cve_id
stringlengths 13
15
| summary
stringlengths 15
4k
| description_hash
stringlengths 64
64
| published_date
timestamp[us, tz=UTC]date 2025-07-31 14:15:34
2025-10-29 13:15:34
| modified_date
timestamp[us, tz=UTC]date 2025-07-31 18:42:37
2025-10-29 13:53:20
| is_rejected
bool 2
classes | source
stringclasses 1
value | source_url
stringclasses 7
values | retrieved_at
timestamp[us, tz=UTC]date 2025-10-29 13:52:01
2025-10-29 13:52:01
| source_record_hash
stringlengths 64
64
|
|---|---|---|---|---|---|---|---|---|---|
CVE-2025-36121
|
IBM OpenPages 9.1 and 9.0 is vulnerable to HTML injection. A remotely authenticated attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
|
eef5e53df3e6cde9550ad04c2ac1b5b8f40537a5bff9578c49527b012b9d2563
| 2025-10-27T15:15:38.473000Z
| 2025-10-27T15:15:38.473000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
49a4a4300af65dafe15278edec226fb8998bf6c4db33a0a5aa88d959d4c5f127
|
CVE-2025-52264
|
StarCharge Artemis AC Charger 7-22 kW v1.0.4 was discovered to contain a stack overflow via the cgiMain function at download.cgi.
|
e51e999a9f95dc44a9709b48fc810641ca2cfed702ca31d9de22791b9845c2cc
| 2025-10-27T15:15:38.637000Z
| 2025-10-27T15:15:38.637000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
da32aa2e7ab616abe4e444183d2c2e2ef178af681e5c0b5714ed833165964fbe
|
CVE-2025-52268
|
StarCharge Artemis AC Charger 7-22 kW v1.0.4 was discovered to contain a hardcoded AES key which allows attackers to forge or decrypt valid login tokens.
|
78a7506e422183fad7f02a0476a298c1a48e206ba814702986d6148352661d4e
| 2025-10-27T15:15:38.750000Z
| 2025-10-27T20:15:53.300000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b1366f00d492e2000b20fa500c900b1265f07f514ba5ede9464733dc51e2ed6d
|
CVE-2025-61482
|
Improper handling of OTP/TOTP/HOTP values in NetKnights GmbH privacyIDEA Authenticator v.4.3.0 on Android allows local attackers with root access to bypass two factor authentication. By hooking into app crypto routines and intercepting decryption paths, attacker can recover plaintext secrets, enabling generation of valid one-time passwords, and bypassing authentication for enrolled accounts.
|
e783856ba363f3f422c57c6f1eae44b9d3ac0aa5c8073ac7f08760eec08b91ed
| 2025-10-27T15:15:38.917000Z
| 2025-10-27T18:15:43.947000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
9aacc1bb10ad37c39147ed4010fc50900d78d54780af7c50a7d64ff40323e98e
|
CVE-2023-37749
|
Incorrect access control in the REST API endpoint of HubSpot v1.29441 allows unauthenticated attackers to view users' data without proper authorization.
|
8e1c6ba62683617ab00423778110db58fb1ca5d8f870e0f80ab35da3fa368e1f
| 2025-10-27T16:15:34.270000Z
| 2025-10-27T20:15:50.090000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b7e26b68661cbd89586b300f82275be9b02d26705419a89ae81ab62f088fd23a
|
CVE-2023-49440
|
AhnLab EPP 1.0.15 is vulnerable to SQL Injection via the "preview parameter."
|
f7f74470bd50d2bf49ad139423221fcde0c6649f823388282f9ee215233db8e6
| 2025-10-27T16:15:35.147000Z
| 2025-10-27T20:15:51.040000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
d5a8d4b6c718411dc43d28611028fee8e61284ded96eb5c4ba160645eadccb5c
|
CVE-2025-10023
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Services Meta-services modules)
allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.9, from 24.04.0 before 24.04.16, from 23.10.0 before 23.10.26.
