Latest CVE Feed
- 
                                
                                
7.5
HIGHCVE-2025-55752
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query par... Read more
Affected Products : tomcat- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
9.4
CRITICALCVE-2025-34292
Rox, the software running BeWelcome, contains a PHP object injection vulnerability resulting from deserialization of untrusted data. User-controlled input is passed to PHP's unserialize(): the POST parameter `formkit_memory_recovery` in \\RoxPostHandler::... Read more
Affected Products : rox- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
4.4
MEDIUMCVE-2025-46602
Dell SupportAssist OS Recovery, versions prior to 5.5.15.0, contain an Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability,... Read more
Affected Products : supportassist_os_recovery- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
5.4
MEDIUMCVE-2025-60983
Reflected Cross Site Scripting vulnerability in Rubikon Banking Solution 4.0.3 in the "Search For Customers Information" endpoints.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
5.3
MEDIUMCVE-2023-37749
Incorrect access control in the REST API endpoint of HubSpot v1.29441 allows unauthenticated attackers to view users' data without proper authorization.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-61795
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately bu... Read more
Affected Products : tomcat- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
9.6
CRITICALCVE-2025-61385
SQL injection vulnerability in tlocke pg8000 1.31.4 allows remote attackers to execute arbitrary SQL commands via a specially crafted Python list input to function pg8000.native.literal.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
7.0
HIGHCVE-2025-34133
Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence ... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
7.3
HIGHCVE-2025-12286
A weakness has been identified in VeePN up to 1.6.2. This affects an unknown function of the file C:\Program Files (x86)\VeePN\avservice\avservice.exe of the component AVService. This manipulation causes unquoted search path. The attack requires local acc... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
7.6
HIGHCVE-2025-60424
A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1.2 and v2024R2 allows attackers to bypass authentication via a bruteforce attack.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-12290
A vulnerability has been found in Sui Shang Information Technology Suishang Enterprise-Level B2B2C Multi-User Mall System 1.0. Affected by this issue is some unknown functionality of the file /i/359. The manipulation of the argument keywords leads to cros... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
8.0
HIGHCVE-2025-52263
An issue in the Web Configuration module of Startcharge Artemis AC Charger 7-22 kW v1.0.4 allows authenticated network-adjacent attackers to upload crafted firmware, leading to arbitrary code execution.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.2
HIGHCVE-2025-61247
indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in the password parameter of login.php.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
5.8
MEDIUMCVE-2025-12287
A security vulnerability has been detected in Bdtask Wholesale Inventory Control and Inventory Management System up to 20251013. This impacts an unknown function of the file /Admin_dashboard/edit_profile. Such manipulation of the argument first_name/last_... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
7.5
HIGHCVE-2025-52268
StarCharge Artemis AC Charger 7-22 kW v1.0.4 was discovered to contain a hardcoded AES key which allows attackers to forge or decrypt valid login tokens.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cryptography
 
 - 
                                
                                
0.0
NONECVE-2025-26862
Unexpected authentication form rendering in HTML Form Adapter using only non-default redirectless mode in PingFederate allows authentication attempts which may enable brute force login attacks.... Read more
Affected Products : pingfederate- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
6.8
MEDIUMCVE-2025-12351
Honeywell S35 Series Cameras contains an authorization bypass Vulnerability through User controller key. An attacker could potentially exploit this vulnerability, leading to Privilege Escalation to admin privileged functionalities . Honeywell also recomme... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
6.9
MEDIUMCVE-2025-12365
Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
8.6
HIGHCVE-2025-60425
Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
2.0
LOWCVE-2025-32785
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable to cross-site scripting (XSS) via the Address field in t... Read more
Affected Products : web_interface- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Scripting