Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 6.9

    MEDIUM
    CVE-2025-0844

    A vulnerability was found in needyamin Library Card System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file signup.php of the component Registration Page. The manipulation of the argument fir... Read more

    • Published: Jan. 30, 2025
    • Modified: Feb. 04, 2025
    • Vuln Type: Cross-Site Scripting
  • 9.9

    CRITICAL
    CVE-2025-21415

    Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network.... Read more

    Affected Products : azure_ai_face_service
    • Published: Jan. 29, 2025
    • Modified: Feb. 07, 2025
    • Vuln Type: Authentication
  • 9.8

    CRITICAL
    CVE-2025-21396

    Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network.... Read more

    Affected Products : account micrososft_account
    • Published: Jan. 29, 2025
    • Modified: Feb. 12, 2025
    • Vuln Type: Authorization
  • 9.8

    CRITICAL
    CVE-2025-0843

    A vulnerability was found in needyamin Library Card System 1.0. It has been classified as critical. Affected is an unknown function of the file admindashboard.php of the component Admin Panel. The manipulation of the argument email/password leads to sql i... Read more

    Affected Products : library_card_system
    • Published: Jan. 29, 2025
    • Modified: Feb. 04, 2025
    • Vuln Type: Injection
  • 9.8

    CRITICAL
    CVE-2024-57665

    JFinalCMS 1.0 is vulnerable to SQL Injection in rc/main/java/com/cms/entity/Content.java. The cause of the vulnerability is that the title parameter is controllable and is concatenated directly into filterSql without filtering.... Read more

    Affected Products : jfinalcms
    • Published: Jan. 29, 2025
    • Modified: May. 23, 2025
    • Vuln Type: Injection
  • 9.8

    CRITICAL
    CVE-2025-0851

    A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations.... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Jan. 29, 2025
    • Vuln Type: Path Traversal
  • 9.8

    CRITICAL
    CVE-2025-0842

    A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. This issue affects some unknown processing of the file admin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The... Read more

    Affected Products : library_card_system
    • Published: Jan. 29, 2025
    • Modified: Feb. 25, 2025
    • Vuln Type: Injection
  • 6.5

    MEDIUM
    CVE-2024-57513

    A floating-point exception (FPE) vulnerability exists in the AP4_TfraAtom::AP4_TfraAtom function in Bento4.... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Jan. 31, 2025
    • Vuln Type: Denial of Service
  • 7.8

    HIGH
    CVE-2024-57510

    Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Feb. 03, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2024-57509

    Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_File::ParseStream and related functions.... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Jan. 31, 2025
    • Vuln Type: Memory Corruption
  • 9.8

    CRITICAL
    CVE-2024-57395

    Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password and account number parameters.... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Jan. 31, 2025
    • Vuln Type: Authentication
  • 9.8

    CRITICAL
    CVE-2024-54852

    When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an unauthenticated attacker is then able to perform various maliciou... Read more

    Affected Products : teedy
    • Published: Jan. 29, 2025
    • Modified: May. 24, 2025
    • Vuln Type: Injection
  • 8.8

    HIGH
    CVE-2024-54851

    Teedy <= 1.12 is vulnerable to Cross Site Request Forgery (CSRF), due to the lack of CSRF protection.... Read more

    Affected Products : teedy
    • Published: Jan. 29, 2025
    • Modified: May. 23, 2025
    • Vuln Type: Cross-Site Request Forgery
  • 6.1

    MEDIUM
    CVE-2024-51182

    HTML Injection vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to inject arbitrary HTML code via the "erro" parameter.... Read more

    Affected Products : celk_saude
    • Published: Jan. 29, 2025
    • Modified: May. 23, 2025
    • Vuln Type: Cross-Site Scripting
  • 8.8

    HIGH
    CVE-2024-48761

    Reflected XSS vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows a remote attacker to inject arbitrary JavaScript code via the "erro" parameter.... Read more

    Affected Products : celk_saude
    • Published: Jan. 29, 2025
    • Modified: May. 23, 2025
  • 7.5

    HIGH
    CVE-2024-23733

    The /WmAdmin/,/invoke/vm.server/login login page in the Integration Server in Software AG webMethods 10.15.0 before Core_Fix7 allows remote attackers to reach the administration panel and discover hostname and version information by sending an arbitrary u... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Jan. 31, 2025
    • Vuln Type: Authentication
  • 7.5

    HIGH
    CVE-2024-12705

    Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.1... Read more

    Affected Products : bind
    • Published: Jan. 29, 2025
    • Modified: Feb. 07, 2025
    • Vuln Type: Denial of Service
  • 7.5

    HIGH
    CVE-2024-11187

    It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolve... Read more

    Affected Products : bind
    • Published: Jan. 29, 2025
    • Modified: Feb. 11, 2025
    • Vuln Type: Denial of Service
  • 5.1

    MEDIUM
    CVE-2025-24884

    kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the "full-elastic-stack" example vector configuration was used for a real cluster, the previous values of kubernetes secrets would have been disclosed in the audit message... Read more

    Affected Products :
    • Published: Jan. 29, 2025
    • Modified: Jan. 29, 2025
    • Vuln Type: Information Disclosure
  • 4.4

    MEDIUM
    CVE-2025-24795

    The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for Python. On Li... Read more

    Affected Products : snowflake_connector
    • Published: Jan. 29, 2025
    • Modified: Jan. 29, 2025
    • Vuln Type: Information Disclosure
Showing 20 of 291219 Results