Latest CVE Feed
-
6.1
MEDIUMCVE-2025-9899
The Trust Reviews plugin for Google, Tripadvisor, Yelp, Airbnb and other platforms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the feed... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.5
HIGHCVE-2025-11066
A flaw has been found in code-projects Online Bidding System 1.0. This impacts an unknown function of the file /administrator/bidlist.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploi... Read more
Affected Products : online_bidding_system- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2025-9944
The Professional Contact Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the watch_for_contact_form_submit function. This makes it p... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.5
MEDIUMCVE-2025-11048
A security vulnerability has been detected in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /consulta-dispensas. Such manipulation leads to improper authorization. The attack may be launched remotel... Read more
Affected Products : i-educar- Published: Sep. 26, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-10341
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a stored HTML injection due to lack of proper validation of user input by sending a POST request in the parameter 'company' at the endpoint '/clients/client/x.... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-11064
A security flaw has been discovered in Campcodes Online Learning Management System 1.0. Impacted is an unknown function of the file /admin/teachers.php. The manipulation of the argument department results in sql injection. It is possible to launch the att... Read more
Affected Products : online_learning_management_system- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
6.1
MEDIUMCVE-2025-36239
IBM Storage TS4500 Library 1.11.0.0 and 2.11.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading t... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting
-
0.0
NACVE-2025-56233
Openindiana, kernel SunOS 5.11 has a denial of service vulnerability. For the processing of TCP packets with RST or SYN flag set, Openindiana has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the nex... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Denial of Service
-
6.5
MEDIUMCVE-2024-43192
IBM Storage TS4500 Library 1.11.0.0 and 2.11.0.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
8.1
HIGHCVE-2025-57483
A reflected cross-site scripting (XSS) vulnerability in tawk.to chatbox widget v4 allows attackers to execute arbitrary Javascript in the context of the user's browser via injecting a crafted payload into the vulnerable parameter.... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting
-
4.3
MEDIUMCVE-2025-10499
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.12.0. This is due to missing or incorrect nonce validation on the maybe_opt_in() functi... Read more
Affected Products : ninja_forms- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-10498
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.12.0. This is due to missing or incorrect nonce validation when exporting CSV files. This m... Read more
Affected Products : ninja_forms- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.9
MEDIUMCVE-2025-3193
Versions of the package algoliasearch-helper from 2.0.0-rc1 and before 3.11.2 are vulnerable to Prototype Pollution in the _merge() function in merge.js, which allows constructor.prototype to be written even though doing so throws an error. In the "extrem... Read more
Affected Products : algoliasearch-helper- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-11050
A flaw has been found in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /periodo-lancamento. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been published and may b... Read more
Affected Products : i-educar- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-61659
bash-git-prompt 2.6.1 through 2.7.1 insecurely uses the /tmp/git-index-private$$ file, which has a predictable name.... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-10954
Versions of the package github.com/nyaruka/phonenumbers before 1.2.2 are vulnerable to Improper Validation of Syntactic Correctness of Input in the phonenumbers.Parse() function. An attacker can cause a panic by providing crafted input causing a "runtime ... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Denial of Service
-
8.6
HIGHCVE-2025-59932
Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the /api/resources endpoint previously allowed POST and DELETE requests without proper authentication or authorization. This could have enabled unauthorized users to cre... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authentication
-
8.2
HIGHCVE-2025-59845
Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified... Read more
Affected Products :- Published: Sep. 26, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.5
MEDIUMCVE-2025-59938
Wazuh is a free and open source platform used for threat prevention, detection, and response. In versions starting from 3.8.0 to before 4.11.0, wazuh-analysisd is vulnerable to a heap buffer overflow when parsing XML elements from Windows EventChannel mes... Read more
Affected Products : wazuh- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-11052
A security flaw has been discovered in kidaze CourseSelectionSystem 1.0/5.php. The impacted element is an unknown function of the file /Profilers/PriProfile/COUNT3s5.php. Performing manipulation of the argument csslc results in sql injection. The attack c... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection