Latest CVE Feed
-
3.3
LOWCVE-2024-51491
notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab's security audit on the Certificate Revocation List (CRL) based revocation check feature... Read more
Affected Products : notation-go- Published: Jan. 13, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Misconfiguration
-
5.9
MEDIUMCVE-2024-11584
cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.socket with default SocketMode that grants 0666 permissions, making it world-writable. This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could ... Read more
Affected Products : cloud-init- Published: Jun. 26, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potenti... Read more
Affected Products : redis- Published: Jul. 07, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10,... Read more
Affected Products : redis- Published: Jul. 07, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Denial of Service
-
4.8
MEDIUMCVE-2025-55107
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could p... Read more
Affected Products : portal_for_arcgis- Published: Aug. 21, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cross-Site Scripting
-
4.8
MEDIUMCVE-2025-55106
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potential... Read more
Affected Products : portal_for_arcgis- Published: Aug. 21, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cross-Site Scripting
-
4.8
MEDIUMCVE-2025-55105
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potential... Read more
Affected Products : portal_for_arcgis- Published: Aug. 21, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cross-Site Scripting
-
4.8
MEDIUMCVE-2025-55104
A stored cross-site scripting (XSS) vulnerability exists ArcGIS HUB and ArcGIS Enterprise Sites which allows an authenticated user with the ability to create or edit a site to add and store an XSS payload. If this stored XSS payload is triggered by any us... Read more
Affected Products : portal_for_arcgis- Published: Aug. 21, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cross-Site Scripting
-
4.8
MEDIUMCVE-2025-55103
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Sites versions 10.9.1 – 11.4 that may allow a remote, authenticated attacker to inject malicious a file with an embedded xss script which when loaded could potential... Read more
Affected Products : portal_for_arcgis- Published: Aug. 21, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cross-Site Scripting
-
9.1
CRITICALCVE-2025-21622
ClipBucket V5 provides open source video hosting with PHP. During the user avatar upload workflow, a user can choose to upload and change their avatar at any time. During deletion, ClipBucket checks for the avatar_url as a filepath within the avatars subd... Read more
Affected Products : clipbucket- Published: Jan. 07, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-23369
An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already... Read more
Affected Products : enterprise_server- Published: Jan. 21, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cryptography
-
7.1
HIGHCVE-2024-10001
A Code Injection vulnerability was identified in GitHub Enterprise Server that allowed attackers to inject malicious code into the query selector via the identity property in the message handling function. This enabled the exfiltration of sensitive data b... Read more
Affected Products : enterprise_server- Published: Jan. 29, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-3124
A missing authorization vulnerability was identified in GitHub Enterprise Server that allowed a user to see the names of private repositories that they wouldn't otherwise have access to in the Security Overview in GitHub Advanced Security. The Security Ov... Read more
Affected Products : enterprise_server- Published: Apr. 17, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Authorization
-
8.6
HIGHCVE-2025-3246
An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed cross-site scripting in GitHub Markdown that used `$$..$$` math blocks. Exploitation required access to the target GitHub Enterprise Server instance... Read more
Affected Products : enterprise_server- Published: Apr. 17, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Cross-Site Scripting
-
7.2
HIGHCVE-2025-3509
A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. Th... Read more
Affected Products : enterprise_server- Published: Apr. 17, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Authentication
-
6.3
MEDIUMCVE-2025-6600
An exposure of sensitive information vulnerability was identified in GitHub Enterprise Server that could allow an attacker to disclose the names of private repositories within an organization. This issue could be exploited by leveraging a user-to-server t... Read more
Affected Products : enterprise_server- Published: Jul. 01, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-21605
Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Re... Read more
- Published: Apr. 23, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Denial of Service
-
4.4
MEDIUMCVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redi... Read more
Affected Products : redis- Published: Jan. 06, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2025-48543
In multiple locations, there is a possible way to escape chrome sandbox to attack android system_server due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not neede... Read more
Affected Products : android- Actively Exploited
- Published: Sep. 04, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.... Read more
- Published: Jan. 06, 2025
- Modified: Sep. 05, 2025
- Vuln Type: Authentication