Latest CVE Feed
-
7.8
HIGHCVE-2025-21700
In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion Ackermann was able to create a UAF which can be abused for privilege escalation with the following script ... Read more
Affected Products : linux_kernel- Published: Feb. 13, 2025
- Modified: Mar. 24, 2025
- Vuln Type: Memory Corruption
-
6.1
MEDIUMCVE-2024-13867
The Listivo - Classified Ads WordPress Theme theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 2.3.67 due to insufficient input sanitization and output escaping. This makes it p... Read more
Affected Products : listivo- Published: Feb. 13, 2025
- Modified: Feb. 18, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2024-13606
The JS Help Desk – The Ultimate Help Desk & Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'jssupportticketdata' directory. This makes it possible for unauthenticated... Read more
Affected Products : js_help_desk- Published: Feb. 13, 2025
- Modified: Feb. 18, 2025
- Vuln Type: Information Disclosure
-
7.1
HIGHCVE-2024-46910
An authenticated user can perform XSS and potentially impersonate another user. This issue affects Apache Atlas versions 2.3.0 and earlier. Users are recommended to upgrade to version 2.4.0, which fixes the issue.... Read more
Affected Products : atlas- Published: Feb. 13, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2024-3303
An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.6.5, starting from 17.7 prior to 17.7.4, and starting from 17.8 prior to 17.8.2, which allows an attacker to exfiltrate contents of a private issue using prompt inj... Read more
Affected Products : gitlab- Published: Feb. 13, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Information Disclosure
-
4.3
MEDIUMCVE-2024-13639
The Read More & Accordion plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the expmDeleteData() function in all versions up to, and including, 3.4.2. This makes it possible for authentic... Read more
Affected Products : read_more_\&_accordion- Published: Feb. 13, 2025
- Modified: Feb. 18, 2025
- Vuln Type: Authorization
-
7.1
HIGHCVE-2025-0816
CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the product when malicious IPV6 packets are sent to the device.... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
-
7.1
HIGHCVE-2025-0815
CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the product when malicious ICMPV6 packets are sent to the device.... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Denial of Service
-
6.9
MEDIUMCVE-2025-0814
CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the network services running on the product when malicious IEC61850-MMS packets are sent to the device. The core functionality of the breaker remains intact durin... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Denial of Service
-
4.3
MEDIUMCVE-2025-0661
The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible ... Read more
Affected Products : dethemekit_for_elementor- Published: Feb. 13, 2025
- Modified: Feb. 24, 2025
- Vuln Type: Information Disclosure
-
8.5
HIGHCVE-2025-0327
CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit trail data and the other acting as server managing client request) that could cause a loss of Confidentiality, Integrity and Availability of engineer... Read more
Affected Products : ecostruxure_process_expert- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Authorization
-
2.7
LOWCVE-2024-47266
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in share file list functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users with admi... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Path Traversal
-
6.5
MEDIUMCVE-2024-47265
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in encrypted share umount functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users to... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Path Traversal
-
4.9
MEDIUMCVE-2024-47264
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in agent-related functionality in Synology Active Backup for Business before 2.7.1-13234, 2.7.1-23234 and 2.7.1-3234 allows remote authenticated users with admini... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 18, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2024-13346
The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.11.13. This is due to the software allowing users to execute an action that does not properl... Read more
Affected Products : avada- Published: Feb. 13, 2025
- Modified: Feb. 24, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-13345
The Avada Builder plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.11.13. This is due to the software allowing users to execute an action that does not properly validate a value before running do_... Read more
- Published: Feb. 13, 2025
- Modified: Apr. 14, 2025
- Vuln Type: Misconfiguration
-
8.1
HIGHCVE-2025-1070
CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could render the device inoperable when a malicious file is downloaded.... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Misconfiguration
-
8.7
HIGHCVE-2025-1060
CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists that could result in the exposure of data when network traffic is being sniffed by an attacker.... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Cryptography
-
8.7
HIGHCVE-2025-1059
CWE-770: Allocation of Resources Without Limits or Throttling vulnerability exists that could cause communications to stop when malicious packets are sent to the webserver of the device.... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Denial of Service
-
8.1
HIGHCVE-2025-1058
CWE-494: Download of Code Without Integrity Check vulnerability exists that could render the device inoperable when malicious firmware is downloaded.... Read more
Affected Products :- Published: Feb. 13, 2025
- Modified: Feb. 13, 2025
- Vuln Type: Supply Chain