Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.6

    CRITICAL
    CVE-2025-66398

    Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.19.0, an unauthenticated attacker can pollute the internal state (`restoreFilePath`) of the server via the `/skServer/validateBackup` endpoint. This allows th... Read more

    Affected Products : signal_k_server
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Path Traversal
  • 7.5

    HIGH
    CVE-2025-68272

    Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoint (`/sig... Read more

    Affected Products : signal_k_server
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Denial of Service
  • 7.7

    HIGH
    CVE-2026-21428

    cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header line... Read more

    Affected Products : cpp-httplib
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Server-Side Request Forgery
  • 7.5

    HIGH
    CVE-2025-66628

    ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code read... Read more

    Affected Products : imagemagick
    • Published: Dec. 10, 2025
    • Modified: Jan. 06, 2026
    • Vuln Type: Memory Corruption
  • 7.5

    HIGH
    CVE-2025-68618

    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, using Magick to read a malicious SVG file resulted in a DoS attack. Version 7.1.2-12 fixes the issue.... Read more

    Affected Products : imagemagick
    • Published: Dec. 30, 2025
    • Modified: Jan. 06, 2026
    • Vuln Type: Denial of Service
  • 7.5

    HIGH
    CVE-2025-67269

    An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer->length = (... Read more

    Affected Products :
    • Published: Jan. 02, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Denial of Service
  • 9.8

    CRITICAL
    CVE-2025-67268

    gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied sat... Read more

    Affected Products :
    • Published: Jan. 02, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Memory Corruption
  • 9.8

    CRITICAL
    CVE-2025-65125

    SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to gain sensitive information.... Read more

    Affected Products :
    • Published: Jan. 02, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Injection
  • 5.3

    MEDIUM
    CVE-2024-55374

    REDCap 14.3.13 allows an attacker to enumerate usernames due to an observable discrepancy between login attempts.... Read more

    Affected Products :
    • Published: Jan. 02, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Authentication
  • 9.8

    CRITICAL
    CVE-2025-15409

    A vulnerability was determined in code-projects Online Guitar Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/Delete_product.php. Executing manipulation of the argument del_pro can lead to sql injection. The attack... Read more

    Affected Products : online_guitar_store
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Injection
  • 6.2

    MEDIUM
    CVE-2025-68950

    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, Magick fails to check for circular references between two MVGs, leading to a stack overflow. This is a DoS vulnerability, and any sit... Read more

    Affected Products : imagemagick
    • Published: Dec. 30, 2025
    • Modified: Jan. 06, 2026
    • Vuln Type: Denial of Service
  • 9.8

    CRITICAL
    CVE-2025-15410

    A vulnerability was identified in code-projects Online Guitar Store 1.0. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument L_email leads to sql injection. It is possible to initiate the attack re... Read more

    Affected Products : online_guitar_store
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Injection
  • 7.5

    HIGH
    CVE-2025-69204

    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, in the WriteSVGImage function, using an int variable to store number_attributes caused an integer overflow. This, in turn, triggered ... Read more

    Affected Products : imagemagick
    • Published: Dec. 30, 2025
    • Modified: Jan. 06, 2026
    • Vuln Type: Memory Corruption
  • 8.8

    HIGH
    CVE-2025-68700

    RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions prior to 0.23.0, a low-privileged authenticated user (normal login account) can execute arbitrary system commands on the server host process via the frontend Canvas CodeExe... Read more

    Affected Products : ragflow
    • Published: Dec. 31, 2025
    • Modified: Jan. 06, 2026
    • Vuln Type: Injection
  • 5.3

    MEDIUM
    CVE-2025-68273

    Signal K Server is a server application that runs on a central hub in a boat. An unauthenticated information disclosure vulnerability in versions prior to 2.19.0 allows any user to retrieve sensitive system information, including the full SignalK data sch... Read more

    Affected Products : signal_k_server
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Information Disclosure
  • 7.3

    HIGH
    CVE-2025-68619

    Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the appstore interface allow administrators to install npm packages through a REST API endpoint. While the endpoint validates that the package name e... Read more

    Affected Products : signal_k_server
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Supply Chain
  • 9.1

    CRITICAL
    CVE-2025-68620

    Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSocket-base... Read more

    Affected Products : signal_k_server
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Authentication
  • 8.8

    HIGH
    CVE-2025-69203

    Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the access request system have two related features that when combined by themselves and with an information disclosure vulnerability enable convinci... Read more

    Affected Products : signal_k_server
    • Published: Jan. 01, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Authentication
  • 9.8

    CRITICAL
    CVE-2025-15420

    A security vulnerability has been detected in Yonyou KSOA 9.0. This affects an unknown part of the file /worksheet/agent_work_report.jsp. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has bee... Read more

    Affected Products : ksoa
    • Published: Jan. 02, 2026
    • Modified: Jan. 06, 2026
    • Vuln Type: Injection
  • 10.0

    CRITICAL
    CVE-2025-67109

    Improper verification of the time certificate in Eclipse Cyclone DDS before v0.10.5 allows attackers to bypass certificate checks and execute commands with System privileges.... Read more

    Affected Products : cyclone_data_distribution_service
    • Published: Dec. 23, 2025
    • Modified: Jan. 06, 2026
    • Vuln Type: Authentication
Showing 20 of 4721 Results