Latest CVE Feed
- 
                                
                                8.8HIGHCVE-2025-20709In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitat... Read more - Published: Oct. 14, 2025
- Modified: Oct. 15, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-54399Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP reques... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-54403Multiple OS command injection vulnerabilities exist in the swctrl functionality of Planet WGR-500 v1.3411b190912. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerab... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-54401Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP reques... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-61955A vulnerability exists in F5OS-A and F5OS-C systems that may allow an authenticated attacker with local access to escalate their privileges. A successful exploit may allow the attacker to cross a security boundary. Note: Software versions which have rea... Read more - Published: Oct. 15, 2025
- Modified: Oct. 21, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-11352A security vulnerability has been detected in code-projects Online Hotel Reservation System 1.0. This affects an unknown function of the file /admin/addexec.php. Such manipulation of the argument image leads to unrestricted upload. The attack can be execu... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-60208Cross-Site Request Forgery (CSRF) vulnerability in Tusko Trush Advanced Custom Fields : CPT Options Pages acf-cpt-options-pages allows Object Injection.This issue affects Advanced Custom Fields : CPT Options Pages: from n/a through <= 2.0.9.... Read more Affected Products :- Published: Oct. 22, 2025
- Modified: Oct. 23, 2025
- Vuln Type: Cross-Site Request Forgery
 
- 
                                
                                8.8HIGHCVE-2025-9164Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories, allowing local privilege escalation through malicious... Read more Affected Products : docker_desktop- Published: Oct. 27, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-59249Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.... Read more - Published: Oct. 14, 2025
- Modified: Oct. 28, 2025
 
- 
                                
                                8.8HIGHCVE-2025-41719A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known de... Read more Affected Products :- Published: Oct. 22, 2025
- Modified: Oct. 22, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-27059Memory corruption while performing SCM call.... Read more - Published: Oct. 09, 2025
- Modified: Oct. 21, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-57457An OS Command Injection vulnerability in the Admin panel in Curo UC300 5.42.1.7.1.63R1 allows local attackers to inject arbitrary OS Commands via the "IP Addr" parameter.... Read more Affected Products :- Published: Oct. 08, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-40886A SQL Injection vulnerability was discovered in the Alert functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SQL statements on the DBMS used by the web application, potential... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11746The XStore theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.5.4 via theet_ajax_required_plugins_popup() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, ... Read more Affected Products : xstore- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                8.8HIGHCVE-2025-48826A format string vulnerability exists in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to memory corruption. An attacker can send a series of HTTP requests to trigger this vulnerability... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-58718Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.... Read more Affected Products : windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_server_2022 windows_11_22h2 +15 more products- Published: Oct. 14, 2025
- Modified: Oct. 31, 2025
 
- 
                                
                                8.8HIGHCVE-2025-62177WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Prior to 3.5.1, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_listar.php endpoint, specifically in the id_funcionario parame... Read more Affected Products : wegia- Published: Oct. 13, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-59295Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network.... Read more Affected Products : windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_10_1607 windows_10_1809 windows_10_21h2 windows_10_22h2 windows_server_2022 windows_11_22h2 +10 more products- Published: Oct. 14, 2025
- Modified: Oct. 17, 2025
 
- 
                                
                                8.8HIGHCVE-2025-61591Cursor is a code editor built for programming with AI. In versions 1.7 and below, when MCP uses OAuth authentication with an untrusted MCP server, an attacker can impersonate a malicious MCP server and return crafted, maliciously injected commands during ... Read more Affected Products : cursor- Published: Oct. 03, 2025
- Modified: Oct. 17, 2025
- Vuln Type: Authentication
 
- 
                                
                                8.8HIGHCVE-2025-53595An SQL injection vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to execute unauthorized code or commands. We have already fixed the vulnerability in the followin... Read more Affected Products : qsync_central- Published: Oct. 03, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Injection
 
 
                         
                         
                         
                                             
                                            