Latest CVE Feed
-
9.8
CRITICALCVE-2025-7604
A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user-login.php. The manipulation of the argument Username leads to sql inject... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-7605
A vulnerability was found in code-projects AVL Rooms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /profile.php. The manipulation of the argument first_name leads to sql injection. The attack may be l... Read more
Affected Products : avl_rooms- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-7613
A vulnerability was found in TOTOLINK T6 4.1.5cu.748. It has been rated as critical. This issue affects the function CloudSrvVersionCheck of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip lead... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-7614
A vulnerability classified as critical has been found in TOTOLINK T6 4.1.5cu.748. Affected is the function delDevice of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ipAddr leads to command inje... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-7615
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-7340
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including... Read more
Affected Products : download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-7341
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the temp_file_delete() function in all versions up to, and i... Read more
Affected Products : download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2025-7360
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation in the handle_files_upload() function in all versions up to, and ... Read more
Affected Products : download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-7656
Integer overflow in V8 in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-7657
Use after free in WebRTC in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-1392
A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of... Read more
- Published: Feb. 17, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Cross-Site Scripting
-
8.1
HIGHCVE-2025-25282
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list... Read more
Affected Products : ragflow- Published: Feb. 21, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-53889
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.9.0, Directus Flows with a manual trigger are not validating whether the user triggering the Flow has permissions to the it... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-53887
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, the exact Directus version number is incorrectly being used as OpenAPI Spec version this means that it is being exposed... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Information Disclosure
-
4.5
MEDIUMCVE-2025-53886
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, when using Directus Flows with the WebHook trigger all incoming request details are logged including security sensitive... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Information Disclosure
-
4.2
MEDIUMCVE-2025-53885
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, when using Directus Flows to handle CRUD events for users it is possible to log the incoming data to console using the ... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-24294
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed ... Read more
Affected Products :- Published: Jul. 12, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Denial of Service
-
8.1
HIGHCVE-2025-6554
Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)... Read more
- Actively Exploited
- Published: Jun. 30, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-1819
A vulnerability, which was classified as critical, was found in Tenda AC7 1200M 15.03.06.44. Affected is the function TendaTelnet of the file /goform/telnet. The manipulation of the argument lan_ip leads to os command injection. It is possible to launch t... Read more
- Published: Mar. 02, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2024-51476
IBM Concert Software 1.0.5 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.... Read more
- Published: Mar. 06, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authentication