Latest CVE Feed
-
7.4
HIGHCVE-2025-20340
A vulnerability in the Address Resolution Protocol (ARP) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a broadcast storm, leading to a denial of service (DoS) condition on an affected device. ... Read more
Affected Products : ios_xr- Published: Sep. 10, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
6.0
MEDIUMCVE-2025-20248
A vulnerability in the installation process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR Software image signature verification and load unsigned software on an affected device. To exploit this vulnerability,... Read more
Affected Products : ios_xr- Published: Sep. 10, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-20159
A vulnerability in the management interface access control list (ACL) processing feature in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass configured ACLs for the SSH, NetConf, and gRPC features. This vulnerability exis... Read more
Affected Products : ios_xr- Published: Sep. 10, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration
-
9.0
HIGHCVE-2025-10169
A weakness has been identified in UTT 1200GW up to 3.0.0-170831. Affected by this issue is some unknown functionality of the file /goform/ConfigWirelessBase. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remote... Read more
Affected Products :- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Memory Corruption
-
9.0
CRITICALCVE-2024-38002
The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a wo... Read more
- Published: Oct. 22, 2024
- Modified: Sep. 10, 2025
-
6.5
MEDIUMCVE-2025-6224
Certificate generation in juju/utils using the cert.NewLeaf function could include private information. If this certificate were then transferred over the network in plaintext, an attacker listening on that network could sniff the certificate and triviall... Read more
Affected Products : juju\/utils- Published: Jul. 01, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Information Disclosure
-
4.7
MEDIUMCVE-2025-53791
Improper access control in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network.... Read more
Affected Products : edge_chromium- Published: Sep. 05, 2025
- Modified: Sep. 10, 2025
-
8.7
HIGHCVE-2025-22846
When SIP Session and Router ALG profiles are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support... Read more
Affected Products : big-ip_access_policy_manager big-ip_advanced_firewall_manager big-ip_analytics big-ip_application_acceleration_manager big-ip_application_security_manager big-ip_domain_name_system big-ip_fraud_protection_service big-ip_global_traffic_manager big-ip_link_controller big-ip_local_traffic_manager +3 more products- Published: Feb. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
6.1
MEDIUMCVE-2025-10027
A vulnerability was determined in itsourcecode POS Point of Sale System 1.0. Affected by this issue is some unknown functionality of the file /inventory/main/vendors/datatables/unit_testing/templates/2512.php. This manipulation of the argument scripts cau... Read more
Affected Products : point_of_sale_system- Published: Sep. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2025-38742
Dell iDRAC Service Module (iSM), versions prior to 6.0.3.0, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code executio... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 21, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-48208
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability in Apache HertzBeat . The attacker needs to have an authenticated account with access, and the attack can only be triggered by crafting custom c... Read more
Affected Products : hertzbeat- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-24404
XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulner... Read more
Affected Products : hertzbeat- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: XML External Entity
-
5.3
MEDIUMCVE-2025-53743
Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.... Read more
Affected Products : applitools_eyes- Published: Jul. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-53742
Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file syste... Read more
Affected Products : applitools_eyes- Published: Jul. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration
-
9.1
CRITICALCVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization c... Read more
Affected Products : next.js- Published: Mar. 21, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2024-56332
Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that... Read more
Affected Products : next.js- Published: Jan. 03, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-51479
Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly unde... Read more
Affected Products : next.js- Published: Dec. 17, 2024
- Modified: Sep. 10, 2025
-
5.5
MEDIUMCVE-2024-51752
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In affected versions refresh tokens are logged to the console when the disabled by default `debug` flag, is enabled.... Read more
Affected Products : authkit- Published: Nov. 05, 2024
- Modified: Sep. 10, 2025
-
7.5
HIGHCVE-2024-46982
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this c... Read more
Affected Products : next.js- Published: Sep. 17, 2024
- Modified: Sep. 10, 2025
-
7.5
HIGHCVE-2024-39693
Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later.... Read more
Affected Products : next.js- Published: Jul. 10, 2024
- Modified: Sep. 10, 2025