Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2024-34750

    Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP... Read more

    Affected Products : tomcat ontap_tools
    • Published: Jul. 03, 2024
    • Modified: Aug. 08, 2025
  • 6.5

    MEDIUM
    CVE-2020-3999

    VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to impro... Read more

    Affected Products : workstation mac_os_x esxi fusion
    • EPSS Score: %0.14
    • Published: Dec. 21, 2020
    • Modified: Aug. 08, 2025
  • 7.5

    HIGH
    CVE-2024-49354

    IBM Concert 1.0.0, 1.0.1, and 1.0.2 is vulnerable to sensitive information disclosure through specially crafted API Calls.... Read more

    Affected Products : concert concert_software
    • Published: Jan. 18, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2024-47106

    IBM Jazz for Service Management 1.1.3 through 1.1.3.22 could allow a remote attacker to obtain sensitive information from improper access restrictions that could aid in further attacks against the system.... Read more

    Affected Products : jazz_for_service_management
    • Published: Jan. 18, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Information Disclosure
  • 8.8

    HIGH
    CVE-2025-0682

    The ThemeREX Addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.0 via the 'trx_sc_reviews' shortcode 'type' attribute. This makes it possible for authenticated attackers, with contributor-level and... Read more

    Affected Products : addons
    • Published: Jan. 25, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Path Traversal
  • 7.1

    HIGH
    CVE-2025-22763

    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Brizy Pro allows Reflected XSS. This issue affects Brizy Pro: from n/a through 2.6.1.... Read more

    Affected Products : brizy
    • Published: Jan. 21, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.2

    HIGH
    CVE-2024-31308

    Deserialization of Untrusted Data vulnerability in VJInfotech WP Import Export Lite.This issue affects WP Import Export Lite: from n/a through 3.9.26. ... Read more

    Affected Products : wp_import_export_lite
    • Published: Apr. 07, 2024
    • Modified: Aug. 08, 2025
  • 7.2

    HIGH
    CVE-2024-20429

    A vulnerability in the web-based management interface of Cisco AsyncOS for Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary system commands on an affected device. This vulnerability is due to insufficient input va... Read more

    • Published: Jul. 17, 2024
    • Modified: Aug. 08, 2025
  • 8.8

    HIGH
    CVE-2024-20435

    A vulnerability in the CLI of Cisco AsyncOS for Secure Web Appliance could allow an authenticated, local attacker to execute arbitrary commands and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input ... Read more

    • Published: Jul. 17, 2024
    • Modified: Aug. 08, 2025
  • 5.8

    MEDIUM
    CVE-2024-5969

    The AIomatic - Automatic AI Content Writer for WordPress is vulnerable to arbitrary email sending vulnerability in versions up to, and including, 2.0.5. This is due to insufficient limitations on the email recipient and the content in the 'aiomatic_send_e... Read more

    Affected Products : aiomatic
    • Published: Jul. 27, 2024
    • Modified: Aug. 08, 2025
  • 4.9

    MEDIUM
    CVE-2023-46175

    IBM Cloud Pak for Multicloud Management 2.3 through 2.3 FP8 stores user credentials in a log file plain clear text which can be read by a privileged user.... Read more

    • Published: Sep. 26, 2024
    • Modified: Aug. 08, 2025
  • 8.8

    HIGH
    CVE-2024-7594

    Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to ... Read more

    Affected Products : vault openbao
    • Published: Sep. 26, 2024
    • Modified: Aug. 08, 2025
  • 7.5

    HIGH
    CVE-2024-9029

    A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in ... Read more

    Affected Products : freeimage
    • Published: Sep. 27, 2024
    • Modified: Aug. 08, 2025
  • 8.8

    HIGH
    CVE-2023-47726

    IBM QRadar Suite Software 1.10.12.0 through 1.10.21.0 and IBM Cloud Pak for Security 1.10.12.0 through 1.10.21.0 could allow an authenticated user to execute certain arbitrary commands due to improper input validation. IBM X-Force ID: 272087.... Read more

    Affected Products : cloud_pak_for_security qradar_suite
    • Published: Jun. 18, 2024
    • Modified: Aug. 08, 2025
  • 7.8

    HIGH
    CVE-2025-2024

    Trimble SketchUp SKP File Parsing Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this ... Read more

    Affected Products : sketchup
    • Published: Mar. 07, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2025-2233

    Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not... Read more

    Affected Products : smartthings
    • Published: Mar. 11, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Authentication
  • 7.4

    HIGH
    CVE-2024-8402

    An issue was discovered in GitLab EE affecting all versions starting from 17.2 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2. An input validation issue in the Google Cloud IAM integration featu... Read more

    Affected Products : gitlab
    • Published: Mar. 13, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Misconfiguration
  • 6.5

    MEDIUM
    CVE-2025-0652

    An issue has been discovered in GitLab EE/CE affecting all versions starting from 16.9 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2 could allow unauthorized users to access confidential inform... Read more

    Affected Products : gitlab
    • Published: Mar. 13, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2025-1257

    An issue was discovered in GitLab EE affecting all versions starting with 12.3 before 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2. A vulnerability in certain GitLab instances could allow an attacker to cause a denial of service condition by man... Read more

    Affected Products : gitlab
    • Published: Mar. 13, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Denial of Service
  • 8.8

    HIGH
    CVE-2025-2837

    Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Silicon Labs Gecko OS. Authentication ... Read more

    Affected Products : gecko_os
    • Published: Mar. 26, 2025
    • Modified: Aug. 08, 2025
    • Vuln Type: Memory Corruption
Showing 20 of 291551 Results