Latest CVE Feed
-
7.8
HIGHCVE-2025-24995
Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.... Read more
Affected Products : windows_server_2016 windows_server_2019 windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_server_2022 windows_11_22h2 windows_10_1507 windows +5 more products- Published: Mar. 11, 2025
- Modified: Jul. 03, 2025
-
6.5
MEDIUMCVE-2025-24996
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.... Read more
Affected Products : windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_server_2022 windows_11_22h2 +9 more products- Published: Mar. 11, 2025
- Modified: Jul. 03, 2025
-
4.3
MEDIUMCVE-2025-3863
The Post Carousel Slider for Elementor plugin for WordPress is vulnerable to improper authorization due to a missing capability check on the process_wbelps_promo_form() function in all versions up to, and including, 1.6.0. This makes it possible for authe... Read more
Affected Products : post_carousel_slider_for_elementor- Published: Jun. 26, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-5526
The BuddyPress Docs WordPress plugin before 2.2.5 lacks proper access controls and allows a logged in user to view and download files belonging to another user... Read more
Affected Products : buddypress_docs- Published: Jun. 27, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-6428
When a URL was provided in a link querystring parameter, Firefox for Android would follow that URL instead of the correct URL, potentially leading to phishing attacks. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* ... Read more
- Published: Jun. 24, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Server-Side Request Forgery
-
6.1
MEDIUMCVE-2024-35545
MAP-OS v4.45.0 and earlier was discovered to contain a cross-site scripting (XSS) vulnerability.... Read more
Affected Products : map-os- Published: Jun. 26, 2024
- Modified: Jul. 03, 2025
-
5.4
MEDIUMCVE-2024-36819
MAP-OS 4.45.0 and earlier is vulnerable to Cross-Site Scripting (XSS). This vulnerability allows malicious users to insert a malicious payload into the "Client Name" input. When a service order from this client is created, the malicious payload is display... Read more
Affected Products : map-os- Published: Jun. 25, 2024
- Modified: Jul. 03, 2025
-
4.7
MEDIUMCVE-2024-3754
The Alemha watermarker WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disall... Read more
Affected Products : alemha_watermark- Published: Jun. 14, 2024
- Modified: Jul. 03, 2025
-
4.3
MEDIUMCVE-2025-6425
An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < ... Read more
- Published: Jun. 24, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-53493
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MintyDocs Extension allows Stored XSS.This issue affects Mediawiki - MintyDocs Extension: from 1.43.X before 1.43... Read more
Affected Products :- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Cross-Site Scripting
-
3.7
LOWCVE-2025-53492
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MintyDocs Extension allows Stored XSS.This issue affects Mediawiki - MintyDocs Extension: from 1.43.X before 1.43... Read more
Affected Products :- Published: Jul. 02, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2024-29849
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.... Read more
Affected Products : veeam_backup_\&_replication- Published: May. 22, 2024
- Modified: Jul. 03, 2025
-
8.8
HIGHCVE-2024-29850
Veeam Backup Enterprise Manager allows account takeover via NTLM relay.... Read more
Affected Products : veeam_backup_\&_replication- Published: May. 22, 2024
- Modified: Jul. 03, 2025
-
8.8
HIGHCVE-2025-6192
Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jun. 18, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-6191
Integer overflow in V8 in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jun. 18, 2025
- Modified: Jul. 03, 2025
- Vuln Type: Memory Corruption
-
7.2
HIGHCVE-2024-29851
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account.... Read more
Affected Products : veeam_backup_\&_replication- Published: May. 22, 2024
- Modified: Jul. 03, 2025
-
7.8
HIGHCVE-2024-48992
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable.... Read more
Affected Products : needrestart- Published: Nov. 19, 2024
- Modified: Jul. 03, 2025
-
7.8
HIGHCVE-2024-48991
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python inte... Read more
Affected Products : needrestart- Published: Nov. 19, 2024
- Modified: Jul. 03, 2025
-
7.8
HIGHCVE-2024-48990
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.... Read more
Affected Products : needrestart- Published: Nov. 19, 2024
- Modified: Jul. 03, 2025
-
7.8
HIGHCVE-2024-11003
Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modu... Read more
Affected Products : needrestart- Published: Nov. 19, 2024
- Modified: Jul. 03, 2025