Latest CVE Feed
-
6.4
MEDIUMCVE-2025-7644
The Pixel Gallery Addons for Elementor – Easy Grid, Creative Gallery, Drag and Drop Grid, Custom Grid Layout, Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via URLs in all widgets in all versions up to, and including,... Read more
Affected Products :- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Scripting
-
0.0
NACVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_tim... Read more
Affected Products : linux_kernel- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Race Condition
-
8.6
HIGHCVE-2025-53472
WRC-BE36QS-B and WRC-W701-B contain an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in WebGUI. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to WebGUI.... Read more
Affected Products :- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-6082
The Birth Chart Compatibility plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0. This is due to insufficient protection against directly accessing the plugin's index.php file, which causes an error exposi... Read more
Affected Products :- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2025-6187
The bSecure plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its order_info REST endpoint in versions 1.3.7 through 1.7.9. The plugin registers the /webhook/v2/order_info/ route with a permission_callback that... Read more
Affected Products :- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
6.1
MEDIUMCVE-2025-7685
The Like & Share My Site plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing or incorrect nonce validation on the 'lsms_admin' page. This makes it possible for unauthenticated ... Read more
Affected Products :- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.0
MEDIUMCVE-2025-7899
The powermail extension for TYPO3 allows Insecure Direct Object Reference resulting in download of arbitrary files from the webserver. This issue affects powermail version 12.0.0 up to 12.5.2 and version 13.0.0... Read more
Affected Products : powermail- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
10.0
CRITICALCVE-2025-4285
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rolantis Information Technologies Agentis allows SQL Injection.This issue affects Agentis: before 4.32.... Read more
Affected Products :- Published: Jul. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Injection
-
6.7
MEDIUMCVE-2025-20143
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device. To exploit this vulnerability, the a... Read more
Affected Products : ios_xr- Published: Mar. 12, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authentication
-
5.1
MEDIUMCVE-2024-10929
In certain circumstances, an issue in Arm Cortex-A57, Cortex-A72 (revisions before r1p0), Cortex-A73 and Cortex-A75 may allow an adversary to gain a weak form of control over the victim's branch history.... Read more
Affected Products :- Published: Jan. 22, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-23367
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the... Read more
Affected Products : undertow- Published: Jan. 30, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2019-6446
An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issu... Read more
- EPSS Score: %59.21
- Published: Jan. 16, 2019
- Modified: Jul. 21, 2025
-
4.3
MEDIUMCVE-2025-20300
In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles, and has read-only acces... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-20319
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability `edit_scripted` and `list_inputs` capability , could perform a remote command execution due to improper user input san... Read more
Affected Products : splunk- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authentication
-
7.3
HIGHCVE-2025-20320
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.107, 9.3.2408.117, and 9.2.2406.121, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Denial of Service
-
6.5
MEDIUMCVE-2025-20321
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.114, and 9.2.2406.119, an unauthenticated attacker can send a specially-crafted SPL search that could change the membership... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-20322
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, an unauthenticated attacker could send a specially-crafted SPL search command that could trigger a ... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-20323
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a low-privileged user that does not hold the "admin" or "power" Splunk roles could turn off the scheduled search `Bucket Copy Trigger` within the Splunk Archiver application. This is bec... Read more
Affected Products : splunk- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authorization
-
5.7
MEDIUMCVE-2025-20226
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a saved search... Read more
- Published: Mar. 26, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-20227
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8, and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.112, 9.2.2403.115, 9.1.2312.208 and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk ro... Read more
- Published: Mar. 26, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Information Disclosure