Latest CVE Feed
- 
                                
                                
8.8
HIGHCVE-2025-10228
Session Fixation vulnerability in Rolantis Information Technologies Agentis allows Session Hijacking.This issue affects Agentis: before 4.44.... Read more
Affected Products :- Published: Oct. 14, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-20709
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitat... Read more
- Published: Oct. 14, 2025
 - Modified: Oct. 15, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
8.8
HIGHCVE-2025-12095
The Simple Registration for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.8. This is due to missing nonce validation on the role requests admin page handler in the includes/display-r... Read more
Affected Products :- Published: Oct. 25, 2025
 - Modified: Oct. 27, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.8
HIGHCVE-2025-11353
A vulnerability was detected in code-projects Online Hotel Reservation System 1.0. This impacts an unknown function of the file /admin/addgalleryexec.php. Performing manipulation of the argument image results in unrestricted upload. The attack is possible... Read more
- Published: Oct. 07, 2025
 - Modified: Oct. 09, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.8
HIGHCVE-2025-11351
A weakness has been identified in code-projects Online Hotel Reservation System 1.0. The impacted element is an unknown function of the file /admin/editpicexec.php. This manipulation of the argument image causes unrestricted upload. Remote exploitation of... Read more
- Published: Oct. 07, 2025
 - Modified: Oct. 09, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.8
HIGHCVE-2025-11292
A weakness has been identified in Belkin F9K1015 1.00.10. Affected is an unknown function of the file /goform/formBSSetSitesurvey. Executing manipulation of the argument wan_ipaddr can lead to command injection. The attack can be launched remotely. The ex... Read more
- Published: Oct. 05, 2025
 - Modified: Oct. 07, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-11893
The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to SQL Injection via the donation_ids parameter in all versions up to, and including, 1.8.8.4 due to insufficient escaping on t... Read more
Affected Products : charitable- Published: Oct. 25, 2025
 - Modified: Oct. 27, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-11436
A vulnerability was detected in JhumanJ OpnForm up to 1.9.3. Affected by this issue is some unknown functionality of the file /answer. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may ... Read more
Affected Products : opnform- Published: Oct. 08, 2025
 - Modified: Oct. 09, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.8
HIGHCVE-2025-62958
Cross-Site Request Forgery (CSRF) vulnerability in Clifton Griffin Simple Content Templates for Blog Posts & Pages simple-post-template allows Cross Site Request Forgery.This issue affects Simple Content Templates for Blog Posts & Pages: from n/a ... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 27, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.8
HIGHCVE-2025-59580
Incorrect Privilege Assignment vulnerability in GoodLayers Goodlayers Core goodlayers-core allows Privilege Escalation.This issue affects Goodlayers Core: from n/a through < 2.1.7.... Read more
Affected Products : goodlayers_core- Published: Oct. 22, 2025
 - Modified: Oct. 23, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-12252
A vulnerability was found in code-projects Online Event Judging System 1.0. Affected is an unknown function of the file /ajax/action.php. The manipulation of the argument content results in sql injection. The attack can be launched remotely. The exploit h... Read more
- Published: Oct. 27, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-9428
Zohocorp ManageEngine Analytics Plus versions 6171 and prior are vulnerable to authenticated SQL Injection via the key update api.... Read more
Affected Products : manageengine_analytics_plus- Published: Oct. 21, 2025
 - Modified: Oct. 23, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-9713
Path traversal in Ivanti Endpoint Manager allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.... Read more
Affected Products : endpoint_manager- Published: Oct. 13, 2025
 - Modified: Oct. 15, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
8.8
HIGHCVE-2025-59228
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.... Read more
- Published: Oct. 14, 2025
 - Modified: Oct. 28, 2025
 
 - 
                                
                                
8.8
HIGHCVE-2025-11514
A vulnerability was identified in code-projects Online Complaint Site 1.0. This vulnerability affects unknown code of the file /cms/users/index.php. Such manipulation of the argument Username leads to sql injection. The attack may be performed from remote... Read more
- Published: Oct. 09, 2025
 - Modified: Oct. 10, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-36361
IBM App Connect Enterprise 13.0.1.0 through 13.0.4.2, and 12.0.1.0 through 12.0.12.17 could allow an authenticated user to perform unauthorized actions on customer defined resources due to missing authorization.... Read more
Affected Products : app_connect_enterprise- Published: Oct. 24, 2025
 - Modified: Oct. 28, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-11702
GitLab has remediated an issue in EE affecting all versions from 17.1 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 that could have allowed an authenticated attacker with specific permissions to hijack project runners from other projects.... Read more
Affected Products : gitlab- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-11590
A weakness has been identified in CodeAstro Gym Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/equipment-entry.php. Executing manipulation of the argument ename can lead to sql injection. It is possibl... Read more
Affected Products : gym_management_system- Published: Oct. 11, 2025
 - Modified: Oct. 20, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-11478
A weakness has been identified in SourceCodester Farm Management System 1.0. This issue affects some unknown processing of the file /myCart.php. This manipulation of the argument pid causes sql injection. Remote exploitation of the attack is possible. The... Read more
Affected Products : farm_management_system- Published: Oct. 08, 2025
 - Modified: Oct. 09, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-12028
The IndieAuth plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.5.4. This is due to missing nonce verification on the `login_form_indieauth()` function and the authorization endpoint at wp-login.php?a... Read more
Affected Products :- Published: Oct. 24, 2025
 - Modified: Oct. 27, 2025
 - Vuln Type: Cross-Site Request Forgery