Latest CVE Feed
-
6.5
MEDIUMCVE-2025-27955
Clinical Collaboration Platform 12.2.1.5 has a weak logout system where the session token remains valid after logout and allows a remote attacker to obtain sensitive information and execute arbitrary code.... Read more
Affected Products : clinical_collaboration_platform- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-27954
An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the usertoken function of default.aspx.... Read more
Affected Products : clinical_collaboration_platform- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-27953
An issue in Clinical Collaboration Platform 12.2.1.5 allows a remote attacker to obtain sensitive information and execute arbitrary code via the session management component.... Read more
Affected Products : clinical_collaboration_platform- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-23104
An issue was discovered in Samsung Mobile Processor Exynos 2200. A Use-After-Free in the mobile processor leads to privilege escalation.... Read more
- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Memory Corruption
-
8.0
HIGHCVE-2025-20298
In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by d... Read more
- Published: Jun. 02, 2025
- Modified: Aug. 04, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-20297
In Splunk Enterprise versions below 9.4.2, 9.3.4 and 9.2.6, and Splunk Cloud Platform versions below 9.3.2411.102, 9.3.2408.111 and 9.2.2406.118, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload ... Read more
- Published: Jun. 02, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Cross-Site Scripting
-
7.8
HIGHCVE-2025-5036
A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the... Read more
Affected Products : revit- Published: Jun. 02, 2025
- Modified: Aug. 19, 2025
- Vuln Type: Memory Corruption
-
6.9
MEDIUMCVE-2025-48995
SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 02, 2025
- Vuln Type: Cryptography
-
6.9
MEDIUMCVE-2025-48994
SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 02, 2025
- Vuln Type: Misconfiguration
-
5.2
MEDIUMCVE-2024-8008
A reflected cross-site scripting (XSS) vulnerability exists in multiple WSO2 products due to insufficient output encoding in error messages generated by the JDBC user store connection validation request. A malicious actor can inject a specially crafted pa... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 06, 2025
- Vuln Type: Cross-Site Scripting
-
6.8
MEDIUMCVE-2024-7074
An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper validation of user input in SOAP admin services. A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location on the ser... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 02, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2024-7073
A server-side request forgery (SSRF) vulnerability exists in multiple WSO2 products due to improper input validation in SOAP admin services. This flaw allows unauthenticated attackers to manipulate server-side requests, enabling access to internal and ext... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 02, 2025
- Vuln Type: Server-Side Request Forgery
-
4.3
MEDIUMCVE-2024-3509
A stored cross-site scripting (XSS) vulnerability exists in the Management Console of multiple WSO2 products due to insufficient input validation in the Rich Text Editor within the registry section. To exploit this vulnerability, a malicious actor must ha... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 02, 2025
- Vuln Type: Cross-Site Scripting
-
5.4
MEDIUMCVE-2024-1440
An open redirection vulnerability exists in multiple WSO2 products due to improper validation of the multi-option URL in the authentication endpoint when multi-option authentication is enabled. A malicious actor can craft a valid link that redirects users... Read more
Affected Products :- Published: Jun. 02, 2025
- Modified: Jun. 02, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-48941
MyBB is free and open source forum software. Prior to version 1.8.39, the search component does not validate permissions correctly, which allows attackers to determine the existence of hidden (draft, unapproved, or soft-deleted) threads containing specifi... Read more
Affected Products : mybb- Published: Jun. 02, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Authorization
-
7.2
HIGHCVE-2025-48940
MyBB is free and open source forum software. Prior to version 1.8.39, the upgrade component does not validate user input properly, which allows attackers to perform local file inclusion (LFI) via a specially crafted parameter value. In order to exploit th... Read more
Affected Products : mybb- Published: Jun. 02, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2025-48866
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `saniti... Read more
- Published: Jun. 02, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Denial of Service
-
7.3
HIGHCVE-2025-45542
SQL injection vulnerability in the registrationform endpoint of CloudClassroom-PHP-Project v1.0. The pass parameter is vulnerable due to improper input validation, allowing attackers to inject SQL queries.... Read more
Affected Products : cloudclassroom-php_project- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Injection
-
5.4
MEDIUMCVE-2025-44115
A vulnerability has been found in Cotonti Siena v0.9.25. Affected by this vulnerability is the file /admin.php?m=config&n=edit&o=core&p=title. The manipulation of the value of title leads to cross-site scripting.... Read more
Affected Products : cotonti_siena- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Cross-Site Scripting
-
7.3
HIGHCVE-2024-57459
A time-based SQL injection vulnerability exists in mydetailsstudent.php in the CloudClassroom PHP Project 1.0. The myds parameter does not properly validate user input, allowing an attacker to inject arbitrary SQL commands.... Read more
Affected Products : cloudclassroom-php_project- Published: Jun. 02, 2025
- Modified: Jun. 13, 2025
- Vuln Type: Injection