Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.5

    MEDIUM
    CVE-2024-51242

    A Server-Side Request Forgery (SSRF) vulnerability has been identified in eladmin 2.7 and earlier in ServerDeployController.java. The manipulation of the HTTP Body ip parameter leads to SSRF.... Read more

    Affected Products : eladmin
    • Published: Oct. 30, 2024
    • Modified: May. 17, 2025
  • 7.6

    HIGH
    CVE-2024-5429

    The Logo Slider WordPress plugin before 4.1.0 does not validate and escape some of its Slider Settings before outputting them back in attributes, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks... Read more

    Affected Products : gs_logo_slider logo_slider logo_slider
    • Published: Oct. 17, 2024
    • Modified: May. 17, 2025
  • 9.8

    CRITICAL
    CVE-2024-48411

    itsourcecode Online Tours and Travels Management System v1.0 is vulnerable to SQL Injection (SQLI) via a crafted payload to the val-email parameter in forget_password.php.... Read more

    • Published: Oct. 15, 2024
    • Modified: May. 17, 2025
  • 7.8

    HIGH
    CVE-2025-26601

    A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes tr... Read more

    • Published: Feb. 25, 2025
    • Modified: May. 16, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2025-26600

    A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.... Read more

    • Published: Feb. 25, 2025
    • Modified: May. 16, 2025
    • Vuln Type: Memory Corruption
  • 6.5

    MEDIUM
    CVE-2025-22872

    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse ... Read more

    Affected Products : networking
    • Published: Apr. 16, 2025
    • Modified: May. 16, 2025
  • 7.3

    HIGH
    CVE-2025-22235

    EndpointRequest.to() creates a matcher for null/** if the actuator endpoint, for which the EndpointRequest has been created, is disabled or not exposed. Your application may be affected by this if all the following conditions are met: * You use Sprin... Read more

    Affected Products : spring_boot
    • Published: Apr. 28, 2025
    • Modified: May. 16, 2025
    • Vuln Type: Misconfiguration
  • 5.3

    MEDIUM
    CVE-2025-1493

    IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 12.1.0 through 12.1.1 could allow an authenticated user to cause a denial of service due to concurrent execution of shared resources.... Read more

    Affected Products : db2
    • Published: May. 05, 2025
    • Modified: May. 16, 2025
    • Vuln Type: Denial of Service
  • 5.0

    MEDIUM
    CVE-2024-8654

    MongoDB Server may access non-initialized region of memory leading to unexpected behaviour when zero arguments are called in internal aggregation stage. This issue affected MongoDB Server v6.0 version 6.0.3.... Read more

    Affected Products : mongodb
    • Published: Sep. 10, 2024
    • Modified: May. 16, 2025
  • 6.7

    MEDIUM
    CVE-2024-8207

    In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-co... Read more

    Affected Products : linux_kernel mongodb
    • Published: Aug. 27, 2024
    • Modified: May. 16, 2025
  • 6.9

    MEDIUM
    CVE-2023-3726

    OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.... Read more

    Affected Products : ocsinventory-ocsreports
    • EPSS Score: %0.08
    • Published: Jan. 04, 2024
    • Modified: May. 16, 2025
  • 5.9

    MEDIUM
    CVE-2024-44041

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Martin Gibson IdeaPush allows Stored XSS.This issue affects IdeaPush: from n/a through 8.66.... Read more

    Affected Products : ideapush
    • Published: Oct. 06, 2024
    • Modified: May. 16, 2025
  • 7.1

    HIGH
    CVE-2024-47638

    Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in vCita Online Booking & Scheduling Calendar for WordPress by vcita allows Reflected XSS.This issue affects Online Booking & Scheduling Calendar for... Read more

    • Published: Oct. 05, 2024
    • Modified: May. 16, 2025
  • 7.5

    HIGH
    CVE-2024-7315

    The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups.... Read more

    Affected Products : migration\,_backup\,_staging
    • Published: Oct. 02, 2024
    • Modified: May. 16, 2025
  • 6.3

    MEDIUM
    CVE-2024-45983

    A Cross-Site Request Forgery (CSRF) vulnerability exists in kishan0725's Hospital Management System version 6.3.5. The vulnerability allows an attacker to craft a malicious HTML form that submits a request to delete a doctor record. By enticing an authent... Read more

    Affected Products : hospital_management_system
    • Published: Sep. 26, 2024
    • Modified: May. 16, 2025
  • 7.5

    HIGH
    CVE-2024-39928

    In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this i... Read more

    Affected Products : linkis
    • Published: Sep. 25, 2024
    • Modified: May. 16, 2025
  • 9.1

    CRITICAL
    CVE-2024-3673

    The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.... Read more

    Affected Products : web_directory_free
    • Published: Aug. 30, 2024
    • Modified: May. 16, 2025
  • 9.8

    CRITICAL
    CVE-2023-24163

    SQL Inection vulnerability in Dromara hutool before 5.8.21 allows attacker to execute arbitrary code via the aviator template engine.... Read more

    Affected Products : hutool
    • EPSS Score: %0.12
    • Published: Jan. 31, 2023
    • Modified: May. 16, 2025
  • 9.8

    CRITICAL
    CVE-2023-24468

    Broken access control in Advanced Authentication versions prior to 6.4.1.1 and 6.3.7.2... Read more

    • EPSS Score: %0.09
    • Published: Mar. 15, 2023
    • Modified: May. 16, 2025
  • 7.8

    HIGH
    CVE-2022-48425

    In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs.... Read more

    Affected Products : linux_kernel
    • EPSS Score: %0.01
    • Published: Mar. 19, 2023
    • Modified: May. 16, 2025
Showing 20 of 292100 Results