Latest CVE Feed
-
9.8
CRITICALCVE-2025-2005
The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticate... Read more
Affected Products : front_end_users- Published: Apr. 02, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2024-13637
The Demo Awesome plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the install_plugin function in all versions up to, and including, 1.0.3. This makes it possible for authenticated attackers, with... Read more
Affected Products :- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authorization
-
4.9
MEDIUMCVE-2024-12410
The Front End Users plugin for WordPress is vulnerable to SQL Injection via the 'UserSearchField' parameter in all versions up to, and including, 3.2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the ... Read more
Affected Products : front_end_users- Published: Apr. 02, 2025
- Modified: Aug. 12, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2024-39780
A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue ... Read more
- Published: Apr. 02, 2025
- Modified: Aug. 26, 2025
- Vuln Type: Injection
-
9.9
CRITICALCVE-2023-40714
A relative path traversal in Fortinet FortiSIEM versions 7.0.0, 6.7.0 through 6.7.2, 6.6.0 through 6.6.3, 6.5.1, 6.5.0 allows attacker to escalate privilege via uploading certain GUI elements... Read more
Affected Products : fortisiem- Published: Apr. 02, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Path Traversal
-
8.6
HIGHCVE-2025-0676
This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in priv... Read more
Affected Products : tn-4900_firmware- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Injection
-
9.2
CRITICALCVE-2025-0415
A remote attacker with web administrator privileges can exploit the device’s web interface to execute arbitrary system commands through the NTP settings. Successful exploitation may result in the device entering an infinite reboot loop, leading to a total... Read more
Affected Products : tn-4900_firmware- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Denial of Service
-
6.0
MEDIUMCVE-2024-45700
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive deco... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-45699
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaS... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Cross-Site Scripting
-
2.1
LOWCVE-2024-42325
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authorization
-
2.3
LOWCVE-2024-36469
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authentication
-
8.6
HIGHCVE-2024-36465
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.... Read more
Affected Products : zabbix- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Injection
-
5.9
MEDIUMCVE-2025-27244
AssetView and AssetView CLOUD contain an issue with acquiring sensitive information from sent data to the developer. If exploited, sensitive information may be obtained by a remote unauthenticated attacker.... Read more
Affected Products : assetview- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Information Disclosure
-
8.2
HIGHCVE-2025-25060
Missing authentication for critical function vulnerability exists in AssetView and AssetView CLOUD. If exploited, the files on the server where the product is running may be obtained and/or deleted by a remote unauthenticated attacker.... Read more
Affected Products : assetview- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-2779
The Insert Headers and Footers Code – HT Script plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 1.1.2. This makes it possible for ... Read more
Affected Products :- Published: Apr. 02, 2025
- Modified: Apr. 02, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2025-3074
Inappropriate implementation in Downloads in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3073
Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3072
Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-3071
Inappropriate implementation in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 21, 2025
- Vuln Type: Misconfiguration
-
6.5
MEDIUMCVE-2025-3070
Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Apr. 02, 2025
- Modified: Apr. 07, 2025
- Vuln Type: Authorization