Latest CVE Feed
-
7.6
HIGHCVE-2025-55004
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-1, ImageMagick is vulnerable to heap-buffer overflow read around the handling of images with separate alpha channels when performing imag... Read more
Affected Products : imagemagick- Published: Aug. 13, 2025
- Modified: Aug. 15, 2025
- Vuln Type: Memory Corruption
-
5.3
MEDIUMCVE-2025-54791
OMERO.web provides a web based client and plugin infrastructure. Prior to version 5.29.2, if an error occurred when resetting a user's password using the Forgot Password option in OMERO.web, the error message displayed on the Web page can disclose informa... Read more
Affected Products : omero.web- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Information Disclosure
-
9.6
CRITICALCVE-2025-54382
Cherry Studio is a desktop client that supports for multiple LLM providers. In version 1.5.1, a remote code execution (RCE) vulnerability exists in the Cherry Studio platform when connecting to streamableHttp MCP servers. The issue arises from the server’... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Misconfiguration
-
7.7
HIGHCVE-2025-54074
Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.2.5 to 1.5.1, Cherry Studio is vulnerable to OS Command Injection during a connection with a malicious MCP server in HTTP Streamable mode. Attackers can setup a ma... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Injection
-
5.4
MEDIUMCVE-2025-52392
Soosyze CMS 2.0 allows brute-force login attacks via the /user/login endpoint due to missing rate-limiting and lockout mechanisms. An attacker can repeatedly submit login attempts without restrictions, potentially gaining unauthorized administrative acces... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 19, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-52386
CycloneDX Sunshine v0.9 is vulnerable to CSV Formula Injection via a crafted JSON file... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-32451
A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uninitialized pointer. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and... Read more
Affected Products : pdf_reader- Published: Aug. 13, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-8908
A vulnerability was determined in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.5.4. Affected by this issue is some unknown functionality of the file crm/WeiXinApp/yunzhijia/event.php. The manipulation of the argument openid leads to sql... Read more
Affected Products : lingdang_crm- Published: Aug. 13, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Injection
-
7.3
HIGHCVE-2025-8907
A vulnerability was found in H3C M2 NAS V100R006. Affected by this vulnerability is an unknown functionality of the component Webserver Configuration. The manipulation leads to execution with unnecessary privileges. An attack has to be approached locally.... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2025-8671
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening... Read more
Affected Products : h2o- Published: Aug. 13, 2025
- Modified: Aug. 17, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-48989
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. O... Read more
Affected Products : tomcat- Published: Aug. 13, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Denial of Service
-
5.2
MEDIUMCVE-2025-55280
This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reve... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Misconfiguration
-
6.9
MEDIUMCVE-2025-55279
This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve p... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Cryptography
-
6.8
MEDIUMCVE-2025-54465
This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Misconfiguration
-
7.0
HIGHCVE-2025-54464
This vulnerability exists in ZKTeco WL20 due to storage of admin and user credentials without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary d... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Cryptography
-
6.3
MEDIUMCVE-2025-8916
Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcpkix, bcprov, bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files... Read more
Affected Products : bouncy_castle_for_java- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-8914
Organization Portal System developed by WellChoose has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.... Read more
Affected Products : organization_portal_system- Published: Aug. 13, 2025
- Modified: Aug. 21, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-8913
Organization Portal System developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.... Read more
Affected Products : organization_portal_system- Published: Aug. 13, 2025
- Modified: Aug. 21, 2025
- Vuln Type: Path Traversal
-
8.7
HIGHCVE-2025-8912
Organization Portal System developed by WellChoose has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.... Read more
Affected Products : organization_portal_system- Published: Aug. 13, 2025
- Modified: Aug. 21, 2025
- Vuln Type: Path Traversal
-
6.1
MEDIUMCVE-2025-8911
Organization Portal System developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.... Read more
Affected Products : organization_portal_system- Published: Aug. 13, 2025
- Modified: Aug. 21, 2025
- Vuln Type: Cross-Site Scripting