Latest CVE Feed
- 
                                
                                8.8HIGHCVE-2025-54374Eidos is an extensible framework for Personal Data Management. Versions 0.21.0 and below contain a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted eidos: URL on any website, includ... Read more - Published: Oct. 03, 2025
- Modified: Oct. 24, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11359A security vulnerability has been detected in code-projects Simple Banking System 1.0. The affected element is an unknown function of the file /transfermoney.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attac... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11746The XStore theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.5.4 via theet_ajax_required_plugins_popup() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, ... Read more Affected Products : xstore- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                8.8HIGHCVE-2025-53421Missing Authorization vulnerability in PickPlugins Accordion accordions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accordion: from n/a through <= 2.3.14.... Read more Affected Products : accordion- Published: Oct. 22, 2025
- Modified: Oct. 23, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-11436A vulnerability was detected in JhumanJ OpnForm up to 1.9.3. Affected by this issue is some unknown functionality of the file /answer. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may ... Read more Affected Products : opnform- Published: Oct. 08, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-62495An integer overflow vulnerability exists in the QuickJS regular expression engine (libregexp) due to an inconsistent representation of the bytecode buffer size. * The regular expression bytecode is stored in a DynBuf structure, which correctly uses a ... Read more Affected Products : quickjs- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-62498A relative path traversal (ZipSlip) vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an attacker who can tamper with a productivity project to execute arbitrary code on the machine where the project ... Read more - Published: Oct. 23, 2025
- Modified: Oct. 27, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                8.8HIGHCVE-2025-12100Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.... Read more Affected Products :- Published: Oct. 23, 2025
- Modified: Oct. 27, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-20720In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitat... Read more - Published: Oct. 14, 2025
- Modified: Oct. 15, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-41699An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of ... Read more Affected Products : charx_sec-3150_firmware charx_sec-3100_firmware charx_sec-3050_firmware charx_sec-3000_firmware- Published: Oct. 14, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11398A weakness has been identified in SourceCodester Hotel and Lodge Management System 1.0. The impacted element is an unknown function of the file /profile.php of the component Profile Page. Executing manipulation of the argument image can lead to unrestrict... Read more Affected Products : hotel_and_lodge_management_system- Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-11613A vulnerability was found in code-projects Simple Food Ordering System 1.0. Affected is an unknown function of the file /addcategory.php. The manipulation of the argument cname results in sql injection. The attack can be launched remotely. The exploit has... Read more - Published: Oct. 11, 2025
- Modified: Oct. 23, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11515A security flaw has been discovered in code-projects Online Complaint Site 1.0. This issue affects some unknown processing of the file /cms/users/register-complaint.php. Performing manipulation of the argument cid results in sql injection. It is possible ... Read more - Published: Oct. 09, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-61593Cursor is a code editor built for programming with AI. In versions 1.7 and below, a vulnerability in the way Cursor CLI Agent protects its sensitive files (i.e. */.cursor/cli.json) allows attackers to modify the content of the files through prompt injecti... Read more Affected Products : cursor- Published: Oct. 03, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-57457An OS Command Injection vulnerability in the Admin panel in Curo UC300 5.42.1.7.1.63R1 allows local attackers to inject arbitrary OS Commands via the "IP Addr" parameter.... Read more Affected Products :- Published: Oct. 08, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11417A weakness has been identified in Campcodes Advanced Online Voting Management System 1.0. This vulnerability affects unknown code of the file /admin/voters_add.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack c... Read more Affected Products : advanced_online_voting_system- Published: Oct. 08, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-61592Cursor is a code editor built for programming with AI. In versions 1.7 and below, automatic loading of project-specific CLI configuration from the current working directory (<project>/.cursor/cli.json) could override certain global configurations in Curso... Read more Affected Products : cursor- Published: Oct. 03, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-11611A weakness has been identified in SourceCodester Simple Inventory System 1.0. Impacted is an unknown function of the file /user.php. This manipulation of the argument uemail causes sql injection. The attack is possible to be carried out remotely. The expl... Read more - Published: Oct. 11, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-62889Missing Authorization vulnerability in KingAddons.com King Addons for Elementor king-addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects King Addons for Elementor: from n/a through <= 51.1.37.... Read more Affected Products :- Published: Oct. 27, 2025
- Modified: Oct. 28, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-11516A weakness has been identified in code-projects Online Complaint Site 1.0. Impacted is an unknown function of the file /cms/users/complaint-details.php. Executing manipulation of the argument cid can lead to sql injection. It is possible to launch the att... Read more - Published: Oct. 09, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Injection
 
 
                         
                         
                         
                                             
                                            