Latest CVE Feed
-
6.9
MEDIUMCVE-2025-0844
A vulnerability was found in needyamin Library Card System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file signup.php of the component Registration Page. The manipulation of the argument fir... Read more
- Published: Jan. 30, 2025
- Modified: Feb. 04, 2025
- Vuln Type: Cross-Site Scripting
-
9.9
CRITICALCVE-2025-21415
Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network.... Read more
Affected Products : azure_ai_face_service- Published: Jan. 29, 2025
- Modified: Feb. 07, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-21396
Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network.... Read more
- Published: Jan. 29, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-0843
A vulnerability was found in needyamin Library Card System 1.0. It has been classified as critical. Affected is an unknown function of the file admindashboard.php of the component Admin Panel. The manipulation of the argument email/password leads to sql i... Read more
Affected Products : library_card_system- Published: Jan. 29, 2025
- Modified: Feb. 04, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2024-57665
JFinalCMS 1.0 is vulnerable to SQL Injection in rc/main/java/com/cms/entity/Content.java. The cause of the vulnerability is that the title parameter is controllable and is concatenated directly into filterSql without filtering.... Read more
Affected Products : jfinalcms- Published: Jan. 29, 2025
- Modified: May. 23, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-0851
A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Jan. 29, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2025-0842
A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. This issue affects some unknown processing of the file admin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The... Read more
Affected Products : library_card_system- Published: Jan. 29, 2025
- Modified: Feb. 25, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2024-57513
A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4.... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Denial of Service
-
7.8
HIGHCVE-2024-57510
Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Feb. 03, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2024-57509
Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2024-57395
Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password and account number parameters.... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2024-54852
When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an unauthenticated attacker is then able to perform various maliciou... Read more
Affected Products : teedy- Published: Jan. 29, 2025
- Modified: May. 24, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2024-54851
Teedy <= 1.12 is vulnerable to Cross Site Request Forgery (CSRF), due to the lack of CSRF protection.... Read more
Affected Products : teedy- Published: Jan. 29, 2025
- Modified: May. 23, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.1
MEDIUMCVE-2024-51182
HTML Injection vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to inject arbitrary HTML code via the "erro" parameter.... Read more
Affected Products : celk_saude- Published: Jan. 29, 2025
- Modified: May. 23, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2024-48761
Reflected XSS vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to inject arbitrary JavaScript code via the "erro" parameter.... Read more
Affected Products : celk_saude- Published: Jan. 29, 2025
- Modified: May. 23, 2025
-
7.5
HIGHCVE-2024-23733
The /WmAdmin/,/invoke/vm.server/login login page in the Integration Server in Software AG webMethods 10.15.0 before Core_Fix7 allows remote attackers to reach the administration panel and discover hostname and version information by sending an arbitrary u... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Jan. 31, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2024-12705
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.1... Read more
Affected Products : bind- Published: Jan. 29, 2025
- Modified: Feb. 07, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-11187
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolve... Read more
Affected Products : bind- Published: Jan. 29, 2025
- Modified: Feb. 11, 2025
- Vuln Type: Denial of Service
-
5.1
MEDIUMCVE-2025-24884
kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the "full-elastic-stack" example vector configuration was used for a real cluster, the previous values of kubernetes secrets would have been disclosed in the audit message... Read more
Affected Products :- Published: Jan. 29, 2025
- Modified: Jan. 29, 2025
- Vuln Type: Information Disclosure
-
4.4
MEDIUMCVE-2025-24795
The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. On Li... Read more
Affected Products : snowflake_connector- Published: Jan. 29, 2025
- Modified: Jan. 29, 2025
- Vuln Type: Information Disclosure