Latest CVE Feed
-
5.7
MEDIUMCVE-2024-34035
An issue was discovered in O-RAN Near Realtime RIC H-Release. To trigger the crashing of the e2mgr, an adversary must flood the system with a significant quantity of E2 Subscription Requests originating from an xApp.... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Denial of Service
-
5.7
MEDIUMCVE-2024-34034
An issue was discovered in FlexRIC 2.0.0. It crashes during a Subscription Request denial-of-service (DoS) attack, triggered by an assertion error. An attacker must send a high number of E42 Subscription Requests to the Near-RT RIC component.... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Denial of Service
-
10.0
CRITICALCVE-2023-25574
`jupyterhub-ltiauthenticator` is a JupyterHub authenticator for learning tools interoperability (LTI). LTI13Authenticator that was introduced in `jupyterhub-ltiauthenticator` 1.3.0 wasn't validating JWT signatures. This is believed to allow the LTI13Authe... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Authentication
-
2.3
LOWCVE-2024-51539
The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special elements used in an SQL command. This vulnerability can only be exploited locally on ... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-1262
The Advanced Google reCaptcha plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 1.27 . This makes it possible for unauthenticated attackers to bypass the Built-in Math Captcha Verification.... Read more
Affected Products : advanced_google_recaptcha- Published: Feb. 25, 2025
- Modified: Feb. 28, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-1676
A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. The manipulation of the argument file leads to os command injection. The attack ... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Injection
-
6.4
MEDIUMCVE-2024-13695
The Enfold theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.9 via the 'attachment_id' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make ... Read more
Affected Products : enfold- Published: Feb. 25, 2025
- Modified: Feb. 28, 2025
- Vuln Type: Server-Side Request Forgery
-
5.3
MEDIUMCVE-2024-13693
The Enfold theme for WordPress is vulnerable to unauthorized access of data due to a missing capability check in avia-export-class.php in all versions up to, and including, 6.0.9. This makes it possible for unauthenticated attackers to export all avia set... Read more
Affected Products : enfold- Published: Feb. 25, 2025
- Modified: Feb. 28, 2025
- Vuln Type: Authorization
-
9.1
CRITICALCVE-2025-1675
The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data.... Read more
Affected Products : zephyr- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Memory Corruption
-
8.2
HIGHCVE-2025-1674
A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.... Read more
Affected Products : zephyr- Published: Feb. 25, 2025
- Modified: Feb. 28, 2025
- Vuln Type: Memory Corruption
-
4.3
MEDIUMCVE-2024-13494
The WordPress File Upload plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.25.2. This is due to missing or incorrect nonce validation on the 'wfu_file_details' function. This makes it possible for un... Read more
Affected Products : wordpress_file_upload- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Cross-Site Request Forgery
-
8.2
HIGHCVE-2025-1673
A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation.... Read more
Affected Products : zephyr- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-1648
The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. ... Read more
Affected Products : yawave- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-1128
The Everest Forms – Contact Forms, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF... Read more
Affected Products : everest_forms- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-1063
The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.4 via the rtcl_taxonomy_settings_export function. This makes it possible for... Read more
- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Information Disclosure
-
7.2
HIGHCVE-2025-22210
A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the category management area in backend.... Read more
Affected Products : hikashop- Published: Feb. 25, 2025
- Modified: Jun. 04, 2025
- Vuln Type: Injection
-
3.5
LOWCVE-2024-10545
The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.9 does not sanitise and escape some of its Image settings, which could allow high privilege users such as Admin to perform Stored Cross-Site Scripting attacks even when the unfiltered... Read more
Affected Products : nextgen_gallery- Published: Feb. 25, 2025
- Modified: May. 15, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-1646
A vulnerability, which was classified as critical, has been found in Lumsoft ERP 8. Affected by this issue is some unknown functionality of the file /Api/TinyMce/UploadAjaxAPI.ashx of the component ASPX File Handler. The manipulation of the argument file ... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Misconfiguration
-
3.6
LOWCVE-2025-27145
copyparty, a portable file server, has a DOM-based cross-site scripting vulnerability in versions prior to 1.16.15. The vulnerability is considered low-risk. By handing someone a maliciously-named file, and then tricking them into dragging the file into c... Read more
Affected Products : copyparty- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-1645
A vulnerability classified as critical was found in Benner Connecta 1.0.5330. Affected by this vulnerability is an unknown functionality of the file /Usuarios/Usuario/EditarLogado/. The manipulation of the argument Handle leads to improper control of reso... Read more
Affected Products :- Published: Feb. 25, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Authorization