Latest CVE Feed
-
7.8
HIGHCVE-2025-25724
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-b... Read more
Affected Products : libarchive- Published: Mar. 02, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
8.2
HIGHCVE-2025-0452
eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, which is commonly used as a separator in Windows paths. Thi... Read more
Affected Products : db-gpt- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Path Traversal
-
6.1
MEDIUMCVE-2024-8029
An XSS vulnerability was discovered in the upload file(s) process of imartinez/privategpt v0.5.0. Attackers can upload malicious SVG files, which execute JavaScript when victims click on the file link. This can lead to user data theft, session hijacking, ... Read more
- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Cross-Site Scripting
-
3.1
LOWCVE-2025-7703
Authentication vulnerability in the mobile application(tech.palm.id)may lead to the risk of information leakage.... Read more
Affected Products :- Published: Jul. 16, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
4.4
MEDIUMCVE-2025-50103
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple ... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50102
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50101
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.2
LOWCVE-2025-50100
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with ne... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50099
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via m... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2025-50098
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50087
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-27465
Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed in... Read more
Affected Products : xen- Published: Jul. 16, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-2572
In WhatsUp Gold versions released before 2024.0.3, a database manipulation vulnerability allows an unauthenticated attacker to modify the contents of WhatsUp.dbo.WrlsMacAddressGroup.... Read more
Affected Products : whatsup_gold- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
5.6
MEDIUMCVE-2025-47182
Improper input validation in Microsoft Edge (Chromium-based) allows an authorized attacker to bypass a security feature locally.... Read more
Affected Products : edge_chromium- Published: Jul. 11, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-47963
No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.... Read more
Affected Products : edge_chromium- Published: Jul. 11, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
9.3
CRITICALCVE-2025-49153
The affected products could allow an unauthenticated attacker to overwrite files and execute arbitrary code.... Read more
Affected Products :- Published: Jun. 25, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-49152
The affected products contain JSON Web Tokens (JWT) that do not expire, which could allow an attacker to gain access to the system.... Read more
Affected Products :- Published: Jun. 25, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
9.3
CRITICALCVE-2025-49151
The affected products could allow an unauthenticated attacker to generate forged JSON Web Tokens (JWT) to bypass authentication.... Read more
Affected Products :- Published: Jun. 25, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-47964
Microsoft Edge (Chromium-based) Spoofing Vulnerability... Read more
Affected Products : edge_chromium- Published: Jul. 11, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2023-38036
A security vulnerability within Ivanti Avalanche Manager before version 6.4.1 may allow an unauthenticated attacker to create a buffer overflow that could result in service disruption or arbitrary code execution.... Read more
Affected Products : avalanche- Published: Jul. 12, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service