Latest Cybersecurity Vulnerabilities - Real-Time Updates
Stay ahead of cybersecurity threats with real-time updates on the latest vulnerabilities.
This page lists the 30 most recently disclosed Common Vulnerabilities and Exposures (CVEs),
including risk scores, affected vendors, and mitigation insights.
Keeping track of emerging threats helps security professionals protect their systems.
Latest 30 CVEs - Real-Time Cyber Threats
Cyber threats are constantly evolving, making real-time vulnerability tracking essential.
Below are the 30 most recently disclosed Common Vulnerabilities and Exposures (CVEs),
providing key details such as affected vendors, impact levels, and risk scores.
Each CVE entry includes a brief summary and a direct link to its full details,
enabling cybersecurity professionals, system administrators, and developers to quickly assess
and mitigate potential security risks.
-
CVE-2025-4023 Exploitable Vulnerability Warning
A vulnerability was found in itsourcecode Placement Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_company.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Score: 7.3/10
🔥 Very High Risk
Published on 28 Apr 2025, 14:15 UTC (only 41 minutes ago)
-
CVE-2025-4022 Active Exploit Warning
A vulnerability was found in web-arena-x webarena up to 0.2.0. It has been declared as critical. This vulnerability affects the function HTMLContentEvaluator of the file webarena/evaluation_harness/evaluators.py. The manipulation of the argument target["url"] leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Score: 6.3/10
🔥 High Risk
Published on 28 Apr 2025, 14:15 UTC (only 41 minutes ago)
-
CVE-2025-4021 High-Risk Security Alert
A vulnerability was found in code-projects Patient Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /edit_spatient.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Score: 6.3/10
🔥 High Risk
Published on 28 Apr 2025, 13:15 UTC (only 1 hour ago)
-
CVE-2025-4020 Severe Cybersecurity Threat
A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /contact.php. The manipulation of the argument fname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Score: 7.3/10
🔥 Very High Risk
Published on 28 Apr 2025, 13:15 UTC (only 1 hour ago)
-
CVE-2025-46661 Emergency Security Advisory
IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier.
Score: 10.0/10
☠️ Critical Risk
Published on 28 Apr 2025, 13:15 UTC (only 1 hour ago)
-
CVE-2025-32472 Active Threat Alert
The multiScan and picoScan are vulnerable to a denial-of-service (DoS) attack. A remote attacker can exploit this vulnerability by conducting a Slowloris-type attack, causing the web page to become unresponsive.
Score: 5.3/10
🚨 Significant Risk
Published on 28 Apr 2025, 13:15 UTC (only 1 hour ago)
-
CVE-2025-4019 Critical Security Advisory
A vulnerability, which was classified as critical, was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. Affected is the function genCode of the file novel-admin/src/main/java/com/java2nb/common/controller/GeneratorController.java. The manipulation leads to missing authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Score: 7.3/10
🔥 Very High Risk
Published on 28 Apr 2025, 12:15 UTC (only 2 hours ago)
-
CVE-2025-4018 Exploit & Mitigation Report
A vulnerability, which was classified as critical, has been found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. This issue affects the function addCrawlSource of the file novel-crawl/src/main/java/com/java2nb/novel/controller/CrawlController.java. The manipulation leads to missing authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Score: 5.3/10
🚨 Significant Risk
Published on 28 Apr 2025, 12:15 UTC (only 2 hours ago)
-
CVE-2025-4017 Cybersecurity Threat Advisory
A vulnerability classified as problematic was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. This vulnerability affects the function list of the file nnovel-admin/src/main/java/com/java2nb/common/controller/LogController.java. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Score: 4.3/10
⚠️ Medium Risk
Published on 28 Apr 2025, 11:15 UTC (only 3 hours ago)
-
CVE-2025-4016 Exploit & Mitigation Report
A vulnerability classified as critical has been found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. This affects the function deleteIndex of the file novel-admin/src/main/java/com/java2nb/common/controller/LogController.java. The manipulation leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Score: 5.4/10
🚨 Significant Risk
Published on 28 Apr 2025, 11:15 UTC (only 3 hours ago)
-
CVE-2025-4015 Active Threat Alert
A vulnerability was found in 20120630 Novel-Plus up to 0e156c04b4b7ce0563bef6c97af4476fcda8f160. It has been rated as critical. Affected by this issue is the function list of the file novel-system/src/main/java/com/java2nb/system/controller/SessionController.java. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Score: 5.3/10
🚨 Significant Risk
Published on 28 Apr 2025, 10:15 UTC (only 4 hours ago)
-
CVE-2025-4014 Exploitable Vulnerability Warning
A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/manage-art-medium.php. The manipulation of the argument artmed leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Score: 7.3/10
🔥 Very High Risk
Published on 28 Apr 2025, 10:15 UTC (only 4 hours ago)
-
CVE-2025-3200 Critical Vulnerability Alert
An unauthenticated remote attacker could exploit the used, insecure TLS 1.0 and TLS 1.1 protocols to intercept and manipulate encrypted communications between the Com-Server and connected systems.
