Latest CVE Feed
- 
                                
                                
4.3
MEDIUMCVE-2025-64137
A missing permission check in Jenkins Themis Plugin 1.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
9.3
CRITICALCVE-2018-25120
D-Link DNS-343 ShareCenter devices running firmware versions up to and including 1.05 contain a command injection vulnerability in the Mail Test functionality. The web maintenance script posts to the internal goForm endpoint '/goform/Mail_Test' and uses s... Read more
Affected Products : dns-343_sharecenter- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
5.4
MEDIUMCVE-2025-64133
A cross-site request forgery (CSRF) vulnerability in Jenkins Extensible Choice Parameter Plugin 239.v5f5c278708cf and earlier allows attackers to execute sandboxed Groovy code.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
8.1
HIGHCVE-2025-64101
Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, a potential vulnerability exists in ZITADEL's password reset mechanism. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to constr... Read more
Affected Products : zitadel- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Server-Side Request Forgery
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-64100
CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.9 and 2.11.4, session ids could be fixed by an attacker if the site is configured with server-side session storage (CKAN uses cookie-based session s... Read more
Affected Products : ckan- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-11632
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.5.4. This makes it possible f... Read more
Affected Products : call_now_button- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-11587
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it p... Read more
Affected Products : call_now_button- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
6.9
MEDIUMCVE-2025-12142
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.... Read more
Affected Products : terra_ac_wallbox- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.8
HIGHCVE-2025-57227
An unquoted service path in Kingosoft Technology Ltd Kingo ROOT v1.5.8.3353 allows attackers to escalate privileges via placing a crafted executable file into a parent folder.... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
7.5
HIGHCVE-2025-11232
To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" mus... Read more
Affected Products : kea- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
5.3
MEDIUMCVE-2023-7320
The WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.8.2, due to improper CORS handling on the Store API's REST endpoints allowing direct external access from any origin. This can allow u... Read more
Affected Products : woocommerce- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
8.6
HIGHCVE-2025-62797
FluxCP is a web-based Control Panel for rAthena servers written in PHP. A critical Cross-Site Request Forgery (CSRF) vulnerability exists in the FluxCP-based website template used by multiple rAthena/Ragnarok servers. State-changing POST endpoints accept ... Read more
Affected Products : fluxcp- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-9544
The Doppler Forms WordPress plugin through 2.5.1 registers an AJAX action install_extension without verifying user capabilities or using a nonce. As a result, any authenticated user — including those with the Subscriber role — can install and activate add... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
9.8
CRITICALCVE-2025-11202
win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of win-cli-mcp-server. Authentication is not required to exploit th... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.7
MEDIUMCVE-2025-11906
A vulnerability exists in Progress Flowmon versions prior 12.5.6 where certain system configuration files have incorrect file permissions, allowing a user with access to the default flowmon system user account used for SSH access to potentially escalate p... Read more
Affected Products : flowmon- Published: Oct. 30, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
7.8
HIGHCVE-2025-11463
Ashlar-Vellum Cobalt XE File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this... Read more
Affected Products : cobalt- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.8
HIGHCVE-2025-11465
Ashlar-Vellum Cobalt CO File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this v... Read more
Affected Products : cobalt- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
8.1
HIGHCVE-2025-11201
MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to expl... Read more
Affected Products : mlflow- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Path Traversal
 
 - 
                                
                                
6.9
MEDIUMCVE-2025-12461
This vulnerability allows an attacker to access parts of the application that are not protected by any type of access control. The attacker could access this path ‘…/epsilonnet/License/About.aspx’ and obtain information on both the licence and the config... Read more
Affected Products : epsilon_rh- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.4
MEDIUMCVE-2025-64150
A missing permission check in Jenkins Publish to Bitbucket Plugin 0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cre... Read more
Affected Products :- Published: Oct. 29, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication