Latest CVE Feed
-
8.8
HIGHCVE-2025-55158
Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim’s internal typed value (typval_T... Read more
Affected Products : vim- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-55157
Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically,... Read more
Affected Products : vim- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
-
7.8
HIGHCVE-2025-55156
pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data ... Read more
Affected Products : pyload- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-55151
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, the "convert file to pdf" functionality (/api/v1/convert/file/pdf) uses LibreOffice's unoconvert tool for conversion, and SSRF vulnerab... Read more
Affected Products : stirling_pdf- Published: Aug. 11, 2025
- Modified: Aug. 15, 2025
-
9.8
CRITICALCVE-2025-55150
Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/html/pdf endpoint to convert HTML to PDF, the backend calls a third-party tool to process it and include... Read more
Affected Products : stirling_pdf- Published: Aug. 11, 2025
- Modified: Aug. 15, 2025
-
8.5
HIGHCVE-2025-55012
Zed is a multiplayer code editor. Prior to version 0.197.3, in the Zed Agent Panel allowed for an AI agent to achieve Remote Code Execution (RCE) by bypassing user permission checks. An AI Agent could have exploited a permissions bypass vulnerability to c... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
6.9
MEDIUMCVE-2025-54992
OpenKilda is an open-source OpenFlow controller. Prior to version 1.164.0, an XML external entity (XXE) injection vulnerability was found in OpenKilda which in combination with GHSL-2025-024 allows unauthenticated attackers to exfiltrate information from ... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: XML External Entity
-
8.6
HIGHCVE-2025-25235
Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Server-Side Request Forgery
-
8.6
HIGHCVE-2025-54878
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A heap buffer overflow v... Read more
Affected Products : cryptolib- Published: Aug. 11, 2025
- Modified: Aug. 27, 2025
- Vuln Type: Memory Corruption
-
8.6
HIGHCVE-2025-40920
Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library. * Data::UUID does not use a strong cryptographic source for generating UUIDs. * Data::UUID returns v3 UUIDs, which are ... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 28, 2025
- Vuln Type: Cryptography
-
9.8
CRITICALCVE-2024-32640
MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.6, 7.3.13, and 7.2.8 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7... Read more
Affected Products : masacms- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Injection
-
4.0
MEDIUMCVE-2025-8285
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
9.2
CRITICALCVE-2025-7679
The ASPECT system allows users to bypass authentication. This issue affects all versions of ASPECT... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
8.2
HIGHCVE-2025-7677
A denial-of-service (DoS) attack is possible if access to the local network is provided to unauthorized users. This is due to a buffer copy issue that may lead to a software crash. This issue affects all versions of ASPECT.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-54525
Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to create channel subscription endpoint with an invalid request body.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2025-54478
Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to edit channel subscriptions via API call to the edit channel subscription endpoint.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authentication
-
5.9
MEDIUMCVE-2025-54463
Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Denial of Service
-
5.0
MEDIUMCVE-2025-54458
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to create a subscription for a Confluence space the user does not have access to via the create subscription endpoint.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
4.0
MEDIUMCVE-2025-53910
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint.... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization
-
3.7
LOWCVE-2025-53857
Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the GET autocomplete/GetChannelSubscriptions e... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Authorization