Latest CVE Feed
-
6.1
MEDIUMCVE-2025-10027
A vulnerability was determined in itsourcecode POS Point of Sale System 1.0. Affected by this issue is some unknown functionality of the file /inventory/main/vendors/datatables/unit_testing/templates/2512.php. This manipulation of the argument scripts cau... Read more
Affected Products : point_of_sale_system- Published: Sep. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2025-38742
Dell iDRAC Service Module (iSM), versions prior to 6.0.3.0, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code executio... Read more
Affected Products : emc_idrac_service_module- Published: Aug. 21, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-48208
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability in Apache HertzBeat . The attacker needs to have an authenticated account with access, and the attack can only be triggered by crafting custom c... Read more
Affected Products : hertzbeat- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2025-24404
XML Injection RCE by parse http sitemap xml response vulnerability in Apache HertzBeat. The attacker needs to have an authenticated account with access, and add monitor parsed by xml, returned special content can trigger the XML parsing vulner... Read more
Affected Products : hertzbeat- Published: Sep. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: XML External Entity
-
5.3
MEDIUMCVE-2025-53743
Jenkins Applitools Eyes Plugin 1.16.5 and earlier does not mask Applitools API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.... Read more
Affected Products : applitools_eyes- Published: Jul. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Information Disclosure
-
6.5
MEDIUMCVE-2025-53742
Jenkins Applitools Eyes Plugin 1.16.5 and earlier stores Applitools API keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file syste... Read more
Affected Products : applitools_eyes- Published: Jul. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Misconfiguration
-
9.1
CRITICALCVE-2025-29927
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization c... Read more
Affected Products : next.js- Published: Mar. 21, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2024-56332
Next.js is a React framework for building full-stack web applications. Starting in version 13.0.0 and prior to versions 13.5.8, 14.2.21, and 15.1.2, Next.js is vulnerable to a Denial of Service (DoS) attack that allows attackers to construct requests that... Read more
Affected Products : next.js- Published: Jan. 03, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2024-51479
Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly unde... Read more
Affected Products : next.js- Published: Dec. 17, 2024
- Modified: Sep. 10, 2025
-
5.5
MEDIUMCVE-2024-51752
The AuthKit library for Next.js provides convenient helpers for authentication and session management using WorkOS & AuthKit with Next.js. In affected versions refresh tokens are logged to the console when the disabled by default `debug` flag, is enabled.... Read more
Affected Products : authkit- Published: Nov. 05, 2024
- Modified: Sep. 10, 2025
-
7.5
HIGHCVE-2024-46982
Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this c... Read more
Affected Products : next.js- Published: Sep. 17, 2024
- Modified: Sep. 10, 2025
-
7.5
HIGHCVE-2024-39693
Next.js is a React framework. A Denial of Service (DoS) condition was identified in Next.js. Exploitation of the bug can trigger a crash, affecting the availability of the server. his vulnerability was resolved in Next.js 13.5 and later.... Read more
Affected Products : next.js- Published: Jul. 10, 2024
- Modified: Sep. 10, 2025
-
7.5
HIGHCVE-2024-34351
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met,... Read more
Affected Products : next.js- Published: May. 14, 2024
- Modified: Sep. 10, 2025
-
7.5
HIGHCVE-2024-34350
Next.js is a React framework that can provide building blocks to create web applications. Prior to 13.5.1, an inconsistent interpretation of a crafted HTTP request meant that requests are treated as both a single request, and two separate requests by Next... Read more
Affected Products : next.js- Published: May. 14, 2024
- Modified: Sep. 10, 2025
-
9.8
CRITICALCVE-2025-57807
ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increas... Read more
Affected Products : imagemagick- Published: Sep. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Memory Corruption
-
6.1
MEDIUMCVE-2025-51541
A stored cross-site scripting (XSS) vulnerability exists in the Shopware 6 installation interface at /recovery/install/database-configuration/. The c_database_schema field fails to properly sanitize user-supplied input before rendering it in the browser, ... Read more
Affected Products : shopware- Published: Aug. 05, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-49826
Next.js is a React framework for building full-stack web applications. From versions 15.0.4-canary.51 to before 15.1.8, a cache poisoning bug leading to a Denial of Service (DoS) condition was found in Next.js. This issue does not impact customers hosted ... Read more
Affected Products : next.js- Published: Jul. 03, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Denial of Service
-
6.9
MEDIUMCVE-2025-32378
Shopware is an open source e-commerce software platform. Prior to 6.6.10.3 or 6.5.8.17, the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are Newsletter: Double Opt-in set to activ... Read more
Affected Products : shopware- Published: Apr. 09, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-30151
Shopware is an open commerce platform. It's possible to pass long passwords that leads to Denial Of Service via forms in Storefront forms or Store-API. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17. For older versions of 6.4, corresponding security ... Read more
Affected Products : shopware- Published: Apr. 08, 2025
- Modified: Sep. 10, 2025
-
5.5
MEDIUMCVE-2025-30150
Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Through the store-api it is possible as a attacker to check if a specific e-mail address has an account in the shop. Using the store-api endpoint /store-api/account/recovery-passw... Read more
Affected Products : shopware- Published: Apr. 08, 2025
- Modified: Sep. 10, 2025
- Vuln Type: Information Disclosure