Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.8

    CRITICAL
    CVE-2023-46400

    KWHotel 0.47 is vulnerable to CSV Formula Injection in the add guest function.... Read more

    Affected Products : kwhotel
    • Published: Jan. 23, 2025
    • Modified: Feb. 07, 2025
  • 8.7

    HIGH
    CVE-2025-23012

    Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials and privileges to read read local files by manipulating datastreams. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 03, 2025
  • 8.8

    HIGH
    CVE-2025-23011

    Fedora Repository 3.8.1 allows path traversal when extracting uploaded archives ("Zip Slip"). A remote, authenticated attacker can upload a specially crafted archive that will extract an arbitrary JSP file to a location that can be executed by an unauthen... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 03, 2025
  • 5.0

    MEDIUM
    CVE-2025-24353

    Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.2.0, when sharing an item, a typical user can specify an arbitrary role. It allows the user to use a higher-privileged role to see fields that otherwise t... Read more

    Affected Products : directus
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 3.2

    LOW
    CVE-2025-24034

    Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Starting in version 0.7.0 and prior to versions 0.7.15 and 0.8.3, Himmelblau is vulnerable to leaking credentials in debug logs. When debug logging is enabled, user access to... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 7.5

    HIGH
    CVE-2025-24033

    @fastify/multipart is a Fastify plugin for parsing the multipart content-type. Prior to versions 8.3.1 and 9.0.3, the `saveRequestFiles` function does not delete the uploaded temporary files when user cancels the request. The issue is fixed in versions 8.... Read more

    Affected Products : fastify-multipart
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 6.4

    MEDIUM
    CVE-2025-23227

    IBM Tivoli Application Dependency Discovery Manager 7.3.0.0 through 7.3.0.11 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functional... Read more

    • Published: Jan. 23, 2025
    • Modified: Aug. 15, 2025
  • 7.9

    HIGH
    CVE-2025-22153

    RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when u... Read more

    Affected Products : restrictedpython
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 6.7

    MEDIUM
    CVE-2024-55930

    Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 24, 2025
  • 5.3

    MEDIUM
    CVE-2024-55929

    A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources.... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 24, 2025
  • 6.5

    MEDIUM
    CVE-2024-55928

    Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 24, 2025
  • 7.6

    HIGH
    CVE-2024-55927

    A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions.... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 24, 2025
  • 7.6

    HIGH
    CVE-2024-55926

    A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 24, 2025
  • 6.0

    MEDIUM
    CVE-2024-45672

    IBM Security Verify Bridge 1.0.0 through 1.0.15 could allow a local privileged user to overwrite files due to excessive privileges granted to the agent. which could also cause a denial of service.... Read more

    Affected Products : security_verify_bridge
    • Published: Jan. 23, 2025
    • Modified: Aug. 14, 2025
  • 8.1

    HIGH
    CVE-2025-0650

    A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs con... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 06, 2025
  • 7.5

    HIGH
    CVE-2024-55925

    In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain una... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Feb. 24, 2025
  • 7.7

    HIGH
    CVE-2024-52331

    ECOVACS robot lawnmowers and vacuums use a deterministic symmetric key to decrypt firmware updates. An attacker can create and encrypt malicious firmware that will be successfully decrypted and installed by the robot.... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 9.5

    CRITICAL
    CVE-2024-52330

    ECOVACS lawnmowers and vacuums do not properly validate TLS certificates. An unauthenticated attacker can read or modify TLS traffic, possibly modifying firmware updates.... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 9.5

    CRITICAL
    CVE-2024-52329

    ECOVACS HOME mobile app plugins for specific robots do not properly validate TLS certificates. An unauthenticated attacker can read or modify TLS traffic and obtain authentication tokens.... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
  • 2.3

    LOW
    CVE-2024-52328

    ECOVACS robot lawnmowers and vacuums insecurely store audio files used to indicate that the camera is on. An attacker with access to the /data filesystem can delete or modify warning files such that users may not be aware that the camera is on.... Read more

    Affected Products :
    • Published: Jan. 23, 2025
    • Modified: Jan. 23, 2025
Showing 20 of 291058 Results