Latest CVE Feed
-
9.8
CRITICALCVE-2025-65099
Claude Code is an agentic coding tool. Prior to version 1.0.39, when running on a machine with Yarn 3.0 or above, Claude Code could have been tricked to execute code contained in a project via yarn plugins before the user accepted the startup trust dialog... Read more
Affected Products : claude_code- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-13415
A vulnerability was identified in icret EasyImages up to 2.8.6. This affects an unknown part of the file /app/upload.php of the component SVG Image Handler. The manipulation of the argument File leads to cross site scripting. It is possible to initiate th... Read more
Affected Products : easyimages2.0- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-13443
A vulnerability was detected in macrozheng mall up to 1.0.3. Affected by this issue is the function delete of the file /member/readHistory/delete. Performing manipulation of the argument ids results in improper access controls. Remote exploitation of the ... Read more
Affected Products : mall- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
6.1
MEDIUMCVE-2025-60796
phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations i... Read more
Affected Products : phppgadmin- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Cross-Site Scripting
-
6.5
MEDIUMCVE-2025-60797
phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->c... Read more
Affected Products : phppgadmin- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-60798
phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST['query'] directly to the browseQuery function without proper sanitization. An authenticated attack... Read more
Affected Products : phppgadmin- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Injection
-
6.1
MEDIUMCVE-2025-60799
phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'qu... Read more
Affected Products : phppgadmin- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
8.8
HIGHCVE-2025-62709
ClipBucket v5 is an open source video sharing platform. In ClipBucket version 5.5.2, a change to network.class.php causes the application to dynamically build the server URL from the incoming HTTP Host header when the configuration base_url is not set. Be... Read more
Affected Products : clipbucket- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Server-Side Request Forgery
-
8.8
HIGHCVE-2025-48986
Authorization bypass in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes an logged in attacker to change other users' email address and potentialy take over their accounts using the forgot password functionality.... Read more
Affected Products : revive_adserver- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
6.3
MEDIUMCVE-2025-48987
Improper Neutralization of Input in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes a potential reflected XSS attack.... Read more
Affected Products : revive_adserver- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2025-62406
Piwigo is a full featured open source photo gallery application for the web. In Piwigo 15.6.0, using the password reset function allows sending a password-reset URL by entering an existing username or email address. However, the hostname used to construct... Read more
Affected Products : piwigo- Published: Nov. 18, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Server-Side Request Forgery
-
5.4
MEDIUMCVE-2025-55179
Incomplete validation of rich response messages in WhatsApp for iOS prior to v2.25.23.73, WhatsApp Business for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83 could have allowed a user to trigger processing of media content from an arbitrary URL on ano... Read more
- Published: Nov. 18, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Misconfiguration
-
8.5
HIGHCVE-2025-64324
KubeVirt is a virtual machine management add-on for Kubernetes. The `hostDisk` feature in KubeVirt allows mounting a host file or directory owned by the user with UID 107 into a VM. However, prior to version 1.6.1 and 1.7.0, the implementation of this fea... Read more
Affected Products : kubevirt- Published: Nov. 18, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2025-63889
The fetch function in file thinkphp\library\think\Template.php in ThinkPHP 5.0.24 allows attackers to read arbitrary files via crafted file path in a template value.... Read more
Affected Products : thinkphp- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2025-63888
The read function in file thinkphp\library\think\template\driver\File.php in ThinkPHP 5.0.24 contains a remote code execution vulnerability.... Read more
Affected Products : thinkphp- Published: Nov. 20, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-65031
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an improper authorization flaw in the comment creation endpoint allows authenticated users to impersonate any other user by altering the authorName field in the API reques... Read more
Affected Products : rallly- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
7.1
HIGHCVE-2025-65030
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an authorization flaw in the comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owners and administrators. The ... Read more
Affected Products : rallly- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
8.1
HIGHCVE-2025-65029
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an insecure direct object reference (IDOR) vulnerability allows any authenticated user to delete arbitrary participants from polls without ownership verification. The endp... Read more
Affected Products : rallly- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-65020
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they... Read more
Affected Products : rallly- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
9.1
CRITICALCVE-2025-65021
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability exists in the poll finalization feature of the application. Any authenticated user can finalize a poll they do not... Read more
Affected Products : rallly- Published: Nov. 19, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization