Latest CVE Feed
-
6.5
MEDIUMCVE-2025-3932
It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has been... Read more
Affected Products : thunderbird- Published: May. 14, 2025
- Modified: Jun. 05, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-3909
Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may ... Read more
Affected Products : thunderbird- Published: May. 14, 2025
- Modified: Jun. 05, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-3875
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the ... Read more
Affected Products : thunderbird- Published: May. 14, 2025
- Modified: Jun. 05, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-26785
An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400. The lack of a length check leads to out-... Read more
- Published: May. 14, 2025
- Modified: Jun. 25, 2025
- Vuln Type: Memory Corruption
-
6.5
MEDIUMCVE-2025-26784
An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400. The lack of a length check leads to out-... Read more
- Published: May. 14, 2025
- Modified: Jun. 25, 2025
- Vuln Type: Memory Corruption
-
8.9
HIGHCVE-2025-47782
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker ... Read more
Affected Products : motioneye- Published: May. 14, 2025
- Modified: May. 16, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-47781
Rallly is an open-source scheduling and collaboration tool. Versions up to and including 3.22.1 of the application features token based authentication. When a user attempts to login to the application, they insert their email and a 6 digit code is sent to... Read more
Affected Products : rally- Published: May. 14, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2025-47778
Sulu is an open-source PHP content management system based on the Symfony framework. Starting in versions 2.5.21, 2.6.5, and 3.0.0-alpha1, an admin user can upload SVG which may load external data via XML DOM library. This can be used for insecure XML Ext... Read more
Affected Products : sulu- Published: May. 14, 2025
- Modified: May. 16, 2025
- Vuln Type: XML External Entity
-
9.6
CRITICALCVE-2025-47777
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Versions prior to 0.11.1 are vulnerable to stored cross-site scripting in chatbot responses due to insufficient sanitization. This, in turn, can lead to ... Read more
Affected Products :- Published: May. 14, 2025
- Modified: May. 16, 2025
- Vuln Type: Cross-Site Scripting
-
8.6
HIGHCVE-2025-47775
Bullfrog is a GithHb Action to block unauthorized outbound traffic in GitHub workflows. Prior to version 0.8.4, using tcp breaks blocking and allows DNS exfiltration. This can result in sandbox bypass. Version 0.8.4 fixes the issue.... Read more
Affected Products : bullfrog- Published: May. 14, 2025
- Modified: Jul. 11, 2025
- Vuln Type: Misconfiguration
-
5.0
MEDIUMCVE-2025-24969
iTop is an web based IT Service Management tool. Prior to version 3.2.1, a portal user can see any other contacts picture by changing the picture ID in the URL. Version 3.2.1 contains a patch for the issue.... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2025-24785
iTop is an web based IT Service Management tool. In version 3.2.0, an attacker may send a URL to the server to trigger a PHP error. The next user trying to load this dashboard would encounter a crashed start page. Version 3.2.1 fixes the issue by checking... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Misconfiguration
-
5.3
MEDIUMCVE-2025-24026
iTop is an web based IT Service Management tool. Versions prior to 3.2.1 are vulnerable to regular expression denial of service (ReDoS) that may, under some circumstances, affect iTop server. Version 3.2.1 doesn't use the affected variable in the regular ... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Denial of Service
-
8.5
HIGHCVE-2025-24022
iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, server code execution is possible through the frontend of iTop's portal. This is fixed in versions 2.7.12, 3.1.3 and 3.2.1.... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 01, 2025
-
5.0
MEDIUMCVE-2025-24021
iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, anyone with an account having portal access can set value to object fields when they're not supposed to. Versions 2.7.12, 3.1.3, and 3.2.1 contain a fix for the i... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 22, 2025
- Vuln Type: Authorization
-
6.3
MEDIUMCVE-2024-56157
iTop is an web based IT Service Management tool. Prior to versions 3.1.3 and 3.2.1, by filling malicious code in a CSV content, a cross-site scripting attack can be performed when importing this content. The issue is fixed in versions 3.1.3 and 3.2.1. As ... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2024-52601
iTop is an web based IT Service Management tool. Prior to versions 2.7.12, 3.1.3, and 3.2.1, anyone with an account having portal access can have read access to objects they're not allowed to see by querying an unprotected route. Versions 2.7.12, 3.1.3, a... Read more
Affected Products : itop- Published: May. 14, 2025
- Modified: Aug. 01, 2025
- Vuln Type: Authorization
-
9.4
CRITICALCVE-2024-10865
Improper Input validation leads to XSS or Cross-site Scripting vulnerability in OpenText Advanced Authentication. This issue affects Advanced Authentication versions before 6.5.... Read more
Affected Products :- Published: May. 14, 2025
- Modified: May. 16, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2024-10864
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in OpenText Advanced Authentication. This issue affects Advanced Authentication versions before 6.5... Read more
Affected Products :- Published: May. 14, 2025
- Modified: May. 16, 2025
-
9.8
CRITICALCVE-2025-47436
Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to ... Read more
Affected Products : orc- Published: May. 14, 2025
- Modified: Jul. 14, 2025
- Vuln Type: Memory Corruption