Latest CVE Feed
-
6.4
MEDIUMCVE-2025-36352
IBM License Metric Tool 9.2.0 through 9.2.40 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to cre... Read more
Affected Products : license_metric_tool- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting
-
6.9
MEDIUMCVE-2025-9904
Unallocated memory access vulnerability in print processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-55847
Wavlink M86X3A_V240730 contains a buffer overflow vulnerability in the /cgi-bin/ExportAllSettings.cgi file. The vulnerability arises because the Cookie parameter does not properly validate the length of input data. Attackers can exploit this to execute ar... Read more
Affected Products :- Published: Sep. 26, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
5.1
MEDIUMCVE-2025-11124
A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be la... Read more
Affected Products :- Published: Sep. 28, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting
-
5.8
MEDIUMCVE-2025-11136
A flaw has been found in YiFang CMS up to 2.0.2. The impacted element is the function webUploader of the file app/app/controller/File.php of the component Backend. Executing manipulation of the argument uploadpath can lead to unrestricted upload. The atta... Read more
Affected Products : yifang- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration
-
9.4
CRITICALCVE-2025-59934
Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. ... Read more
Affected Products :- Published: Sep. 26, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-11138
A vulnerability was found in mirweiye wenkucms up to 3.4. This impacts the function createPathOne of the file app/common/common.php. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public an... Read more
Affected Products :- Published: Sep. 29, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-10585
Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Actively Exploited
- Published: Sep. 24, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
9.4
CRITICALCVE-2025-56752
A vulnerability in the Ruijie RG-ES series switch firmware ESW_1.0(1)B1P39 enables remote attackers to fully bypass authentication mechanisms, providing them with unrestricted access to alter administrative settings and potentially seize control of affect... Read more
Affected Products : rg-es228gs-p_firmware rg-es228gs-p rg-es209gc-p_firmware rg-es209gc-p rg-es205gc-p_firmware rg-es205gc-p rg-es205gc_firmware rg-es205gc rg-es208gc_firmware rg-es208gc +30 more products- Published: Sep. 03, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2025-36193
IBM Transformation Advisor 2.0.1 through 4.3.1 incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Transformation Advisor Operator Catalog image.... Read more
Affected Products : transformation_advisor- Published: Sep. 03, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authorization
-
9.8
CRITICALCVE-2025-9934
A vulnerability was found in TOTOLINK X5000R 9.1.0cu.2415_B20250515. This affects the function sub_410C34 of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument pid results in command injection. Remote exploitation of the attack is poss... Read more
- Published: Sep. 04, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-9935
A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotel... Read more
- Published: Sep. 04, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
9.0
HIGHCVE-2025-9938
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely... Read more
- Published: Sep. 04, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-10034
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to init... Read more
- Published: Sep. 06, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-10093
A vulnerability was identified in D-Link DIR-852 up to 1.00CN B09. Affected by this vulnerability is the function phpcgi_main of the file /getcfg.php of the component Device Configuration Handler. Such manipulation leads to information disclosure. The att... Read more
- Published: Sep. 08, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Information Disclosure
-
4.6
MEDIUMCVE-2025-21035
Improper access control in Samsung Calendar prior to version 12.5.06.5 in Android 14 and 12.6.01.12 in Android 15 allows physical attackers to access data across multiple user profiles.... Read more
- Published: Sep. 03, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2025-57349
The messageformat package, an implementation of the Unicode MessageFormat 2 specification for JavaScript, is vulnerable to prototype pollution due to improper handling of message key paths in versions prior to 2.3.0. The flaw arises when processing nested... Read more
Affected Products :- Published: Sep. 24, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-57330
The web3-core-subscriptions is a package designed to manages web3 subscriptions. A Prototype Pollution vulnerability in the attachToObject function of web3-core-subscriptions version 1.10.4 and before allows attackers to inject properties on Object.protot... Read more
Affected Products :- Published: Sep. 24, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-57328
toggle-array is a package designed to enables a property on the object at the specified index, while disabling the property on all other objects. A Prototype Pollution vulnerability in the enable and disable function of toggle-array v1.0.1 and before allo... Read more
Affected Products :- Published: Sep. 24, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Injection
-
8.1
HIGHCVE-2025-55998
A cross-site scripting (XSS) vulnerability in Smart Search & Filter Shopify and BigCommerce apps allows a remote attacker to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into several filter parameter... Read more
Affected Products : smart_search_and_filter- Published: Sep. 08, 2025
- Modified: Sep. 29, 2025
- Vuln Type: Cross-Site Scripting