Latest CVE Feed
-
6.8
MEDIUMCVE-2025-2179
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on Linux devices enables a locally authenticated non administrative user to disable the app even if the GlobalProtect app configuration would not normally permit ... Read more
Affected Products : globalprotect_app- Published: Jul. 29, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
8.2
HIGHCVE-2025-31965
Improper access restrictions in HCL BigFix Remote Control Server WebUI (versions 10.1.0.0248 and lower) allow non-admin users to view unauthorized information on certain web pages.... Read more
Affected Products :- Published: Jul. 29, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2025-5684
The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `mf-template` DOM Element in all versions up to, and including, 4.0.1 due to insufficient input sanitiz... Read more
Affected Products : metform_elementor_contact_form_builder- Published: Jul. 29, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Cross-Site Scripting
-
9.1
CRITICALCVE-2025-54576
OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions 7.10.0 and below, oauth2-proxy deployments are vulnerable when usin... Read more
Affected Products : oauth2_proxy- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-8323
The e-School from Ventem has a Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
6.9
MEDIUMCVE-2025-54834
OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place.... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
10.0
CRITICALCVE-2014-125121
Array Networks vAPV (version 8.3.2.17) and vxAG (version 9.2.0.34) appliances are affected by a privilege escalation vulnerability caused by a combination of hardcoded SSH credentials (or SSH private key) and insecure permissions on a startup script. The ... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2013-10036
A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overw... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Memory Corruption
-
7.0
HIGHCVE-2025-0712
An uncontrolled search path element vulnerability can lead to local privilege Escalation (LPE) via Insecure Directory Permissions. The vulnerability arises from improper handling of directory permissions. An attacker with local access may exploit this fla... Read more
Affected Products : apm_server- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
8.2
HIGHCVE-2025-4421
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-54425
Umbraco is an ASP.NET CMS. In versions 13.0.0 through 13.9.2, 15.0.0 through 15.4.1 and 16.0.0 through 16.1.0, the content delivery API can be restricted from public access where an API key must be provided in a header to authorize the request. It's also ... Read more
Affected Products : umbraco_cms- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-7847
The AI Engine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the rest_simpleFileUpload() function in versions 2.9.3 and 2.9.4. This makes it possible for authenticated attackers, with Subscriber-level a... Read more
- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2013-10039
A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentica... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
6.0
MEDIUMCVE-2025-4426
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-8322
The e-School from Ventem has a Missing Authorization vulnerability, allowing remote attackers with regular privilege to access administrator functions, including creating, modifying, and deleting accounts. They can even escalate any account to system admi... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
6.0
MEDIUMCVE-2025-4424
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
7.3
HIGHCVE-2025-36611
Dell Encryption and Dell Security Management Server, versions prior to 11.11.0, contain an Improper Link Resolution Before File Access ('Link Following') Vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privil... Read more
Affected Products : encryption- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2025-8348
A vulnerability has been found in Kehua Charging Pile Cloud Platform 1.0 and classified as critical. This vulnerability affects unknown code of the file /home. The manipulation leads to improper authentication. The attack can be initiated remotely. The ex... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-2813
An unauthenticated remote attacker can cause a Denial of Service by sending a large number of requests to the http service on port 80.... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.6
HIGHCVE-2011-10008
A stack-based buffer overflow vulnerability exists in MPlayer Lite r33064 due to improper bounds checking when handling M3U playlist files containing long http:// URL entries. An attacker can craft a malicious .m3u file with a specially formatted URL that... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Memory Corruption