Latest CVE Feed
-
9.0
CRITICALCVE-2025-32428
Jupyter Remote Desktop Proxy allows you to run a Linux Desktop on a JupyterHub. jupyter-remote-desktop-proxy was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started by ju... Read more
Affected Products :- Published: Apr. 15, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Misconfiguration
-
3.5
LOWCVE-2025-31494
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. The AutoGPT Platform's WebSocket API transmitted node execution updates to subscribers based on the graph_id+g... Read more
- Published: Apr. 15, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Authorization
-
8.6
HIGHCVE-2025-31491
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to 0.6.1, AutoGPT allows of leakage of cross-domain cookies and protected headers in requests redirect. ... Read more
- Published: Apr. 15, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Information Disclosure
-
9.4
CRITICALCVE-2025-24797
Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in r... Read more
Affected Products : meshtastic_firmware- Published: Apr. 15, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
6.5
MEDIUMCVE-2025-3593
A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been declared as critical. This vulnerability affects the function Upload of the file /admin/upload/authorImg/. The manipulation of the argument File leads to unrestricted upl... Read more
Affected Products :- Published: Apr. 14, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-31490
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to 0.6.1, AutoGPT allows SSRF due to DNS Rebinding in requests wrapper. AutoGPT is built with a wrapper ... Read more
- Published: Apr. 14, 2025
- Modified: Aug. 05, 2025
- Vuln Type: Server-Side Request Forgery
-
5.1
MEDIUMCVE-2025-3592
A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/v1/link/edit. The manipulation leads to cross site scripting. It is possible to initiate the at... Read more
Affected Products :- Published: Apr. 14, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Cross-Site Scripting
-
5.1
MEDIUMCVE-2025-3591
A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/v1/blog/edit. The manipulation leads to cross site scripting. The attack may be ... Read more
Affected Products :- Published: Apr. 14, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-3590
A vulnerability has been found in Adianti Framework up to 8.0 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disc... Read more
Affected Products :- Published: Apr. 14, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-3589
A vulnerability, which was classified as critical, was found in SourceCodester Music Class Enrollment System 1.0. Affected is an unknown function of the file /manage_class.php. The manipulation of the argument ID leads to sql injection. It is possible to ... Read more
Affected Products : music_class_enrollment_system- Published: Apr. 14, 2025
- Modified: Apr. 29, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-3588
A vulnerability, which was classified as problematic, has been found in joelittlejohn jsonschema2pojo 1.2.2. This issue affects the function apply of the file org/jsonschema2pojo/rules/SchemaRule.java of the component JSON File Handler. The manipulation l... Read more
Affected Products :- Published: Apr. 14, 2025
- Modified: Apr. 15, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2023-27272
IBM Aspera Console 3.4.0 through 3.4.4 allows passwords to be reused when a new user logs into the system.... Read more
- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2022-43852
IBM Aspera Console 3.4.0 through 3.4.4 could disclose sensitive information in HTTP headers that could be used in further attacks against the system.... Read more
- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2022-43851
IBM Aspera Console 3.4.0 through 3.4.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.... Read more
- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Cryptography
-
5.4
MEDIUMCVE-2022-43850
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a... Read more
- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Cross-Site Scripting
-
5.4
MEDIUMCVE-2022-43847
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site script... Read more
- Published: Apr. 14, 2025
- Modified: Jul. 17, 2025
- Vuln Type: Misconfiguration
-
4.3
MEDIUMCVE-2022-43840
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to an XPath injection vulnerability, which could allow an authenticated attacker to exfiltrate sensitive application data and/or determine the structure of the XML document.... Read more
Affected Products : aspera_console- Published: Apr. 14, 2025
- Modified: Jul. 24, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-3587
A vulnerability classified as critical was found in ZeroWdd/code-projects studentmanager 1.0. This vulnerability affects unknown code of the file /getTeacherList. The manipulation leads to improper authorization. The attack can be initiated remotely. The ... Read more
- Published: Apr. 14, 2025
- Modified: Jun. 05, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-3585
A vulnerability classified as critical has been found in westboy CicadasCMS 1.0. This affects an unknown part of the file /upload/ of the component JSP Parser. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate ... Read more
Affected Products : cicadascms- Published: Apr. 14, 2025
- Modified: May. 21, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-3277
An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild... Read more
Affected Products : sqlite- Published: Apr. 14, 2025
- Modified: Aug. 18, 2025
- Vuln Type: Memory Corruption