Latest CVE Feed
-
6.4
MEDIUMCVE-2025-5720
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘author’ parameter in all versions up to, and including, 5.80.2 due to insufficient input sanitization and output escaping. This makes it possib... Read more
Affected Products : customer_reviews_for_woocommerce- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
8.4
HIGHCVE-2013-10036
A stack-based buffer overflow vulnerability exists in Beetel Connection Manager version PCW_BTLINDV1.0.0B04 when parsing the UserName parameter in the NetConfig.ini configuration file. A crafted .ini file containing an overly long UserName value can overw... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
9.3
CRITICALCVE-2013-10038
An unauthenticated arbitrary file upload vulnerability exists in FlashChat versions 6.0.2 and 6.0.4 through 6.0.8. The upload.php endpoint fails to properly validate file types and authentication, allowing attackers to upload malicious PHP scripts. Once u... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
5.3
MEDIUMCVE-2025-54575
ImageSharp is a 2D graphics library. In versions below 2.1.11 and 3.0.0 through 3.1.10, a specially crafted GIF file containing a malformed comment extension block (with a missing block terminator) can cause the ImageSharp GIF decoder to enter an infinite... Read more
Affected Products : imagesharp- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
8.7
HIGHCVE-2013-10035
A code injection vulnerability exists in ProcessMaker Open Source versions 2.x when using the default 'neoclassic' skin. An authenticated user can execute arbitrary PHP code via multiple endpoints, including appFolderAjax.php, casesStartPage_Ajax.php, and... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
4.3
MEDIUMCVE-2025-54573
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.1.0 through 2.41.0, email verification was not enforced when using Basic HTTP Authentication. As a result, users could create accounts using fake email a... Read more
Affected Products : computer_vision_annotation_tool- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
4.9
MEDIUMCVE-2025-6348
The Smart Slider 3 plugin for WordPress is vulnerable to time-based SQL Injection via the ‘sliderid’ parameter in all versions up to, and including, 3.5.1.28 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on... Read more
Affected Products : smart_slider_3- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
5.1
MEDIUMCVE-2025-8217
The Amazon Q Developer Visual Studio Code (VS Code) extension v1.84.0 contains inert, injected code designed to call the Q Developer CLI. The code executes when the extension is launched within the VS Code environment; however the injected code contains a... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
5.3
MEDIUMCVE-2014-125122
A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endp... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
8.8
HIGHCVE-2014-125125
A path traversal vulnerability exists in A10 Networks AX Loadbalancer versions 2.6.1-GR1-P5, 2.7.0, and earlier. The vulnerability resides in the handling of the filename parameter in the /xml/downloads endpoint, which fails to properly sanitize user inpu... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
6.5
MEDIUMCVE-2025-8345
A vulnerability classified as critical was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this vulnerability is the function delete_user of the file crm/WeiXinApp/yunzhijia/yunzhijiaApi.php. The manipulation of t... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
7.0
HIGHCVE-2025-0712
An uncontrolled search path element vulnerability can lead to local privilege Escalation (LPE) via Insecure Directory Permissions. The vulnerability arises from improper handling of directory permissions. An attacker with local access may exploit this fla... Read more
Affected Products : apm_server- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
8.2
HIGHCVE-2025-4421
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
8.2
HIGHCVE-2025-4425
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/ho... Read more
Affected Products :- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
5.3
MEDIUMCVE-2025-54425
Umbraco is an ASP.NET CMS. In versions 13.0.0 through 13.9.2, 15.0.0 through 15.4.1 and 16.0.0 through 16.1.0, the content delivery API can be restricted from public access where an API key must be provided in a header to authorize the request. It's also ... Read more
Affected Products : umbraco_cms- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
8.8
HIGHCVE-2025-30105
Dell XtremIO, version(s) 6.4.0-22, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. The attacker may be... Read more
Affected Products : xtremio_management_server- Published: Jul. 30, 2025
- Modified: Jul. 31, 2025
-
8.8
HIGHCVE-2025-7847
The AI Engine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the rest_simpleFileUpload() function in versions 2.9.3 and 2.9.4. This makes it possible for authenticated attackers, with Subscriber-level a... Read more
- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
9.3
CRITICALCVE-2013-10033
An unauthenticated SQL injection vulnerability exists in Kimai version 0.9.2.x via the db_restore.php endpoint. The flaw allows attackers to inject arbitrary SQL queries into the dates[] POST parameter, enabling file write via INTO OUTFILE under specific ... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
8.7
HIGHCVE-2013-10039
A command injection vulnerability exists in GestioIP 3.0 commit ac67be and earlier in ip_checkhost.cgi. Crafted input to the 'ip' parameter allows attackers to execute arbitrary shell commands on the server via embedded base64-encoded payloads. Authentica... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025
-
9.5
CRITICALCVE-2013-10043
A vulnerability exists in OAstium VoIP PBX astium-confweb-2.1-25399 and earlier, where improper input validation in the logon.php script allows an attacker to bypass authentication via SQL injection. Once authenticated as an administrator, the attacker ca... Read more
Affected Products :- Published: Jul. 31, 2025
- Modified: Jul. 31, 2025