Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.4

    MEDIUM
    CVE-2025-25476

    A stored cross-site scripting (XSS) vulnerability in SysPass 3.2.x allows a malicious user with elevated privileges to execute arbitrary Javascript code by specifying a malicious XSS payload as a notification type or notification component.... Read more

    Affected Products : syspass
    • Published: Feb. 28, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.5

    MEDIUM
    CVE-2025-25478

    The account file upload functionality in Syspass 3.2.x fails to properly handle special characters in filenames. This mismanagement leads to the disclosure of the web application s source code, exposing sensitive information such as the database password.... Read more

    Affected Products : syspass
    • Published: Feb. 28, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Information Disclosure
  • 4.3

    MEDIUM
    CVE-2025-3880

    The Poll, Survey & Quiz Maker Plugin by Opinion Stage plugin for WordPress is vulnerable to unauthorized modification of data due to a misconfigured capability check on several functions in all versions up to, and including, 19.9.0. This makes it possible... Read more

    Affected Products : poll\,_survey_\&_quiz_maker
    • Published: Jun. 17, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Authorization
  • 6.4

    MEDIUM
    CVE-2025-5337

    The Slider, Gallery, and Carousel by MetaSlider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘aria-label’ parameter in all versions up to, and including, 3.98.0 due to insufficient input sanitization and output escaping. This ... Read more

    Affected Products : slider\,_gallery\,_and_carousel
    • Published: Jun. 14, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.4

    MEDIUM
    CVE-2025-5289

    The 3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipbook Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style’ and 'mode' parameters in all versions up to, and including, 1.16.15 due to insufficient input san... Read more

    Affected Products : 3d_flipbook
    • Published: Jun. 21, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
  • 7.3

    HIGH
    CVE-2024-11038

    The The WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJAX action in all versions up to, and including, 1.7.5. ... Read more

    • Published: Nov. 19, 2024
    • Modified: Jul. 09, 2025
  • 7.5

    HIGH
    CVE-2025-53184

    Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.... Read more

    Affected Products : harmonyos
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Memory Corruption
  • 7.5

    HIGH
    CVE-2025-53183

    Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.... Read more

    Affected Products : harmonyos
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Denial of Service
  • 6.1

    MEDIUM
    CVE-2025-6044

    An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device i... Read more

    Affected Products : chrome_os
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Authorization
  • 7.6

    HIGH
    CVE-2012-4687

    Post Oak AWAM Bluetooth Reader Traffic System does not use a sufficient source of entropy for private keys, which makes it easier for man-in-the-middle attackers to spoof a device by predicting a key value.... Read more

    Affected Products : awam_bluetooth_reader
    • EPSS Score: %0.54
    • Published: Dec. 08, 2012
    • Modified: Jul. 09, 2025
  • 7.5

    HIGH
    CVE-2025-53182

    Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.... Read more

    Affected Products : harmonyos
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Denial of Service
  • 7.5

    HIGH
    CVE-2025-53181

    Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.... Read more

    Affected Products : harmonyos
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Denial of Service
  • 7.5

    HIGH
    CVE-2025-53179

    Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.... Read more

    Affected Products : harmonyos
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Denial of Service
  • 7.5

    HIGH
    CVE-2025-53180

    Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.... Read more

    Affected Products : harmonyos
    • Published: Jul. 07, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Denial of Service
  • 6.5

    MEDIUM
    CVE-2024-44905

    go-pg pg v10.13.0 was discovered to contain a SQL injection vulnerability via the component /types/append_value.go.... Read more

    Affected Products : pg
    • Published: Jun. 12, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Injection
  • 7.2

    HIGH
    CVE-2025-4799

    The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, ... Read more

    Affected Products : wp-downloadmanager
    • Published: Jun. 11, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Path Traversal
  • 9.8

    CRITICAL
    CVE-2023-48978

    An issue in NCR ITM Web terminal v.4.4.0 and v.4.4.4 allows a remote attacker to execute arbitrary code via a crafted script to the IP camera URL component.... Read more

    Affected Products : itm_web_terminal
    • Published: Jun. 23, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Misconfiguration
  • 8.4

    HIGH
    CVE-2023-50450

    An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges.... Read more

    • Published: Jun. 23, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Authorization
  • 8.7

    HIGH
    CVE-2025-34031

    A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read... Read more

    Affected Products : jmol
    • Published: Jun. 24, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Path Traversal
  • 6.1

    MEDIUM
    CVE-2025-34032

    A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing... Read more

    Affected Products : jmol
    • Published: Jun. 24, 2025
    • Modified: Jul. 09, 2025
    • Vuln Type: Cross-Site Scripting
Showing 20 of 291825 Results