Latest CVE Feed
-
4.1
MEDIUMCVE-2025-31326
SAP�BusinessObjects Business�Intelligence Platform (Web Intelligence) is vulnerable to HTML Injection, allowing an attacker with basic user privileges to inject malicious code into specific input fields. This could lead to unintended redirects or manipula... Read more
Affected Products :- Published: Jul. 08, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Cross-Site Scripting
-
4.1
MEDIUMCVE-2024-52514
Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwa... Read more
Affected Products : notes- Published: Nov. 15, 2024
- Modified: Nov. 18, 2024
-
4.1
MEDIUMCVE-2021-39727
In eicPresentationRetrieveEntryValue of acropora/app/identity/libeic/EicPresentation.c, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with System execution privileges needed. User inter... Read more
Affected Products : android- Published: Mar. 16, 2022
- Modified: Nov. 21, 2024
-
4.1
MEDIUMCVE-2023-52720
Race condition vulnerability in the soundtrigger module Impact: Successful exploitation of this vulnerability will affect availability.... Read more
- Published: May. 14, 2024
- Modified: Dec. 09, 2024
-
4.1
MEDIUMCVE-2025-32358
In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automat... Read more
Affected Products : zammad- Published: Apr. 05, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Server-Side Request Forgery
-
4.1
MEDIUMCVE-2025-32019
Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Versions 2.11.2 and below, as well as versions 2.12.0-rc1 and 2.13.0-rc1, contain a vulnerability where the markdown field in the info tab page can be ex... Read more
Affected Products : harbor- Published: Jul. 23, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Cross-Site Scripting
-
4.1
MEDIUMCVE-2025-6838
The Broken Link Notifier plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 1.3.0 via broken links that are later exported. This makes it possible for authenticated attackers, with Contributor-level access and above,... Read more
Affected Products : broken_link_notifier- Published: Jul. 11, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Injection
-
4.1
MEDIUMCVE-2024-49822
IBM QRadar Advisor 1.0.0 through 2.6.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.... Read more
- Published: Mar. 18, 2025
- Modified: Aug. 14, 2025
- Vuln Type: Server-Side Request Forgery
-
4.1
MEDIUMCVE-2025-48710
kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and r... Read more
Affected Products :- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authentication
-
4.0
MEDIUMCVE-2025-48708
gs_lib_ctx_stash_sanitized_arg in base/gslibctx.c in Artifex Ghostscript before 10.05.1 lacks argument sanitization for the # case. A created PDF document includes its password in cleartext.... Read more
Affected Products : ghostscript- Published: May. 23, 2025
- Modified: Jun. 20, 2025
- Vuln Type: Information Disclosure
-
4.0
MEDIUMCVE-2025-32365
Poppler before 25.04.0 allows crafted input files to trigger out-of-bounds reads in the JBIG2Bitmap::combine function in JBIG2Stream.cc because of a misplaced isOk check.... Read more
Affected Products : poppler- Published: Apr. 05, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Memory Corruption
-
4.0
MEDIUMCVE-2025-48432
An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead t... Read more
Affected Products : django- Published: Jun. 05, 2025
- Modified: Jun. 10, 2025
- Vuln Type: Information Disclosure
-
4.0
MEDIUMCVE-2025-53175
Stack overflow risk when vector images are parsed during file preview Impact: Successful exploitation of this vulnerability may affect the file preview function.... Read more
Affected Products : harmonyos- Published: Jul. 07, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Memory Corruption
-
4.0
MEDIUMCVE-2025-53172
Stack overflow risk when vector images are parsed during file preview Impact: Successful exploitation of this vulnerability may affect the file preview function.... Read more
Affected Products : harmonyos- Published: Jul. 07, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Memory Corruption
-
4.0
MEDIUMCVE-2025-32094
An issue was discovered in Akamai Ghost, as used for the Akamai CDN platform before 2025-03-26. Under certain circumstances, a client making an HTTP/1.x OPTIONS request with an "Expect: 100-continue" header, and using obsolete line folding, can lead to a ... Read more
Affected Products : akamaighost- Published: Aug. 07, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Misconfiguration
-
4.0
MEDIUMCVE-2025-48929
The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Authentication
-
4.0
MEDIUMCVE-2006-2925
Cross-site scripting (XSS) vulnerability in the web interface in Ingate Firewall before 4.4.1 and SIParator before 4.4.1 allows remote attackers to inject arbitrary web script or HTML, and steal cookies, via unspecified vectors related to "XSS exploits" i... Read more
- Published: Jun. 09, 2006
- Modified: Apr. 03, 2025
-
4.0
MEDIUMCVE-2025-32460
GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call.... Read more
Affected Products : graphicsmagick- Published: Apr. 09, 2025
- Modified: Apr. 09, 2025
- Vuln Type: Memory Corruption
-
4.0
MEDIUMCVE-2025-49087
In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.... Read more
- Published: Jul. 20, 2025
- Modified: Aug. 07, 2025
- Vuln Type: Cryptography
-
4.0
MEDIUMCVE-2025-22413
In multiple functions of hyp-main.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation... Read more
Affected Products : android- Published: Aug. 26, 2025
- Modified: Sep. 02, 2025
- Vuln Type: Information Disclosure