|
43639b0cb36be294ae9e4bf5d4846dab3b58281351277dfb1ea1b295f4fb3f46
| 2025-10-27T16:15:35.287000Z
| 2025-10-27T16:15:35.287000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
9e13f991b6262dd4083e3a97a8eb37f4f32ad4f9b686c53b68ebd91625062ed2
|
CVE-2025-12291
|
A vulnerability was found in ashymuzuro Full-Ecommece-Website and Muzuro Ecommerce System up to 1.1.0. This affects an unknown part of the file /admin/index.php?add_product of the component Add Product Page. The manipulation results in unrestricted upload. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
1c714b73ece54a5088822a6b80a74048a7e22bbea4bfeb9b8f5595b761c1b14f
| 2025-10-27T16:15:38.080000Z
| 2025-10-27T16:15:38.080000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
ec98767a576a209e31402cb205e93e4d39e9c90568489ab1ab15f686de3d2076
|
CVE-2025-12292
|
A vulnerability was determined in SourceCodester Point of Sales 1.0. This vulnerability affects unknown code of the file /index.php. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
|
951cc602a55c87053926b944e2a8c9ebae444fd2bcc5d4f6775093e94f9b30cf
| 2025-10-27T16:15:38.257000Z
| 2025-10-27T16:15:38.257000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
1bbf471a08f428ac4d9fc8be2d093f47b475076ed808f7657fa3fac130c65956
|
CVE-2025-12293
|
A vulnerability was identified in SourceCodester Point of Sales 1.0. This issue affects some unknown processing of the file /category.php. Such manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
|
73e0e1efb102002ddb26e790ad23a8cc0c677ea3e66b5e26b1db14d732c9f896
| 2025-10-27T16:15:38.437000Z
| 2025-10-27T16:15:38.437000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
dadec7849d63ab62885f3b0fbd5a2a0c9aebddd04cdbe3ace5d89c593a99af8f
|
CVE-2025-12294
|
A security flaw has been discovered in SourceCodester Point of Sales 1.0. Impacted is an unknown function of the file /delete_category.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
|
c93bae6e6a70e2443dbd9526f09761b28d2f8a931758eac23359982892ab56fe
| 2025-10-27T16:15:38.617000Z
| 2025-10-27T16:15:38.617000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
3c665980a795f95d238e2a2212a0464f418fcab62d5a661e7f1f10f0770cb60c
|
CVE-2025-34133
|
Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence of the field is checked. An attacker can craft a cross-site request that causes a logged-in victim’s browser to submit a JSON POST containing an arbitrary or empty 'csrf_token', and the API will execute the request with the victim’s privileges. Successful exploitation can allow an attacker to perform privileged actions as the victim potentially resulting in account takeover, privilege escalation, or service disruption.
|
658a747cf63f3d870cf5dfe3c1197ea1ecaae33363c4be53c0477d35b501f81c
| 2025-10-27T16:15:39.683000Z
| 2025-10-27T16:15:39.683000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
86a43347f7250932f781c33d9aecb6496a8efc2e95b55b75756d2955b38ea711
|
CVE-2025-60424
|
A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1.2 and v2024R2 allows attackers to bypass authentication via a bruteforce attack.
|
e86d5901ac6a2d4de449494430194bf8feec4a917854916c6b2f8ae57e0dd43e
| 2025-10-27T16:15:41.753000Z
| 2025-10-27T16:15:41.753000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
290627ec83579ce9e571a47c27c1e8724651fc997a0683c536abe15c3b8238f4
|
CVE-2025-60425
|
Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.
|
a5dec0da1986413245d0286bae01ac49226e77274fd9fae92c39fd360109d9d9
| 2025-10-27T16:15:42.040000Z
| 2025-10-27T20:15:53.773000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
e5d8a5d5e23f8b61c8461ae0888f6f53c5498dfbc6d014da13c98e1fe5865227
|
CVE-2025-60791
|
Easywork Enterprise 2.1.3.354 is vulnerable to Cleartext Storage of Sensitive Information in Memory. The application leaves valid device-bound license keys in process memory after a failed activation attempt. The keys can be obtained by attaching a debugger or analyzing the process/memory dump and then they can be used to activate the software on the same machine without purchasing.
|
cc4e3d7c55fe22111af7995697b3b8370b2593556dcbb440a87d202aceab9de0
| 2025-10-27T16:15:42.510000Z
| 2025-10-27T20:15:53.910000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
8da602152173f27fed2fe67cb206d4317f67c38bb2eba3baf994aa84905180f9
|
CVE-2025-61247
|
indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in the password parameter of login.php.
|
f1a40a1b887f8b328cb677f6086a3e9ab4d311840a5f28a912a8d15f4046b3e1
| 2025-10-27T16:15:42.717000Z
| 2025-10-27T20:15:54.333000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
98121badadb5709f2bdd7c0f3fa1f41c6503b80fc240f289a175efe1adc014e2
|
CVE-2025-12295
|
A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verification of cryptographic signature. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
|
2507cef1b552f35d125564bfc7b155b0f5e19c97fdb9a6698514deb77574ee25
| 2025-10-27T17:15:36.510000Z
| 2025-10-27T17:15:36.510000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fd611399246afc79aad6fff2bcc17c8b0d10ee34a66ab32f63a65189602e6989
|
CVE-2025-12296
|
A security vulnerability has been detected in D-Link DAP-2695 2.00RC13. The impacted element is the function sub_4174B0 of the component Firmware Update Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
|
7536a13d34cb5882a4914cca520917c37666c1577970ca72ea0018cba1a7657c
| 2025-10-27T17:15:37.103000Z
| 2025-10-27T17:15:37.103000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
0dcb1673ee78143e742c4f5e355326cd65dcb2970a9ecb33a4c46157ded8d25b
|
CVE-2025-12297
|
A vulnerability was detected in atjiu pybbs up to 6.0.0. This affects an unknown function of the file UserApiController.java. The manipulation results in information disclosure. The attack may be launched remotely. The exploit is now public and may be used.
