Latest CVE Feed
-
7.2
HIGHCVE-2025-31500
Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an Asset name.... Read more
- Published: May. 28, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Cross-Site Scripting
-
7.2
HIGHCVE-2025-30087
Best Practical RT (Request Tracker) 4.4 through 4.4.7 and 5.0 through 5.0.7 allows XSS via injection of crafted parameters in a search URL.... Read more
- Published: May. 28, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Cross-Site Scripting
-
5.6
MEDIUMCVE-2025-1461
Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss ... Read more
Affected Products :- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2024-57338
An arbitrary file upload vulnerability in M2Soft CROWNIX Report & ERS v5.x to v5.5.14.1070, v7.x to v7.4.3.960, and v8.x to v8.2.0.345 allows attackers to execute arbitrary code via supplying a crafted file.... Read more
Affected Products :- Published: May. 28, 2025
- Modified: May. 30, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2024-57337
An arbitrary file upload vulnerability in the opcode 500 functionality of M2Soft CROWNIX Report & ERS v5.x to v5.5.14.1070, v7.x to v7.4.3.960, and v8.x to v8.2.0.345 allows attackers to execute arbitrary code via supplying a crafted file.... Read more
Affected Products :- Published: May. 28, 2025
- Modified: May. 30, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2024-57336
Incorrect access control in M2Soft CROWNIX Report & ERS affected v7.x to v7.4.3.599 and v8.x to v8.0.3.79 allows unauthorized attackers to obtain Administrator account access.... Read more
Affected Products :- Published: May. 28, 2025
- Modified: May. 30, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2024-47057
SummaryThis advisory addresses a security vulnerability in Mautic related to the "Forget your password" functionality. This vulnerability could be exploited by unauthenticated users to enumerate valid usernames. User Enumeration via Timing Attack: A user... Read more
Affected Products : mautic- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Information Disclosure
-
4.3
MEDIUMCVE-2024-47055
SummaryThis advisory addresses a security vulnerability in Mautic related to the segment cloning functionality. This vulnerability allows any authenticated user to clone segments without proper authorization checks. Insecure Direct Object Reference (IDOR... Read more
Affected Products : mautic- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-5257
SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search engines. This could lead to the unintended disclosure of draft content or sensit... Read more
Affected Products : mautic- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Authorization
-
3.2
LOWCVE-2025-48931
The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Cryptography
-
2.8
LOWCVE-2025-48930
The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Information Disclosure
-
4.0
MEDIUMCVE-2025-48929
The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a later date if discovered by an adversary.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Authentication
-
4.0
MEDIUMCVE-2025-48928
The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.... Read more
Affected Products : telemessage- Actively Exploited
- Published: May. 28, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Information Disclosure
-
5.3
MEDIUMCVE-2025-48927
The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.... Read more
Affected Products : telemessage- Actively Exploited
- Published: May. 28, 2025
- Modified: Jul. 02, 2025
- Vuln Type: Misconfiguration
-
4.3
MEDIUMCVE-2025-48926
The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Information Disclosure
-
4.3
MEDIUMCVE-2025-48925
The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential.... Read more
Affected Products : telemessage- Published: May. 28, 2025
- Modified: Jul. 01, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-48746
Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function.... Read more
Affected Products : directory_manager- Published: May. 28, 2025
- Modified: Jun. 24, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-36572
Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with the knowledge of the hard-coded credentials, could potentially exploit this vul... Read more
Affected Products : powerstoreos powerstore_500t powerstore_1000t powerstore_1200t powerstore_3200t powerstore_3000t powerstore_5200t powerstore_5000t powerstore_7000t powerstore_9000t +2 more products- Published: May. 28, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2025-32802
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecur... Read more
Affected Products : kea- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Path Traversal
-
7.8
HIGHCVE-2025-32801
Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea ver... Read more
Affected Products : kea- Published: May. 28, 2025
- Modified: May. 29, 2025
- Vuln Type: Misconfiguration