Latest CVE Feed
-
6.9
MEDIUMCVE-2025-24315
Unauthenticated attackers can add devices of other users to their scenes (or arbitrary scenes of other arbitrary users).... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-24297
Due to lack of server-side input validation, attackers can inject malicious JavaScript code into users personal spaces of the web portal.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-22269
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShapedPlugin LLC Real Testimonials allows Stored XSS. This issue affects Real Testimonials: from n/a through 3.1.6.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-22268
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uncanny Owl Uncanny Toolkit for LearnDash allows Stored XSS. This issue affects Uncanny Toolkit for LearnDash: from n/a through 3.7.0.1.... Read more
Affected Products : uncanny_toolkit_for_learndash- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Cross-Site Scripting
-
7.1
HIGHCVE-2025-22263
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Global Gallery allows Reflected XSS. This issue affects Global Gallery: from n/a through 8.8.0.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2024-49200
An issue was discovered in AcpiS3SaveDxe and ChipsetSvcDxe in Insyde InsydeH2O with kernel 5.2 though 5.7. A potential DXE memory corruption vulnerability has been identified. The root cause is use of a pointer originating from the value of an NVRAM varia... Read more
Affected Products : kernel- Published: Apr. 15, 2025
- Modified: Apr. 30, 2025
- Vuln Type: Memory Corruption
-
9.3
CRITICALCVE-2025-32778
Web-Check is an all-in-one OSINT tool for analyzing any website. A command injection vulnerability exists in the screenshot API of the Web Check project (Lissy93/web-check). The issue stems from user-controlled input (url) being passed unsanitized into a ... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-32021
Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation ... Read more
Affected Products : weblate- Published: Apr. 15, 2025
- Modified: Apr. 30, 2025
- Vuln Type: Information Disclosure
-
6.9
MEDIUMCVE-2025-31949
An authenticated attacker can obtain any plant name by knowing the plant ID.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Information Disclosure
-
6.9
MEDIUMCVE-2025-31941
An unauthenticated attacker can obtain a list of smart devices by knowing a valid username.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authorization
-
6.9
MEDIUMCVE-2025-31933
An unauthenticated attacker can check the existence of usernames in the system by querying an API.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authentication
-
7.6
HIGHCVE-2025-31499
Jellyfin is an open source self hosted media server. Versions before 10.10.7 are vulnerable to argument injection in FFmpeg. This can be leveraged to possibly achieve remote code execution by anyone with credentials to a low-privileged user. This vulnerab... Read more
Affected Products : jellyfin- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Injection
-
6.9
MEDIUMCVE-2025-31357
An unauthenticated attacker can obtain a user's plant list by knowing the username.... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 16, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-30740
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access v... Read more
Affected Products : jd_edwards_enterpriseone_tools- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authentication
-
5.7
MEDIUMCVE-2025-30737
Vulnerability in the Oracle Smart View for Office product of Oracle Hyperion (component: Core Smart View). The supported version that is affected is 24.200. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP ... Read more
Affected Products : smart_view_for_office- Published: Apr. 15, 2025
- Modified: Jun. 27, 2025
- Vuln Type: Authentication
-
7.4
HIGHCVE-2025-30736
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocol... Read more
- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authentication
-
8.1
HIGHCVE-2025-30735
Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attack... Read more
- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-30733
Vulnerability in the RDBMS Listener component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net t... Read more
- Published: Apr. 15, 2025
- Modified: May. 19, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2025-30732
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via... Read more
Affected Products : application_object_library- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authentication
-
3.6
LOWCVE-2025-30731
Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logo... Read more
Affected Products : applications_technology_stack- Published: Apr. 15, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Authorization