Latest CVE Feed
-
10.0
CRITICALCVE-2025-29902
Remote code execution that allows unauthorized users to execute arbitrary code on the server machine.... Read more
Affected Products :- Published: Jun. 13, 2025
- Modified: Jun. 16, 2025
-
6.5
MEDIUMCVE-2025-6070
The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read t... Read more
Affected Products :- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Path Traversal
-
7.1
HIGHCVE-2025-36539
AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service.... Read more
Affected Products : pi_server- Published: Jun. 12, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Denial of Service
-
6.9
MEDIUMCVE-2025-4417
A cross-site scripting vulnerability exists in AVEVA PI Connector for CygNet Versions 1.6.14 and prior that, if exploited, could allow an administrator miscreant with local access to the connector admin portal to persist arbitrary JavaScript code that... Read more
Affected Products :- Published: Jun. 12, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Scripting
-
7.8
HIGHCVE-2025-27689
Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.... Read more
Affected Products :- Published: Jun. 12, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Authorization
-
7.2
HIGHCVE-2025-5487
The AutomatorWP – Automator plugin for no-code automations, webhooks & custom integrations in WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the field_conditions parameter in all versions up to, and including, 5.2.3 due to in... Read more
Affected Products :- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2025-6062
The Yougler Blogger Profile Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, v1.01. This is due to missing or incorrect nonce validation on the 'yougler-plugin.php' page. This makes it possible fo... Read more
Affected Products :- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.1
MEDIUMCVE-2025-5926
The Link Shield plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5.4. This is due to missing or incorrect nonce validation on the link_shield_menu_options() function. This makes it possible for unaut... Read more
Affected Products :- Published: Jun. 13, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.3
MEDIUMCVE-2025-6106
A vulnerability was found in WuKongOpenSource WukongCRM 9.0 and classified as problematic. This issue affects some unknown processing of the file AdminRoleController.java. The manipulation leads to cross-site request forgery. The attack may be initiated r... Read more
Affected Products : wukongcrm- Published: Jun. 16, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
2.7
LOWCVE-2024-38823
Salt's request server is vulnerable to replay attacks when not using a TLS encrypted transport.... Read more
Affected Products :- Published: Jun. 13, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Misconfiguration
-
9.0
HIGHCVE-2025-6091
A vulnerability was found in H3C GR-3000AX V100R007L50. It has been classified as critical. Affected is the function UpdateWanParamsMulti/UpdateIpv6Params of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow... Read more
Affected Products :- Published: Jun. 15, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-6109
A vulnerability was found in javahongxi whatsmars 2021.4.0. It has been rated as problematic. Affected by this issue is the function initialize of the file /whatsmars-archetypes/whatsmars-initializr/src/main/java/org/hongxi/whatsmars/initializr/controller... Read more
Affected Products :- Published: Jun. 16, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2025-6096
A vulnerability has been found in codesiddhant Jasmin Ransomware up to 1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Search leads to sql injection.... Read more
Affected Products :- Published: Jun. 16, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-6108
A vulnerability was found in hansonwang99 Spring-Boot-In-Action up to 807fd37643aa774b94fd004cc3adbd29ca17e9aa. It has been declared as critical. Affected by this vulnerability is the function watermarkTest of the file /springbt_watermark/src/main/java/cn... Read more
Affected Products :- Published: Jun. 16, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Path Traversal
-
10.0
HIGHCVE-2025-6098
A vulnerability was found in UTT 进取 750W up to 5.0. It has been classified as critical. This affects the function strcpy of the file /goform/setSysAdm of the component API. The manipulation of the argument passwd1 leads to buffer overflow. It is possible ... Read more
Affected Products :- Published: Jun. 16, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Memory Corruption
-
4.3
MEDIUMCVE-2025-6059
The Seraphinite Accelerator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.27.21. This is due to missing or incorrect nonce validation on the 'OnAdminApi_CacheOpBegin' function. This makes it possi... Read more
Affected Products : seraphinite_accelerator- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.1
MEDIUMCVE-2025-6040
The Easy Flashcards plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1. This is due to missing or incorrect nonce validation on the 'ef_settings_submenu' page. This makes it possible for unauthentica... Read more
Affected Products :- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.1
MEDIUMCVE-2025-6064
The WP URL Shortener plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the 'url_shortener_settings' page. This makes it possible for unauthen... Read more
Affected Products :- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.5
MEDIUMCVE-2025-6012
The Auto Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated atta... Read more
Affected Products :- Published: Jun. 13, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Scripting
-
4.3
MEDIUMCVE-2025-5928
The WP Sliding Login/Dashboard Panel plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing or incorrect nonce validation on the wp_sliding_panel_user_options() function. This m... Read more
Affected Products :- Published: Jun. 13, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery