Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
0.0 NA
CVE-2026-8758 — Metasoft 美特软件 MetaCRM upload3.jsp unrestricted upload

A vulnerability was determined in Metasoft 美特软件 MetaCRM up to 6.4.0 Beta06. This impacts an unknown function of the file /common/jsp/upload3.jsp. Executing a manipulation of the argument File can lea…

| Misconfiguration
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
7.5 HIGH
CVE-2026-8756 — fishaudio Bert-VITS2 Gradio webui_preprocess.py generate_config path traversal

A vulnerability has been found in fishaudio Bert-VITS2 up to 8f7fbd8c4770965225d258db548da27dc8dd934c. The impacted element is the function generate_config of the file webui_preprocess.py of the comp…

Remote | Path Traversal
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
7.5 HIGH
CVE-2026-8755 — fishaudio Bert-VITS2 Model hiyoriUI.py _get_all_models path traversal

A flaw has been found in fishaudio Bert-VITS2 up to 8f7fbd8c4770965225d258db548da27dc8dd934c. The affected element is the function _get_all_models of the file hiyoriUI.py of the component Model Handl…

Remote | Path Traversal
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
6.5 MEDIUM
CVE-2026-8754 — AstrBotDevs AstrBot File Upload chat.py post_file path traversal

A vulnerability was detected in AstrBotDevs AstrBot up to 4.23.5. Impacted is the function post_file of the file astrbot/dashboard/routes/chat.py of the component File Upload Handler. The manipulatio…

Remote | Path Traversal
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
6.5 MEDIUM
CVE-2026-8753 — kalcaddle Kodbox fileThumb Plugin VideoResize.class.php parseVideoInfo command injection

A security vulnerability has been detected in kalcaddle Kodbox up to 1.64. This issue affects the function parseVideoInfo of the file /workspace/source-code/plugins/fileThumb/lib/VideoResize.class.ph…

Remote | Injection
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.8 HIGH
CVE-2018-25339 — Zechat 1.5 SQL Injection via v parameter (time-based blind)

Zechat 1.5 contains a SQL injection vulnerability in the v parameter that allows unauthenticated attackers to extract database information using time-based blind techniques. Attackers can exploit the…

Remote | Injection
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.8 HIGH
CVE-2018-25338 — Zechat 1.5 SQL Injection via hashtag parameter

Zechat 1.5 contains a SQL injection vulnerability in the hashtag parameter that allows unauthenticated attackers to extract database information using union-based techniques. Attackers can exploit th…

Remote | Injection
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
5.3 MEDIUM
CVE-2018-25337 — Joomla JoomOCShop 1.0 Cross-Site Request Forgery

Joomla JoomOCShop 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions on behalf of authenticated users. Attackers can craft malicious HTML fo…

Remote | Cross-Site Request Forgery
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
6.9 MEDIUM
CVE-2018-25336 — Joomla jCart for OpenCart 2.3.0.2 Cross-Site Request Forgery

Joomla jCart for OpenCart 2.3.0.2 contains a cross-site request forgery vulnerability that allows attackers to modify user account information without authentication. Attackers can craft malicious HT…

Remote | Cross-Site Request Forgery
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
9.8 CRITICAL
CVE-2018-25335 — WordPress Plugin Peugeot Music 1.0 Arbitrary File Upload

WordPress Plugin Peugeot Music 1.0 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the upload.php endpoint.…

Remote | Misconfiguration
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
5.4 MEDIUM
CVE-2018-25334 — Zechat 1.5 Cross-Site Request Forgery (CSRF) via hashtag parameter

Zechat 1.5 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to change a user's information by bypassing anti-CSRF protections. The application uses a CSRF token, but…

Remote | Cross-Site Request Forgery
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.8 HIGH
CVE-2018-25333 — Nordex N149/4.0-4.5 Wind Turbine Web Server SQL Injection

Nordex N149/4.0-4.5 Wind Turbine Web Server 4.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the …

Remote | Injection
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
9.8 CRITICAL
CVE-2018-25332 — GitBucket 4.23.1 Unauthenticated Remote Code Execution

GitBucket 4.23.1 contains an unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands by exploiting weak secret token generation and insecure file uploa…

Remote | Injection
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
6.1 MEDIUM
CVE-2018-25331 — Zenar Content Management System Cross-Site Scripting via ajax.php

Zenar Content Management System contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating form parameters in POST requests. Attac…

Remote | Cross-Site Scripting
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.8 HIGH
CVE-2018-25330 — Joomla! EkRishta 2.10 Persistent XSS and SQL Injection

Joomla! extension EkRishta 2.10 contains persistent cross-site scripting and SQL injection vulnerabilities that allow attackers to inject malicious code through profile fields and POST parameters. At…

Remote | Cross-Site Scripting
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.7 HIGH
CVE-2018-25329 — WordPress Plugin WP with Spritz 1.0 Remote File Inclusion

WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attack…

Remote | Path Traversal
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.6 HIGH
CVE-2018-25328 — VX Search 10.6.18 Local Buffer Overflow via Directory Field

VX Search 10.6.18 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying an oversized string in the directory field. Attackers can craf…

| Memory Corruption
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
6.9 MEDIUM
CVE-2018-25327 — Joomla! Component Js Jobs 1.2.0 Cross-Site Request Forgery

Joomla! Component Js Jobs 1.2.0 contains a cross-site request forgery vulnerability that allows attackers to perform state-changing actions without token validation. Attackers can craft malicious HTM…

Remote | Cross-Site Request Forgery
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.7 HIGH
CVE-2018-25326 — Google Drive for WordPress 2.2 Path Traversal RCE via gdrive-ajaxs.php

Google Drive for WordPress 2.2 contains a path traversal vulnerability that allows unauthenticated attackers to read arbitrary files by injecting directory traversal sequences in the file_name parame…

Remote | Path Traversal
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
8.7 HIGH
CVE-2018-25325 — Woocommerce CSV Importer 3.3.6 Path Traversal File Deletion

Woocommerce CSV Importer 3.3.6 contains a path traversal vulnerability that allows any registered user to delete arbitrary files by submitting unescaped filenames through the delete_export_file AJAX …

Remote | Path Traversal
May 17, 2026 May 17, 2026
May 17, 2026
May 17, 2026
Showing 20 of 6242 Results