Latest CVE Feed
-
8.8
HIGHCVE-2025-4315
The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.23. This is due to the plugin allowing a user to update arbitrary user meta through the update_user_meta... Read more
Affected Products : cubewp- Published: Jun. 11, 2025
- Modified: Jul. 10, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-41663
For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would n... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jul. 23, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-41661
An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection.... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jul. 23, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.8
MEDIUMCVE-2025-26412
The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with ... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Authentication
-
2.1
LOWCVE-2025-5991
There is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the bod... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Race Condition
-
8.3
HIGHCVE-2025-29756
SunGrow's back end users system iSolarCloud https://isolarcloud.com uses an MQTT service to transport data from the user's connected devices to the user's web browser. The MQTT server however did not have sufficient restrictions in place to limit the t... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-5395
The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'core.php' file in all versions up to, and including, 3.115.0. This makes it possible for authenticated attackers, ... Read more
Affected Products : wordpress_automatic_plugin- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2024-35295
A vulnerability has been identified in Perfect Harmony GH180 (All versions >= V8.0 < V8.3.3 with NXGPro+ controller manufactured between April 2020 to April 2025). The maintenance connection of affected devices fails to protect access to the device's cont... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authentication
-
7.2
HIGHCVE-2025-4799
The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, ... Read more
Affected Products : wp-downloadmanager- Published: Jun. 11, 2025
- Modified: Jul. 09, 2025
- Vuln Type: Path Traversal
-
4.9
MEDIUMCVE-2025-4798
The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.68.10. This is due to a lack of restriction on the directory an administrator can select for storing downloads. This makes it possible... Read more
Affected Products : wp-downloadmanager- Published: Jun. 11, 2025
- Modified: Jul. 09, 2025
- Vuln Type: Path Traversal
-
6.4
MEDIUMCVE-2025-4666
The Zotpress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘nickname’ parameter in all versions up to, and including, 7.3.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated a... Read more
Affected Products : zotpress- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Cross-Site Scripting
-
9.5
CRITICALCVE-2024-1244
Improper input validation in the OSSEC HIDS agent for Windows prior to version 3.8.0 allows an attacker in with control over the OSSEC server or in possession of the agent's key to configure the agent to connect to a malicious UNC path. This results in th... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Misconfiguration
-
9.5
CRITICALCVE-2024-1243
Improper input validation in the Wazuh agent for Windows prior to version 4.8.0 allows an attacker with control over the Wazuh server or agent key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine accoun... Read more
Affected Products : wazuh- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-5959
Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jun. 11, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-5958
Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Jun. 11, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-4275
A vulnerability in the digital signature verification process does not properly validate variable attributes which allows an attacker to bypass signature verification by creating a non-authenticated NVRAM variable. An attacker may to execute arbitrary sig... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Authentication
-
8.2
HIGHCVE-2025-49091
KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary i... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 18, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2025-32717
Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.... Read more
Affected Products : 365_apps- Published: Jun. 11, 2025
- Modified: Jul. 09, 2025
- Vuln Type: Memory Corruption
-
4.7
MEDIUMCVE-2025-30675
In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter=self... Read more
Affected Products : cloudstack- Published: Jun. 11, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Authorization
-
5.6
MEDIUMCVE-2025-1055
A vulnerability in the K7RKScan.sys driver, part of the K7 Security Anti-Malware suite, allows a local low-privilege user to send crafted IOCTL requests to terminate a wide range of processes running with administrative or system-level privileges, with th... Read more
Affected Products :- Published: Jun. 11, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Misconfiguration