Latest CVE Feed
-
5.3
MEDIUMCVE-2025-54575
ImageSharp is a 2D graphics library. In versions below 2.1.11 and 3.0.0 through 3.1.10, a specially crafted GIF file containing a malformed comment extension block (with a missing block terminator) can cause the ImageSharp GIF decoder to enter an infinite... Read more
Affected Products : imagesharp- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-54581
vproxy is an HTTP/HTTPS/SOCKS5 proxy server. In versions 2.3.3 and below, untrusted data is extracted from the user-controlled HTTP Proxy-Authorization header and passed to Extension::try_from and flows into parse_ttl_extension where it is parsed as a TTL... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2025-54433
Bugsink is a self-hosted error tracking service. In versions 1.4.2 and below, 1.5.0 through 1.5.4, 1.6.0 through 1.6.3, and 1.7.0 through 1.7.3, ingestion paths construct file locations directly from untrusted event_id input without validation. A special... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-53558
ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common credential for all installations. With the knowledge of the credential, an attacker may log in to the affected devices.... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-50475
An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vuln... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
8.2
HIGHCVE-2025-4425
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
7.2
HIGHCVE-2025-41688
A high privileged remote attacker can execute arbitrary OS commands using an undocumented method allowing to escape the implemented LUA sandbox.... Read more
- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
6.9
MEDIUMCVE-2025-43018
Certain HP LaserJet Pro printers may be vulnerable to information disclosure when a non-authenticated user queries a device’s local address book.... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Information Disclosure
-
5.1
MEDIUMCVE-2025-40980
A Stored Cross Site Scripting vulnerability has been found in UltimatePOS by UltimateFosters. This vulnerability is due to the lack of proper validation of user inputs via ‘/products/<PRODUCT_ID>/edit’, affecting to ‘name’ parameter via POST. The vulnerab... Read more
Affected Products : ultimatepos- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Cross-Site Scripting
-
0.0
NACVE-2025-38498
In the Linux kernel, the following vulnerability has been resolved: do_change_type(): refuse to operate on unmounted/not ours mounts Ensure that propagation settings can only be changed for mounts located in the caller's mount namespace. This change ali... Read more
Affected Products : linux_kernel- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-30480
Dell PowerProtect Data Manager, versions prior to 19.19, contain(s) an Improper Input Validation vulnerability in PowerProtect Data Manager. A low privileged attacker with remote access could potentially exploit this vulnerability to read arbitrary files.... Read more
Affected Products : powerprotect_data_manager- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2025-26332
TechAdvisor versions 2.6 through 3.37-30 for Dell XtremIO X2, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information ex... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Information Disclosure
-
7.0
HIGHCVE-2025-25011
An uncontrolled search path element vulnerability can lead to local privilege Escalation (LPE) via Insecure Directory Permissions. The vulnerability arises from improper handling of directory permissions. An attacker with local access may exploit this fla... Read more
Affected Products : elastic_beats- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authorization
-
5.9
MEDIUMCVE-2025-1221
A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to nor... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.6
HIGHCVE-2025-53022
TrustedFirmware-M (aka Trusted Firmware for M profile Arm CPUs) before 2.1.3 and 2.2.x before 2.2.1 lacks length validation during a firmware upgrade. While processing a new image, the Firmware Upgrade (FWU) module does not validate the length field of th... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Memory Corruption
-
6.9
MEDIUMCVE-2025-54572
The Ruby SAML library is for implementing the client side of a SAML authorization. In versions 1.18.0 and below, a denial-of-service vulnerability exists in ruby-saml even with the message_max_bytesize setting configured. The vulnerability occurs because ... Read more
Affected Products : ruby-saml- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Denial of Service
-
8.1
HIGHCVE-2024-48916
Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC ... Read more
Affected Products : ceph- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
9.2
CRITICALCVE-2014-125126
An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanis... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Authentication
-
10.0
CRITICALCVE-2014-125123
An unauthenticated SQL injection vulnerability exists in the Kloxo web hosting control panel (developed by LXCenter) prior to version 6.1.12. The flaw resides in the login-name parameter passed to lbin/webcommand.php, which fails to properly sanitize inpu... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection
-
9.5
CRITICALCVE-2013-10043
A vulnerability exists in OAstium VoIP PBX astium-confweb-2.1-25399 and earlier, where improper input validation in the logon.php script allows an attacker to bypass authentication via SQL injection. Once authenticated as an administrator, the attacker ca... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
- Vuln Type: Injection