Latest CVE Feed
- 
                                
                                8.8HIGHCVE-2025-54374Eidos is an extensible framework for Personal Data Management. Versions 0.21.0 and below contain a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted eidos: URL on any website, includ... Read more - Published: Oct. 03, 2025
- Modified: Oct. 24, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-54406Multiple OS command injection vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to t... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11417A weakness has been identified in Campcodes Advanced Online Voting Management System 1.0. This vulnerability affects unknown code of the file /admin/voters_add.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack c... Read more Affected Products : advanced_online_voting_system- Published: Oct. 08, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-10293The Keyy Two Factor Authentication (like Clef) plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.3. This is due to the plugin not properly validating a user's identity associated with... Read more Affected Products :- Published: Oct. 15, 2025
- Modified: Oct. 16, 2025
- Vuln Type: Authentication
 
- 
                                
                                8.8HIGHCVE-2025-62889Missing Authorization vulnerability in KingAddons.com King Addons for Elementor king-addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects King Addons for Elementor: from n/a through <= 51.1.37.... Read more Affected Products :- Published: Oct. 27, 2025
- Modified: Oct. 28, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-61930Emlog is an open source website building system. Emlog Pro versions 2.5.19 and earlier are vulnerable to Cross‑Site Request Forgery (CSRF) on the password change endpoint. An attacker can trick a logged‑in administrator into submitting a crafted POST requ... Read more Affected Products : emlog- Published: Oct. 10, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Cross-Site Request Forgery
 
- 
                                
                                8.8HIGHCVE-2025-54401Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP reques... Read more - Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-9713Path traversal in Ivanti Endpoint Manager allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.... Read more Affected Products : endpoint_manager- Published: Oct. 13, 2025
- Modified: Oct. 15, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                8.8HIGHCVE-2025-11611A weakness has been identified in SourceCodester Simple Inventory System 1.0. Impacted is an unknown function of the file /user.php. This manipulation of the argument uemail causes sql injection. The attack is possible to be carried out remotely. The expl... Read more - Published: Oct. 11, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-6979Captive Portal can allow authentication bypass... Read more Affected Products : arista_edge_threat_management_-_arista_next_generation_firewall- Published: Oct. 23, 2025
- Modified: Oct. 27, 2025
- Vuln Type: Authentication
 
- 
                                
                                8.8HIGHCVE-2025-11667A vulnerability was found in code-projects Automated Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add_candidate_modal.php.. The manipulation of the argument firstname results in sql injection. The attack... Read more - Published: Oct. 13, 2025
- Modified: Oct. 17, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11591A security vulnerability has been detected in CodeAstro Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/actions/delete-member.php. The manipulation of the argument ID leads to sql injection. The attack ca... Read more Affected Products : gym_management_system- Published: Oct. 11, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11523A vulnerability was detected in Tenda AC7 15.03.06.44. This vulnerability affects unknown code of the file /goform/AdvSetLanip. The manipulation of the argument lanIp results in command injection. It is possible to launch the attack remotely. The exploit ... Read more - Published: Oct. 09, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-9561The AP Background plugin for WordPress is vulnerable to arbitrary file uploads due to missing authorization and insufficient file validation within the advParallaxBackAdminSaveSlider() handler in versions 3.8.1 to 3.8.2. This makes it possible for authent... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-11589A security flaw has been discovered in CodeAstro Gym Management System 1.0. Affected is an unknown function of the file /admin/user-payment.php. Performing manipulation of the argument plan results in sql injection. It is possible to initiate the attack r... Read more Affected Products : gym_management_system- Published: Oct. 10, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11398A weakness has been identified in SourceCodester Hotel and Lodge Management System 1.0. The impacted element is an unknown function of the file /profile.php of the component Profile Page. Executing manipulation of the argument image can lead to unrestrict... Read more Affected Products : hotel_and_lodge_management_system- Published: Oct. 07, 2025
- Modified: Oct. 09, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-59580Incorrect Privilege Assignment vulnerability in GoodLayers Goodlayers Core goodlayers-core allows Privilege Escalation.This issue affects Goodlayers Core: from n/a through < 2.1.7.... Read more Affected Products : goodlayers_core- Published: Oct. 22, 2025
- Modified: Oct. 23, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-9213The TextBuilder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 1.0.0 to 1.1.1. This is due to missing or incorrect nonce validation on the 'handleToken' function. This makes it possible for unauthenticated attackers to update... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Request Forgery
 
- 
                                
                                8.8HIGHCVE-2025-11588A vulnerability was identified in CodeAstro Gym Management System 1.0. This impacts an unknown function of the file /customer/index.php. Such manipulation of the argument fullname leads to sql injection. The attack may be performed from remote. The exploi... Read more Affected Products : gym_management_system- Published: Oct. 10, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-11590A weakness has been identified in CodeAstro Gym Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/equipment-entry.php. Executing manipulation of the argument ename can lead to sql injection. It is possibl... Read more Affected Products : gym_management_system- Published: Oct. 11, 2025
- Modified: Oct. 20, 2025
- Vuln Type: Injection
 
 
                         
                         
                         
                                             
                                            