Latest CVE Feed
-
4.3
MEDIUMCVE-2025-0446
Inappropriate implementation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-0443
Insufficient data validation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted HTML page. (Chromium security severity: Mediu... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-0442
Inappropriate implementation in Payments in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-0441
Inappropriate implementation in Fenced Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to obtain potentially sensitive information from the system via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-0440
Inappropriate implementation in Fullscreen in Google Chrome on Windows prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-0439
Race in Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Race Condition
-
8.8
HIGHCVE-2025-0438
Stack buffer overflow in Tracing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jan. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-3074
Inappropriate implementation in Downloads in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3073
Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3072
Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3071
Inappropriate implementation in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
4.8
MEDIUMCVE-2025-30714
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocol... Read more
- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authentication
-
4.4
MEDIUMCVE-2025-30704
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows high privileged attacker wi... Read more
Affected Products : mysql_server- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2025-30703
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via m... Read more
Affected Products : mysql_server- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
4.9
MEDIUMCVE-2025-30696
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access v... Read more
Affected Products : mysql_server- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Denial of Service
-
5.5
MEDIUMCVE-2025-30693
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via m... Read more
- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Denial of Service
-
6.5
MEDIUMCVE-2025-30692
Vulnerability in the Oracle iSupplier Portal product of Oracle E-Business Suite (component: Attachments). Supported versions that are affected are 12.2.7-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTT... Read more
Affected Products : isupplier_portal- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
7.2
HIGHCVE-2025-30690
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris... Read more
- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
4.9
MEDIUMCVE-2025-30689
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
Affected Products : mysql_server- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2022-46126
Helmet Store Showroom Site v1.0 is vulnerable to SQL Injection via /hss/admin/brands/manage_brand.php?id=.... Read more
Affected Products : helmet_store_showroom_site- Published: Dec. 14, 2022
- Modified: Apr. 21, 2025