Latest CVE Feed
- 
                                
                                
9.4
CRITICALCVE-2025-62410
In versions before 20.0.2, it was found that --disallow-code-generation-from-strings is not sufficient for isolating untrusted JavaScript in happy-dom. The untrusted script and the rest of the application still run in the same Isolate/process, so attacker... Read more
Affected Products :- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
10.0
CRITICALCVE-2025-11832
Allocation of Resources Without Limits or Throttling vulnerability in Azure Access Technology BLU-IC2, Azure Access Technology BLU-IC4 allows Flooding.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.... Read more
Affected Products :- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-11683
YAML::Syck versions before 1.36 for Perl has missing null-terminators which causes out-of-bounds read and potential information disclosure Missing null terminators in token.c leads to but-of-bounds read which allows adjacent variable to be read The issu... Read more
Affected Products :- Published: Oct. 16, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-58079
Improper Protection of Alternate Path (CWE-424) in the AppSuite of desknet's NEO V4.0R1.0 to V9.0R2.0 allows an attacker to create malicious AppSuite applications.... Read more
Affected Products :- Published: Oct. 16, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
9.2
CRITICALCVE-2025-6338
There is an incomplete cleanup vulnerability in Qt Network's Schannel support on Windows which can lead to a Denial of Service over a long period.This issue affects Qt from 5.15.0 through 6.8.3, from 6.9.0 before 6.9.2.... Read more
Affected Products :- Published: Oct. 16, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-41254
STOMP over WebSocket applications may be vulnerable to a security bypass that allows an attacker to send unauthorized messages. Affected Spring Products and VersionsSpring Framework: * 6.2.0 - 6.2.11 * 6.1.0 - 6.1.23 * 6.0.x - 6.0.29 * 5.3.0... Read more
Affected Products :- Published: Oct. 16, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
9.8
CRITICALCVE-2025-10850
The Felan Framework plugin for WordPress is vulnerable to improper authentication in versions up to, and including, 1.1.4. This is due to the hardcoded password in the 'fb_ajax_login_or_register' function and in the 'google_ajax_login_or_register' functio... Read more
Affected Products :- Published: Oct. 16, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
9.3
CRITICALCVE-2025-41019
SQL injection in Sergestec's SISTICK v7.2. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'id' parameter in '/index.php?view=ticket_detail'.... Read more
Affected Products : exito- Published: Oct. 16, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.5
HIGHCVE-2025-10576
Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. HP is releasing updated audio packages to mitigate the potential vulnerabil... Read more
Affected Products :- Published: Oct. 15, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-60265
In xckk v9.6, there is a SQL injection vulnerability in which the orderBy parameter in user/list is not securely filtered, resulting in a SQL injection vulnerability.... Read more
Affected Products : xckk- Published: Oct. 09, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-60311
ProjectWorlds Gym Management System1.0 is vulnerable to SQL Injection via the "id" parameter in the profile/edit.php page... Read more
- Published: Oct. 08, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-60266
In xckk v9.6, there is a SQL injection vulnerability in which the orderBy parameter in address/list is not securely filtered, resulting in a SQL injection vulnerability.... Read more
Affected Products : xckk- Published: Oct. 09, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-60304
code-projects Simple Scheduling System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Subject Description field.... Read more
- Published: Oct. 09, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-60267
In xckk v9.6, there is a SQL injection vulnerability in which the cond parameter in notice/list is not securely filtered, resulting in a SQL injection vulnerability.... Read more
Affected Products : xckk- Published: Oct. 09, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
9.4
CRITICALCVE-2025-60316
SourceCodester Pet Grooming Management Software 1.0 is vulnerable to SQL Injection in admin/view_customer.php via the ID parameter.... Read more
Affected Products : pet_grooming_management_software- Published: Oct. 09, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.2
MEDIUMCVE-2025-54654
Permission control vulnerability in the Gallery module. Successful exploitation of this vulnerability may affect service confidentiality... Read more
Affected Products : harmonyos- Published: Oct. 11, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
6.2
MEDIUMCVE-2025-58278
Identity authentication bypass vulnerability in the Gallery app. Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Oct. 11, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
5.5
MEDIUMCVE-2025-58282
Permission control vulnerability in the camera module. Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Oct. 11, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.5
MEDIUMCVE-2025-58283
Permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Oct. 11, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.9
MEDIUMCVE-2025-58284
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service confidentiality.... Read more
Affected Products : harmonyos- Published: Oct. 11, 2025
 - Modified: Oct. 16, 2025
 - Vuln Type: Authorization