Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.8

    CRITICAL
    CVE-2025-22952

    elestio memos v0.23.0 is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks.... Read more

    Affected Products : memos
    • Published: Feb. 27, 2025
    • Modified: Jul. 10, 2025
    • Vuln Type: Server-Side Request Forgery
  • 5.4

    MEDIUM
    CVE-2024-57240

    A Cross-Site Scripting (XSS) vulnerability in the Rendering Engine component in Apryse WebViewer v11.1 and earlier allows attackers to execute arbitrary code via a crafted PDF file.... Read more

    Affected Products : webviewer
    • Published: Mar. 03, 2025
    • Modified: Jul. 10, 2025
    • Vuln Type: Cross-Site Scripting
  • 8.8

    HIGH
    CVE-2024-37479

    Local File Inclusion vulnerability in LA-Studio LA-Studio Element Kit for Elementor via "LaStudioKit Progress Bar" widget in New Post, specifically in the "progress_type" attribute.This issue affects LA-Studio Element Kit for Elementor: from n/a through 1... Read more

    Affected Products : element_kit_for_elementor
    • Published: Jul. 02, 2024
    • Modified: Jul. 10, 2025
  • 7.5

    HIGH
    CVE-2024-53450

    RAGFlow 0.13.0 suffers from improper access control in document-hooks.ts, allowing unauthorized access to user documents.... Read more

    Affected Products : ragflow
    • Published: Dec. 09, 2024
    • Modified: Jul. 10, 2025
  • 9.1

    CRITICAL
    CVE-2024-5926

    A path traversal vulnerability in the get-project-files functionality of stitionai/devika allows attackers to read arbitrary files from the filesystem and cause a Denial of Service (DoS). This issue is present in all versions of the application. The vulne... Read more

    Affected Products : devika
    • Published: Jun. 30, 2024
    • Modified: Jul. 10, 2025
  • 9.8

    CRITICAL
    CVE-2024-38993

    rjrodger jsonic-next v2.12.1 was discovered to contain a prototype pollution via the function empty. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.... Read more

    Affected Products : jsonic
    • Published: Jul. 01, 2024
    • Modified: Jul. 10, 2025
  • 6.5

    MEDIUM
    CVE-2024-39853

    adolph_dudu ratio-swiper 0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.... Read more

    Affected Products : swiper
    • Published: Jul. 01, 2024
    • Modified: Jul. 10, 2025
  • 5.4

    MEDIUM
    CVE-2024-39929

    Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.... Read more

    Affected Products : exim
    • Published: Jul. 04, 2024
    • Modified: Jul. 10, 2025
  • 5.4

    MEDIUM
    CVE-2024-36387

    Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.... Read more

    Affected Products : http_server ontap
    • Published: Jul. 01, 2024
    • Modified: Jul. 10, 2025
  • 8.8

    HIGH
    CVE-2024-6353

    The Wallet for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'search[value]' parameter in all versions up to, and including, 1.5.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on ... Read more

    Affected Products : terawallet
    • Published: Jul. 12, 2024
    • Modified: Jul. 10, 2025
  • 6.1

    MEDIUM
    CVE-2024-45031

    When editing objects in the Syncope Console, incomplete HTML tags could be used to bypass HTML sanitization. This made it possible to inject stored XSS payloads which would trigger for other users during ordinary usage of the application. XSS payloads cou... Read more

    Affected Products : syncope
    • Published: Oct. 24, 2024
    • Modified: Jul. 10, 2025
  • 9.1

    CRITICAL
    CVE-2024-23590

    Session Fixation vulnerability in Apache Kylin. This issue affects Apache Kylin: from 2.0.0 through 4.x. Users are recommended to upgrade to version 5.0.0 or above, which fixes the issue.... Read more

    Affected Products : kylin
    • Published: Nov. 04, 2024
    • Modified: Jul. 10, 2025
  • 4.9

    MEDIUM
    CVE-2024-50378

    Airflow versions before 2.10.3 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive variables were set via airflow CLI, values of those variables appeare... Read more

    Affected Products : airflow
    • Published: Nov. 08, 2024
    • Modified: Jul. 10, 2025
  • 8.8

    HIGH
    CVE-2024-6983

    mudler/localai version 2.17.1 is vulnerable to remote code execution. The vulnerability arises because the localai backend receives inputs not only from the configuration file but also from other inputs, allowing an attacker to upload a binary file and ex... Read more

    Affected Products : localai
    • Published: Sep. 27, 2024
    • Modified: Jul. 10, 2025
  • 4.3

    MEDIUM
    CVE-2024-8771

    The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'preview_email_template_design' func... Read more

    Affected Products : email_subscribers_\&_newsletters
    • Published: Sep. 26, 2024
    • Modified: Jul. 10, 2025
  • 5.3

    MEDIUM
    CVE-2024-40761

    Inadequate Encryption Strength vulnerability in Apache Answer. This issue affects Apache Answer: through 1.3.5. Using the MD5 value of a user's email to access Gravatar is insecure and can lead to the leakage of user email. The official recommendation i... Read more

    Affected Products : answer
    • Published: Sep. 25, 2024
    • Modified: Jul. 10, 2025
  • 4.3

    MEDIUM
    CVE-2024-7386

    The Premium Packages – Sell Digital Products Securely plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.1. This is due to missing nonce validation on the addRefund() function. This makes it possible... Read more

    • Published: Sep. 25, 2024
    • Modified: Jul. 10, 2025
  • 8.2

    HIGH
    CVE-2024-37397

    An External XML Entity (XXE) vulnerability in the provisioning web service of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to leak API secrets.... Read more

    Affected Products : endpoint_manager
    • Published: Sep. 12, 2024
    • Modified: Jul. 10, 2025
  • 6.1

    MEDIUM
    CVE-2024-37656

    An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the insufficient URL parameter verification in bbs/logout.php.... Read more

    Affected Products : gnuboard
    • Published: Jul. 07, 2025
    • Modified: Jul. 10, 2025
    • Vuln Type: Information Disclosure
  • 6.1

    MEDIUM
    CVE-2024-37657

    An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via thebbs/login.php component.... Read more

    Affected Products : gnuboard
    • Published: Jul. 07, 2025
    • Modified: Jul. 10, 2025
    • Vuln Type: Misconfiguration
Showing 20 of 291520 Results