Latest CVE Feed
- 
                                
                                6.4MEDIUMCVE-2025-10165The AP Background plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'adv_parallax_back' shortcode in all versions up to, and including, 3.8.2 due to insufficient input sanitization and output escaping on user supplied attr... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                6.4MEDIUMCVE-2025-10192The WP Photo Effects plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wppe_effect' shortcode in all versions up to, and including, 1.2.4 due to insufficient input sanitization and output escaping on user supplied attribu... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                7.2HIGHCVE-2025-32942SSH Tectia Server before 6.6.6 sometimes allows attackers to read and alter a user's session traffic.... Read more Affected Products : tectia_server- Published: Oct. 02, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cryptography
 
- 
                                
                                8.4HIGHCVE-2025-11223Installer of Panasonic AutoDownloader version 1.2.8 contains an issue with the DLL search path, which may lead to loading a crafted DLL file in the same directory.... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                6.4MEDIUMCVE-2025-11241The Yoast SEO Premium plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 25.7 to 25.9 due to a flawed regex used to remove an attribute in post content, which can be abused to inject arbitrary HTML attributes, including JavaScri... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                8.7HIGHCVE-2025-61666Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage... Read more Affected Products : traccar- Published: Oct. 02, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                8.2HIGHCVE-2025-0616Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Teknolojik Center Telecommunication Industry Trade Co. Ltd. B2B - Netsis Panel allows SQL Injection.This issue affects B2B - Netsis Panel: through 202510... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authorization
 
- 
                                
                                9.8CRITICALCVE-2025-6388The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site.... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Authentication
 
- 
                                
                                4.4MEDIUMCVE-2025-10053The TableGen – Data Table Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for aut... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                8.6HIGHCVE-2025-59835LangBot is a global IM bot platform designed for LLMs. In versions 4.1.0 up to but not including 4.3.5, authorized attackers can exploit the /api/v1/files/documents interface to perform arbitrary file uploads. Since this interface does not strictly restri... Read more Affected Products :- Published: Oct. 02, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                7.5HIGHCVE-2025-11234A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abuse... Read more Affected Products : qemu- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                8.6HIGHCVE-2025-10653An unauthenticated debug port may allow access to the device file system.... Read more Affected Products :- Published: Oct. 02, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-61595MANTRA is a purpose-built RWA Layer 1 Blockchain, capable of adherence to real world regulatory requirements. Versions 4.0.1 and below do not enforce the tx gas limit in its send hooks. Send hooks can spend more gas than what remains in tx, combined with ... Read more Affected Products :- Published: Oct. 02, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                7.5HIGHCVE-2025-61600Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memo... Read more Affected Products :- Published: Oct. 02, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                5.4MEDIUMCVE-2025-61681KUNO CMS is a fully deployable full-stack blog application. Versions 1.3.13 and below contain validation flaws in its file upload functionality that can be exploited for stored XSS. The upload endpoint only validates file types based on Content-Type heade... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                6.6MEDIUMCVE-2025-61680Minecraft RCON Terminal is a VS Code extension that streamlines Minecraft server management. Versions 0.1.0 through 2.0.6 stores passwords using VS Code's configuration API which writes to settings.json in plaintext. This issue is fixed in version 2.1.0.... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                0.0NACVE-2022-50483In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid buffer leaks on xdp_do_redirect() failure Before enetc_clean_rx_ring_xdp() calls xdp_do_redirect(), each software BD in the RX ring between index orig_i and i can have... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-10582The WP Dispatcher plugin for WordPress is vulnerable to SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL que... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Injection
 
- 
                                
                                9.4CRITICALCVE-2025-10728When the module renders a Svg file that contains a <pattern> element, it might end up rendering it recursively leading to stack overflow DoS... Read more Affected Products :- Published: Oct. 03, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                0.0NACVE-2022-50489In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices when removing the host Whenever the MIPI-DSI host is unregistered, the code of mipi_dsi_host_unregister() loops over every device currently found on that bu... Read more Affected Products : linux_kernel- Published: Oct. 04, 2025
- Modified: Oct. 06, 2025
- Vuln Type: Misconfiguration
 
 
                         
                         
                         
                                             
                                            