Score: 9.1/10
☠️ Critical Risk
Published on 28 Apr 2025, 10:15 UTC (only 4 hours ago)
-
CVE-2025-4013 Exploitable Vulnerability Warning
A vulnerability was found in PHPGurukul Art Gallery Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/aboutus.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Score: 7.3/10
🔥 Very High Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
-
CVE-2025-4012 Security Risk Analysis
A vulnerability was found in playeduxyz PlayEdu 开源培训系统 up to 1.8 and classified as problematic. This issue affects some unknown processing of the file /api/backend/v1/user/create of the component User Avatar Handler. The manipulation of the argument Avatar leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Score: 2.7/10
🟢 Low Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
-
CVE-2025-4011 Moderate Vulnerability Alert
A vulnerability has been found in Redmine 6.0.0/6.0.1/6.0.2/6.0.3 and classified as problematic. This vulnerability affects unknown code of the component Custom Query Handler. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 6.0.4 is able to address this issue. It is recommended to upgrade the affected component.
Score: 3.5/10
⚠️ Moderate Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
-
CVE-2025-42598 Critical Security Advisory
Multiple SEIKO EPSON printer drivers for Windows OS are configured with an improper access permission settings when installed or used in a language other than English. If a user is directed to place a crafted DLL file in a location of an attacker's choosing, the attacker may execute arbitrary code with SYSTEM privilege on a Windows system on which the printer driver is installed.
Score: 7.8/10
🔥 Very High Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
-
CVE-2025-39367 Exploit & Mitigation Report
Missing Authorization vulnerability in SeventhQueen Kleo.This issue affects Kleo: from n/a before 5.4.4.
Score: 5.3/10
🚨 Significant Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
-
CVE-2025-32471 Moderate Vulnerability Alert
The device’s passwords have not been adequately salted, making them vulnerable to password extraction attacks.
Score: 3.7/10
⚠️ Moderate Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
-
CVE-2025-32470 Critical Security Advisory
A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.
Score: 7.5/10
🔥 Very High Risk
Published on 28 Apr 2025, 09:15 UTC (only 5 hours ago)
What are CVEs?
A Common Vulnerability and Exposure (CVE) is a publicly disclosed cybersecurity flaw
that can be exploited by attackers to compromise software, systems, or networks.
The CVE system is maintained by The CVE Program
and provides a unique identifier for each vulnerability.
CVEs are assigned a severity score using the Common Vulnerability Scoring System (CVSS),
which helps security teams prioritize their response to threats.
Why Tracking CVEs is Important?
Keeping track of the latest CVEs is crucial for organizations and IT security professionals.
Cybercriminals frequently exploit unpatched vulnerabilities to launch ransomware attacks, data breaches, and system takeovers.
By staying updated with the latest threats, companies can apply security patches,
adjust firewall rules, and implement security policies to minimize risks.