Latest CVE Feed
- 
                                
                                
7.5
HIGHCVE-2025-64131
Jenkins SAML Plugin 4.583.vc68232f7018a_ and earlier does not implement a replay cache, allowing attackers able to obtain information about the SAML authentication flow between a user's web browser and Jenkins to replay those requests, authenticating to J... Read more
Affected Products : saml- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
5.9
MEDIUMCVE-2025-54549
Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO... Read more
Affected Products : danz_monitoring_fabric- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-64288
Cross-Site Request Forgery (CSRF) vulnerability in Premmerce Premmerce premmerce allows Cross Site Request Forgery.This issue affects Premmerce: from n/a through <= 1.3.19.... Read more
Affected Products : premmerce- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
7.7
HIGHCVE-2025-64102
Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOT... Read more
Affected Products : zitadel- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
0.0
NACVE-2025-50736
An open redirect vulnerability exists in Byaidu PDFMathTranslate v1.9.9 that allows attackers to craft URLs that cause the application to redirect users to arbitrary external websites via the file parameter to the /gradio_api endpoint. This vulnerability ... Read more
Affected Products :- Published: Oct. 30, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-54548
On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes)... Read more
Affected Products : danz_monitoring_fabric- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
4.9
MEDIUMCVE-2015-10146
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the... Read more
Affected Products : thumbnail_slider_with_lightbox- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
8.8
HIGHCVE-2025-61429
An issue in NCR Atleos Terminal Manager (ConfigApp) v3.4.0 allows attackers to escalate privileges via a crafted request.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.4
MEDIUMCVE-2025-64150
A missing permission check in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cre... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
7.8
HIGHCVE-2025-11463
Ashlar-Vellum Cobalt XE File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this... Read more
Affected Products : cobalt- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
6.3
MEDIUMCVE-2025-10928
Improper Restriction of Excessive Authentication Attempts vulnerability in Drupal Access code allows Brute Force.This issue affects Access code: from 0.0.0 before 2.0.5.... Read more
- Published: Oct. 30, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
6.9
MEDIUMCVE-2025-61959
Prior to September 19, 2025, the Hospital Manager Backend Services returned verbose ASP.NET error pages for invalid WebResource.axd requests, disclosing framework and ASP.NET version information, stack traces, internal paths, and the insecure configuratio... Read more
Affected Products : hospital_manager_backend_services- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
8.7
HIGHCVE-2025-53880
A Path Traversal vulnerability in the tftpsync/add and tftpsync/delete scripts allows a remote attacker on an adjacent network to write or delete files on the filesystem with the privileges of the unprivileged wwwrun user. Although the endpoint is unauthe... Read more
Affected Products :- Published: Oct. 30, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-64219
Missing Authorization vulnerability in Strategy11 Team Business Directory business-directory-plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business Directory: from n/a through <= 6.4.18.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-11587
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it p... Read more
Affected Products : call_now_button- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.9
MEDIUMCVE-2025-64291
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Premmerce Premmerce User Roles premmerce-user-roles allows Stored XSS.This issue affects Premmerce User Roles: from n/a through <= 1.0.13.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
7.8
HIGHCVE-2025-9869
Razer Synapse 3 Macro Module Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Razer Synapse 3. An attacker must first obtain the ability to execute low-p... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
7.1
HIGHCVE-2025-64134
Jenkins JDepend Plugin 1.3.1 and earlier includes an outdated version of JDepend Maven Plugin that does not configure its XML parser to prevent XML external entity (XXE) attacks.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: XML External Entity
 
 - 
                                
                                
5.4
MEDIUMCVE-2025-64133
A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-64143
Jenkins OpenShift Pipeline Plugin 1.0.57 and earlier stores authorization tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission, or access to the Jenkins controller file s... Read more
Affected Products : openshift_pipeline- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure