Latest CVE Feed
-
8.4
HIGHCVE-2010-20108
FTPPad <= 1.2.0 contains a stack-based buffer overflow vulnerability in its FTP directory listing parser. When the client connects to an FTP server and receives a crafted response to a LIST command containing an excessively long directory and filename, th... Read more
Affected Products :- Published: Aug. 21, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
8.4
HIGHCVE-2010-20120
Maple versions up to and including 13's Maplet framework allows embedded commands to be executed automatically when a .maplet file is opened. This behavior bypasses standard security restrictions that normally prevent code execution in regular Maple works... Read more
Affected Products :- Published: Aug. 21, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-43752
Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.4, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allow users to upload a... Read more
- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Denial of Service
-
6.8
MEDIUMCVE-2025-41452
Post-authenticated external control of system web interface configuration setting vulnerability in Danfoss AK-SM8xxA Series prior to 4.3.1, which could allow for a denial of service attack induced by improper handling of exceptional conditions... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Denial of Service
-
6.5
MEDIUMCVE-2025-8678
The WP Crontrol plugin for WordPress is vulnerable to Server-Side Request Forgery in versions 1.17.0 to 1.19.1 via the 'wp_remote_request' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Server-Side Request Forgery
-
0.0
NONECVE-2025-9340
Out-of-bounds Write vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bc-fips on All (API modules). This vulnerability is associated with program files org/bouncycastle/jcajce/provider/BaseCipher. This issue affects Bouncy Castle f... Read more
Affected Products : bouncy_castle_for_java- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
4.3
MEDIUMCVE-2025-57884
Missing Authorization vulnerability in wpsoul Greenshift allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Greenshift: from n/a through 12.1.1.... Read more
Affected Products : greenshift- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-57887
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme Jobmonster allows Stored XSS. This issue affects Jobmonster: from n/a through 4.8.0.... Read more
Affected Products : jobmonster- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Scripting
-
4.3
MEDIUMCVE-2025-57893
Cross-Site Request Forgery (CSRF) vulnerability in Epsiloncool WP Fast Total Search allows Cross Site Request Forgery. This issue affects WP Fast Total Search: from n/a through 1.79.270.... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-57894
Missing Authorization vulnerability in ollybach WPPizza allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WPPizza: from n/a through 3.19.8.... Read more
Affected Products : wppizza- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-57896
Missing Authorization vulnerability in andy_moyle Church Admin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Church Admin: from n/a through 5.0.26.... Read more
Affected Products : church_admin- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-9254
WebITR developed by Uniong has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to log into the system as arbitrary users by exploiting a specific functionality.... Read more
Affected Products : webitr- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authentication
-
7.1
HIGHCVE-2025-9256
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.... Read more
Affected Products : webitr- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Path Traversal
-
7.1
HIGHCVE-2025-9257
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.... Read more
Affected Products : webitr- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Path Traversal
-
7.1
HIGHCVE-2025-9258
WebITR developed by Uniong has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.... Read more
Affected Products : webitr- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Path Traversal
-
4.3
MEDIUMCVE-2025-9331
The Spacious theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'welcome_notice_import_handler' function in all versions up to, and including, 1.9.11. This makes it possible for authenticated at... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
9.3
CRITICALCVE-2009-10006
UFO: Alien Invasion versions up to and including 2.2.1 contain a buffer overflow vulnerability in its built-in IRC client component. When the client connects to an IRC server and receives a crafted numeric reply (specifically a 001 message), the applicati... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2024-58239
In the Linux kernel, the following vulnerability has been resolved: tls: stop recv() if initial process_rx_list gave us non-DATA If we have a non-DATA record on the rx_list and another record of the same type still on the queue, we will end up merging t... Read more
Affected Products : linux_kernel- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-33120
IBM QRadar SIEM 7.5 through 7.5.0 UP13 could allow an authenticated user to escalate their privileges via a misconfigured cronjob due to execution with unnecessary privileges.... Read more
Affected Products : qradar_security_information_and_event_manager- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-55573
QuantumNous new-api v.0.8.5.2 is vulnerable to Cross Site Scripting (XSS).... Read more
Affected Products :- Published: Aug. 22, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Cross-Site Scripting