Latest CVE Feed
-
5.1
MEDIUMCVE-2025-7863
A vulnerability was found in thinkgem JeeSite up to 5.12.0 and classified as problematic. Affected by this issue is the function redirectUrl of the file src/main/java/com/jeesite/common/web/http/ServletUtils.java. The manipulation of the argument url lead... Read more
Affected Products : jeesite- Published: Jul. 20, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Misconfiguration
-
5.1
MEDIUMCVE-2025-7803
A vulnerability was found in descreekert wx-discuz up to 12bd4745c63ec203cb32119bf77ead4a923bf277. It has been classified as problematic. This affects the function validToken of the file /wx.php. The manipulation of the argument echostr leads to cross sit... Read more
Affected Products :- Published: Jul. 18, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Scripting
-
9.4
CRITICALCVE-2025-7783
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.... Read more
Affected Products : form-data- Published: Jul. 18, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Misconfiguration
-
8.2
HIGHCVE-2025-53923
Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows remote attackers to inject arbitrary web script or HTML via the keyword parameter. Due to lack of sanitization it is... Read more
Affected Products : emlog- Published: Jul. 16, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2025-53892
Vue I18n is the internationalization plugin for Vue.js. The escapeParameterHtml: true option in Vue I18n is designed to protect against HTML/script injection by escaping interpolated parameters. However, starting in version 9.0.0 and prior to versions 9.1... Read more
Affected Products :- Published: Jul. 16, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Scripting
-
9.3
CRITICALCVE-2025-32463
Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.... Read more
- Published: Jun. 30, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2025-2699
A vulnerability was found in GetmeUK ContentTools up to 1.6.16. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Image Handler. The manipulation of the argument onload leads to cross site scripting. T... Read more
- Published: Mar. 24, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Scripting
-
8.1
HIGHCVE-2023-45811
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `Li... Read more
Affected Products : synchrony- EPSS Score: %0.13
- Published: Oct. 17, 2023
- Modified: Jul. 22, 2025
-
4.3
MEDIUMCVE-2025-20114
A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system. This vulnerability is due to insufficient validation of user-suppli... Read more
- Published: May. 21, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
7.1
HIGHCVE-2025-20113
A vulnerability in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to elevate privileges to Administrator for a limited set of functions on an affected system. This vulnerability is due to insufficient server-side valida... Read more
- Published: May. 21, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
5.8
MEDIUMCVE-2025-20288
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to i... Read more
- Published: Jul. 16, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Server-Side Request Forgery
-
8.8
HIGHCVE-2025-20274
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to upload arbitrary files to an affected device. This vulnerability is due to improper validation of files that are... Read more
- Published: Jul. 16, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authentication
-
4.6
MEDIUMCVE-2025-2120
A vulnerability was found in Thinkware Car Dashcam F800 Pro up to 20250226. It has been rated as problematic. This issue affects some unknown processing of the file /tmp/hostapd.conf of the component Configuration File Handler. The manipulation leads to c... Read more
- Published: Mar. 09, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-2121
A vulnerability classified as critical has been found in Thinkware Car Dashcam F800 Pro up to 20250226. Affected is an unknown function of the component File Storage. The manipulation leads to improper access controls. The attack can only be done within t... Read more
- Published: Mar. 09, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-2122
A vulnerability classified as problematic was found in Thinkware Car Dashcam F800 Pro up to 20250226. Affected by this vulnerability is an unknown functionality of the component Connection Handler. The manipulation leads to denial of service. The attack c... Read more
- Published: Mar. 09, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Denial of Service
-
5.9
MEDIUMCVE-2025-44612
Tinxy WiFi Lock Controller v1 RF was discovered to transmit sensitive information in plaintext, including control information and device credentials, allowing attackers to possibly intercept and access sensitive information via a man-in-the-middle attack.... Read more
- Published: May. 30, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cryptography
-
7.5
HIGHCVE-2025-44614
Tinxy WiFi Lock Controller v1 RF was discovered to store users' sensitive information, including credentials and mobile phone numbers, in plaintext.... Read more
- Published: May. 30, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cryptography
-
9.1
CRITICALCVE-2025-44619
Tinxy WiFi Lock Controller v1 RF was discovered to be configured to transmit on an open Wi-Fi network, allowing attackers to join the network without authentication.... Read more
- Published: May. 30, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-45784
D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis t... Read more
Affected Products : dph-400se_firmware dph-400se dph-400se_firmware dph-400se dph-400s_firmware dph-400s dph-400s_firmware dph-400s- Published: Jun. 18, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cryptography
-
7.2
HIGHCVE-2025-20284
A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as root. This vulnerability is due to insufficient validation of user-supplied i... Read more
- Published: Jul. 16, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authentication