Latest CVE Feed
-
5.5
MEDIUMCVE-2025-23057
A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary scrip... Read more
Affected Products : fabric_composer- Published: Jan. 28, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Cross-Site Scripting
-
5.5
MEDIUMCVE-2025-23056
A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary scrip... Read more
Affected Products : fabric_composer- Published: Jan. 28, 2025
- Modified: Mar. 28, 2025
- Vuln Type: Cross-Site Scripting
-
5.5
MEDIUMCVE-2025-23055
A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary scrip... Read more
Affected Products : fabric_composer- Published: Jan. 28, 2025
- Modified: Mar. 28, 2025
-
6.5
MEDIUMCVE-2025-23054
A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attac... Read more
Affected Products : fabric_composer- Published: Jan. 28, 2025
- Modified: Apr. 16, 2025
-
6.5
MEDIUMCVE-2025-23053
A privilege escalation vulnerability exists in the web-based management interface of HPE Aruba Networking Fabric Composer. Successful exploitation could allow an authenticated low privilege operator user to change the state of certain settings of a vulner... Read more
Affected Products : fabric_composer- Published: Jan. 28, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authorization
-
8.2
HIGHCVE-2024-13484
A flaw was found in openshift-gitops-operator-container. The openshift.io/cluster-monitoring label is applied to all namespaces that deploy an ArgoCD CR instance, allowing the namespace to create a rogue PrometheusRule. This issue can have adverse effects... Read more
Affected Products :- Published: Jan. 28, 2025
- Modified: Jun. 24, 2025
- Vuln Type: Misconfiguration
-
9.9
CRITICALCVE-2025-0781
An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.... Read more
- Published: Jan. 28, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Path Traversal
-
5.4
MEDIUMCVE-2024-8401
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability exists when an authenticated attacker modifies folder names within the context of the product.... Read more
Affected Products :- Published: Jan. 28, 2025
- Modified: Jan. 28, 2025
- Vuln Type: Cross-Site Scripting
-
6.2
MEDIUMCVE-2018-9378
In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not n... Read more
Affected Products : android- Published: Jan. 28, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2018-9373
In TdlsexRxFrameHandle of the MTK WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for expl... Read more
Affected Products : android- Published: Jan. 28, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Memory Corruption
-
5.7
MEDIUMCVE-2017-13318
In HeifDataSource::readAt of HeifDecoderImpl.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitati... Read more
Affected Products : android- Published: Jan. 28, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
5.7
MEDIUMCVE-2017-13317
In HeifDecoderImpl::getScanline of HeifDecoderImpl.cpp, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed fo... Read more
Affected Products : android- Published: Jan. 28, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
9.3
CRITICALCVE-2025-24800
Hyperbridge is a hyper-scalable coprocessor for verifiable, cross-chain interoperability. A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers.... Read more
Affected Products :- Published: Jan. 28, 2025
- Modified: Jan. 28, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-23385
In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possibl... Read more
- Published: Jan. 28, 2025
- Modified: Jan. 28, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-23213
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The file upload feature allows to upload arbitrary files, including html and svg. Both can contain malicious content (XSS Payloads). This vulnerability is... Read more
Affected Products : recipes- Published: Jan. 28, 2025
- Modified: May. 08, 2025
- Vuln Type: Cross-Site Scripting
-
7.7
HIGHCVE-2025-23212
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28.... Read more
Affected Products : recipes- Published: Jan. 28, 2025
- Modified: May. 08, 2025
- Vuln Type: Information Disclosure
-
9.9
CRITICALCVE-2025-23211
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability... Read more
Affected Products : recipes- Published: Jan. 28, 2025
- Modified: May. 08, 2025
- Vuln Type: Injection
-
8.7
HIGHCVE-2025-23045
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container. This vuln... Read more
Affected Products : computer_vision_annotation_tool- Published: Jan. 28, 2025
- Modified: Jan. 28, 2025
- Vuln Type: Authentication
-
7.0
HIGHCVE-2025-0659
A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. ... Read more
Affected Products :- Published: Jan. 28, 2025
- Modified: Jan. 28, 2025
- Vuln Type: Path Traversal
-
6.9
MEDIUMCVE-2025-0432
EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage.... Read more
Affected Products :- Published: Jan. 28, 2025
- Modified: Jan. 28, 2025
- Vuln Type: Cryptography