Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2025-66377

    Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in a product-internal API, allowing an attacker (who already has access to execute code on one node within a Pexip Infinity installation) to impact the operation of other nodes ... Read more

    Affected Products : pexip_infinity infinity
    • Published: Dec. 25, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Authentication
  • 9.1

    CRITICAL
    CVE-2025-59683

    Pexip Infinity 15.0 through 38.0 before 38.1 has Improper Access Control in the Secure Scheduler for Exchange service, when used with Office 365 Legacy Exchange Tokens. This allows a remote attacker to read potentially sensitive data and excessively consu... Read more

    Affected Products : pexip_infinity infinity
    • Published: Dec. 25, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2025-66378

    Pexip Infinity 38.0 and 38.1 before 39.0 has insufficient access control in the RTMP implementation, allowing an attacker to disconnect RTMP streams traversing a Proxy Node.... Read more

    Affected Products : pexip_infinity infinity
    • Published: Dec. 25, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Authorization
  • 7.5

    HIGH
    CVE-2025-66379

    Pexip Infinity before 39.0 has Improper Input Validation in the media implementation, allowing a remote attacker to trigger a software abort via a crafted media stream, resulting in a denial of service.... Read more

    Affected Products : pexip_infinity infinity
    • Published: Dec. 25, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Denial of Service
  • 7.5

    HIGH
    CVE-2025-66443

    Pexip Infinity 35.0 through 38.1 before 39.0, in non-default configurations that use Direct Media for WebRTC, has Improper Input Validation in signalling that allows an attacker to trigger a software abort, resulting in a temporary denial of service.... Read more

    Affected Products : pexip_infinity infinity
    • Published: Dec. 25, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Denial of Service
  • 8.8

    HIGH
    CVE-2025-15393

    A security vulnerability has been detected in Kohana KodiCMS up to 13.82.135. This impacts the function Save of the file cms/modules/kodicms/classes/kodicms/model/file.php of the component Layout API Endpoint. The manipulation of the argument content lead... Read more

    Affected Products : kodicms
    • Published: Dec. 31, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Injection
  • 9.9

    CRITICAL
    CVE-2025-68668

    n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this v... Read more

    Affected Products : n8n
    • Published: Dec. 26, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Injection
  • 9.8

    CRITICAL
    CVE-2025-15359

    DVP-12SE11T - Out-of-bound memory write Vulnerability... Read more

    Affected Products : dvp-12se11t_firmware dvp-12se11t
    • Published: Dec. 30, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Memory Corruption
  • 9.8

    CRITICAL
    CVE-2018-25138

    FLIR AX8 Thermal Camera 1.32.16 contains hard-coded SSH and web panel credentials that cannot be changed through normal camera operations. Attackers can exploit these persistent credentials to gain unauthorized shell access and login to multiple camera in... Read more

    Affected Products : flir_ax8_firmware flir_ax8
    • Published: Dec. 24, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Authentication
  • 0.0

    NA
    CVE-2023-54224

    In the Linux kernel, the following vulnerability has been resolved: btrfs: fix lockdep splat and potential deadlock after failure running delayed items When running delayed items we are holding a delayed node's mutex and then we will attempt to modify a... Read more

    Affected Products : linux_kernel
    • Published: Dec. 30, 2025
    • Modified: Jan. 05, 2026
    • Vuln Type: Race Condition
  • 6.1

    MEDIUM
    CVE-2025-13456

    The ShopBuilder WordPress plugin before 3.2.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.... Read more

    Affected Products :
    • Published: Jan. 02, 2026
    • Modified: Jan. 02, 2026
    • Vuln Type: Cross-Site Scripting
  • 6.1

    MEDIUM
    CVE-2025-13153

    The Logo Slider WordPress plugin before 4.9.0 does not validate and escape some of its slider options before outputting them back in the dashboard, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks... Read more

    Affected Products : logo_slider
    • Published: Jan. 02, 2026
    • Modified: Jan. 02, 2026
    • Vuln Type: Cross-Site Scripting
  • 6.5

    MEDIUM
    CVE-2025-12685

    The WPBookit WordPress plugin through 1.0.7 lacks a CSRF check when deleting customers. This could allow an unauthenticated attacker to delete any customer through a CSRF attack.... Read more

    Affected Products :
    • Published: Jan. 02, 2026
    • Modified: Jan. 02, 2026
    • Vuln Type: Cross-Site Request Forgery
  • 9.8

    CRITICAL
    CVE-2024-27480

    givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload.... Read more

    Affected Products : vvvebjs
    • Published: Dec. 29, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Misconfiguration
  • 9.8

    CRITICAL
    CVE-2024-25182

    givanz VvvebJs 1.7.2 suffers from a File Upload vulnerability via save.php.... Read more

    Affected Products : vvvebjs
    • Published: Dec. 29, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Misconfiguration
  • 9.0

    HIGH
    CVE-2025-15231

    A vulnerability was determined in Tenda M3 1.0.0.13(4903). This affects the function formSetRemoteVlanInfo of the file /goform/setVlanInfo. Executing manipulation of the argument ID/vlan/port can lead to stack-based buffer overflow. The attack can be exec... Read more

    Affected Products : m3_firmware m3
    • Published: Dec. 30, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Memory Corruption
  • 9.0

    HIGH
    CVE-2025-15230

    A vulnerability was found in Tenda M3 1.0.0.13(4903). Affected by this issue is the function formSetVlanPolicy of the file /goform/setVlanPolicyData. Performing manipulation of the argument qvlan_truck_port results in heap-based buffer overflow. Remote ex... Read more

    Affected Products : m3_firmware m3
    • Published: Dec. 30, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Memory Corruption
  • 9.0

    HIGH
    CVE-2025-15218

    A weakness has been identified in Tenda AC10U 15.03.06.48/15.03.06.49. Affected by this vulnerability is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Parameter Handler. Executing manipulation of the argument l... Read more

    Affected Products : ac10u_firmware ac10u
    • Published: Dec. 30, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Memory Corruption
  • 9.0

    HIGH
    CVE-2025-15217

    A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing manipulation of the argument list results in buffer overflow. The attack can be initiated re... Read more

    Affected Products : ac23_firmware ac23
    • Published: Dec. 30, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Memory Corruption
  • 9.0

    HIGH
    CVE-2025-15216

    A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remo... Read more

    Affected Products : ac23_firmware ac23
    • Published: Dec. 30, 2025
    • Modified: Jan. 02, 2026
    • Vuln Type: Memory Corruption
Showing 20 of 4567 Results