Latest CVE Feed
-
4.2
MEDIUMCVE-2025-55013
The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the se... Read more
Affected Products :- Published: Aug. 09, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Path Traversal
-
4.2
MEDIUMCVE-2024-21066
Vulnerability in the RDBMS component of Oracle Database Server. Supported versions that are affected are 19.3-19.22 and 21.3-21.13. Easily exploitable vulnerability allows high privileged attacker having Authenticated User privilege with logon to the in... Read more
- Published: Apr. 16, 2024
- Modified: Jun. 18, 2025
-
4.2
MEDIUMCVE-2025-6088
In version 0.7.8 of danny-avila/librechat, improper authorization controls in the conversation sharing feature allow unauthorized access to other users' conversations if the conversation ID is known. Although UUIDv4 conversation IDs are generated server-s... Read more
Affected Products : librechat- Published: Sep. 11, 2025
- Modified: Sep. 11, 2025
- Vuln Type: Authorization
-
4.2
MEDIUMCVE-2024-26023
OS command injection vulnerability in BUFFALO wireless LAN routers allows a logged-in user to execute arbitrary OS commands.... Read more
Affected Products : wsr-2533dhp2_firmware wsr-a2533dhp2_firmware wsr-2533dhp_firmware wsr-2533dhpl_firmware wcr-1166ds_firmware wcr-1166ds wsr-2533dhp2 wsr-a2533dhp2 wsr-2533dhp wsr-2533dhpl +4 more products- Published: Apr. 15, 2024
- Modified: Jun. 30, 2025
-
4.2
MEDIUMCVE-2024-45678
Yubico YubiKey 5 Series devices with firmware before 5.7.0 and YubiHSM 2 devices with firmware before 2.4.0 allow an ECDSA secret-key extraction attack (that requires physical access and expensive equipment) in which an electromagnetic side channel is pre... Read more
Affected Products : yubikey_5_nfc_firmware yubikey_5c_nfc_firmware yubikey_5c_nfc yubikey_5_nfc yubikey_5c_firmware yubikey_5c yubikey_5_nano_firmware yubikey_5_nano yubikey_5c_nano_firmware yubikey_5c_nano +26 more products- Published: Sep. 03, 2024
- Modified: Mar. 17, 2025
-
4.2
MEDIUMCVE-2024-23461
An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS during the upgrade process may allow a Local Execution of Code.This issue affects Client Connector on MacOS: before 3.4. ... Read more
Affected Products : client_connector- Published: May. 02, 2024
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-37386
An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. Certain manipulations allow restarting in single-user mode despite the activation of secure boot. The following versions fix this: 4.3.27, ... Read more
Affected Products : stormshield_network_security- Published: Jul. 15, 2024
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-32877
Yii 2 is a PHP application framework. During internal penetration testing of a product based on Yii2, users discovered a Cross-site Scripting (XSS) vulnerability within the framework itself. This issue is relevant for the latest version of Yii2 (2.0.49.3)... Read more
Affected Products : yii- Published: May. 30, 2024
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2017-8754
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to trick a user into loading a page containing malicious content, due to the way that the Edge Content Security Policy (CSP) validates certain specia... Read more
- Published: Sep. 13, 2017
- Modified: Apr. 20, 2025
-
4.2
MEDIUMCVE-2024-7096
A privilege escalation vulnerability exists in multiple [Vendor Name] products due to a business logic flaw in SOAP admin services. A malicious actor can create a new user with elevated permissions only when all of the following conditions are met: * S... Read more
Affected Products :- Published: May. 30, 2025
- Modified: May. 30, 2025
- Vuln Type: Authorization
-
4.2
MEDIUMCVE-2025-49193
The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected ma... Read more
Affected Products :- Published: Jun. 12, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Misconfiguration
-
4.2
MEDIUMCVE-2025-2571
Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to clear Google OAuth credentials when converting user accounts to bot accounts, allowing attackers to gain unauthorized access to bot accounts via the Google... Read more
Affected Products : mattermost_server- Published: May. 30, 2025
- Modified: May. 30, 2025
- Vuln Type: Authentication
-
4.2
MEDIUMCVE-2025-27435
Under specific conditions and prerequisites, an unauthenticated attacker could access customer coupon codes exposed in the URL parameters of the Coupon Campaign URL in SAP Commerce. This could allow the attacker to use the disclosed coupon code, hence pos... Read more
Affected Products : commerce_cloud- Published: Apr. 08, 2025
- Modified: Apr. 08, 2025
- Vuln Type: Information Disclosure
-
4.2
MEDIUMCVE-2025-24363
The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.8.9, in CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise se... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
- Vuln Type: Information Disclosure
-
4.2
MEDIUMCVE-2023-42757
Process Explorer before 17.04 allows attackers to make it functionally unavailable (a denial of service for analysis) by renaming an executable file to a new extensionless 255-character name and launching it with NtCreateUserProcess. This can occur throug... Read more
Affected Products :- Published: May. 07, 2024
- Modified: Mar. 26, 2025
-
4.2
MEDIUMCVE-2018-12332
Incomplete Cleanup vulnerability in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to compromise authentication and encryption keys via a compromised host PC after a reset.... Read more
- Published: Jun. 17, 2018
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-6476
Gee-netics, member of the AXIS Camera Station Pro Bug Bounty Program has found that it is possible for a non-admin user to gain system privileges by redirecting a file deletion upon service restart. Axis has released patched versions for the highlighted... Read more
Affected Products :- Published: Nov. 26, 2024
- Modified: Nov. 26, 2024
-
4.2
MEDIUMCVE-2020-14560
Vulnerability in the Oracle Hyperion BI+ product of Oracle Hyperion (component: UI and Visualization). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to c... Read more
- Published: Jul. 15, 2020
- Modified: Nov. 21, 2024
-
4.2
MEDIUMCVE-2024-21808
Improper buffer restrictions in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.... Read more
Affected Products :- Published: Nov. 13, 2024
- Modified: Nov. 15, 2024
-
4.2
MEDIUMCVE-2024-28162
In Jenkins Delphix Plugin 3.0.1 through 3.1.0 (both inclusive) a global option for administrators to enable or disable SSL/TLS certificate validation for Data Control Tower (DCT) connections fails to take effect until Jenkins is restarted when switching f... Read more
Affected Products : delphix- Published: Mar. 06, 2024
- Modified: May. 07, 2025