Latest CVE Feed
-
8.8
HIGHCVE-2025-3485
Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability. The s... Read more
Affected Products : allegra- Published: Jun. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-5473
GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the targ... Read more
Affected Products : gimp- Published: Jun. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption
-
7.3
HIGHCVE-2025-5474
2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to exec... Read more
Affected Products : syncbackfree- Published: Jun. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Path Traversal
-
7.8
HIGHCVE-2025-5480
Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1. An attacker must first obtain the ability to execute low-privileged ... Read more
Affected Products : action1- Published: Jun. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-6216
Allegra calculateTokenExpDate Password Recovery Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authentication is not required to exploit this vulnerability. T... Read more
Affected Products : allegra- Published: Jun. 21, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-2771
BEC Technologies Multiple Routers Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability.... Read more
Affected Products : router_firmware- Published: Apr. 23, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-3910
A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication.... Read more
- Published: Apr. 29, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Authentication
-
3.8
LOWCVE-2025-6217
PEAK-System Driver PCANFD_ADD_FILTERS Time-Of-Check Time-Of-Use Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of PEAK-System Driver. An attacker must first obtai... Read more
Affected Products : device_driver- Published: Jun. 21, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-6442
Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP p... Read more
Affected Products : webrick- Published: Jun. 25, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2025-6443
Mikrotik RouterOS VXLAN Source IP Improper Access Control Vulnerability. This vulnerability allows remote attackers to bypass access restrictions on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability.... Read more
Affected Products : routeros- Published: Jun. 25, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Authentication
-
6.8
MEDIUMCVE-2025-20696
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed fo... Read more
- Published: Aug. 04, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption
-
6.7
MEDIUMCVE-2025-20697
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID... Read more
- Published: Aug. 04, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption
-
6.7
MEDIUMCVE-2025-20698
In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID... Read more
- Published: Aug. 04, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-53738
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption
-
7.2
HIGHCVE-2025-38739
Dell Digital Delivery, versions prior to 5.6.1.0, contains an Insufficiently Protected Credentials vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to Information Disclosure.... Read more
Affected Products : digital_delivery- Published: Aug. 04, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Information Disclosure
-
8.4
HIGHCVE-2025-54652
Path traversal vulnerability in the virtualization base module. Successful exploitation of this vulnerability may affect the confidentiality of the virtualization module.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Path Traversal
-
8.4
HIGHCVE-2025-54653
Path traversal vulnerability in the virtualization file module. Successful exploitation of this vulnerability may affect the confidentiality of the virtualization file module.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2025-50234
MCCMS v2.7.0 has an SSRF vulnerability located in the index() method of the sys\apps\controllers\api\Gf.php file, where the pic parameter is processed. The pic parameter is decrypted using the sys_auth($pic, 1) function, which utilizes a hard-coded key Mc... Read more
Affected Products : mccms- Published: Aug. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Server-Side Request Forgery
-
3.5
LOWCVE-2025-38746
Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. An unauthenticated attacker with physical access could potentially exploit this vulnerability, leading to Inf... Read more
Affected Products : supportassist_os_recovery- Published: Aug. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Information Disclosure
-
7.8
HIGHCVE-2025-38747
Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contain a Creation of Temporary File With Insecure Permissions vulnerability. A local authenticated attacker could potentially exploit this vulnerability, leading to Elevation of Privileges.... Read more
Affected Products : supportassist_os_recovery- Published: Aug. 06, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Misconfiguration