Latest CVE Feed
-
7.2
HIGHCVE-2025-53744
An incorrect privilege assignment vulnerability [CWE-266] in FortiOS Security Fabric version 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.0 all versions, 6.4 all versions, may allow a remote authenticated attacker with high privileges to ... Read more
Affected Products : fortios- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
-
8.1
HIGHCVE-2025-52970
A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device an... Read more
Affected Products : fortiweb- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
-
7.2
HIGHCVE-2025-49813
An improper neutralization of special elements used in an OS Command ("OS Command Injection") vulnerability [CWE-78] in Fortinet FortiADC version 7.2.0 and before 7.1.1 allows a remote and authenticated attacker with low privilege to execute unauthorized ... Read more
Affected Products : fortiadc- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
-
6.7
MEDIUMCVE-2025-47857
A improper neutralization of special elements used in an os command ('os command injection') vulnerability [CWE-78] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or command via... Read more
Affected Products : fortiweb- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
-
6.5
MEDIUMCVE-2025-32932
An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR version 7.6.1 and below, version 7.5.1 and below, 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all v... Read more
Affected Products : fortisoar- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
-
7.5
HIGHCVE-2025-8800
A vulnerability has been found in Open5GS up to 2.7.5. Affected by this issue is the function esm_handle_pdn_connectivity_request of the file src/mme/esm-handler.c of the component AMF Component. The manipulation leads to denial of service. The attack may... Read more
Affected Products : open5gs- Published: Aug. 10, 2025
- Modified: Aug. 15, 2025
-
4.3
MEDIUMCVE-2025-8452
By using the "uscan" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described b... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
-
7.5
HIGHCVE-2021-27923
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.... Read more
- EPSS Score: %0.60
- Published: Mar. 03, 2021
- Modified: Aug. 15, 2025
-
7.5
HIGHCVE-2021-27922
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.... Read more
- EPSS Score: %0.35
- Published: Mar. 03, 2021
- Modified: Aug. 15, 2025
-
7.5
HIGHCVE-2021-27921
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.... Read more
- EPSS Score: %0.60
- Published: Mar. 03, 2021
- Modified: Aug. 15, 2025
-
7.8
HIGHCVE-2025-21756
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during conne... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Aug. 14, 2025
-
8.8
HIGHCVE-2021-20087
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam 0.5.1 allows a malicious user to inject properties into Object.prototype.... Read more
Affected Products : jquery-deparam- EPSS Score: %1.79
- Published: Apr. 23, 2021
- Modified: Aug. 14, 2025
-
4.7
MEDIUMCVE-2020-9295
FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below and FortiClient 6.2 running AV engine version 6.00137 and below may not immediately detect certain types of malformed or non-standard RAR arch... Read more
- Published: Mar. 17, 2025
- Modified: Aug. 14, 2025
-
5.4
MEDIUMCVE-2024-54951
Monica 4.1.2 is vulnerable to Cross Site Scripting (XSS). A malicious user can create a malformed contact and use that contact in the "HOW YOU MET" customization options to trigger the XSS.... Read more
Affected Products : monica- Published: Feb. 13, 2025
- Modified: Aug. 14, 2025
-
5.4
MEDIUMCVE-2024-57329
HortusFox v3.9 contains a stored XSS vulnerability in the "Add Plant" function. The name input field does not sanitize or escape user inputs, allowing attackers to inject and execute arbitrary JavaScript payloads.... Read more
Affected Products : hortusfox- Published: Jan. 23, 2025
- Modified: Aug. 14, 2025
-
5.3
MEDIUMCVE-2025-36034
IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques.... Read more
Affected Products : infosphere_information_server- Published: Jun. 26, 2025
- Modified: Aug. 14, 2025
-
7.1
HIGHCVE-2025-49321
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arraytics Eventin allows Reflected XSS. This issue affects Eventin: from n/a through 4.0.28.... Read more
Affected Products : eventin- Published: Jun. 27, 2025
- Modified: Aug. 14, 2025
-
4.8
MEDIUMCVE-2025-36582
Dell NetWorker, versions 19.12.0.1 and prior, contains a Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to I... Read more
Affected Products : networker- Published: Jul. 01, 2025
- Modified: Aug. 14, 2025
-
9.8
CRITICALCVE-2025-45872
zrlog v3.1.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the downloadUrl parameter.... Read more
Affected Products : zrlog- Published: Jul. 01, 2025
- Modified: Aug. 14, 2025
-
9.1
CRITICALCVE-2025-53632
Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authen... Read more
Affected Products : chall-manager- Published: Jul. 10, 2025
- Modified: Aug. 14, 2025