Latest CVE Feed
- 
                                
                                6.3MEDIUMCVE-2025-60711Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
 
- 
                                
                                9.8CRITICALCVE-2025-57108Kitware VTK (Visualization Toolkit) through 9.5.0 contains a heap use-after-free vulnerability in vtkGLTFDocumentLoader. The vulnerability manifests during mesh object copy operations where vector members are accessed after the underlying memory has been ... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                6.1MEDIUMCVE-2025-52180Cross-site scripting (XSS) vulnerability in Zucchetti Ad Hoc Infinity 4.2 and earlier allows remote unauthenticated attackers to inject arbitrary JavaScript via the pHtmlSource parameter of the /ahi/jsp/gsfr_feditorHTML.jsp?pHtmlSource endpoint.... Read more Affected Products :- Published: Oct. 30, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                10.0CRITICALCVE-2025-29270Incorrect access control in the realtime.cgi endpoint of Deep Sea Electronics devices DSE855 v1.1.0 to v1.1.26 allows attackers to gain access to the admin panel and complete control of the device.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                7.6HIGHCVE-2025-10693When SmartStart Inclusion fails during the onboarding of a Z-Wave PIR sensor, the sensor will join the network as a non-secure device. This vulnerability exists in Silicon Labs' Z-Wave PIR Sensor Reference design delivered as part of SiSDK v2025.6.0 and v... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authentication
 
- 
                                
                                9.8CRITICALCVE-2025-41108The communication protocol implemented in Ghost Robotics Vision 60 v0.27.2 could allow an attacker to send commands to the robot from an external attack station, impersonating the control station (tablet) and gaining unauthorised full control of the robot... Read more - Published: Oct. 22, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authentication
 
- 
                                
                                8.7HIGHCVE-2025-41109Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with ... Read more - Published: Oct. 22, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authentication
 
- 
                                
                                5.4MEDIUMCVE-2025-40643Stored Cross-Site Scripting (XSS) vulnerability in Energy CRM v2025 by Status Tracker Ltd, consisting of a stored XSS due to lack of proper validation of user input by sending a POST request to “/crm/create_job_submit.php”, using the “JobCreatedBy” parame... Read more Affected Products : energy_crm- Published: Oct. 23, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                4.3MEDIUMCVE-2025-62723FlashMQ is a MQTT broker/server, designed for multi-CPU environments. Prior to version 1.23.2, any authenticated user can create sessions and have them collect QoS messages. When not sent to a client, these are then not released upon (eventual) session ex... Read more Affected Products : flashmq- Published: Oct. 24, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                5.4MEDIUMCVE-2025-64368Cross-Site Request Forgery (CSRF) vulnerability in Mikado-Themes Bard bardwp allows Cross Site Request Forgery.This issue affects Bard: from n/a through <= 1.6.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Cross-Site Request Forgery
 
- 
                                
                                6.5MEDIUMCVE-2025-64367Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adrian Tobey Groundhogg groundhogg allows Stored XSS.This issue affects Groundhogg: from n/a through <= 4.2.6.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                7.6HIGHCVE-2025-64366Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix MasterStudy LMS masterstudy-lms-learning-management-system allows Blind SQL Injection.This issue affects MasterStudy LMS: from n/a through <= 3.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Injection
 
- 
                                
                                8.8HIGHCVE-2025-64353Deserialization of Untrusted Data vulnerability in Chouby Polylang polylang allows Object Injection.This issue affects Polylang: from n/a through <= 3.7.3.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Injection
 
- 
                                
                                2.7LOWCVE-2025-64352Missing Authorization vulnerability in WPDeveloper Essential Addons for Elementor essential-addons-for-elementor-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Essential Addons for Elementor: from n/a throu... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                4.3MEDIUMCVE-2025-64351Insertion of Sensitive Information Into Sent Data vulnerability in Rank Math SEO Rank Math SEO seo-by-rank-math allows Retrieve Embedded Sensitive Data.This issue affects Rank Math SEO: from n/a through <= 1.0.252.1.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                8.8HIGHCVE-2025-64349ELOG allows an authenticated user to modify another user's profile. An attacker can edit a target user's email address, then request a password reset, and take control of the target account. By default, ELOG is not configured to allow self-registration.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                9.3CRITICALCVE-2025-64348ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By d... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authentication
 
- 
                                
                                5.4MEDIUMCVE-2025-64199Missing Authorization vulnerability in WpEstate wpresidence wpresidence allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects wpresidence: from n/a through <= 5.3.2.... Read more Affected Products :- Published: Oct. 29, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Authorization
 
- 
                                
                                7.6HIGHCVE-2025-64195Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress Eduma eduma allows PHP Local File Inclusion.This issue affects Eduma: from n/a through <= 5.7.6.... Read more Affected Products : eduma- Published: Oct. 29, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                0.0NACVE-2025-63458Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the timeZone parameter in the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.... Read more Affected Products :- Published: Oct. 31, 2025
- Modified: Oct. 31, 2025
- Vuln Type: Denial of Service
 
 
                         
                         
                         
                                             
                                            