Latest CVE Feed
-
8.8
HIGHCVE-2025-49521
A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or acce... Read more
Affected Products :- Published: Jun. 30, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-49520
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the... Read more
Affected Products :- Published: Jun. 30, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-5967
A stored cross-site scripting vulnerability in ENS HX 10.0.4 allows a malicious user to inject arbitrary HTML into the ENS HX Malware Scan Name field, resulting in the exposure of sensitive data.... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Cross-Site Scripting
-
8.6
HIGHCVE-2025-53100
RestDB's Codehooks.io MCP Server is an MCP server on the Codehooks.io platform. Prior to version 0.2.2, the MCP server is written in a way that is vulnerable to command injection attacks as part of some of its MCP Server tools definition and implementatio... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Injection
-
5.8
MEDIUMCVE-2025-49493
Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection.... Read more
Affected Products : cloudtest- Published: Jun. 30, 2025
- Modified: Jul. 03, 2025
- Vuln Type: XML External Entity
-
7.4
HIGHCVE-2025-49480
Out-of-bounds access in ASR180x 、ASR190x in lte-telephony, This vulnerability is associated with program files apps/lzma/src/LzmaEnc.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Memory Corruption
-
5.4
MEDIUMCVE-2025-49491
Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux、Kestrel、Lapwing_Linux on Linux (traffic_stat modules) allows Resource Leak Exposure. This vulnerability is associated with program files traffic_stat/traffic_service/traffic_service.C... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Information Disclosure
-
5.4
MEDIUMCVE-2025-49488
Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in router components allows Resource Leak Exposure. This vulnerability is associated with program files router/phonebook/pb.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Lin... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Misconfiguration
-
7.1
HIGHCVE-2025-48379
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for avail... Read more
Affected Products : pillow- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-41648
An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-36593
Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid prot... Read more
Affected Products :- Published: Jun. 30, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2025-36630
In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.... Read more
Affected Products : nessus- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Misconfiguration
-
6.9
MEDIUMCVE-2025-34065
An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function allows unauthenticated access to any request containing "/nobody" in the URL, bypassing login controls.... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authentication
-
6.9
MEDIUMCVE-2025-34081
The Contec Co.,Ltd. CONPROSYS HMI System (CHS) exposes a PHP phpinfo() debug page to unauthenticated users that may contain sensitive data useful for an attacker.This issue affects CONPROSYS HMI System (CHS): before 3.7.7.... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Information Disclosure
-
9.0
CRITICALCVE-2025-34064
A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receivin... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Misconfiguration
-
8.7
HIGHCVE-2025-34058
Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulner... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authentication
-
5.1
MEDIUMCVE-2025-34050
A cross-site request forgery (CSRF) vulnerability exists in the web interface of AVTECH IP camera, DVR, and NVR devices. An attacker can craft malicious requests that, when executed in the context of an authenticated user’s browser session, allow unauthor... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.8
MEDIUMCVE-2025-6952
A vulnerability, which was classified as problematic, has been found in Open5GS up to 2.7.5. This issue affects the function amf_state_operational of the file src/amf/amf-sm.c of the component AMF Service. The manipulation leads to reachable assertion. It... Read more
Affected Products : open5gs- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
-
3.7
LOWCVE-2025-4654
The Soumettre.fr plugin for WordPress is vulnerable to unauthorized access and modification of data due to a improper authorization checks on the make_signature function in all versions up to, and including, 2.1.5. This makes it possible for unauthenticat... Read more
Affected Products :- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-52101
linjiashop <=0.9 is vulnerable to Incorrect Access Control. When using the default-generated JWT authentication, attackers can bypass the authentication and retrieve the encrypted "password" and "salt". The password can then be obtained through brute-forc... Read more
Affected Products :- Published: Jul. 01, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authentication