Latest CVE Feed
-
7.5
HIGHCVE-2025-21605
Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Re... Read more
- Published: Apr. 23, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Denial of Service
-
4.4
MEDIUMCVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redi... Read more
Affected Products : redis- Published: Jan. 06, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2025-48543
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not neede... Read more
Affected Products : android- Actively Exploited
- Published: Sep. 04, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.... Read more
- Published: Jan. 06, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Authentication
-
7.4
HIGHCVE-2025-38352
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_tim... Read more
Affected Products : linux_kernel- Actively Exploited
- Published: Jul. 22, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Race Condition
-
5.9
MEDIUMCVE-2025-40909
Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for ... Read more
Affected Products : perl- Published: May. 30, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Race Condition
-
5.3
MEDIUMCVE-2025-40907
FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library. The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via craft... Read more
Affected Products : fcgi- Published: May. 16, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-40906
BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities. Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and CVE-2025-0755. BSON-XS was the official Per... Read more
Affected Products :- Published: May. 16, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Supply Chain
-
4.0
MEDIUMCVE-2025-2814
Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable... Read more
Affected Products :- Published: Apr. 13, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
4.0
MEDIUMCVE-2025-27552
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.000... Read more
Affected Products :- Published: Mar. 26, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
4.0
MEDIUMCVE-2025-27551
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects DBIx::Class::EncodedColumn ... Read more
Affected Products :- Published: Mar. 26, 2025
- Modified: Sep. 05, 2025
-
7.7
HIGHCVE-2025-1860
Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.... Read more
Affected Products :- Published: Mar. 28, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
8.8
HIGHCVE-2025-1828
Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. If the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Cryp... Read more
Affected Products : crypt\- Published: Mar. 11, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
5.5
MEDIUMCVE-2024-58036
Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically stat... Read more
Affected Products : net\- Published: Apr. 05, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
5.5
MEDIUMCVE-2024-57868
Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is "Use... Read more
Affected Products : web\- Published: Apr. 05, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
6.5
MEDIUMCVE-2024-56370
Net::Xero 0.044 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Xero uses the Data::Random library which specifically states that it is ... Read more
Affected Products :- Published: Apr. 05, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
5.5
MEDIUMCVE-2024-52322
WebService::Xero 0.11 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically WebService::Xero uses the Data::Random library which specifically state... Read more
Affected Products : webservice\- Published: Apr. 05, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
7.3
HIGHCVE-2025-48372
Schule is open-source school management system software. The generateOTP() function generates a 4-digit numeric One-Time Password (OTP). Prior to version 1.0.1, even if a secure random number generator is used, the short length and limited range (1000–999... Read more
Affected Products : schule_school_management_system- Published: May. 22, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Authentication
-
9.1
CRITICALCVE-2025-48373
Schule is open-source school management system software. The application relies on client-side JavaScript (index.js) to redirect users to different panels based on their role. Prior to version 1.0.1, this implementation poses a serious security risk becau... Read more
Affected Products : schule_school_management_system- Published: May. 22, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Authorization
-
8.4
HIGHCVE-2021-27285
An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell.... Read more
Affected Products : clusterengine- Published: Jan. 06, 2025
- Modified: Sep. 05, 2025