Latest CVE Feed
-
7.2
HIGHCVE-2025-1929
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı allows SQL Injection, CAPEC - 7 - Blind SQL Injection.This issue affect... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
9.2
CRITICALCVE-2025-54473
An authenticated RCE vulnerability in Phoca Commander component 1.0.0-4.0.0 and 5.0.0-5.0.1 for Joomla was discovered. The issue allows code execution via the unzip feature.... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authentication
-
8.5
HIGHCVE-2025-54474
A SQLi vulnerability in DJ-Classifieds component 3.9.2-3.10.1 for Joomla was discovered. The issue allows privileged users to execute arbitrary SQL commands.... Read more
Affected Products :- Published: Aug. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
7.3
HIGHCVE-2025-29984
Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.... Read more
Affected Products : trusted_device_agent- Published: Apr. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Misconfiguration
-
7.3
HIGHCVE-2025-29983
Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of priv... Read more
Affected Products : trusted_device_agent- Published: Apr. 15, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2025-23227
IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.11 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functional... Read more
- Published: Jan. 23, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
7.8
HIGHCVE-2025-0413
Parallels Desktop Technical Data Reporter Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability ... Read more
- Published: Feb. 05, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-54176
IBM DevOps Deploy 8.0 through 8.0.1.4, 8.1 through 8.1.0.0 and IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14 and 7.3 through 7.3.2 could allow an authenticated user to obtain sensitive information about other ... Read more
- Published: Feb. 08, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authorization
-
7.2
HIGHCVE-2025-53744
An incorrect privilege assignment vulnerability [CWE-266] in FortiOS Security Fabric version 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.0 all versions, 6.4 all versions, may allow a remote authenticated attacker with high privileges to ... Read more
Affected Products : fortios- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authorization
-
8.1
HIGHCVE-2025-52970
A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device an... Read more
Affected Products : fortiweb- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authentication
-
7.2
HIGHCVE-2025-49813
An improper neutralization of special elements used in an OS Command ("OS Command Injection") vulnerability [CWE-78] in Fortinet FortiADC version 7.2.0 and before 7.1.1 allows a remote and authenticated attacker with low privilege to execute unauthorized ... Read more
Affected Products : fortiadc- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
6.7
MEDIUMCVE-2025-47857
A improper neutralization of special elements used in an os command ('os command injection') vulnerability [CWE-78] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or command via... Read more
Affected Products : fortiweb- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-32932
An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR version 7.6.1 and below, version 7.5.1 and below, 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all v... Read more
Affected Products : fortisoar- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-8800
A vulnerability has been found in Open5GS up to 2.7.5. Affected by this issue is the function esm_handle_pdn_connectivity_request of the file src/mme/esm-handler.c of the component AMF Component. The manipulation leads to denial of service. The attack may... Read more
Affected Products : open5gs- Published: Aug. 10, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Denial of Service
-
4.3
MEDIUMCVE-2025-8452
By using the "uscan" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described b... Read more
Affected Products :- Published: Aug. 12, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2021-27923
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.... Read more
- EPSS Score: %0.60
- Published: Mar. 03, 2021
- Modified: Aug. 15, 2025
-
7.5
HIGHCVE-2021-27922
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.... Read more
- EPSS Score: %0.35
- Published: Mar. 03, 2021
- Modified: Aug. 15, 2025
-
7.5
HIGHCVE-2021-27921
Pillow before 8.1.2 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.... Read more
- EPSS Score: %0.60
- Published: Mar. 03, 2021
- Modified: Aug. 15, 2025
-
7.8
HIGHCVE-2025-21756
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during conne... Read more
Affected Products : linux_kernel- Published: Feb. 27, 2025
- Modified: Aug. 14, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2021-20087
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam 0.5.1 allows a malicious user to inject properties into Object.prototype.... Read more
Affected Products : jquery-deparam- EPSS Score: %1.79
- Published: Apr. 23, 2021
- Modified: Aug. 14, 2025