Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 3.5

    LOW
    CVE-2025-38746

    Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. An unauthenticated attacker with physical access could potentially exploit this vulnerability, leading to Inf... Read more

    Affected Products : supportassist_os_recovery
    • Published: Aug. 06, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Information Disclosure
  • 7.8

    HIGH
    CVE-2025-38747

    Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contain a Creation of Temporary File With Insecure Permissions vulnerability. A local authenticated attacker could potentially exploit this vulnerability, leading to Elevation of Privileges.... Read more

    Affected Products : supportassist_os_recovery
    • Published: Aug. 06, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Misconfiguration
  • 9.8

    CRITICAL
    CVE-2025-55167

    WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_remover.php endpoint, specifically in the id_... Read more

    Affected Products : wegia
    • Published: Aug. 12, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Injection
  • 9.8

    CRITICAL
    CVE-2025-8967

    A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1.0. Affected is an unknown function of the file /admin/operations/packages.php. The manipulation of the argument pname leads to sql injection. It is possible to launc... Read more

    • Published: Aug. 14, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Injection
  • 9.8

    CRITICAL
    CVE-2025-8966

    A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /admin/operations/tax.php. The manipulation of the argument tname leads to sql injection. The attack may be init... Read more

    • Published: Aug. 14, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Injection
  • 7.8

    HIGH
    CVE-2023-42126

    G DATA Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the abili... Read more

    Affected Products : total_security
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 8.0

    HIGH
    CVE-2023-42128

    Magnet Forensics AXIOM Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Magnet Forensics AXIOM. User interaction is required to exploit this ... Read more

    Affected Products : axiom
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 6.5

    MEDIUM
    CVE-2023-42129

    A10 Thunder ADC ShowTechDownloadView Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of A10 Thunder ADC. Authentication is required to exploit... Read more

    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 8.8

    HIGH
    CVE-2023-42130

    A10 Thunder ADC FileMgmtExport Directory Traversal Arbitrary File Read and Deletion Vulnerability. This vulnerability allows remote attackers to read and delete arbitrary files on affected installations of A10 Thunder ADC. Authentication is required to ex... Read more

    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 7.8

    HIGH
    CVE-2023-42131

    Ansys SpaceClaim X_B File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim. User interaction is required to exploit this vul... Read more

    Affected Products : spaceclaim
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 7.8

    HIGH
    CVE-2023-44428

    MuseScore CAP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MuseScore. User interaction is required to exploit this vulnerabil... Read more

    Affected Products : musescore
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 8.8

    HIGH
    CVE-2023-44438

    Ashlar-Vellum Argon Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Argon. User interaction is required to exploit this v... Read more

    Affected Products : argon
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 8.8

    HIGH
    CVE-2023-44440

    Ashlar-Vellum Lithium Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Lithium. User interaction is required to exploit th... Read more

    Affected Products : lithium
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 8.8

    HIGH
    CVE-2023-44439

    Ashlar-Vellum Xenon Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Xenon. User interaction is required to exploit this v... Read more

    Affected Products : xenon
    • Published: May. 03, 2024
    • Modified: Aug. 18, 2025
  • 7.5

    HIGH
    CVE-2025-53793

    Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network.... Read more

    • Published: Aug. 12, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Authentication
  • 7.0

    HIGH
    CVE-2025-53788

    Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.... Read more

    Affected Products : windows_subsystem_for_linux
    • Published: Aug. 12, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Race Condition
  • 8.4

    HIGH
    CVE-2025-53784

    Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.... Read more

    • Published: Aug. 12, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Memory Corruption
  • 7.2

    HIGH
    CVE-2025-53779

    Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network.... Read more

    Affected Products : windows_server_2025
    • Published: Aug. 12, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Path Traversal
  • 5.5

    MEDIUM
    CVE-2025-53765

    Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.... Read more

    • Published: Aug. 12, 2025
    • Modified: Aug. 18, 2025
    • Vuln Type: Information Disclosure
  • 8.1

    HIGH
    CVE-2024-27273

    IBM AIX's Unix domain (AIX 7.2, 7.3, VIOS 3.1, and VIOS 4.1) datagram socket implementation could potentially expose applications using Unix domain datagram sockets with SO_PEERID operation and may lead to privilege escalation. IBM X-Force ID: 284903.... Read more

    Affected Products : aix vios
    • Published: May. 07, 2024
    • Modified: Aug. 18, 2025
Showing 20 of 291741 Results