Latest CVE Feed
-
2.1
LOWCVE-2024-42325
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authorization
-
2.3
LOWCVE-2024-36469
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authentication
-
8.6
HIGHCVE-2024-36465
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Injection
-
5.9
MEDIUMCVE-2025-27244
AssetView and AssetView CLOUD contain an issue with acquiring sensitive information from sent data to the developer. If exploited, sensitive information may be obtained by a remote unauthenticated attacker.... Read more
Affected Products : assetview- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Information Disclosure
-
8.2
HIGHCVE-2025-25060
Missing authentication for critical function vulnerability exists in AssetView and AssetView CLOUD. If exploited, the files on the server where the product is running may be obtained and/or deleted by a remote unauthenticated attacker.... Read more
Affected Products : assetview- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-2779
The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 1.1.2. This makes it possible for ... Read more
Affected Products :- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2025-3074
Inappropriate implementation in Downloads in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3073
Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3072
Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3071
Inappropriate implementation in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-3070
Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-3069
Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-3068
Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-3067
Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted app. (Chromium security severity:... Read more
- Published: Apr. 02, 2025
- Modified: Sep. 08, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-3066
Use after free in Site Isolation in Google Chrome prior to 135.0.7049.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 08, 2025
- Vuln Type: Memory Corruption
-
6.8
MEDIUMCVE-2025-29982
Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insecure Inherited Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.... Read more
Affected Products : wyse_management_suite- Published: Apr. 02, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2025-29981
Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information di... Read more
Affected Products : wyse_management_suite- Published: Apr. 02, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-27694
Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insufficient Resource Pool vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Denial of service.... Read more
Affected Products : wyse_management_suite- Published: Apr. 02, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Denial of Service
-
4.9
MEDIUMCVE-2025-27693
Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerabili... Read more
Affected Products : wyse_management_suite- Published: Apr. 02, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Cross-Site Scripting
-
7.2
HIGHCVE-2025-27692
Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Unrestricted Upload of File with Dangerous Type vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service, Inf... Read more
Affected Products : wyse_management_suite- Published: Apr. 02, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Misconfiguration