Latest CVE Feed
-
7.8
HIGHCVE-2024-39289
A code execution vulnerability has been discovered in the Robot Operating System (ROS) 'rosparam' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-suppl... Read more
- Published: Jul. 17, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Injection
-
7.8
HIGHCVE-2024-41148
A code injection vulnerability has been discovered in the Robot Operating System (ROS) 'rostopic' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the 'hz' verb, which reports the publishing rate of a t... Read more
- Published: Jul. 17, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Injection
-
7.8
HIGHCVE-2024-41921
A code injection vulnerability has been discovered in the Robot Operating System (ROS) 'rostopic' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the 'echo' verb, which allows a user to introspect a RO... Read more
- Published: Jul. 17, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Injection
-
7.8
HIGHCVE-2025-3753
A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-suppli... Read more
- Published: Jul. 17, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2022-28653
Users can consume unlimited disk space in /var/crash... Read more
Affected Products : apport- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Denial of Service
-
3.1
LOW- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2022-1736
Ubuntu's configuration of gnome-control-center allowed Remote Desktop Sharing to be enabled by default.... Read more
- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Misconfiguration
-
4.9
MEDIUMCVE-2023-0092
An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem.... Read more
Affected Products : juju- Published: Jan. 31, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-8037
Vulnerable juju hook tool abstract UNIX domain socket. When combined with an attack of JUJU_CONTEXT_ID, any user on the local system with access to the default network namespace may connect to the @/var/lib/juju/agents/unit-xxxx-yyyy/agent.socket and perf... Read more
Affected Products : juju- Published: Oct. 02, 2024
- Modified: Aug. 26, 2025
-
5.7
MEDIUMCVE-2024-42491
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion start... Read more
- Published: Sep. 05, 2024
- Modified: Aug. 26, 2025
-
9.4
CRITICALCVE-2024-47062
Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furt... Read more
Affected Products : navidrome- Published: Sep. 20, 2024
- Modified: Aug. 26, 2025
-
7.9
HIGHCVE-2024-8038
Vulnerable juju introspection abstract UNIX domain socket. An abstract UNIX domain socket responsible for introspection is available without authentication locally to network namespace users. This enables denial of service attacks.... Read more
Affected Products : juju- Published: Oct. 02, 2024
- Modified: Aug. 26, 2025
-
8.8
HIGHCVE-2024-9313
Authd PAM module before version 0.3.5 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them.... Read more
Affected Products : authd- Published: Oct. 03, 2024
- Modified: Aug. 26, 2025
-
4.4
MEDIUMCVE-2024-31227
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis ... Read more
Affected Products : redis- Published: Oct. 07, 2024
- Modified: Aug. 26, 2025
-
7.5
HIGHCVE-2024-9312
Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.... Read more
Affected Products : authd- Published: Oct. 10, 2024
- Modified: Aug. 26, 2025
-
8.7
HIGHCVE-2024-7558
JUJU_CONTEXT_ID is a predictable authentication secret. On a Juju machine (non-Kubernetes) or Juju charm container (on Kubernetes), an unprivileged user in the same network namespace can connect to an abstract domain socket and guess the JUJU_CONTEXT_ID v... Read more
Affected Products : juju- Published: Oct. 02, 2024
- Modified: Aug. 26, 2025
-
7.8
HIGHCVE-2024-10224
Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by pas... Read more
- Published: Nov. 19, 2024
- Modified: Aug. 26, 2025
-
5.5
MEDIUMCVE-2025-48382
Fess is a deployable Enterprise Search Server. Prior to version 14.19.2, the createTempFile() method in org.codelibs.fess.helper.SystemHelper creates temporary files without explicitly setting restrictive permissions. This could lead to potential informat... Read more
Affected Products : fess- Published: May. 27, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Information Disclosure
-
5.4
MEDIUMCVE-2025-48495
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. By renaming the friendly name of an API key, an authenticated user could inject JS into the API key overview, which would also be executed when another user clic... Read more
Affected Products : gokapi- Published: Jun. 02, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Cross-Site Scripting
-
5.4
MEDIUMCVE-2025-48494
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. When using end-to-end encryption, a stored cross-site scripting vulnerability can be exploited by uploading a file with JavaScript code embedded in the filename.... Read more
Affected Products : gokapi- Published: Jun. 02, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Cross-Site Scripting