Latest CVE Feed
-
4.9
MEDIUMCVE-2025-50102
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50101
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.2
LOWCVE-2025-50100
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with ne... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50099
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via m... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2025-50098
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-50087
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network a... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-27465
Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed in... Read more
Affected Products : xen- Published: Jul. 16, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Memory Corruption
-
5.6
MEDIUMCVE-2025-2572
In WhatsUp Gold versions released before 2024.0.3, a database manipulation vulnerability allows an unauthenticated attacker to modify the contents of WhatsUp.dbo.WrlsMacAddressGroup.... Read more
Affected Products : whatsup_gold- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
5.6
MEDIUMCVE-2025-47182
Improper input validation in Microsoft Edge (Chromium-based) allows an authorized attacker to bypass a security feature locally.... Read more
Affected Products : edge_chromium- Published: Jul. 11, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-47963
No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.... Read more
Affected Products : edge_chromium- Published: Jul. 11, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
9.3
CRITICALCVE-2025-49153
The affected products could allow an unauthenticated attacker to overwrite files and execute arbitrary code.... Read more
Affected Products :- Published: Jun. 25, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-49152
The affected products contain JSON Web Tokens (JWT) that do not expire, which could allow an attacker to gain access to the system.... Read more
Affected Products :- Published: Jun. 25, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
9.3
CRITICALCVE-2025-49151
The affected products could allow an unauthenticated attacker to generate forged JSON Web Tokens (JWT) to bypass authentication.... Read more
Affected Products :- Published: Jun. 25, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-47964
Microsoft Edge (Chromium-based) Spoofing Vulnerability... Read more
Affected Products : edge_chromium- Published: Jul. 11, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2023-38036
A security vulnerability within Ivanti Avalanche Manager before version 6.4.1 may allow an unauthenticated attacker to create a buffer overflow that could result in service disruption or arbitrary code execution.... Read more
Affected Products : avalanche- Published: Jul. 12, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Denial of Service
-
8.1
HIGHCVE-2024-10906
In version 0.6.0 of eosphoros-ai/db-gpt, the `uvicorn` app created by `dbgpt_server` uses an overly permissive instance of `CORSMiddleware` which sets the `Access-Control-Allow-Origin` to `*` for all requests. This configuration makes all endpoints expose... Read more
Affected Products : db-gpt- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.9
MEDIUMCVE-2023-39339
A vulnerability exists on all versions of Ivanti Policy Secure below 22.6R1 where an authenticated administrator can perform an arbitrary file read via a maliciously crafted web request.... Read more
Affected Products : policy_secure- Published: Jul. 12, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-10902
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /v1/personal/agent/upload` is vulnerable to Arbitrary File Upload with Path Traversal. This vulnerability allows unauthorized attackers to upload arbitrary files to the victim's file system at any l... Read more
Affected Products : db-gpt- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2024-10901
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/chart/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write, enabling them to wri... Read more
Affected Products : db-gpt- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-10835
In eosphoros-ai/db-gpt version v0.6.0, the web API `POST /api/v1/editor/sql/run` allows execution of arbitrary SQL queries without any access control. This vulnerability can be exploited by attackers to perform Arbitrary File Write using DuckDB SQL, enabl... Read more
Affected Products : db-gpt- Published: Mar. 20, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication