Latest CVE Feed
-
4.9
MEDIUMCVE-2025-47951
Weblate is a web based localization tool. Prior to version 5.12, the verification of the second factor was not subject to rate limiting. The absence of rate limiting on the second factor endpoint allows an attacker with valid credentials to automate OTP g... Read more
Affected Products : weblate- Published: Jun. 16, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authentication
-
8.3
HIGHCVE-2025-7602
A vulnerability was found in D-Link DI-8100 16.07.26A1 and classified as critical. This issue affects some unknown processing of the file /arp_sys.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. The attack... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
8.3
HIGHCVE-2025-7603
A vulnerability was found in D-Link DI-8100 16.07.26A1. It has been classified as critical. Affected is an unknown function of the file /jingx.asp of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow. It is possible... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-7604
A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user-login.php. The manipulation of the argument Username leads to sql inject... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-7605
A vulnerability was found in code-projects AVL Rooms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /profile.php. The manipulation of the argument first_name leads to sql injection. The attack may be l... Read more
Affected Products : avl_rooms- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-7613
A vulnerability was found in TOTOLINK T6 4.1.5cu.748. It has been rated as critical. This issue affects the function CloudSrvVersionCheck of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip lead... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-7614
A vulnerability classified as critical has been found in TOTOLINK T6 4.1.5cu.748. Affected is the function delDevice of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ipAddr leads to command inje... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-7615
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads... Read more
- Published: Jul. 14, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-7340
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including... Read more
Affected Products : download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-7341
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the temp_file_delete() function in all versions up to, and i... Read more
Affected Products : download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2025-7360
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation in the handle_files_upload() function in all versions up to, and ... Read more
Affected Products : download_contact_form_7_widget_for_elementor_page_builder_\&_gutenberg_blocks- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-7656
Integer overflow in V8 in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-7657
Use after free in WebRTC in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-1392
A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of... Read more
- Published: Feb. 17, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Cross-Site Scripting
-
8.1
HIGHCVE-2025-25282
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list... Read more
Affected Products : ragflow- Published: Feb. 21, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-53889
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.9.0, Directus Flows with a manual trigger are not validating whether the user triggering the Flow has permissions to the it... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-53887
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, the exact Directus version number is incorrectly being used as OpenAPI Spec version this means that it is being exposed... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Information Disclosure
-
4.5
MEDIUMCVE-2025-53886
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, when using Directus Flows with the WebHook trigger all incoming request details are logged including security sensitive... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Information Disclosure
-
4.2
MEDIUMCVE-2025-53885
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0 and prior to version 11.9.0, when using Directus Flows to handle CRUD events for users it is possible to log the incoming data to console using the ... Read more
Affected Products : directus- Published: Jul. 15, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-24294
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed ... Read more
Affected Products :- Published: Jul. 12, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Denial of Service