Latest CVE Feed
-
4.3
MEDIUMCVE-2024-29885
silverstripe/reports is an API for creating backend reports in the Silverstripe Framework. In affected versions reports can be accessed by their direct URL by any user who has access to view the reports admin section, even if the `canView()` method for th... Read more
- Published: Jul. 17, 2024
- Modified: Sep. 04, 2025
-
5.3
MEDIUMCVE-2024-38353
CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD ... Read more
Affected Products : codimd- Published: Jul. 10, 2024
- Modified: Sep. 04, 2025
-
6.5
MEDIUMCVE-2024-32467
MeterSphere is an open source continuous testing platform. Prior to version 2.10.14-lts, members without space permissions can view member information from other workspaces beyond their authority. Version 2.10.14-lts fixes this issue.... Read more
Affected Products : metersphere- Published: Apr. 25, 2024
- Modified: Sep. 04, 2025
-
7.7
HIGHCVE-2024-39701
Directus is a real-time API and App dashboard for managing SQL database content. Directus >=9.23.0, <=v10.5.3 improperly handles _in, _nin operators. It evaluates empty arrays as valid so expressions like {"role": {"_in": $CURRENT_USER.some_field}} would ... Read more
Affected Products : directus- Published: Jul. 08, 2024
- Modified: Sep. 04, 2025
-
9.1
CRITICALCVE-2024-32880
pyload is an open-source Download Manager written in pure Python. An authenticated user can change the download folder and upload a crafted template to the specified folder lead to remote code execution. There is no fix available at the time of publicatio... Read more
Affected Products : pyload- Published: Apr. 26, 2024
- Modified: Sep. 04, 2025
-
9.0
CRITICALCVE-2024-31225
RIOT is a real-time multi-threading operating system that supports a range of devices that are typically 8-bit, 16-bit and 32-bit microcontrollers. The `_on_rd_init()` function does not implement a size check before copying data to the `_result_buf` stati... Read more
- Published: May. 01, 2024
- Modified: Sep. 04, 2025
-
5.3
MEDIUMCVE-2024-31223
Fides is an open-source privacy engineering platform, and `SERVER_SIDE_FIDES_API_URL` is a server-side configuration environment variable used by the Fides Privacy Center to communicate with the Fides webserver backend. The value of this variable is a URL... Read more
Affected Products : fides- Published: Jul. 03, 2024
- Modified: Sep. 04, 2025
-
7.1
HIGHCVE-2024-53271
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions envoy does not properly handle http 1.1 non-101 1xx responses. This can lead to downstream failures in networked devices. This issue has been addressed in versions 1... Read more
Affected Products : envoy- Published: Dec. 18, 2024
- Modified: Sep. 04, 2025
-
7.1
HIGHCVE-2025-24030
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies man... Read more
Affected Products : gateway- Published: Jan. 23, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Path Traversal
-
9.4
CRITICALCVE-2024-28253
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. `CompiledRule::validateExpression` is also called from `PolicyRepository.prepare`.... Read more
Affected Products : openmetadata- Published: Mar. 15, 2024
- Modified: Sep. 04, 2025
-
5.3
MEDIUMCVE-2025-25294
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. In all Envoy Gateway versions prior to 1.2.7 and 1.3.1 a default Envoy Proxy access log configuration is used. This format is vulnera... Read more
Affected Products : gateway- Published: Mar. 06, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2024-28254
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `AlertUtil::validateExpression` method evaluates an SpEL expression using `ge... Read more
Affected Products : openmetadata- Published: Mar. 15, 2024
- Modified: Sep. 04, 2025
-
9.8
CRITICALCVE-2024-28255
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT toke... Read more
Affected Products : openmetadata- Published: Mar. 15, 2024
- Modified: Sep. 04, 2025
-
7.5
HIGHCVE-2024-53270
Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions `sendOverloadError` is going to assume the active request exists when `envoy.load_shed_points.http1_server_abort_dispatch` is configured. If `active_request` is nullp... Read more
Affected Products : envoy- Published: Dec. 18, 2024
- Modified: Sep. 04, 2025
-
8.6
HIGHCVE-2025-9377
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both prod... Read more
Affected Products : archer_c7_firmware tl-wr841n_firmware tl-wr841n archer_c7 tl-wr841nd_firmware tl-wr841nd- Actively Exploited
- Published: Aug. 29, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2024-28847
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. Similarly to the GHSL-2023-250 issue, `AlertUtil::validateExpression` is also call... Read more
Affected Products : openmetadata- Published: Mar. 15, 2024
- Modified: Sep. 04, 2025
-
7.5
HIGHCVE-2023-37474
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outs... Read more
- Published: Jul. 14, 2023
- Modified: Sep. 04, 2025
-
6.3
MEDIUMCVE-2023-38501
copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the serve... Read more
- Published: Jul. 25, 2023
- Modified: Sep. 04, 2025
-
9.8
CRITICALCVE-2024-45169
An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Due to improper input validation, improper deserialization, and improper restriction of operations within the bounds of a memory buffer, IDOL2 is vulnerable to Denial-of-Service (D... Read more
Affected Products : idol2- Published: Aug. 22, 2024
- Modified: Sep. 04, 2025
-
9.2
CRITICALCVE-2025-7679
The ASPECT system allows users to bypass authentication. This issue affects all versions of ASPECT... Read more
Affected Products :- Published: Aug. 11, 2025
- Modified: Sep. 04, 2025
- Vuln Type: Authentication