Latest CVE Feed
-
5.5
MEDIUMCVE-2025-65093
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.11.0, a boolean-based blind SQL injection vulnerability was identified in the LibreNMS application at the /ajax_output.php endpoint. The hostname parameter i... Read more
Affected Products : librenms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
3.7
LOWCVE-2025-65014
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.11.0, a weak password policy vulnerability was identified in the user management functionality of the LibreNMS application. This vulnerability allows adminis... Read more
Affected Products : librenms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authentication
-
6.2
MEDIUMCVE-2025-65013
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.11.0, a reflected cross-site scripting (XSS) vulnerability was identified in the LibreNMS application at the /maps/nodeimage endpoint. The Image Name paramet... Read more
Affected Products : librenms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-63208
An issue was discovered in bridgetech VB288 Objective QoE Content Extractor, firmware version 5.6.0-8, allowing attackers to gain sensitive information such as administrator passwords via the /probe/core/setup/passwd endpoint.... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Information Disclosure
-
9.8
CRITICALCVE-2025-12735
The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEM... Read more
Affected Products :- Published: Nov. 05, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
5.4
MEDIUMCVE-2025-13343
A security flaw has been discovered in SourceCodester Interview Management System 1.0. Affected is an unknown function of the file /editQuestion.php. The manipulation of the argument Question results in cross site scripting. It is possible to launch the a... Read more
Affected Products : interview_management_system- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
5.4
MEDIUMCVE-2025-13349
A vulnerability has been found in SourceCodester Student Grades Management System 1.0. This issue affects some unknown processing of the file /grades.php of the component Add New Grade Page. The manipulation of the argument Remarks leads to cross site scr... Read more
Affected Products : student_grades_management_system- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
6.8
MEDIUMCVE-2025-59110
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.9
MEDIUMCVE-2025-59111
Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI. The vendor was notified early about this vulner... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-59112
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send POST request that deletes given user. The vendor was notified ear... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.5
HIGHCVE-2025-59113
Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this p... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-59114
Windu CMS is vulnerable to Cross-Site Request Forgery in file uploading functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send malicious file to the server. The vendor was notified early abo... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.4
MEDIUMCVE-2025-59115
Windu CMS is vulnerable to Stored Cross-Site Scripting (XSS) in the logon page where input data has no proper validation. Malicious attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting logs page by admin. ... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
6.1
MEDIUMCVE-2025-65026
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, The esm.sh CDN service contains a Template Literal Injection vulnerability (CWE-94) in its CSS-to-JavaScript module conversion feature. When a CSS file is ... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
8.2
HIGHCVE-2025-65025
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An attacker can craft a malicious NPM package containing spec... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Path Traversal
-
8.6
HIGHCVE-2025-59088
If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability... Read more
- Published: Nov. 12, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Server-Side Request Forgery
-
8.8
HIGHCVE-2025-13223
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Actively Exploited
- Published: Nov. 17, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Memory Corruption
-
6.9
MEDIUMCVE-2025-59116
Windu CMS is vulnerable to User Enumeration. This issue occurs during logon, where a difference in messages could allow an attacker to determine if the login is valid or not, enabling a brute force attack with valid logins. The vendor was notified early ... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authentication
-
4.8
MEDIUMCVE-2025-59117
Windu CMS is vulnerable to multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the page editing endpoint windu/admin/content/pages/edit/. This vulnerability can be exploited by a privileged user and may target users with higher privileges. The... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-54345
An issue was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2. Sensitive Information is exposed to an Unauthorized Actor.... Read more
Affected Products : pingalert_application_server- Published: Nov. 14, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Information Disclosure