Latest CVE Feed
- 
                                
                                
5.5
MEDIUMCVE-2020-36855
A security vulnerability has been detected in DCMTK up to 3.6.5. The affected element is the function parseQuota of the component dcmqrscp. The manipulation of the argument StorageQuota leads to stack-based buffer overflow. Local access is required to app... Read more
Affected Products : dcmtk- Published: Oct. 21, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
5.5
MEDIUMCVE-2022-4981
A vulnerability was detected in DCMTK up to 3.6.7. The impacted element is the function DcmQueryRetrieveConfig::readPeerList of the file /dcmqrcnf.cc of the component dcmqrscp. The manipulation results in null pointer dereference. The attack needs to be a... Read more
Affected Products : dcmtk- Published: Oct. 21, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-60280
Cross-Site Scripting (XSS) vulnerability in Bang Resto v1.0 could allow an attacker to inject malicious JavaScript code into the application's web pages. This vulnerability exists due to insufficient input sanitization or output encoding, allowing attacke... Read more
Affected Products : bang_resto- Published: Oct. 21, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.1
MEDIUMCVE-2025-11952
Stored Cross-site Scripting (XSS) in Oct8ne Chatbot v2.3. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by injecting a malicious payload through the creation of a transcript that is sent by email. This vulnerabil... Read more
Affected Products : chatbot- Published: Oct. 22, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
7.5
HIGHCVE-2025-62232
Sensitive data exposure via logging in basic-auth leads to plaintext usernames and passwords written to error logs and forwarded to log sinks when log level is INFO/DEBUG. This creates a high risk of credential compromise through log access. It has been f... Read more
Affected Products : apisix- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
10.0
CRITICALCVE-2025-52665
A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-12521
The Analytify Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.0.3 via the Analytify Tag HTML details. This makes it possible for unauthenticated attackers to extract usernames from source co... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-12460
An XSS issue was discovered in Afterlogic Aurora webmail version 9.8.3 and below. An attacker can send a specially crafted HTML e-mail message with JavaScript in an img HTML tag. This could allow a remote attacker to load arbitrary JavaScript code in the ... Read more
Affected Products : aurora- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-11191
The RealPress WordPress plugin before 1.1.0 registers the REST routes without proper permission checks, allowing the creation of pages and sending of emails from the site.... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
4.4
MEDIUMCVE-2025-43724
Dell PowerScale OneFS, versions prior to 9.12.0.0, contains an authorization bypass through user-controlled key vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to gain unauthorized access to NFSv4 o... Read more
Affected Products : powerscale_onefs- Published: Oct. 08, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
6.8
MEDIUMCVE-2025-4952
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
8.8
HIGHCVE-2025-48984
A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user.... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
3.7
LOWCVE-2025-36249
IBM Jazz for Service Management 1.1.3.0 through 1.1.3.25 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site th... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Cryptography
 
 - 
                                
                                
7.8
HIGHCVE-2025-33003
IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow a non-root user to gain higher privileges/capabilities within the scope of a container due to execution with unnecessary privileges.... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.1
MEDIUMCVE-2024-13992
Nagios XI versions prior to < 2024R1.1 is vulnerable to a cross-site scripting (XSS) when a user visits the "missing page" (404) page after following a link from another website. The vulnerable component, page-missing.php, fails to properly validate or es... Read more
Affected Products : xi- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.3
MEDIUMCVE-2025-11602
Potential information leak in bolt protocol handshake in Neo4j Enterprise and Community editions allows attacker to obtain one byte of information from previous connections. The attacker has no control over the information leaked in server responses.... Read more
- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
0.0
NACVE-2025-40106
In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() function performs a modulo operation `async->munge_chan %= async->cmd.chanlist_len` without first checking if cha... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-12115
The WPC Name Your Price for WooCommerce plugin for WordPress is vulnerable to unauthorized price alteration in all versions up to, and including, 2.1.9. This is due to the plugin not disabling the ability to name a custom price when it has been specifical... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-12041
The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to d... Read more
Affected Products :- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.8
HIGHCVE-2025-11843
Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a serv... Read more
Affected Products : therefore_online_and_therefore_on-premises- Published: Oct. 31, 2025
 - Modified: Oct. 31, 2025
 - Vuln Type: Authentication