Latest CVE Feed
-
8.8
HIGHCVE-2025-6184
The Tutor LMS Pro – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter used in the get_submitted_assignments() function in all versions up to, and including, 3.7.0 due to insuffici... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
9.8
CRITICALCVE-2025-6715
The LatePoint WordPress plugin before 5.1.94 is vulnerable to Local File Inclusion via the layout parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
9.8
CRITICALCVE-2025-7384
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible... Read more
Affected Products : database_for_contact_form_7\,_wpforms\,_elementor_forms- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
4.3
MEDIUMCVE-2025-8891
The OceanWP theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 4.0.9 to 4.1.1. This is due to missing or incorrect nonce validation on the oceanwp_notice_button_click() function. This makes it possible for unauthenticated attacker... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 21, 2025
-
4.3
MEDIUMCVE-2025-8491
The Easy restaurant menu manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on the nsc_eprm_save_menu() function. This makes it possibl... Read more
Affected Products : easy_pdf_restaurant_menu_upload- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
6.5
MEDIUMCVE-2025-0818
Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability req... Read more
- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
8.8
HIGHCVE-2025-8901
Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Aug. 13, 2025
- Modified: Aug. 14, 2025
-
8.8
HIGHCVE-2025-8882
Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Aug. 13, 2025
- Modified: Aug. 14, 2025
-
6.5
MEDIUMCVE-2025-8881
Inappropriate implementation in File Picker in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)... Read more
- Published: Aug. 13, 2025
- Modified: Aug. 14, 2025
-
8.8
HIGHCVE-2025-8880
Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)... Read more
- Published: Aug. 13, 2025
- Modified: Aug. 14, 2025
-
8.8
HIGHCVE-2025-8879
Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)... Read more
- Published: Aug. 13, 2025
- Modified: Aug. 14, 2025
-
7.5
HIGHCVE-2025-4410
A buffer overflow vulnerability exists in the module SetupUtility. An attacker with local privileged access can exploit this vulnerability by executeing arbitrary code.... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
7.5
HIGHCVE-2025-4277
Tcg2Smm has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level.... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
7.5
HIGHCVE-2025-4276
UsbCoreDxe has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level.... Read more
Affected Products :- Published: Aug. 13, 2025
- Modified: Aug. 13, 2025
-
5.5
MEDIUMCVE-2025-54238
Dimension versions 4.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 14, 2025
-
5.5
MEDIUMCVE-2025-54233
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 14, 2025
-
7.8
HIGHCVE-2025-54232
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mus... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 14, 2025
-
7.8
HIGHCVE-2025-54231
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mus... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 14, 2025
-
7.8
HIGHCVE-2025-54230
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mus... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 14, 2025
-
7.8
HIGHCVE-2025-54229
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mus... Read more
- Published: Aug. 12, 2025
- Modified: Aug. 14, 2025