Latest CVE Feed
- 
                                
                                0.0NACVE-2025-64352Missing Authorization vulnerability in WPDeveloper Essential Addons for Elementor essential-addons-for-elementor-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Addons for Elementor: from n/a throu... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                0.0NACVE-2025-64351Insertion of Sensitive Information Into Sent Data vulnerability in Rank Math SEO Rank Math SEO seo-by-rank-math allows Retrieve Embedded Sensitive Data.This issue affects Rank Math SEO: from n/a through <= 1.0.252.1.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                0.0NACVE-2025-64350Missing Authorization vulnerability in Rank Math SEO Rank Math SEO seo-by-rank-math allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rank Math SEO: from n/a through <= 1.0.252.1.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                0.0NACVE-2025-58149When passing through PCI devices, the detach logic in libxl won't remove access permissions to any 64bit memory BARs the device might have. As a result a domain can still have access any 64bit memory BAR when such device is no longer assigned to the doma... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                0.0NACVE-2025-58148[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2025-58147[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                0.0NACVE-2025-40603A potential exposure of sensitive information in log files in SonicWall SMA100 Series appliances may allow a remote, authenticated administrator, under certain conditions to view partial users credential data.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                6.3MEDIUMCVE-2025-11602Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                0.0NACVE-2025-40106In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() function performs a modulo operation `async->munge_chan %= async->cmd.chanlist_len` without first checking if cha... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                7.5HIGHCVE-2025-12115The WPC Name Your Price for WooCommerce plugin for WordPress is vulnerable to unauthorized price alteration in all versions up to, and including, 2.1.9. This is due to the plugin not disabling the ability to name a custom price when it has been specifical... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authentication
 
- 
                                
                                5.3MEDIUMCVE-2025-12041The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to d... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                8.8HIGHCVE-2025-11843Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a serv... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authentication
 
- 
                                
                                4.3MEDIUMCVE-2025-8383The Depicter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions less than, or equal to, 4.0.4. This is due to missing or incorrect nonce validation on the depicter-document-rules-store function. This makes it possible for unauthe... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Cross-Site Request Forgery
 
- 
                                
                                0.0NACVE-2025-62232Sensitive data exposure via logging in basic-auth leads to plaintext usernames and passwords written to error logs and forwarded to log sinks when log level is INFO/DEBUG. This creates a high risk of credential compromise through log access. It has been f... Read more Affected Products : apisix- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                5.4MEDIUMCVE-2025-30191Malicious content from E-Mail can be used to perform a redressing attack. Users can be tricked to perform unintended actions or provide sensitive information to a third party which would enable further threats. Attribute values containing HTML fragments a... Read more Affected Products : ox_app_suite- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Cross-Site Request Forgery
 
- 
                                
                                7.4HIGHCVE-2025-30189When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable c... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                7.5HIGHCVE-2025-30188Malicious or unintentional API requests can be used to add significant amount of data to caches. Caches may evict information that is required to operate the web frontend, which leads to unavailability of the component. Please deploy the provided updates ... Read more Affected Products : ox_app_suite- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                4.3MEDIUMCVE-2025-12175The The Events Calendar plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'tec_qr_code_modal' AJAX endpoint in all versions up to, and including, 6.15.9. This makes it possible for authenticated attackers, ... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                5.3MEDIUMCVE-2025-12094The OOPSpam Anti-Spam: Spam Protection for WordPress Forms & Comments (No CAPTCHA) plugin for WordPress is vulnerable to IP Header Spoofing in all versions up to, and including, 1.2.53. This is due to the plugin trusting client-controlled forwarded header... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                6.8MEDIUMCVE-2025-8385The Zombify plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5. This is due to insufficient input validation in the zf_get_file_by_url function. This makes it possible for authenticated attackers, with subscri... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Path Traversal
 
 
                         
                         
                         
                                             
                                            