Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2024-10668

    There exists an auth bypass in Google Quickshare where an attacker can upload an unknown file type to a victim. The root cause of the vulnerability lies in the fact that when a Payload Transfer frame of type FILE is sent to Quick Share, the file that is c... Read more

    Affected Products : windows nearby quick_share
    • Published: Nov. 07, 2024
    • Modified: Jul. 23, 2025
  • 7.5

    HIGH
    CVE-2024-10389

    There exists a Path Traversal vulnerability in Safearchive on Platforms with Case-Insensitive Filesystems (e.g., NTFS). This allows Attackers to Write Arbitrary Files via Archive Extraction containing symbolic links. We recommend upgrading past commit f7c... Read more

    Affected Products : safearchive
    • Published: Nov. 04, 2024
    • Modified: Jul. 23, 2025
  • 7.8

    HIGH
    CVE-2025-49738

    Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.... Read more

    Affected Products : pc_manager
    • Published: Jul. 08, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Authorization
  • 5.4

    MEDIUM
    CVE-2025-41442

    A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By manipulating certain input parameters, an attacker could execute unauthorized scripts in the user's brows... Read more

    Affected Products : iview
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Cross-Site Scripting
  • 5.3

    MEDIUM
    CVE-2025-46704

    A vulnerability exists in Advantech iView in NetworkServlet.processImportRequest() that could allow for a directory traversal attack. This issue requires an authenticated attacker with at least user-level privileges. A specific parameter is not properl... Read more

    Affected Products : iview
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Path Traversal
  • 7.6

    HIGH
    CVE-2025-48891

    A vulnerability exists in Advantech iView that could allow for SQL injection through the CUtils.checkSQLInjection() function. This vulnerability can be exploited by an authenticated attacker with at least user-level privileges, potentially leading to i... Read more

    Affected Products : iview
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Injection
  • 8.8

    HIGH
    CVE-2025-52577

    A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters ar... Read more

    Affected Products : iview
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Injection
  • 5.4

    MEDIUM
    CVE-2025-53519

    A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By manipulating specific parameters, an attacker could execute unauthorized scripts in the user's browser, p... Read more

    Affected Products : iview
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Cross-Site Scripting
  • 8.8

    HIGH
    CVE-2025-53475

    A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in th... Read more

    Affected Products : iview
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Injection
  • 5.9

    MEDIUM
    CVE-2025-7427

    Uncontrolled Search Path Element in Arm Development Studio before 2025 may allow an attacker to perform a DLL hijacking attack. Successful exploitation could lead to local arbitrary code execution in the context of the user running Arm Development Studio.... Read more

    Affected Products :
    • Published: Jul. 22, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Misconfiguration
  • 7.3

    HIGH
    CVE-2024-10234

    A vulnerability was found in Wildfly, where a user may perform Cross-site scripting in the Wildfly deployment system. This flaw allows an attacker or insider to execute a deployment with a malicious payload, which could trigger undesired behavior against ... Read more

    • Published: Oct. 22, 2024
    • Modified: Jul. 23, 2025
  • 6.4

    MEDIUM
    CVE-2025-7035

    The Media Library Assistant plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mla_tag_cloud and mla_term_list shortcodes in all versions up to, and including, 3.26 due to insufficient input sanitization and output escaping... Read more

    Affected Products : media_library_assistant
    • Published: Jul. 16, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.5

    MEDIUM
    CVE-2025-36104

    IBM Storage Scale 5.2.3.0 and 5.2.3.1 could allow an authenticated user to obtain sensitive information from files due to the insecure permissions inherited through the SMB protocol.... Read more

    • Published: Jul. 12, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2025-3631

    An IBM MQ 9.3 and 9.4 Client connecting to an MQ Queue Manager can cause a SIGSEGV in the AMQRMPPA channel process terminating it.... Read more

    Affected Products : mq mq_appliance
    • Published: Jul. 11, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Denial of Service
  • 5.3

    MEDIUM
    CVE-2025-36090

    IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could allow a remote attacker to obtain information about the application framework which could be used in reconnaissance to gather information for future attacks from a detailed technical error message.... Read more

    Affected Products : analytics_content_hub
    • Published: Jul. 10, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Information Disclosure
  • 9.8

    CRITICAL
    CVE-2024-39752

    IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could be vulnerable to malicious file upload by not validating the type of file uploaded to Explore Content. Attackers can make use of this weakness and upload malicious executable files into the system, an... Read more

    Affected Products : analytics_content_hub
    • Published: Jul. 10, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Misconfiguration
  • 9.8

    CRITICAL
    CVE-2024-38327

    IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 is vulnerable to information exposure and further attacks due to an exposed JavaScript source map which could assist an attacker to read and debug JavaScript used in the application's API.... Read more

    Affected Products : analytics_content_hub
    • Published: Jul. 10, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Information Disclosure
  • 5.3

    MEDIUM
    CVE-2024-37524

    IBM Analytics Content Hub 2.0, 2.1, 2.2, and 2.3 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser.... Read more

    Affected Products : analytics_content_hub
    • Published: Jul. 10, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Information Disclosure
  • 7.5

    HIGH
    CVE-2025-47988

    Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.... Read more

    Affected Products : azure_monitor_agent
    • Published: Jul. 08, 2025
    • Modified: Jul. 23, 2025
  • 8.0

    HIGH
    CVE-2025-47178

    Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.... Read more

    • Published: Jul. 08, 2025
    • Modified: Jul. 23, 2025
    • Vuln Type: Injection
Showing 20 of 293250 Results