Latest CVE Feed
-
8.7
HIGHCVE-2013-10039
A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentica... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
6.0
MEDIUMCVE-2025-4426
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-8322
The e-School from Ventem has a Missing Authorization vulnerability, allowing remote attackers with regular privilege to access administrator functions, including creating, modifying, and deleting accounts. They can even escalate any account to system admi... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
6.0
MEDIUMCVE-2025-4424
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
7.3
HIGHCVE-2025-36611
Dell Encryption and Dell Security Management Server, versions prior to 11.11.0, contain an Improper Link Resolution Before File Access ('Link Following') Vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privil... Read more
Affected Products : encryption- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2025-8348
A vulnerability has been found in Kehua Charging Pile Cloud Platform 1.0 and classified as critical. This vulnerability affects unknown code of the file /home. The manipulation leads to improper authentication. The attack can be initiated remotely. The ex... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-2813
An unauthenticated remote attacker can cause a Denial of Service by sending a large number of requests to the http service on port 80.... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.6
HIGHCVE-2011-10008
A stack-based buffer overflow vulnerability exists in MPlayer Lite r33064 due to improper bounds checking when handling M3U playlist files containing long http:// URL entries. An attacker can craft a malicious .m3u file with a specially formatted URL that... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Memory Corruption
-
9.3
CRITICALCVE-2013-10042
A stack-based buffer overflow vulnerability exists in freeFTPd version 1.0.10 and earlier in the handling of the FTP PASS command. When an attacker sends a specially crafted password string, the application fails to validate input length, resulting in mem... Read more
Affected Products : freeftpd- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Memory Corruption
-
10.0
CRITICALCVE-2014-125124
An unauthenticated remote command execution vulnerability exists in Pandora FMS versions up to and including 5.0RC1 via the Anyterm web interface, which listens on TCP port 8023. The anyterm-module endpoint accepts unsanitized user input via the p paramet... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-54832
OPEXUS FOIAXpress Public Access Link (PAL), version v11.1.0, allows an authenticated user to add entries to the list of states and territories.... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
7.2
HIGHCVE-2025-8213
The NinjaScanner – Virus & Malware scan plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'nscan_ajax_quarantine' and 'nscan_quarantine_select' functions in all versions up to, and including, 3.2... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
6.9
MEDIUMCVE-2025-8192
There exists a TOCTOU race condition in TvSettings AppRestrictionsFragment.java that lead to start of attacker supplied activity in Settings’ context, i.e. system-uid context, thus lead to launchAnyWhere. The core idea is to utilize the time window betwee... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Race Condition
-
4.9
MEDIUMCVE-2025-6348
The Smart Slider 3 plugin for WordPress is vulnerable to time-based SQL Injection via the ‘sliderid’ parameter in all versions up to, and including, 3.5.1.28 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on... Read more
Affected Products : smart_slider_3- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
6.4
MEDIUMCVE-2025-5720
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author’ parameter in all versions up to, and including, 5.80.2 due to insufficient input sanitization and output escaping. This makes it possib... Read more
Affected Products : customer_reviews_for_woocommerce- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Cross-Site Scripting
-
6.3
MEDIUMCVE-2025-54589
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value d... Read more
- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Cross-Site Scripting
-
4.3
MEDIUMCVE-2025-54573
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.1.0 through 2.41.0, email verification was not enforced when using Basic HTTP Authentication. As a result, users could create accounts using fake email a... Read more
Affected Products : computer_vision_annotation_tool- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-54575
ImageSharp is a 2D graphics library. In versions below 2.1.11 and 3.0.0 through 3.1.10, a specially crafted GIF file containing a malformed comment extension block (with a missing block terminator) can cause the ImageSharp GIF decoder to enter an infinite... Read more
Affected Products : imagesharp- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-54581
vproxy is an HTTP/HTTPS/SOCKS5 proxy server. In versions 2.3.3 and below, untrusted data is extracted from the user-controlled HTTP Proxy-Authorization header and passed to Extension::try_from and flows into parse_ttl_extension where it is parsed as a TTL... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2025-54433
Bugsink is a self-hosted error tracking service. In versions 1.4.2 and below, 1.5.0 through 1.5.4, 1.6.0 through 1.6.3, and 1.7.0 through 1.7.3, ingestion paths construct file locations directly from untrusted event_id input without validation. A special... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Path Traversal