Latest CVE Feed
-
2.1
LOWCVE-2025-53535
Better Auth is an authentication and authorization library for TypeScript. An open redirect has been found in the originCheck middleware function, which affects the following routes: /verify-email, /reset-password/:token, /delete-user/callback, /magic-lin... Read more
Affected Products : better_auth- Published: Jul. 07, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-20325
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.113, and 9.2.2406.119, the software potentially exposes the search head cluster [splunk.secret](https://help.splunk.com/en... Read more
- Published: Jul. 07, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Information Disclosure
-
5.4
MEDIUMCVE-2025-20324
In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.7, and 9.1.10 and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create or overwri... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-20323
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a low-privileged user that does not hold the "admin" or "power" Splunk roles could turn off the scheduled search `Bucket Copy Trigger` within the Splunk Archiver application. This is bec... Read more
Affected Products : splunk- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-20322
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, an unauthenticated attacker could send a specially-crafted SPL search command that could trigger a ... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.5
MEDIUMCVE-2025-20321
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.114, and 9.2.2406.119, an unauthenticated attacker can send a specially-crafted SPL search that could change the membership... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.3
HIGHCVE-2025-20320
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7 and 9.1.10, and Splunk Cloud Platform versions below 9.3.2411.107, 9.3.2408.117, and 9.2.2406.121, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Denial of Service
-
6.8
MEDIUMCVE-2025-20319
In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a user who holds a role that contains the high-privilege capability `edit_scripted` and `list_inputs` capability , could perform a remote command execution due to improper user input san... Read more
Affected Products : splunk- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authentication
-
4.3
MEDIUMCVE-2025-20300
In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles, and has read-only acces... Read more
- Published: Jul. 07, 2025
- Modified: Jul. 21, 2025
- Vuln Type: Authorization
-
5.9
MEDIUMCVE-2024-43190
IBM Engineering Requirements Management DOORS 9.7.2.9, under certain configurations, could allow a remote attacker to obtain password reset instructions of a legitimate user using man in the middle techniques.... Read more
- Published: Jul. 07, 2025
- Modified: Aug. 20, 2025
- Vuln Type: Information Disclosure
-
6.1
MEDIUMCVE-2024-37658
An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the bbs/member_confirm.php.... Read more
Affected Products : gnuboard- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Misconfiguration
-
6.1
MEDIUMCVE-2024-37657
An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via thebbs/login.php component.... Read more
Affected Products : gnuboard- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Misconfiguration
-
6.1
MEDIUMCVE-2024-37656
An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the insufficient URL parameter verification in bbs/logout.php.... Read more
Affected Products : gnuboard- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2025-7137
A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /panel/schedule-staff.php. The manipulation of the argument staff_id leads to sql injection. It is p... Read more
Affected Products : best_salon_management_system- Published: Jul. 07, 2025
- Modified: Jul. 09, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-7136
A vulnerability, which was classified as critical, was found in Campcodes Online Recruitment Management System 1.0. Affected is an unknown function of the file /admin/view_vacancy.php. The manipulation of the argument ID leads to sql injection. It is poss... Read more
Affected Products : online_recruitment_management_system- Published: Jul. 07, 2025
- Modified: Jul. 09, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-53532
giscus is a commenting system powered by GitHub Discussions. A bug in giscus' discussions creation API allowed an unauthorized user to create discussions on any repository where giscus is installed. This affects the server-side part of giscus, which is pr... Read more
Affected Products :- Published: Jul. 07, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2025-53531
WeGIA is a web manager for charitable institutions. The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the fid parameter. Tests confirmed t... Read more
Affected Products : wegia- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Denial of Service
-
8.7
HIGHCVE-2025-53530
WeGIA is a web manager for charitable institutions. The Wegia server has a vulnerability that allows excessively long HTTP GET requests to a specific URL. This issue arises from the lack of validation for the length of the errorstr parameter. Tests confir... Read more
Affected Products : wegia- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-53529
WeGIA is a web manager for charitable institutions. An SQL Injection vulnerability was identified in the /html/funcionario/profile_funcionario.php endpoint. The id_funcionario parameter is not properly sanitized or validated before being used in a SQL que... Read more
Affected Products : wegia- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-53527
WeGIA is a web manager for charitable institutions. A Time-Based Blind SQL Injection vulnerability was discovered in the almox parameter of the /controle/relatorio_geracao.php endpoint. This issue allows attacker to inject arbitrary SQL queries, potential... Read more
Affected Products : wegia- Published: Jul. 07, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Injection