CVE Alert: CVE-2019-16151
Vulnerability Summary: CVE-2019-16151 An improper neutralization of input during web page generation vulnerability in FortiOS 6.4.1 and below, 6.2.9 and...
Vulnerability Summary: CVE-2019-16151 An improper neutralization of input during web page generation vulnerability in FortiOS 6.4.1 and below, 6.2.9 and...
Vulnerability Summary: CVE-2025-29226 In Linksys E5600 V1.1.0.26, the \usr\share\lua\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via...
Vulnerability Summary: CVE-2025-2598 When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with...
Vulnerability Summary: CVE-2025-29230 Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.emailReg function. The vulnerability...
Vulnerability Summary: CVE-2025-29227 In Linksys E5600 V1.1.0.26, the \usr\share\lua\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via...
Vulnerability Summary: CVE-2025-30349 Horde IMP through 6.2.27, as used with Horde Application Framework through 5.2.23, allows XSS that leads to...
Vulnerability Summary: CVE-2025-2602 A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as...
Vulnerability Summary: CVE-2025-29223 Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the...
Vulnerability Summary: CVE-2025-25035 Improper Neutralization of Input During Web Page Generation Cross-site Scripting vulnerability in Jalios JPlatform 10 allows for...
Vulnerability Summary: CVE-2025-2601 A vulnerability, which was classified as critical, was found in SourceCodester Kortex Lite Advocate Office Management System...
Vulnerability Summary: CVE-2025-2606 A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical....
Vulnerability Summary: CVE-2025-25036 Improper Restriction of XML External Entity Reference vulnerability in Jalios JPlatform allows XML Injection.This issue affects all...
Vulnerability Summary: CVE-2025-2603 A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical....
Vulnerability Summary: CVE-2025-2607 A vulnerability was found in phplaozhang LzCMS-LaoZhangBoKeXiTong up to 1.1.4. It has been rated as critical. Affected...
Vulnerability Summary: CVE-2025-2604 A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System 1.0. It has been classified...
Vulnerability Summary: CVE-2025-26500 : Uncontrolled Resource Consumption vulnerability in Wind River Systems VxWorks 7 on VxWorks allows Excessive Allocation. Specifically...
Vulnerability Summary: CVE-2025-2609 Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling login logging allows unauthenticated users...
Vulnerability Summary: CVE-2025-2608 A vulnerability classified as critical has been found in PHPGurukul Banquet Booking System 1.2. This affects an...
Vulnerability Summary: CVE-2025-2610 Improper neutralization of input during web page generation vulnerability in MagnusSolution MagnusBilling (Alarm Module modules) allows authenticated...
Vulnerability Summary: CVE-2025-30204 golang-jwt is a Go implementation of JSON Web Tokens. Prior to 5.2.2 and 4.5.2, the function parse.ParseUnverified...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software CISA and the Federal Bureau...