Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.2

    HIGH
    CVE-2025-53744

    An incorrect privilege assignment vulnerability [CWE-266] in FortiOS Security Fabric version 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.0 all versions, 6.4 all versions, may allow a remote authenticated attacker with high privileges to ... Read more

    Affected Products : fortios
    • Published: Aug. 12, 2025
    • Modified: Aug. 15, 2025
  • 8.1

    HIGH
    CVE-2025-52970

    A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device an... Read more

    Affected Products : fortiweb
    • Published: Aug. 12, 2025
    • Modified: Aug. 15, 2025
  • 7.2

    HIGH
    CVE-2025-49813

    An improper neutralization of special elements used in an OS Command ("OS Command Injection") vulnerability [CWE-78] in Fortinet FortiADC version 7.2.0 and before 7.1.1 allows a remote and authenticated attacker with low privilege to execute unauthorized ... Read more

    Affected Products : fortiadc
    • Published: Aug. 12, 2025
    • Modified: Aug. 15, 2025
  • 6.7

    MEDIUM
    CVE-2025-47857

    A improper neutralization of special elements used in an os command ('os command injection') vulnerability [CWE-78] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or command via... Read more

    Affected Products : fortiweb
    • Published: Aug. 12, 2025
    • Modified: Aug. 15, 2025
  • 6.5

    MEDIUM
    CVE-2025-32932

    An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR version 7.6.1 and below, version 7.5.1 and below, 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all v... Read more

    Affected Products : fortisoar
    • Published: Aug. 12, 2025
    • Modified: Aug. 15, 2025
  • 7.5

    HIGH
    CVE-2025-8800

    A vulnerability has been found in Open5GS up to 2.7.5. Affected by this issue is the function esm_handle_pdn_connectivity_request of the file src/mme/esm-handler.c of the component AMF Component. The manipulation leads to denial of service. The attack may... Read more

    Affected Products : open5gs
    • Published: Aug. 10, 2025
    • Modified: Aug. 15, 2025
  • 4.3

    MEDIUM
    CVE-2025-8452

    By using the "uscan" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described b... Read more

    Affected Products :
    • Published: Aug. 12, 2025
    • Modified: Aug. 15, 2025
  • 7.5

    HIGH
    CVE-2021-27923

    Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.... Read more

    Affected Products : fedora pillow
    • EPSS Score: %0.60
    • Published: Mar. 03, 2021
    • Modified: Aug. 15, 2025
  • 7.5

    HIGH
    CVE-2021-27922

    Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.... Read more

    Affected Products : fedora pillow
    • EPSS Score: %0.35
    • Published: Mar. 03, 2021
    • Modified: Aug. 15, 2025
  • 7.5

    HIGH
    CVE-2021-27921

    Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.... Read more

    Affected Products : fedora pillow
    • EPSS Score: %0.60
    • Published: Mar. 03, 2021
    • Modified: Aug. 15, 2025
  • 7.8

    HIGH
    CVE-2025-21756

    In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during conne... Read more

    Affected Products : linux_kernel
    • Published: Feb. 27, 2025
    • Modified: Aug. 14, 2025
  • 8.8

    HIGH
    CVE-2021-20087

    Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam 0.5.1 allows a malicious user to inject properties into Object.prototype.... Read more

    Affected Products : jquery-deparam
    • EPSS Score: %1.79
    • Published: Apr. 23, 2021
    • Modified: Aug. 14, 2025
  • 4.7

    MEDIUM
    CVE-2020-9295

    FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below and FortiClient 6.2 running AV engine version 6.00137 and below may not immediately detect certain types of malformed or non-standard RAR arch... Read more

    Affected Products : fortios forticlient antivirus_engine
    • Published: Mar. 17, 2025
    • Modified: Aug. 14, 2025
  • 5.4

    MEDIUM
    CVE-2024-54951

    Monica 4.1.2 is vulnerable to Cross Site Scripting (XSS). A malicious user can create a malformed contact and use that contact in the "HOW YOU MET" customization options to trigger the XSS.... Read more

    Affected Products : monica
    • Published: Feb. 13, 2025
    • Modified: Aug. 14, 2025
  • 5.4

    MEDIUM
    CVE-2024-57329

    HortusFox v3.9 contains a stored XSS vulnerability in the "Add Plant" function. The name input field does not sanitize or escape user inputs, allowing attackers to inject and execute arbitrary JavaScript payloads.... Read more

    Affected Products : hortusfox
    • Published: Jan. 23, 2025
    • Modified: Aug. 14, 2025
  • 5.3

    MEDIUM
    CVE-2025-36034

    IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques.... Read more

    Affected Products : infosphere_information_server
    • Published: Jun. 26, 2025
    • Modified: Aug. 14, 2025
  • 7.1

    HIGH
    CVE-2025-49321

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arraytics Eventin allows Reflected XSS. This issue affects Eventin: from n/a through 4.0.28.... Read more

    Affected Products : eventin
    • Published: Jun. 27, 2025
    • Modified: Aug. 14, 2025
  • 4.8

    MEDIUM
    CVE-2025-36582

    Dell NetWorker, versions 19.12.0.1 and prior, contains a Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to I... Read more

    Affected Products : networker
    • Published: Jul. 01, 2025
    • Modified: Aug. 14, 2025
  • 9.8

    CRITICAL
    CVE-2025-45872

    zrlog v3.1.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the downloadUrl parameter.... Read more

    Affected Products : zrlog
    • Published: Jul. 01, 2025
    • Modified: Aug. 14, 2025
  • 9.1

    CRITICAL
    CVE-2025-53632

    Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authen... Read more

    Affected Products : chall-manager
    • Published: Jul. 10, 2025
    • Modified: Aug. 14, 2025
Showing 20 of 290957 Results