Latest CVE Feed
-
5.9
MEDIUMCVE-2025-48007
Improper Encoding or Escaping of Output vulnerability in Hallo Welt! GmbH BlueSpice (Extension:BlueSpiceAvatars) allows Cross-Site Scripting (XSS). This issue affects BlueSpice: from 5 through 5.1.1.... Read more
Affected Products : bluespice- Published: Sep. 19, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cross-Site Scripting
-
5.9
MEDIUMCVE-2025-58114
Improper Input Validation vulnerability in Hallo Welt! GmbH BlueSpice (Extension:CognitiveProcessDesigner) allows Cross-Site Scripting (XSS).This issue affects BlueSpice: from 5 through 5.1.1.... Read more
Affected Products : bluespice- Published: Sep. 19, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cross-Site Scripting
-
7.7
HIGHCVE-2025-57528
An issue was discovered in Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01 allowing attackers to cause a denial of service via the funcname, funcpara1, funcpara2 parameters to the formSetCfm function (uri path: SetCfm).... Read more
Affected Products :- Published: Sep. 19, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Denial of Service
-
6.4
MEDIUMCVE-2025-8532
Authorization Bypass Through User-Controlled Key, CWE - 862 - Missing Authorization, – Improper Authorization vulnerability in Bimser Solution Software Trade Inc. EBA Document and Workflow Management System allows – Exploitation of Trusted Identifiers, – ... Read more
Affected Products :- Published: Sep. 19, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authorization
-
6.3
MEDIUMCVE-2025-8664
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saysis Computer Systems Trade Ltd. Co. StarCities E-Municipality Management allows Cross-Site Scripting (XSS).This issue affects StarCities E-Muni... Read more
Affected Products :- Published: Sep. 19, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cross-Site Scripting
-
7.0
HIGHCVE-2025-59215
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.... Read more
- Published: Sep. 18, 2025
- Modified: Sep. 19, 2025
-
6.3
MEDIUMCVE-2025-10671
A vulnerability has been found in youth-is-as-pale-as-poetry e-learning 1.0. Impacted is the function encryptSecret of the file e-learning-master\exam-api\src\main\java\com\yf\exam\ability\shiro\jwt\JwtUtils.java of the component JWT Token Handler. The ma... Read more
Affected Products :- Published: Sep. 18, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cryptography
-
5.5
MEDIUMCVE-2025-36139
IBM Lakehouse (watsonx.data 2.2) is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclos... Read more
Affected Products : watsonx.data- Published: Sep. 18, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cross-Site Scripting
-
4.7
MEDIUMCVE-2025-36143
IBM Lakehouse (watsonx.data 2.2) could allow an authenticated privileged user to execute arbitrary commands on the system due to improper validation of user supplied input.... Read more
Affected Products : watsonx.data- Published: Sep. 18, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2025-36146
IBM Lakehouse (watsonx.data 2.2) could allow an authenticated user to obtain sensitive server component version information which could aid in further attacks against the system.... Read more
Affected Products : watsonx.data- Published: Sep. 18, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2024-30250
Astro-Shield is an integration to enhance website security with SubResource Integrity hashes, Content-Security-Policy headers, and other techniques. Versions from 1.2.0 to 1.3.1 of Astro-Shield allow bypass to the allow-lists for cross-origin resources by... Read more
Affected Products : astro-shield- Published: Apr. 04, 2024
- Modified: Sep. 19, 2025
-
7.5
HIGHCVE-2024-29896
Astro-Shield is a library to compute the subresource integrity hashes for your JS scripts and CSS stylesheets. When automated CSP headers generation for SSR content is enabled and the web application serves content that can be partially controlled by exte... Read more
Affected Products : astro-shield- Published: Mar. 28, 2024
- Modified: Sep. 19, 2025
-
7.5
HIGHCVE-2025-58767
REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or l... Read more
Affected Products : rexml- Published: Sep. 17, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Denial of Service
-
5.5
MEDIUMCVE-2024-35804
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Mark target gfn of emulated atomic instruction as dirty When emulating an atomic access on behalf of the guest, mark the target gfn dirty if the CMPXCHG by KVM is attempted an... Read more
Affected Products : linux_kernel- Published: May. 17, 2024
- Modified: Sep. 19, 2025
-
6.5
MEDIUMCVE-2025-29888
A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in... Read more
Affected Products : file_station- Published: Aug. 29, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Denial of Service
-
5.9
MEDIUMCVE-2024-43398
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new,... Read more
- Published: Aug. 22, 2024
- Modified: Sep. 19, 2025
-
4.3
MEDIUMCVE-2024-39908
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilitie... Read more
- Published: Jul. 16, 2024
- Modified: Sep. 19, 2025
-
8.0
HIGHCVE-2025-32956
ManageWiki is a MediaWiki extension allowing users to manage wikis. Versions before commit f504ed8, are vulnerable to SQL injection when renaming a namespace in Special:ManageWiki/namespaces when using a page prefix (namespace name, which is the current n... Read more
Affected Products : managewiki- Published: Apr. 21, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2023-50894
In Janitza GridVis through 9.0.66, use of hard-coded credentials in the de.janitza.pasw.feature.impl.activators.PasswordEncryption password encryption function allows remote authenticated administrative users to discover cleartext database credentials con... Read more
Affected Products : gridvis- Published: Mar. 26, 2024
- Modified: Sep. 19, 2025
-
4.6
MEDIUMCVE-2025-32964
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This ... Read more
Affected Products : managewiki- Published: Apr. 22, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authorization