Latest CVE Feed
-
8.8
HIGHCVE-2025-49291
Cross-Site Request Forgery (CSRF) vulnerability in codepeople Calculated Fields Form allows Cross Site Request Forgery. This issue affects Calculated Fields Form: from n/a through 5.3.58.... Read more
Affected Products : calculated_fields_form- Published: Jun. 06, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Cross-Site Request Forgery
-
9.8
CRITICALCVE-2025-48126
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in g5theme Essential Real Estate allows PHP Local File Inclusion. This issue affects Essential Real Estate: from n/a through 5.2.1.... Read more
Affected Products : essential_real_estate- Published: Jun. 09, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2025-48261
Insertion of Sensitive Information Into Sent Data vulnerability in MultiVendorX MultiVendorX allows Retrieve Embedded Sensitive Data. This issue affects MultiVendorX: from n/a through 4.2.22.... Read more
Affected Products : multivendorx- Published: Jun. 09, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Information Disclosure
-
7.3
HIGHCVE-2024-8765
In lunary-ai/lunary, the privilege check mechanism is flawed in version git afc5df4. The system incorrectly identifies certain endpoints as public if the path contains '/auth/' anywhere within it. This allows unauthenticated attackers to access sensitive ... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2024-8764
A vulnerability in lunary-ai/lunary, as of commit be54057, allows users to upload and execute arbitrary regular expressions on the server side. This can lead to a Denial of Service (DoS) condition, as certain regular expressions can cause excessive resour... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-8763
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary repository, specifically in the compileTextTemplate function. The affected version is git be54057. An attacker can exploit this vulnerability by manipulating the r... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
4.3
MEDIUMCVE-2024-7476
A broken access control vulnerability exists in lunary-ai/lunary versions 1.2.7 through 1.4.2. The vulnerability allows an authenticated attacker to modify any user's templates by sending a crafted HTTP POST request to the /v1/templates/{id}/versions endp... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-11301
In lunary-ai/lunary before version 1.6.3, the application allows the creation of evaluators without enforcing a unique constraint on the combination of projectId and slug. This allows an attacker to overwrite existing data by submitting a POST request wit... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2024-11137
An Insecure Direct Object Reference (IDOR) vulnerability exists in the `PATCH /v1/runs/:id/score` endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter in the... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
8.1
HIGHCVE-2024-10762
In lunary-ai/lunary before version 1.5.9, the /v1/evaluators/ endpoint allows users to delete evaluators of a project by sending a DELETE request. However, the route lacks proper access control, such as middleware to ensure that only users with appropriat... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10330
In lunary-ai/lunary version 1.5.6, the `/v1/evaluators/` endpoint lacks proper access control, allowing any user associated with a project to fetch all evaluator data regardless of their role. This vulnerability permits low-privilege users to access poten... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-6152
A vulnerability, which was classified as critical, was found in Steel Browser up to 0.1.3. This affects the function handleFileUpload of the file api/src/modules/files/files.routes.ts. The manipulation of the argument filename leads to path traversal. It ... Read more
Affected Products : browser- Published: Jun. 17, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Path Traversal
-
7.3
HIGHCVE-2024-10275
In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-6167
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0.5.5. Affected is the function create_workflow of the file python_a2a/agent_flow/server/api.py. The manipulation leads to path traversal. Upgrading to version 0.5.6 i... Read more
Affected Products : python_a2a- Published: Jun. 17, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2024-10274
An improper authorization vulnerability exists in lunary-ai/lunary version 1.5.5. The /users/me/org endpoint lacks adequate access control mechanisms, allowing unauthorized users to access sensitive information about all team members in the current organi... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-10273
In lunary-ai/lunary v1.5.0, improper privilege management in the models.ts file allows users with viewer roles to modify models owned by others. The PATCH endpoint for models does not have appropriate privilege checks, enabling low-privilege users to upda... Read more
Affected Products : lunary- Published: Mar. 20, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
6.4
MEDIUMCVE-2025-5291
The Master Slider – Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's masterslider_pb and ms_slide shortcodes in all versions up to, and including, 3.10.8 due to insufficient input sanitization and ... Read more
Affected Products : master_slider- Published: Jun. 17, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Cross-Site Scripting
-
4.7
MEDIUMCVE-2025-4955
The tarteaucitron.io WordPress plugin before 1.9.5 uses query parameters from YouTube oEmbed URLs without sanitizing these parameters correctly, which could allow users with the contributor role and above to perform Stored Cross-site Scripting attacks.... Read more
Affected Products : tarteaucitron.io- Published: Jun. 18, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Cross-Site Scripting
-
8.1
HIGHCVE-2025-5877
A vulnerability, which was classified as problematic, has been found in Fengoffice Feng Office 3.2.2.1. Affected by this issue is some unknown functionality of the file /application/models/ApplicationDataObject.class.php of the component Document Upload H... Read more
Affected Products : feng_office- Published: Jun. 09, 2025
- Modified: Jul. 02, 2025
- Vuln Type: XML External Entity
-
5.9
MEDIUMCVE-2025-45661
A cross-site scripting (XSS) vulnerability in miniTCG v1.3.1 beta allows attackers to execute abritrary web scripts or HTML via injecting a crafted payload into the id parameter at /members/edit.php.... Read more
Affected Products : minitcg- Published: Jun. 18, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Cross-Site Scripting