Latest CVE Feed
-
7.8
HIGHCVE-2025-1411
IBM Security Verify Directory Container 10.0.0.0 through 10.0.3.1 could allow a local user to execute commands as root due to execution with unnecessary privileges.... Read more
Affected Products : security_verify_directory- Published: Jun. 15, 2025
- Modified: Aug. 11, 2025
-
7.6
HIGHCVE-2025-5990
An input neutralization vulnerability in the Server Name form and API Key form components of Crafty Controller allows a remote, authenticated attacker to perform stored XSS via malicious form input.... Read more
Affected Products : crafty_controller- Published: Jun. 15, 2025
- Modified: Aug. 11, 2025
-
7.0
HIGHCVE-2025-32797
Conda-build contains commands and tools to build conda packages. Prior to version 25.3.1, The write_build_scripts function in conda-build creates the temporary build script conda_build.sh with overly permissive file permissions (0o766), allowing write acc... Read more
Affected Products : conda-build- Published: Jun. 16, 2025
- Modified: Aug. 11, 2025
-
9.8
CRITICALCVE-2025-3515
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attac... Read more
Affected Products : drag_and_drop_multiple_file_upload_-_contact_form_7- Published: Jun. 17, 2025
- Modified: Aug. 11, 2025
-
9.3
CRITICALCVE-2012-10037
PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution u... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
9.4
CRITICALCVE-2012-10039
ZEN Load Balancer versions 2.0 and 3.0-rc1 contain a command injection vulnerability in content2-2.cgi. The filelog parameter is passed directly into a backtick-delimited exec() call without sanitation. An authenticated attacker can inject arbitrary shell... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
7.5
HIGHCVE-2025-8838
A vulnerability has been found in WinterChenS my-site up to 1f7525f15934d9d6a278de967f6ec9f1757738d8. This vulnerability affects the function preHandle of the file /admin/ of the component Backend Interface. The manipulation of the argument uri leads to i... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
5.1
MEDIUMCVE-2025-7020
An incorrect encryption implementation vulnerability exists in the system log dump feature of BYD's DiLink 3.0 OS (e.g. in the model ATTO3). An attacker with physical access to the vehicle can bypass the encryption of log dumps on the In-Vehicle Infotainm... Read more
Affected Products :- Published: Aug. 09, 2025
- Modified: Aug. 11, 2025
-
7.1
HIGHCVE-2025-55008
The AuthKit library for React Router 7+ provides helpers for authentication and session management using WorkOS & AuthKit with React Router. In versions 0.6.1 and below, @workos-inc/authkit-react-router exposed sensitive authentication artifacts — specifi... Read more
Affected Products :- Published: Aug. 09, 2025
- Modified: Aug. 11, 2025
-
8.7
HIGHCVE-2025-54888
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. In versions below 1.3.20, 1.4.0-dev.585 through 1.4.12, 1.5.0-dev.636 through 1.5.4, 1.6.0-dev.754 through 1.6.7, 1.7.0-pr.251.885 through 1.7.8 and 1.8.0-dev.909 th... Read more
Affected Products :- Published: Aug. 09, 2025
- Modified: Aug. 11, 2025
-
8.0
HIGHCVE-2025-54063
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.4.8 to 1.5.0, there is a one-click remote code execution vulnerability through the custom URL handling. An attacker can exploit this by hosting a malicious website... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
5.1
MEDIUMCVE-2025-8866
YugabyteDB Anywhere web server does not properly enforce authentication for the /metamaster/universe API endpoint. An unauthenticated attacker could exploit this flaw to obtain server networking configuration details, including private and public IP addre... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
5.6
MEDIUMCVE-2025-8660
Privilege escalation occurs when a user gets access to more resources or functionality than they are normally allowed.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
5.3
MEDIUMCVE-2025-8852
A vulnerability was identified in WuKongOpenSource WukongCRM 11.0. This affects an unknown part of the file /adminFile/upload of the component API Response Handler. The manipulation leads to information exposure through error message. It is possible to in... Read more
Affected Products : wukongcrm- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
7.0
HIGHCVE-2025-8862
YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend upgrading the database to a version where this information is properly redacted.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
5.5
MEDIUMCVE-2025-8840
A vulnerability was determined in jshERP up to 3.5. Affected is an unknown function of the file /jshERP-boot/user/deleteBatch of the component Endpoint. The manipulation of the argument ids leads to improper authorization. It is possible to launch the att... Read more
Affected Products : jsherp- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
4.8
MEDIUMCVE-2025-8844
A vulnerability was determined in NASM Netwide Assember 2.17rc0. This vulnerability affects the function parse_smacro_template of the file preproc.c. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has b... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
4.8
MEDIUMCVE-2025-8834
A vulnerability has been found in JCG Link-net LW-N915R 17s.20.001.908. Affected is an unknown function of the file /wireless/basic.asp of the component Wireless Basic Settings Page. The manipulation of the argument Network Name leads to cross site script... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
9.0
HIGHCVE-2025-8826
A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This vulnerability affects the function um_rp_autochannel of the file /goform/RP_setBasicAuto. The manipulation of the argument apcli_AuthMode_2G/a... Read more
Affected Products : re6500_firmware re6300_firmware re9000_firmware re6250_firmware re6350_firmware re7000_firmware- Published: Aug. 11, 2025
- Modified: Aug. 11, 2025
-
5.3
MEDIUMCVE-2025-8808
A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been rated as problematic. This issue affects the function exportOrder of the file /tianti-module-admin/user/ajax/save of the component com.jeff.tianti.controller. The manipulation leads to c... Read more
Affected Products :- Published: Aug. 10, 2025
- Modified: Aug. 11, 2025