Latest CVE Feed
-
7.1
HIGHCVE-2025-24562
Cross-Site Request Forgery (CSRF) vulnerability in Optimal Access Inc. KBucket allows Stored XSS. This issue affects KBucket: from n/a through 4.1.6.... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
7.1
HIGHCVE-2025-24561
Cross-Site Request Forgery (CSRF) vulnerability in ReviewsTap ReviewsTap allows Stored XSS. This issue affects ReviewsTap: from n/a through 1.1.2.... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
7.1
HIGHCVE-2025-24555
Cross-Site Request Forgery (CSRF) vulnerability in SubscriptionDNA.com Subscription DNA allows Stored XSS. This issue affects Subscription DNA: from n/a through 2.1.... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
5.3
MEDIUMCVE-2025-24552
Generation of Error Message Containing Sensitive Information vulnerability in David de Boer Paytium allows Retrieve Embedded Sensitive Data. This issue affects Paytium: from n/a through 4.4.11.... Read more
Affected Products : paytium- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
6.5
MEDIUMCVE-2025-24547
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthias Wagner - FALKEmedia Caching Compatible Cookie Opt-In and JavaScript allows Stored XSS. This issue affects Caching Compatible Cookie Opt-In and J... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
5.4
MEDIUMCVE-2025-24546
Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9.... Read more
Affected Products : ultimate_coming_soon_\&_maintenance- Published: Jan. 24, 2025
- Modified: Jun. 09, 2025
-
4.3
MEDIUMCVE-2025-24543
Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9.... Read more
Affected Products : ultimate_coming_soon_\&_maintenance- Published: Jan. 24, 2025
- Modified: Jun. 09, 2025
-
6.5
MEDIUMCVE-2025-24542
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in icegram Icegram allows Stored XSS. This issue affects Icegram: from n/a through 3.1.31.... Read more
Affected Products : icegram_express- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
7.1
HIGHCVE-2025-24362
In some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the workflow. U... Read more
Affected Products : codeql_action- Published: Jan. 24, 2025
- Modified: Mar. 31, 2025
-
6.5
MEDIUMCVE-2025-0702
A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the a... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
9.9
CRITICALCVE-2024-56404
In One Identity Identity Manager 9.x before 9.3, an insecure direct object reference (IDOR) vulnerability allows privilege escalation. Only On-Premise installations are affected.... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
2.8
LOWCVE-2024-35122
IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to acc... Read more
- Published: Jan. 24, 2025
- Modified: Jul. 03, 2025
-
8.8
HIGHCVE-2019-15690
LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execut... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
8.4
HIGHCVE-2025-24359
ASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval's restrictions and execute arbitrary Python code in the context of the application... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
7.1
HIGHCVE-2025-24355
Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which cont... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
6.1
MEDIUMCVE-2025-24025
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.380, the tags page allows users to search for tags. If the search does not return any results, the query gets reflected on the ... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
8.4
HIGHCVE-2025-23222
An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
10.0
CRITICALCVE-2025-22612
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.374, the missing authorization allows an authenticated user to retrieve any existing private keys on a coolify instance in plai... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
9.9
CRITICALCVE-2025-22611
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to escalate his or any other team members privileges to any role, ... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025
-
5.7
MEDIUMCVE-2025-22610
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the global coolify instance OAuth configuration. This exp... Read more
Affected Products :- Published: Jan. 24, 2025
- Modified: Jan. 24, 2025