Latest CVE Feed
- 
                                
                                
8.7
HIGHCVE-2025-11573
An infinite loop issue in Amazon.IonDotnet library versions <v1.3.2 may allow a threat actor to cause a denial of service through a specially crafted text input. To mitigate this issue, users should upgrade to version v1.3.2. As of August 20, 2025, this ... Read more
Affected Products :- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
8.7
HIGHCVE-2025-59975
An Uncontrolled Resource Consumption vulnerability in the HTTP daemon (httpd) of Juniper Networks Junos Space allows an unauthenticated network-based attacker flooding the device with inbound API calls to consume all resources on the system, leading to a ... Read more
Affected Products : junos_space- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
9.3
CRITICALCVE-2025-61928
Better Auth is an authentication and authorization library for TypeScript. In versions prior to 1.3.26, unauthenticated attackers can create or modify API keys for any user by passing that user's id in the request body to the `api/auth/api-key/create` rou... Read more
Affected Products : better_auth- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
8.5
HIGHCVE-2025-59146
New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. An authenticated Server-Side Request Forgery (SSRF) vulnerability exists in versions prior to 0.9.0.5. A feature within the application allows authent... Read more
Affected Products :- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Server-Side Request Forgery
 
 - 
                                
                                
8.7
HIGHCVE-2016-15047
AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The `exefile` parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisti... Read more
Affected Products :- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
9.3
CRITICALCVE-2017-20203
NetSarang Xmanager Enterprise 5.0 Build 1232, Xmanager 5.0 Build 1045, Xshell 5.0 Build 1322, Xftp 5.0 Build 1218, and Xlpd 5.0 Build 1220 contain a malicious nssock2.dll that implements a multi-stage, DNS-based backdoor. The dormant library contacts a C2... Read more
Affected Products :- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Supply Chain
 
 - 
                                
                                
6.0
MEDIUMCVE-2025-59962
An Access of Uninitialized Pointer vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved with BGP sharding configured allows an attacker triggering indirect next-hop updates, along with timing outside the att... Read more
- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
8.6
HIGHCVE-2025-59968
A Missing Authorization vulnerability in the Juniper Networks Junos Space Security Director allows an unauthenticated network-based attacker to read or modify metadata via the web interface. Tampering with this metadata can result in managed SRX Seri... Read more
Affected Products : junos- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
7.1
HIGHCVE-2025-59976
An arbitrary file download vulnerability in the web interface of Juniper Networks Junos Space allows a network-based authenticated attacker using a crafted GET method to access any file on the file system. Using specially crafted GET methods, an attacker ... Read more
Affected Products : junos_space- Published: Oct. 09, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-31994
HCL Unica Campaign 12.1.10 is vulnerable to Reflected Cross-Site Scripting (XSS) where an attacker injects malicious script into an HTTP request, which is then reflected unsafely in the server's immediate response to the victim's browser, executing the sc... Read more
Affected Products :- Published: Oct. 13, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
9.8
CRITICALCVE-2025-6439
The WooCommerce Designer Pro plugin for WordPress, used by the Pricom - Printing Company & Design Services WordPress theme, is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'wcdp_save_canvas_design_ajax' function in... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
5.5
MEDIUMCVE-2025-61911
python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, the sanitization method `ldap.filter.escape_filter_chars` can be tricked to skip escaping of special characters when a crafted `list` or `dict... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-11254
The Contest Gallery – Upload, Vote & Sell with PayPal and Stripe plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 27.0.3 via gallery submissions. This makes it possible for unauthenticated attackers to embed untrus... Read more
Affected Products :- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-8887
Authorization Bypass Through User-Controlled Key, Missing Authorization, Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Usta Information Systems Inc. Aybs Interaktif allows Forceful Browsing, Parameter Injection, Input Data Ma... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
4.6
MEDIUMCVE-2025-62239
Cross-site scripting (XSS) vulnerability in workflow process builder in Liferay Portal 7.4.3.21 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, and 7.4 update 21 through update 92 allows remote authenticated at... Read more
- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-61152
python-jose thru 3.3.0 allows JWT tokens with 'alg=none' to be decoded and accepted without any cryptographic signature verification. A malicious actor can craft a forged token with arbitrary claims (e.g., is_admin=true) and bypass authentication checks, ... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-60868
The Alt Redirect 1.6.3 addon for Statamic fails to consistently strip query string parameters when the "Query String Strip" feature is enabled. Case variations, encoded keys, and duplicates are not removed, allowing attackers to bypass sanitization. This ... Read more
Affected Products :- Published: Oct. 10, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
7.5
HIGHCVE-2025-11654
A vulnerability was identified in yousaf530 Inferno Online Clothing Store up to 827dd42bfbe380e8de76fdc67958c24cf1246208. The affected element is an unknown function of the file /log.php. Such manipulation of the argument cemail/password leads to sql inje... Read more
Affected Products :- Published: Oct. 13, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
4.9
MEDIUMCVE-2025-10185
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in the action nf_load_form_entries in all versions up to, and including, 9.1.6 due to insufficient escaping on the user su... Read more
Affected Products : nex-forms- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-10175
The WP Links Page plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 4.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL que... Read more
Affected Products : wp_links_page- Published: Oct. 11, 2025
 - Modified: Oct. 14, 2025
 - Vuln Type: Injection