9_firmware aquos_zeta_sh-04f_firmware arrows_nx_f05-f_firmware nexus_7 galaxy_s4 +6 more products- Published: Jun. 06, 2019
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2025-31929
A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (All versions), IEC 1Ph 7.4kW Child socket/ shutter (8EM1310-2EN04-0GA0) (All versions), IEC 1Ph 7.4kW Parent cable 7m (8EM1310-2EJ04-3GA1) (All versions), IEC 1Ph 7.4k... Read more
Affected Products :- Published: May. 13, 2025
- Modified: May. 13, 2025
- Vuln Type: Authentication
-
4.2
MEDIUMCVE-2024-2260
A session fixation vulnerability exists in the zenml-io/zenml application, where JWT tokens used for user authentication are not invalidated upon logout. This flaw allows an attacker to bypass authentication mechanisms by reusing a victim's JWT token.... Read more
Affected Products : zenml- Published: Apr. 16, 2024
- Modified: Jun. 12, 2025
-
4.2
MEDIUMCVE-2025-23377
Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script... Read more
Affected Products : powerprotect_data_manager- Published: Apr. 28, 2025
- Modified: May. 13, 2025
- Vuln Type: Cross-Site Scripting
-
4.2
MEDIUMCVE-2024-36036
Zoho ManageEngine ADAudit Plus versions 7260 and below allows unauthorized local agent machine users to access sensitive information and modifying the agent configuration.... Read more
Affected Products : manageengine_adaudit_plus- Published: May. 27, 2024
- Modified: May. 16, 2025
-
4.2
MEDIUMCVE-2024-41597
Cross Site Request Forgery vulnerability in ProcessWire v.3.0.229 allows a remote attacker to execute arbitrary code via a crafted HTML file to the comments functionality.... Read more
Affected Products : processwire- Published: Jul. 19, 2024
- Modified: Jul. 09, 2025
-
4.2
MEDIUMCVE-2020-2563
Vulnerability in the Hyperion Financial Close Management product of Oracle Hyperion (component: Close Manager). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via ... Read more
Affected Products : hyperion_financial_close_management- Published: Jan. 15, 2020
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-33009
SAP Global Label Management is vulnerable to SQL injection. On exploitation the attacker can use specially crafted inputs to modify database commands resulting in the retrieval of additional information persisted by the system. This could lead to low impa... Read more
Affected Products :- Published: May. 14, 2024
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2019-2797
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to ... Read more
- Published: Jul. 23, 2019
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2021-3047
A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability to observe their own authentication secrets over a lon... Read more
Affected Products : pan-os- Published: Aug. 11, 2021
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2017-0135
Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka "Microsoft Edge Security Feature Bypass Vulnerability." This vulnerability is different from those described in CVE-2017-0066 and CVE-2... Read more
Affected Products : edge- Published: Mar. 17, 2017
- Modified: Apr. 20, 2025
-
4.2
MEDIUMCVE-2024-12369
A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization c... Read more
Affected Products :- Published: Dec. 09, 2024
- Modified: Apr. 17, 2025
-
4.2
MEDIUMCVE-2020-14764
Vulnerability in the Hyperion Planning product of Oracle Hyperion (component: Application Development Framework). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access vi... Read more
Affected Products : hyperion_planning- Published: Oct. 21, 2020
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2025-26708
There is a configuration defect vulnerability in ZTELink 5.4.9 for iOS. This vulnerability is caused by a flaw in the WiFi parameter configuration of the ZTELink. An attacker can obtain unauthorized access to the WiFi service.... Read more
Affected Products :- Published: Mar. 07, 2025
- Modified: Mar. 07, 2025
- Vuln Type: Misconfiguration
-
4.2
MEDIUMCVE-2024-55159
GFast between v2 to v3.2 was discovered to contain a SQL injection vulnerability via the SortName parameter at /system/loginLog/list.... Read more
Affected Products :- Published: Feb. 21, 2025
- Modified: Mar. 12, 2025
- Vuln Type: Injection
-
4.2
MEDIUMCVE-2014-3591
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuatio... Read more
- Published: Nov. 29, 2019
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2025-26603
Vim is a greatly improved version of the good old UNIX editor Vi. Vim allows to redirect screen messages using the `:redir` ex command to register, variables and files. It also allows to show the contents of registers using the `:registers` or `:display` ... Read more
- Published: Feb. 18, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption