Latest CVE Feed
-
9.8
CRITICALCVE-2025-10111
A security flaw has been discovered in itsourcecode Student Information Management System 1.0. The affected element is an unknown function of the file /admin/modules/instructor/index.php. The manipulation of the argument ID results in sql injection. The a... Read more
Affected Products : student_information_management_system- Published: Sep. 08, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-10110
A vulnerability was identified in ChanCMS up to 3.3.1. Impacted is an unknown function of the file /search/. The manipulation with the input '%20or%201=1%20%23/words.html leads to sql injection. Remote exploitation of the attack is possible. The exploit i... Read more
Affected Products : chancms- Published: Sep. 08, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Injection
-
6.9
MEDIUMCVE-2025-57791
A security vulnerability has been identified that allows remote attackers to inject or manipulate command-line arguments passed to internal components due to insufficient input validation. Successful exploitation results in a valid user session for a low ... Read more
- Published: Aug. 20, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-57790
A security vulnerability has been identified that allows remote attackers to perform unauthorized file system access through a path traversal issue. The vulnerability may lead to remote code execution.... Read more
- Published: Aug. 20, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Path Traversal
-
5.4
MEDIUMCVE-2025-57789
During the brief window between installation and the first administrator login, remote attackers may exploit the default credential to gain admin control. This is limited to the setup phase, before any jobs have been configured.... Read more
- Published: Aug. 20, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authentication
-
6.9
MEDIUMCVE-2025-57788
A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user credentials. RBAC helps limit the exposure but does not eliminate risk.... Read more
- Published: Aug. 20, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authentication
-
9.0
CRITICALCVE-2024-38002
The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a wo... Read more
- Published: Oct. 22, 2024
- Modified: Sep. 10, 2025
-
6.5
MEDIUMCVE-2025-6224
Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and triviall... Read more
Affected Products : juju\/utils- Published: Jul. 01, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Information Disclosure
-
4.7
MEDIUMCVE-2025-53791
Improper access control in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network.... Read more
Affected Products : edge_chromium- Published: Sep. 05, 2025
- Modified: Sep. 10, 2025
-
8.7
HIGHCVE-2025-22846
When SIP Session and Router ALG profiles are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support... Read more
Affected Products : big-ip_access_policy_manager big-ip_advanced_firewall_manager big-ip_analytics big-ip_application_acceleration_manager big-ip_application_security_manager big-ip_domain_name_system big-ip_fraud_protection_service big-ip_global_traffic_manager big-ip_link_controller big-ip_local_traffic_manager +3 more products- Published: Feb. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
6.1
MEDIUMCVE-2025-10027
A vulnerability was determined in itsourcecode POS Point of Sale System 1.0. Affected by this issue is some unknown functionality of the file /inventory/main/vendors/datatables/unit_testing/templates/2512.php. This manipulation of the argument scripts cau... Read more
Affected Products : point_of_sale_system- Published: Sep. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2025-38742
Dell iDRAC Service Module (iSM), versions prior to 6.0.3.0, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code executio... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 21, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-48208
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability in Apache HertzBeat . The attacker needs to have an authenticated account with access, and the attack can only be triggered by crafting custom c... Read more
Affected Products : hertzbeat- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-24404
XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulner... Read more
Affected Products : hertzbeat- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: XML External Entity
-
5.3
MEDIUMCVE-2025-53743
Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.... Read more
Affected Products : applitools_eyes- Published: Jul. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-53742
Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file syste... Read more
Affected Products : applitools_eyes- Published: Jul. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration
-
9.1
CRITICALCVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization c... Read more
Affected Products : next.js- Published: Mar. 21, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2024-56332
Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that... Read more
Affected Products : next.js- Published: Jan. 03, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-51479
Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly unde... Read more
Affected Products : next.js- Published: Dec. 17, 2024
- Modified: Sep. 10, 2025
-
5.5
MEDIUMCVE-2024-51752
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In affected versions refresh tokens are logged to the console when the disabled by default `debug` flag, is enabled.... Read more
Affected Products : authkit- Published: Nov. 05, 2024
- Modified: Sep. 10, 2025