Latest CVE Feed
-
6.5
MEDIUMCVE-2025-11054
A security vulnerability has been detected in itsourcecode Open Source Job Portal 1.0. This impacts an unknown function of the file /jobportal/admin/category/index.php?view=edit. The manipulation of the argument ID leads to sql injection. The attack may b... Read more
Affected Products : open_source_job_portal- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-11035
A vulnerability was determined in Jinher OA 2.0. The impacted element is an unknown function of the file /c6/Jhsoft.Web.module/ToolBar/ManageWord.aspx/?text=GetUrl&style=1. This manipulation causes xml external entity reference. The attack can be initiate... Read more
Affected Products : jinher_oa- Published: Sep. 26, 2025
- Modified: Sep. 29, 2025
- Vuln Type: XML External Entity
-
7.5
HIGHCVE-2025-11062
A vulnerability was determined in Campcodes Online Learning Management System 1.0. This vulnerability affects unknown code of the file /admin/save_student.php. Executing manipulation of the argument class_id can lead to sql injection. The attack may be pe... Read more
Affected Products : online_learning_management_system- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
4.3
MEDIUMCVE-2025-10498
The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.12.0. This is due to missing or incorrect nonce validation when exporting CSV files. This m... Read more
Affected Products : ninja_forms- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Request Forgery
-
8.1
HIGHCVE-2025-41251
VMware NSX contains a weak password recovery mechanism vulnerability. An unauthenticated malicious actor may exploit this to enumerate valid usernames, potentially enabling brute-force attacks. Impact: Username enumeration → credential brute force risk. ... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-59938
Wazuh is a free and open source platform used for threat prevention, detection, and response. In versions starting from 3.8.0 to before 4.11.0, wazuh-analysisd is vulnerable to a heap buffer overflow when parsing XML elements from Windows EventChannel mes... Read more
Affected Products : wazuh- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-59939
WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. I... Read more
Affected Products : wegia- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-56234
AT_NA2000 from Nanda Automation Technology vendor has a denial-of-service vulnerability. For the processing of TCP RST packets, PLC AT_NA2000 has a wide acceptable range of sequence numbers. It does not require the sequence number to exactly match the nex... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Denial of Service
-
6.5
MEDIUMCVE-2025-11050
A flaw has been found in Portabilis i-Educar up to 2.10. This affects an unknown part of the file /periodo-lancamento. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been published and may b... Read more
Affected Products : i-educar- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-61659
bash-git-prompt 2.6.1 through 2.7.1 insecurely uses the /tmp/git-index-private$$ file, which has a predictable name.... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration
-
5.5
MEDIUMCVE-2025-10954
Versions of the package github.com/nyaruka/phonenumbers before 1.2.2 are vulnerable to Improper Validation of Syntactic Correctness of Input in the phonenumbers.Parse() function. An attacker can cause a panic by providing crafted input causing a "runtime ... Read more
Affected Products :- Published: Sep. 27, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Denial of Service
-
9.4
CRITICALCVE-2025-56752
A vulnerability in the Ruijie RG-ES series switch firmware ESW_1.0(1)B1P39 enables remote attackers to fully bypass authentication mechanisms, providing them with unrestricted access to alter administrative settings and potentially seize control of affect... Read more
Affected Products : rg-es228gs-p_firmware rg-es228gs-p rg-es209gc-p_firmware rg-es209gc-p rg-es205gc-p_firmware rg-es205gc-p rg-es205gc_firmware rg-es205gc rg-es208gc_firmware rg-es208gc +30 more products- Published: Sep. 03, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2025-36193
IBM Transformation Advisor 2.0.1 through 4.3.1 incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Transformation Advisor Operator Catalog image.... Read more
Affected Products : transformation_advisor- Published: Sep. 03, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-9934
A vulnerability was found in TOTOLINK X5000R 9.1.0cu.2415_B20250515. This affects the function sub_410C34 of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument pid results in command injection. Remote exploitation of the attack is poss... Read more
- Published: Sep. 04, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-9935
A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotel... Read more
- Published: Sep. 04, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
9.0
HIGHCVE-2025-9938
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely... Read more
- Published: Sep. 04, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-10034
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to init... Read more
- Published: Sep. 06, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-10093
A vulnerability was identified in D-Link DIR-852 up to 1.00CN B09. Affected by this vulnerability is the function phpcgi_main of the file /getcfg.php of the component Device Configuration Handler. Such manipulation leads to information disclosure. The att... Read more
- Published: Sep. 08, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-57349
The messageformat package, an implementation of the Unicode MessageFormat 2 specification for JavaScript, is vulnerable to prototype pollution due to improper handling of message key paths in versions prior to 2.3.0. The flaw arises when processing nested... Read more
Affected Products :- Published: Sep. 24, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-57330
The web3-core-subscriptions is a package designed to manages web3 subscriptions. A Prototype Pollution vulnerability in the attachToObject function of web3-core-subscriptions version 1.10.4 and before allows attackers to inject properties on Object.protot... Read more
Affected Products :- Published: Sep. 24, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration