Latest CVE Feed
-
6.5
MEDIUMCVE-2025-29888
A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in... Read more
Affected Products : file_station- Published: Aug. 29, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Denial of Service
-
5.9
MEDIUMCVE-2024-43398
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new,... Read more
- Published: Aug. 22, 2024
- Modified: Sep. 19, 2025
-
4.3
MEDIUMCVE-2024-39908
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilitie... Read more
- Published: Jul. 16, 2024
- Modified: Sep. 19, 2025
-
8.0
HIGHCVE-2025-32956
ManageWiki is a MediaWiki extension allowing users to manage wikis. Versions before commit f504ed8, are vulnerable to SQL injection when renaming a namespace in Special:ManageWiki/namespaces when using a page prefix (namespace name, which is the current n... Read more
Affected Products : managewiki- Published: Apr. 21, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2023-50894
In Janitza GridVis through 9.0.66, use of hard-coded credentials in the de.janitza.pasw.feature.impl.activators.PasswordEncryption password encryption function allows remote authenticated administrative users to discover cleartext database credentials con... Read more
Affected Products : gridvis- Published: Mar. 26, 2024
- Modified: Sep. 19, 2025
-
4.6
MEDIUMCVE-2025-32964
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 00bebea, when enabling a conflicting extension, a restricted extension would be automatically disabled even if the user did not hold the ManageWiki-restricted right. This ... Read more
Affected Products : managewiki- Published: Apr. 22, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2024-35801
In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD Commit 672365477ae8 ("x86/fpu: Update XFD state where required") and commit 8bf26758ca96 ("x86/fpu: Add XFD state to fpstate") introduc... Read more
Affected Products : linux_kernel- Published: May. 17, 2024
- Modified: Sep. 19, 2025
-
9.8
CRITICALCVE-2024-28421
SQL Injection vulnerability in Razor 0.8.0 allows a remote attacker to escalate privileges via the ChannelModel::updateapk method of the channelmodle.php... Read more
Affected Products : razor- Published: Mar. 25, 2024
- Modified: Sep. 19, 2025
-
5.4
MEDIUMCVE-2025-43861
ManageWiki is a MediaWiki extension allowing users to manage wikis. Prior to commit 2f177dc, ManageWiki is vulnerable to reflected or stored XSS in the review dialog. A logged-in attacker must change a form field to include a malicious payload. If that sa... Read more
Affected Products : managewiki- Published: Apr. 24, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2024-35176
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem... Read more
Affected Products : rexml- Published: May. 16, 2024
- Modified: Sep. 19, 2025
-
5.5
MEDIUMCVE-2024-35800
In the Linux kernel, the following vulnerability has been resolved: efi: fix panic in kdump kernel Check if get_next_variable() is actually valid pointer before calling it. In kdump kernel this method is set to NULL that causes panic during the kexec-ed... Read more
Affected Products : linux_kernel- Published: May. 17, 2024
- Modified: Sep. 19, 2025
-
8.8
HIGHCVE-2024-12138
A vulnerability classified as critical was found in horilla up to 1.2.1. This vulnerability affects the function request_new/get_employee_shift/create_reimbursement/key_result_current_value_update/create_meetings/create_skills. The manipulation leads to d... Read more
Affected Products : horilla- Published: Dec. 04, 2024
- Modified: Sep. 19, 2025
-
6.1
MEDIUMCVE-2025-47789
Horilla is a free and open source Human Resource Management System (HRMS). In versions up to and including 1.3, an attacker can craft a Horilla URL that refers to an external domain. Upon clicking and logging in, the user is redirected to an external doma... Read more
Affected Products : horilla- Published: May. 15, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2025-24025
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.380, the tags page allows users to search for tags. If the search does not return any results, the query gets reflected on the ... Read more
Affected Products : coolify- Published: Jan. 24, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Cross-Site Scripting
-
10.0
CRITICALCVE-2025-22612
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.374, the missing authorization allows an authenticated user to retrieve any existing private keys on a coolify instance in plai... Read more
Affected Products : coolify- Published: Jan. 24, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authorization
-
9.9
CRITICALCVE-2025-22611
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to escalate his or any other team members privileges to any role, ... Read more
Affected Products : coolify- Published: Jan. 24, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2024-21914
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or contr... Read more
Affected Products : factorytalk_view- Published: Mar. 25, 2024
- Modified: Sep. 19, 2025
-
6.5
MEDIUMCVE-2025-22610
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the global coolify instance OAuth configuration. This exp... Read more
Affected Products : coolify- Published: Jan. 24, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-58756
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.0, in `model_dict = torch.load(full_path, map_location=torch.device(device), weights_only=True)` in monai/bundle/scripts.py , `weights_only=T... Read more
Affected Products : medical_open_network_for_ai- Published: Sep. 09, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-58757
MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.0, the `pickle_operations` function in `monai/data/utils.py` automatically handles dictionary key-value pairs ending with a specific suffix a... Read more
Affected Products : medical_open_network_for_ai- Published: Sep. 09, 2025
- Modified: Sep. 19, 2025
- Vuln Type: Injection