Latest CVE Feed
-
8.8
HIGHCVE-2025-1216
A vulnerability, which was classified as critical, has been found in ywoa up to 2024.07.03. This issue affects the function selectNoticeList of the file com/cloudweb/oa/mapper/xml/OaNoticeMapper.xml. The manipulation of the argument sort leads to sql inje... Read more
- Published: Feb. 12, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Injection
-
7.8
HIGHCVE-2025-1215
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local ... Read more
- Published: Feb. 12, 2025
- Modified: Aug. 13, 2025
- Vuln Type: Memory Corruption
-
8.1
HIGHCVE-2025-1146
CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Con... Read more
Affected Products : falcon- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Misconfiguration
-
7.1
HIGHCVE-2025-0937
Nomad Community and Nomad Enterprise ("Nomad") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces.... Read more
Affected Products : nomad- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2025-25741
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module.... Read more
- Published: Feb. 12, 2025
- Modified: May. 02, 2025
- Vuln Type: Memory Corruption
-
9.2
CRITICALCVE-2025-25200
Koa is expressive middleware for Node.js using ES2017 async functions. Prior to versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3, Koa uses an evil regex to parse the `X-Forwarded-Proto` and `X-Forwarded-Host` HTTP headers. This can be exploited to carry ... Read more
Affected Products :- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-25199
go-crypto-winnative Go crypto backend for Windows using Cryptography API: Next Generation (CNG). Prior to commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, calls to `cng.TLS1PRF` don't release the key handle, producing a small memory leak every time. Commi... Read more
Affected Products :- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-25198
mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link poi... Read more
Affected Products : mailcow\- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-1214
A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to ... Read more
Affected Products :- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Authorization
-
5.1
MEDIUMCVE-2025-1213
A vulnerability was found in pihome-shc PiHome 1.77. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The at... Read more
Affected Products :- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2024-6097
In Progress® Telerik® Reporting versions prior to 2025 Q1 (19.0.25.211), information disclosure is possible by a local threat actor through an absolute path vulnerability.... Read more
Affected Products : telerik_reporting- Published: Feb. 12, 2025
- Modified: Feb. 24, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2025-25746
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module.... Read more
- Published: Feb. 12, 2025
- Modified: Mar. 18, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-25744
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetDynamicDNSSettings module.... Read more
- Published: Feb. 12, 2025
- Modified: Mar. 05, 2025
- Vuln Type: Memory Corruption
-
7.2
HIGHCVE-2025-25743
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a command injection vulnerability in the SetVirtualServerSettings module.... Read more
- Published: Feb. 12, 2025
- Modified: Mar. 05, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-25742
D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the AccountPassword parameter in the SetSysEmailSettings module.... Read more
- Published: Feb. 12, 2025
- Modified: Mar. 05, 2025
- Vuln Type: Memory Corruption
-
5.7
MEDIUMCVE-2025-25184
Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-conce... Read more
- Published: Feb. 12, 2025
- Modified: Feb. 14, 2025
- Vuln Type: Information Disclosure
-
9.4
CRITICALCVE-2025-25182
Stroom is a data processing, storage and analysis platform. A vulnerability exists starting in version 7.2-beta.53 and prior to versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2 that allows authentication bypass to a Stroom system when configured with A... Read more
Affected Products : stroom- Published: Feb. 12, 2025
- Modified: Feb. 12, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-1210
A vulnerability classified as critical was found in code-projects Wazifa System 1.0. Affected by this vulnerability is an unknown functionality of the file /controllers/control.php. The manipulation of the argument to leads to sql injection. The attack ca... Read more
Affected Products : wazifa_system- Published: Feb. 12, 2025
- Modified: Feb. 19, 2025
- Vuln Type: Injection
-
5.4
MEDIUMCVE-2025-1209
A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is the function searchuser of the file /search_resualts.php. The manipulation of the argument firstname/lastname leads to cross site scripting. It is pos... Read more
Affected Products : wazifa_system- Published: Feb. 12, 2025
- Modified: Feb. 19, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2024-11629
In Progress® Telerik® Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), using .NET Standard 2.0, the contents of a file at an arbitrary path can be exported to RTF.... Read more
Affected Products : telerik_document_processing_libraries- Published: Feb. 12, 2025
- Modified: Feb. 19, 2025
- Vuln Type: Path Traversal