Latest CVE Feed
-
3.5
LOWCVE-2025-49000
InvenTree is an Open Source Inventory Management System. Prior to version 0.17.13, the skip field in the built-in `label-sheet` plugin lacks an upper bound, so a large value forces the server to allocate an enormous Python list. This lets any authenticate... Read more
Affected Products : inventree- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Denial of Service
-
4.1
MEDIUMCVE-2025-48710
kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and r... Read more
Affected Products :- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-4435
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would s... Read more
Affected Products : python- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Misconfiguration
-
8.2
HIGHCVE-2024-53021
Information disclosure may occur while processing goodbye RTCP packet from network.... Read more
Affected Products :- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Information Disclosure
-
8.9
HIGHCVE-2025-1701
CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The... Read more
Affected Products :- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authentication
-
5.2
MEDIUMCVE-2025-20987
Improper access control in fingerprint trustlet prior to SMR May-2025 Release 1 allows local privileged attackers to get a auth_token.... Read more
Affected Products :- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authentication
-
5.5
MEDIUMCVE-2025-20986
Improper access control in ScreenCapture for Galaxy Watch prior to SMR Jun-2025 Release 1 allows local attackers to take screenshots.... Read more
Affected Products :- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authorization
-
4.9
MEDIUMCVE-2025-20995
Improper handling of insufficient permission in ClientProvider in Samsung Internet installed on non-Samsung Device prior to version 28.0.0.59 allows local attackers to read and write arbitrary files.... Read more
Affected Products : internet- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-30360
webpack-dev-server allows users to use webpack with a development server that provides live reloading. Prior to version 5.2.1, webpack-dev-server users' source code may be stolen when you access a malicious web site with non-Chromium based browser. The `O... Read more
Affected Products : webpack-dev-server- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Information Disclosure
-
7.3
HIGHCVE-2025-35036
Hibernate Validator before 6.2.0 and 7.0.0, by default and depending how it is used, may interpolate user-supplied input in a constraint violation message with Expression Language. This could allow an attacker to access sensitive information or execute ar... Read more
Affected Products :- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Information Disclosure
-
6.4
MEDIUMCVE-2025-3919
The WordPress Comments Import & Export plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_settings function in all versions up to, and including, 2.4.3. Additionally, the plugin fails to p... Read more
Affected Products : wordpress_comments_import_and_export- Published: Jun. 02, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authentication
-
7.3
HIGHCVE-2025-46355
Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker.... Read more
Affected Products :- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Misconfiguration
-
7.3
HIGHCVE-2024-31127
An improper verification of a loaded library in Zscaler Client Connector on Mac < 4.2.0.241 may allow a local attacker to elevate their privileges.... Read more
Affected Products : client_connector- Published: Jun. 04, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-49069
Cross-Site Request Forgery (CSRF) vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Cross Site Request Forgery.This issue affects Contact Forms by Cimatti: from n/a through 1.9.8.... Read more
Affected Products : wordpress_contact_forms- Published: Jun. 02, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.3
MEDIUMCVE-2025-48996
HAX open-apis provides microservice apis for HAX webcomponents repo that are shared infrastructure calls. An unauthenticated information disclosure vulnerability exists in the Penn State University deployment of the HAX content management system via the `... Read more
- Published: Jun. 02, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Information Disclosure
-
6.4
MEDIUMCVE-2025-49162
Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename.... Read more
Affected Products :- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Misconfiguration
-
4.3
MEDIUMCVE-2025-4047
The Broken Link Checker plugin for WordPress is vulnerable to unauthorized data access due to a missing capability check on the ajax_full_status and ajax_dashboard_status functions in all versions up to, and including, 2.4.4. This makes it possible for au... Read more
Affected Products : broken_link_checker- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-4797
The Golo - City Travel Guide WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.7.0. This is due to the plugin not properly validating a user's identity prior to setting a... Read more
Affected Products : golo- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Authentication
-
6.6
MEDIUMCVE-2024-53015
Memory corruption while processing IOCTL command to handle buffers associated with a session.... Read more
Affected Products :- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Memory Corruption
-
8.2
HIGHCVE-2024-53026
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.... Read more
Affected Products :- Published: Jun. 03, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Information Disclosure