Latest CVE Feed
-
5.4
MEDIUMCVE-2025-5742
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability exists when an authenticated user modifies configuration parameters on the web server... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Cross-Site Scripting
-
6.9
MEDIUMCVE-2025-5741
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause arbitrary file reads from the charging station. The exploitation of this vulnerability does require an authenticated session of th... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Path Traversal
-
8.6
HIGHCVE-2025-5740
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause arbitrary file writes when an unauthenticated user on the web server manipulates file path.... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Path Traversal
-
8.6
HIGHCVE-2025-4681
Improper Privilege Management vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Privilege Abuse.This issue affects upKeeper Instant Privilege Access: before 1.4.0.... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authorization
-
8.6
HIGHCVE-2025-4680
Improper Input Validation vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects upKeeper Instant Privilege Access: before 1.4.0.... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2025-3905
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists impacting PLC system variables that could cause an unvalidated data injected by authenticated malicious user leading to modify or read data i... Read more
Affected Products : modicon_m258_firmware modicon_m241_firmware modicon_m251_firmware modicon_lmc058_firmware- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Cross-Site Scripting
-
5.4
MEDIUMCVE-2025-3899
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in Certificates page on Webserver that could cause an unvalidated data injected by authenticated malicious user leading to modify or read dat... Read more
- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2025-3898
CWE-20: Improper Input Validation vulnerability exists that could cause Denial of Service when an authenticated malicious user sends HTTPS request containing invalid data type to the webserver.... Read more
- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Denial of Service
-
5.4
MEDIUMCVE-2025-3117
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists impacting configuration file paths that could cause an unvalidated data injected by authenticated malicious user leading to modify or read da... Read more
Affected Products : modicon_m258_firmware modicon_m241_firmware modicon_m251_firmware modicon_lmc058_firmware- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2025-3116
CWE-20: Improper Input Validation vulnerability exists that could cause Denial of Service when an authenticated malicious user sends special malformed HTTPS request containing improper formatted body data to the controller.... Read more
Affected Products : modicon_m258_firmware modicon_m241_firmware modicon_m251_firmware modicon_lmc058_firmware- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Denial of Service
-
7.1
HIGHCVE-2025-3112
CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause Denial of Service when an authenticated malicious user sends manipulated HTTPS Content-Length header to the webserver.... Read more
- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-27819
In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To explo... Read more
Affected Products : kafka- Published: Jun. 10, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-27818
A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS confi... Read more
Affected Products : kafka- Published: Jun. 10, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-27817
A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" ... Read more
Affected Products : kafka- Published: Jun. 10, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Server-Side Request Forgery
-
8.8
HIGHCVE-2025-4954
The Axle Demo Importer WordPress plugin through 1.0.3 does not validate files to be uploaded, which could allow authenticated users (author and above) to upload arbitrary files such as PHP on the server... Read more
Affected Products : axle_demo_importer- Published: Jun. 10, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-4840
The inprosysmedia-likes-dislikes-post WordPress plugin through 1.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection... Read more
Affected Products : likes_and_dislikes- Published: Jun. 10, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Injection
-
9.9
CRITICALCVE-2025-1041
An improper input validation discovered in Avaya Call Management System could allow an unauthorized remote command via a specially crafted web request. Affected versions include 18.x, 19.x prior to 19.2.0.7, and 20.x prior to 20.0.1.0.... Read more
Affected Products : call_management_system- Published: Jun. 10, 2025
- Modified: Jul. 30, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-5952
A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initi... Read more
Affected Products :- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Injection
-
5.5
MEDIUMCVE-2025-5935
A vulnerability was found in Open5GS up to 2.7.3. It has been declared as problematic. Affected by this vulnerability is the function common_register_state of the file src/mme/emm-sm.c of the component AMF/MME. The manipulation of the argument ran_ue_id l... Read more
Affected Products : open5gs- Published: Jun. 10, 2025
- Modified: Jun. 12, 2025
- Vuln Type: Denial of Service
-
6.4
MEDIUMCVE-2025-3076
The Elementor Website Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘button_text’ parameter in all versions up to, and including, 3.29.0 due to insufficient input sanitization and output escaping. This makes it poss... Read more
- Published: Jun. 10, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Cross-Site Scripting