Latest CVE Feed
-
4.2
MEDIUMCVE-2022-29127
BitLocker Security Feature Bypass Vulnerability... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +14 more products- Published: May. 10, 2022
- Modified: Jan. 02, 2025
-
4.2
MEDIUMCVE-2022-39404
Vulnerability in the MySQL Installer product of Oracle MySQL (component: Installer: General). Supported versions that are affected are 1.6.3 and prior. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure wher... Read more
- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-42795
An Incorrect Access Control vulnerability was found in /music/view_user.php?id=3 and /music/controller.php?page=edit_user&id=3 in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to view valid user details.... Read more
Affected Products : music_management_system- Published: Sep. 16, 2024
- Modified: Apr. 28, 2025
-
4.2
MEDIUMCVE-2019-11360
A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.... Read more
Affected Products : iptables- Published: Jul. 12, 2019
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2025-26603
Vim is a greatly improved version of the good old UNIX editor Vi. Vim allows to redirect screen messages using the `:redir` ex command to register, variables and files. It also allows to show the contents of registers using the `:registers` or `:display` ... Read more
- Published: Feb. 18, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption
-
4.2
MEDIUMCVE-2019-12762
Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.... Read more
Affected Products : mi_5s_plus_firmware xperia_z4_firmware galaxy_s6_edge_firmware galaxy_s4_firmware nexus_7_firmware nexus_9_firmware aquos_zeta_sh-04f_firmware arrows_nx_f05-f_firmware nexus_7 galaxy_s4 +6 more products- Published: Jun. 06, 2019
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2025-23377
Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script... Read more
Affected Products : powerprotect_data_manager- Published: Apr. 28, 2025
- Modified: May. 13, 2025
- Vuln Type: Cross-Site Scripting
-
4.2
MEDIUMCVE-2021-33881
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific ap... Read more
- Published: Jun. 06, 2021
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-7501
The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.7. This is due to missing or incorrect nonce validation on the download_theme() function. This... Read more
Affected Products :- Published: Aug. 16, 2024
- Modified: Aug. 19, 2024
-
4.2
MEDIUMCVE-2022-20541
In phNxpNciHal_ioctl of phNxpNciHal.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation.Product: And... Read more
Affected Products : android- Published: Dec. 16, 2022
- Modified: Apr. 21, 2025
-
4.2
MEDIUMCVE-2021-37436
Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor ma... Read more
- Published: Jul. 24, 2021
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2025-6707
Under certain conditions, an authenticated user request may execute with stale privileges following an intentional change by an authorized administrator. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to ... Read more
Affected Products : mongodb- Published: Jun. 26, 2025
- Modified: Jun. 26, 2025
- Vuln Type: Authorization
-
4.2
MEDIUMCVE-2025-58067
Basecamp's Google Sign-In adds Google sign-in to Rails applications. Prior to version 1.3.1, it is possible to redirect a user to another origin if the "proceed_to" value in the session store is set to a protocol-relative URL. Normally the value of this U... Read more
Affected Products :- Published: Aug. 29, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Misconfiguration
-
4.2
MEDIUMCVE-2025-23301
NVIDIA HGX and DGX contain a vulnerability where a misconfiguration of the VBIOS could enable an attacker to set an unsafe debug access level. A successful exploit of this vulnerability might lead to denial of service.... Read more
Affected Products :- Published: Sep. 04, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Misconfiguration
-
4.2
MEDIUMCVE-2022-27893
The Foundry Magritte plugin osisoft-pi-web-connector versions 0.15.0 - 0.43.0 was found to be logging in a manner that captured authentication requests. This vulnerability is resolved in osisoft-pi-web-connector version 0.44.0.... Read more
Affected Products : osisoft-pi-web-connector- Published: Nov. 04, 2022
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2023-25758
Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not ... Read more
- Published: Feb. 14, 2023
- Modified: Mar. 20, 2025
-
4.2
MEDIUMCVE-2024-37816
Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack overflow.... Read more
Affected Products :- Published: Nov. 27, 2024
- Modified: Nov. 27, 2024
-
4.2
MEDIUMCVE-2024-12369
A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization c... Read more
Affected Products :- Published: Dec. 09, 2024
- Modified: Apr. 17, 2025
-
4.2
MEDIUMCVE-2024-41597
Cross Site Request Forgery vulnerability in ProcessWire v.3.0.229 allows a remote attacker to execute arbitrary code via a crafted HTML file to the comments functionality.... Read more
Affected Products : processwire- Published: Jul. 19, 2024
- Modified: Jul. 09, 2025
-
4.2
MEDIUMCVE-2024-11197
The Lock User Account plugin for WordPress is vulnerable to user lock bypass in all versions up to, and including, 1.0.5. This is due to permitting application password logins when user accounts are locked. This makes it possible for authenticated attacke... Read more
Affected Products : lock_user_account- Published: Nov. 21, 2024
- Modified: Nov. 21, 2024