Latest CVE Feed
- 
                                
                                
8.8
HIGHCVE-2025-11516
A weakness has been identified in code-projects Online Complaint Site 1.0. Impacted is an unknown function of the file /cms/users/complaint-details.php. Executing manipulation of the argument cid can lead to sql injection. It is possible to launch the att... Read more
- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-49924
Incorrect Privilege Assignment vulnerability in Josh Kohlbach Wholesale Suite woocommerce-wholesale-prices allows Privilege Escalation.This issue affects Wholesale Suite: from n/a through <= 2.2.4.2.... Read more
Affected Products : wholesale_suite- Published: Oct. 22, 2025
 - Modified: Oct. 23, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-11605
A vulnerability was identified in code-projects Client Details System 1.0. Impacted is an unknown function of the file /admin/update-profile.php. Such manipulation of the argument uid leads to sql injection. The attack can be executed remotely. The exploi... Read more
- Published: Oct. 11, 2025
 - Modified: Oct. 29, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-57457
An OS Command Injection vulnerability in the Admin panel in Curo UC300 5.42.1.7.1.63R1 allows local attackers to inject arbitrary OS Commands via the "IP Addr" parameter.... Read more
Affected Products :- Published: Oct. 08, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-60305
SourceCodester Online Student Clearance System 1.0 is vulnerable to Incorrect Access Control. The application contains a logic flaw which allows low privilege users can forge high privileged sessions and perform sensitive operations.... Read more
Affected Products : online_student_clearance_system- Published: Oct. 10, 2025
 - Modified: Oct. 21, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-12254
A vulnerability was identified in code-projects Online Event Judging System 1.0. Affected by this issue is some unknown functionality of the file /add_judge.php. Such manipulation of the argument fullname leads to sql injection. The attack may be launched... Read more
- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-12238
A security flaw has been discovered in code-projects Automated Voting System 1.0. The affected element is an unknown function of the file /admin/user.php. Performing manipulation of the argument Username results in sql injection. The attack is possible to... Read more
Affected Products : automated_voting_system- Published: Oct. 27, 2025
 - Modified: Oct. 27, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-62422
DataEase is an open source data visualization and analytics platform. In versions 2.10.13 and earlier, the /de2api/datasetData/tableField interface is vulnerable to SQL injection. An attacker can construct a malicious tableName parameter to execute arbitr... Read more
Affected Products : dataease- Published: Oct. 17, 2025
 - Modified: Oct. 24, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-62008
Deserialization of Untrusted Data vulnerability in acowebs Product Table For WooCommerce product-table-for-woocommerce.This issue affects Product Table For WooCommerce: from n/a through <= 1.2.4.... Read more
Affected Products :- Published: Oct. 22, 2025
 - Modified: Oct. 24, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.8
HIGHCVE-2025-62007
Incorrect Privilege Assignment vulnerability in bPlugins Voice Feedback voice-feedback allows Privilege Escalation.This issue affects Voice Feedback: from n/a through <= 1.0.3.... Read more
Affected Products :- Published: Oct. 22, 2025
 - Modified: Oct. 24, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-11552
A vulnerability was identified in code-projects Online Complaint Site 1.0. This impacts an unknown function of the file /admin/category.php. Such manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. T... Read more
- Published: Oct. 09, 2025
 - Modified: Oct. 23, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-52079
The administrator password setting of the D-Link DIR-820L 1.06B02 is has Improper Access Control and is vulnerable to Unverified Password Change via crafted POST request to /get_set.ccp.... Read more
- Published: Oct. 21, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-59228
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.... Read more
- Published: Oct. 14, 2025
 - Modified: Oct. 28, 2025
 
 - 
                                
                                
8.8
HIGHCVE-2025-10293
The Keyy Two Factor Authentication (like Clef) plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.3. This is due to the plugin not properly validating a user's identity associated with... Read more
Affected Products :- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-61930
Emlog is an open source website building system. Emlog Pro versions 2.5.19 and earlier are vulnerable to Cross‑Site Request Forgery (CSRF) on the password change endpoint. An attacker can trick a logged‑in administrator into submitting a crafted POST requ... Read more
Affected Products : emlog- Published: Oct. 10, 2025
 - Modified: Oct. 20, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.8
HIGHCVE-2025-10299
The WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ctl_create_link AJAX action in all versions up to, and including, 1.0.7. This makes it possible ... Read more
Affected Products :- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-8052
SQL Injection vulnerability in opentext Flipper allows SQL Injection. The vulnerability could allow a low privilege user to interact with the database in unintended ways and extract data by interacting with the HQL processor. This issue affects Flipper... Read more
Affected Products : flipper- Published: Oct. 20, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-27060
Memory corruption while performing SCM call with malformed inputs.... Read more
- Published: Oct. 09, 2025
 - Modified: Oct. 21, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
8.8
HIGHCVE-2025-12242
A vulnerability has been found in CodeAstro Gym Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/actions/check-attendance.php. Such manipulation of the argument ID leads to sql injection. The attack can ... Read more
Affected Products : gym_management_system- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-64140
Jenkins Azure CLI Plugin 0.9 and earlier does not restrict which commands it executes on the Jenkins controller, allowing attackers with Item/Configure permission to execute arbitrary shell commands.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection