Latest CVE Feed
-
8.2
HIGHCVE-2025-58056
Netty is an asynchronous event-driven network application framework for development of maintainable high performance protocol servers and clients. In versions 4.1.124.Final, and 4.2.0.Alpha3 through 4.2.4.Final, Netty incorrectly accepts standalone newlin... Read more
Affected Products : netty- Published: Sep. 03, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-36906
In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-58057
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and be... Read more
Affected Products : netty- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Denial of Service
-
4.8
MEDIUMCVE-2025-9929
A weakness has been identified in code-projects Responsive Blog Site 1.0. This affects an unknown function of the file blogs_view.php. Executing manipulation of the argument product_code/gen_name/product_name/supplier can lead to cross site scripting. It ... Read more
Affected Products : responsive_blog_site- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Cross-Site Scripting
-
6.2
MEDIUMCVE-2025-57752
Next.js is a React framework for building full-stack web applications. In versions before 14.2.31 and from 15.0.0 to before 15.4.5, Next.js Image Optimization API routes are affected by cache key confusion. When images returned from API routes vary based ... Read more
Affected Products : next.js- Published: Aug. 29, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-9930
A security vulnerability has been detected in 1000projects Beauty Parlour Management System 1.0. This impacts an unknown function of the file /admin/contact-us.php. The manipulation of the argument mobnumber leads to sql injection. The attack can be initi... Read more
Affected Products : beauty_parlour_management_system- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-9932
A flaw has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this vulnerability is an unknown functionality of the file /admin/update-image.php. This manipulation of the argument lid causes sql injection. The attack may be initiat... Read more
Affected Products : beauty_parlour_management_system- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-9933
A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. Such manipulation of the argument viewid leads to sql injection. The attack ma... Read more
Affected Products : beauty_parlour_management_system- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-9924
A vulnerability has been found in projectworlds Travel Management System 1.0. This vulnerability affects unknown code of the file /enquiry.php. The manipulation of the argument t2 leads to sql injection. Remote exploitation of the attack is possible. The ... Read more
Affected Products : travel_management_system- Published: Sep. 03, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2025-55173
Next.js is a React framework for building full-stack web applications. In versions before 14.2.31 and from 15.0.0 to before 15.4.5, Next.js Image Optimization is vulnerable to content injection. The issue allowed attacker-controlled external image sources... Read more
Affected Products : next.js- Published: Aug. 29, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Misconfiguration
-
6.1
MEDIUMCVE-2025-9923
A flaw has been found in Campcodes Sales and Inventory System 1.0. This affects an unknown part of the file /index.php. Executing manipulation of the argument page can lead to cross site scripting. The attack may be launched remotely. The exploit has been... Read more
Affected Products : sales_and_inventory_system- Published: Sep. 03, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Cross-Site Scripting
-
9.8
CRITICALCVE-2024-46484
TRENDnet TV-IP410 vA1.0R was discovered to contain an OS command injection vulnerability via the /server/cgi-bin/testserv.cgi component.... Read more
- Published: Aug. 29, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Injection
-
8.2
HIGHCVE-2025-57822
Next.js is a React framework for building full-stack web applications. Prior to versions 14.2.32 and 15.4.7, when next() was used without explicitly passing the request object, it could lead to SSRF in self-hosted applications that incorrectly forwarded u... Read more
Affected Products : next.js- Published: Aug. 29, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Server-Side Request Forgery
-
5.5
MEDIUMCVE-2025-26456
In multiple functions of DexUseManagerLocal.java, there is a possible way to crash system server due to a logic error in the code. This could lead to local permanent denial of service with no additional execution privileges needed. User interaction is not... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Denial of Service
-
7.8
HIGHCVE-2025-0089
In multiple locations, there is a possible way to hijack the Launcher app due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-32345
In updateState of ContentProtectionTogglePreferenceController.java, there is a possible way for a secondary user to disable the primary user's deceptive app scanning setting due to a logic error in the code. This could lead to local escalation of privileg... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-48522
In setDisplayName of AssociationRequest.java, there is a possible way for an app to retain CDM association due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction ... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-48546
In checkPermissions of SafeActivityOptions.java, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization
-
7.3
HIGHCVE-2025-48547
In multiple locations, there is a possible one-time permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.... Read more
Affected Products : android- Published: Sep. 04, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-32320
In System UI, there is a possible way to view other users' images due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.... Read more
Affected Products : android- Published: Sep. 05, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization