Latest CVE Feed
-
9.0
HIGHCVE-2025-11527
A vulnerability was determined in Tenda AC7 15.03.06.44. The impacted element is an unknown function of the file /goform/fast_setting_pppoe_set. Executing manipulation of the argument Password can lead to stack-based buffer overflow. The attack may be lau... Read more
- Published: Oct. 09, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Memory Corruption
-
9.0
HIGHCVE-2025-11526
A vulnerability was found in Tenda AC7 15.03.06.44. The affected element is an unknown function of the file /goform/WifiMacFilterSet. Performing manipulation of the argument wifi_chkHz results in stack-based buffer overflow. The attack may be initiated re... Read more
- Published: Oct. 09, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-11511
A flaw has been found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/supplier_add.php. Executing manipulation of the argument supp_email can lead to sql injection. The attack may be launched remotely. The explo... Read more
- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-11509
A vulnerability was detected in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/product_add.php. Performing manipulation of the argument prod_name results in sql injection. The attack may be initiated remotely. Th... Read more
- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-11508
A security vulnerability has been detected in code-projects Voting System 1.0. This affects an unknown function of the file /admin/voters_add.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. T... Read more
Affected Products : voting_system- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-11507
A weakness has been identified in PHPGurukul Beauty Parlour Management System 1.1. The impacted element is an unknown function of the file /admin/search-invoices.php. This manipulation of the argument searchdata causes sql injection. The attack can be ini... Read more
Affected Products : beauty_parlour_management_system- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-11506
A security flaw has been discovered in PHPGurukul Beauty Parlour Management System 1.1. The affected element is an unknown function of the file /admin/search-appointment.php. The manipulation of the argument searchdata results in sql injection. It is poss... Read more
Affected Products : beauty_parlour_management_system- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Injection
-
9.3
CRITICALCVE-2017-20202
Web Developer for Chrome v0.4.9 contained malicious code that generated a domain via a DGA and fetched a remote script. The fetched script conditionally loaded follow-on modules that performed extensive ad substitution and malvertising, displayed fake “re... Read more
Affected Products :- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Supply Chain
-
9.3
CRITICALCVE-2017-20201
CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 (32-bit builds) contained a malicious pre-entry-point loader that diverts execution from __scrt_common_main_seh into a custom loader. That loader decodes an embedded blob into shellcode, allocates executab... Read more
Affected Products : ccleaner- Published: Oct. 08, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Supply Chain
-
5.5
MEDIUMCVE-2025-11412
A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The... Read more
Affected Products : binutils- Published: Oct. 07, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Memory Corruption
-
6.0
MEDIUMCVE-2025-59422
Dify is an open-source LLM app development platform. In version 1.8.1, a broken access control vulnerability on the /console/api/apps/<APP_ID>chat-messages?conversation_id=<CONVERSATION_ID>&limit=10 endpoint allows users in the same workspace to read chat... Read more
Affected Products : dify- Published: Sep. 25, 2025
- Modified: Oct. 14, 2025
- Vuln Type: Authorization
-
9.0
HIGHCVE-2025-10948
A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer overflow. The attack is possible to be carried out remotel... Read more
Affected Products : routeros- Published: Sep. 25, 2025
- Modified: Oct. 13, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-39664
Insufficient escaping in the report scheduler within Checkmk <2.4.0p13, <2.3.0p38, <2.2.0p46 and 2.1.0 (EOL) allows authenticated attackers to define the storage location of report file pairs beyond their intended root directory.... Read more
Affected Products : checkmk- Published: Oct. 09, 2025
- Modified: Oct. 13, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-32919
Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all version... Read more
Affected Products : checkmk- Published: Oct. 09, 2025
- Modified: Oct. 13, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-11153
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 143.0.3.... Read more
Affected Products : firefox- Published: Sep. 30, 2025
- Modified: Oct. 13, 2025
-
8.8
HIGHCVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick... Read more
Affected Products : enterprise_linux- Published: Sep. 23, 2025
- Modified: Oct. 13, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-6921
The huggingface/transformers library, versions prior to 4.53.0, is vulnerable to Regular Expression Denial of Service (ReDoS) in the AdamWeightDecay optimizer. The vulnerability arises from the _do_use_weight_decay method, which processes user-controlled ... Read more
Affected Products : transformers- Published: Sep. 23, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-56819
An issue in Datart v.1.0.0-rc.3 allows a remote attacker to execute arbitrary code via the INIT connection parameter.... Read more
Affected Products : datart- Published: Sep. 24, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Injection
-
7.1
HIGHCVE-2025-56815
Datart 1.0.0-rc.3 is vulnerable to Directory Traversal in the POST /viz/image interface, since the server directly uses MultipartFile.transferTo() to save the uploaded file to a path controllable by the user, and lacks strict verification of the file name... Read more
Affected Products : datart- Published: Sep. 24, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-56816
Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe lo... Read more
Affected Products : datart- Published: Sep. 24, 2025
- Modified: Oct. 10, 2025
- Vuln Type: Path Traversal