Latest CVE Feed
- 
                                
                                
7.5
HIGHCVE-2025-11341
A security flaw has been discovered in Jinher OA up to 2.0. This affects an unknown function of the file /c6/Jhsoft.Web.module/eformaspx/WebDesign.aspx/?type=SystemUserInfo&style=1. Performing manipulation results in xml external entity reference. Remote ... Read more
Affected Products : jinher_oa- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: XML External Entity
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-59450
The YoSmart YoLink Smart Hub firmware 0382 is unencrypted, and data extracted from it can be used to determine network access credentials.... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
4.7
MEDIUMCVE-2025-59448
Components of the YoSmart YoLink ecosystem through 2025-10-02 leverage unencrypted MQTT to communicate over the internet. An attacker with the ability to monitor network traffic could therefore obtain sensitive information or tamper with the traffic to co... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
2.2
LOWCVE-2025-59447
The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
3.6
LOWCVE-2025-61984
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansio... Read more
Affected Products : openssh- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-61766
Bucket is a MediaWiki extension to store and retrieve structured data on articles. Prior to version 1.0.0, infinite recursion can occur if a user queries a bucket using the `!=` comparator. This will result in PHP's call stack limit exceeding, and/or incr... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
5.8
MEDIUMCVE-2025-59452
The YoSmart YoLink API through 2025-10-02 uses an endpoint URL that is derived from a device's MAC address along with an MD5 hash of non-secret information, such as a key that begins with cf50.... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
9.1
CRITICALCVE-2025-57247
The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() ... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.5
HIGHCVE-2025-36355
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.... Read more
- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
7.3
HIGHCVE-2025-36354
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow an unauthenticated user to execute arbitrary commands with lower user privileges on the system due to improper validat... Read more
- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-61224
Cross Site Scripting vulnerability in DokuWiki 2025-05-14a 'Librarian'[56.1] allows a remote attacker to execute arbitrary code via the q parameter... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
9.6
CRITICALCVE-2025-59159
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.13.4, the web user interface for SillyTavern is s... Read more
Affected Products :- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
9.3
CRITICALCVE-2025-52472
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 4.3-milestone-1 and prior to versions 16.10.9, 17.4.2, and 17.5.0, the REST search URL is vulnerable to HQL injection via the `ord... Read more
Affected Products : xwiki- Published: Oct. 06, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
0.0
NACVE-2023-53659
In the Linux kernel, the following vulnerability has been resolved: iavf: Fix out-of-bounds when setting channels on remove If we set channels greater during iavf_remove(), and waiting reset done would be timeout, then returned with error but changed nu... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
4.8
MEDIUMCVE-2025-43823
Cross-site scripting (XSS) vulnerability in the Commerce Search Result widget in Liferay Portal 7.4.0 through 7.4.3.111, and Liferay DXP 2023.Q4 before patch 6, 2023.Q3 before patch 9, and 7.4 GA through update 92 allows remote attackers to inject arbitra... Read more
- Published: Oct. 07, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
5.6
MEDIUMCVE-2025-42701
A race condition exists in the Falcon sensor for Windows that could allow an attacker, with the prior ability to execute code on a host, to delete arbitrary files. CrowdStrike released a security fix for this issue in Falcon sensor for Windows versions 7.... Read more
Affected Products :- Published: Oct. 08, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Race Condition
 
 - 
                                
                                
8.6
HIGHCVE-2025-48981
An insecure implementation of the proprietary protocol DNET in Product CGM MEDICO allows attackers within the intranet to eavesdrop and manipulate data on the protocol because encryption is optional for this connection.... Read more
Affected Products :- Published: Oct. 08, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Cryptography
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-10649
The Welcart e-Commerce plugin for WordPress is vulnerable to SQL Injection via the cookie in all versions up to, and including, 2.11.21 due to insufficient escaping on the user supplied value and lack of sufficient preparation on the existing SQL query. T... Read more
Affected Products : welcart_e-commerce- Published: Oct. 08, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
9.3
CRITICALCVE-2025-10352
Vulnerability in the melis-core module of Melis Technology's Melis Platform, which, if exploited, allows an unauthenticated attacker to create an administrator account via a request to '/melis/MelisCore/ToolUser/addNewUser'.... Read more
Affected Products :- Published: Oct. 08, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
9.3
CRITICALCVE-2025-10351
SQL injection vulnerability based on the melis-cms module of the Melis platform from Melis Technology. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'idPage' parameter in the '/melis/MelisCms/PageEditi... Read more
Affected Products : meliscms- Published: Oct. 08, 2025
 - Modified: Oct. 08, 2025
 - Vuln Type: Injection