Latest CVE Feed
-
9.8
CRITICALCVE-2025-23317
NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shell by sending a specially crafted HTTP request. A successful exploit of this vulnerability might lead to remote code execution, denial o... Read more
- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2025-23311
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially crafted HTTP requests. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information ... Read more
- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-23310
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer overflow by specially crafted inputs. A successful exploit of this vulnerability might lead to remote code execution, denial of servic... Read more
- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-8620
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id... Read more
Affected Products : givewp- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Information Disclosure
-
6.0
MEDIUMCVE-2025-21010
Improper privilege management in SamsungAccount prior to SMR Aug-2025 Release 1 allows local privileged attackers to deactivate Samsung account.... Read more
Affected Products : android- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
4.0
MEDIUMCVE-2025-20990
Improper access control in accessing system device node prior to SMR Aug-2025 Release 1 allows local attackers to access device identifier.... Read more
Affected Products : android- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2025-7498
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown Widget in all versions up to, and including, 2.7.9.4 due to insufficient input sanitization and output escaping. This makes it possible ... Read more
Affected Products : exclusive_addons_for_elementor- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Cross-Site Scripting
-
6.2
MEDIUMCVE-2025-54615
Vulnerability of insufficient information protection in the media library module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Information Disclosure
-
5.5
MEDIUMCVE-2025-54616
Out-of-bounds array access vulnerability in the ArkUI framework. Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Memory Corruption
-
6.2
MEDIUMCVE-2025-54614
Input verification vulnerability in the home screen module. Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Denial of Service
-
7.3
HIGHCVE-2025-54611
EXTRA_REFERRER resource read vulnerability in the Gallery module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.... Read more
- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Information Disclosure
-
5.4
MEDIUMCVE-2024-52364
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitr... Read more
Affected Products : cloud_pak_for_business_automation- Published: Feb. 05, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-54610
Out-of-bounds access vulnerability in the audio codec module. Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-54609
Out-of-bounds access vulnerability in the audio codec module. Impact: Successful exploitation of this vulnerability may affect availability.... Read more
Affected Products : harmonyos- Published: Aug. 06, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-6207
The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_tempalte_import' function in all versions up to, and including, 3.9.28. This makes it possible for authenticated attack... Read more
Affected Products : wp_import_export_lite- Published: Aug. 05, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authentication
-
6.4
MEDIUMCVE-2024-52365
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed... Read more
Affected Products : cloud_pak_for_business_automation- Published: Feb. 05, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Cross-Site Scripting
-
3.3
LOWCVE-2023-38105
Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit ... Read more
- Published: May. 03, 2024
- Modified: Aug. 12, 2025
-
3.3
LOWCVE-2023-42098
Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulne... Read more
- Published: May. 03, 2024
- Modified: Aug. 12, 2025
-
5.9
MEDIUMCVE-2025-24731
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IP2Location Download IP2Location Country Blocker allows Stored XSS. This issue affects Download IP2Location Country Blocker: from n/a through 2.38.3.... Read more
Affected Products : country_blocker- Published: Jan. 24, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-8823
A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this vulnerability is the function setDeviceName of the file /goform/setDeviceName. The manipulation of the argument DeviceName leads to os ... Read more
Affected Products : re6500_firmware re6300_firmware re9000_firmware re6250_firmware re6350_firmware re7000_firmware- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Injection