|
2fc13f2bdaa6e1d81b0c282dd0eaeafc7840ea6c2ff86698ce67af1b66f4ef0a
| 2025-10-27T17:15:37.300000Z
| 2025-10-27T17:15:37.300000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fc859777f14a7542cf824049eb9647bb382818d7d2c4a322479eafd156625f61
|
CVE-2025-12298
|
A vulnerability was identified in code-projects Simple Food Ordering System 1.0. This affects an unknown part of the file /editcategory.php. The manipulation of the argument pname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
|
e560e290a7ac5ed5d222c4a66feb85a8484c3fdcdf8148f66ed70fe366c249b9
| 2025-10-27T17:15:37.483000Z
| 2025-10-27T17:15:37.483000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
d0323d22af9f4e6a04e059af8fe784f24be0111783295ecd5f8c67a38f768605
|
CVE-2025-12299
|
A security flaw has been discovered in code-projects Simple Food Ordering System 1.0. This vulnerability affects unknown code of the file /addproduct.php. The manipulation of the argument pname/category/price results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
|
658d5abfba5c42ea3a3e871a2de09c2f8f40b180ec1a1005261ae7014bd7e6ac
| 2025-10-27T17:15:37.673000Z
| 2025-10-27T17:15:37.673000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
74be6c4cf53f5f0a846547e8272f8843506377efe804cfa573c7371f2956803a
|
CVE-2025-27222
|
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/getCobrandingData endpoint to retrieve files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to read any local server file that is accessible by the TRUfusion user and can also be used to leak cleartext passwords of TRUfusion Enterprise itself.
|
b40b52f8ff45c3cb1364160addf0f5550aaf024e3085be9284966ab965620fbc
| 2025-10-27T17:15:37.853000Z
| 2025-10-27T21:15:36.910000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
efa95d7ad957eae475e6c2dad4fd8be8654198f7dce56777ff17f3360c86aaa7
|
CVE-2025-27223
|
TRUfusion Enterprise through 7.10.4.0 exposes the encrypted COOKIEID as an authentication mechanism for some endpoints such as /trufusionPortal/getProjectList. However, the application uses a static key to create the encrypted cookie, ultimately allowing anyone to forge cookies and gain access to sensitive internal information.
|
68a67329023ef9feb6bd71240e058be7143979c8ac0e6802b49de24775541ae5
| 2025-10-27T17:15:37.973000Z
| 2025-10-28T14:15:58.293000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
6a382e84905a769f232bc9692cb075354202b8e2ab30599886f48fe7996f1a8c
|
CVE-2025-27224
|
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to write to any filename with any file type at any location on the local server, ultimately allowing execution of arbitrary code.
|
5612ac1a1c0436d6f0be46c6e0bff5abf2bb7589e87cf118e68f2b7e2e2c6f8a
| 2025-10-27T17:15:38.090000Z
| 2025-10-28T14:15:58.493000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
d45eb1f29dd843f312de04c6219cd19064b7ca97353e0833e91f827e70647751
|
CVE-2025-27225
|
TRUfusion Enterprise through 7.10.4.0 exposes the /trufusionPortal/jsp/internal_admin_contact_login.jsp endpoint to unauthenticated users. This endpoint discloses sensitive internal information including PII to unauthenticated attackers.
|
519e5f9dc7eb5b43673cd4ff88e6b97064b6ce23e52288dff1368d4e9d3eb693
| 2025-10-27T17:15:38.210000Z
| 2025-10-27T19:16:02.947000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fbbdd41141449bb0e3c7fb452ea95da30f881adb3f2f7017adf8f827503ab406
|
CVE-2025-54967
|
An issue was discovered in BAE SOCET GXP before 4.6.0.3. It permits external entities in certain XML-based files. An attacker who is able to social engineer a SOCET GXP user into opening a malicious file can trigger a variety of outbound requests, potentially compromising sensitive information in the process.
|
4a91cefc65ae71e97a1ecbd87e22ce38babcaff4284e4c55c273ec1593396b71
| 2025-10-27T17:15:38.337000Z
| 2025-10-28T14:15:59.387000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
0f639cef1898b71f49df423c998e7e94711c135feba0112d7c7e1d64952df960
|
CVE-2025-54968
|
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.
|
ac2d163bb1303075c4509fa42564b9062f3e2bb35c559baa3f009d6bb25a958a
| 2025-10-27T17:15:38.470000Z
| 2025-10-28T14:15:59.563000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
9195e382f8fa74c1bff0bfd7290267721fcda0ec3135d36ca200f2944acb85d2
|
CVE-2025-54969
|
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service does not implement CSRF protections. An attacker who social engineers a valid user into clicking a malicious link or visiting a malicious website may be able to submit requests to the Job Status Service without the user's knowledge.
|
143c2ba1fe5f88d8782f53f5eee177fff7895202a202232337c5388096aebd4e
| 2025-10-27T17:15:38.587000Z
| 2025-10-27T19:16:04.317000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
f614dcab0abfbe2eac1d866951b51fd2ddc461a959287f77ffca43bcaa24e4a2
|
CVE-2025-54970
|
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service fails to authenticate requests. In some configurations, this may allow remote or local users to abort jobs or read information without the permissions of the job owner.
|
32d97a81133069ae9ce4535b05962f4a4e07c943162f9afb8b9b83da3e504fcd
| 2025-10-27T17:15:38.703000Z
| 2025-10-28T14:15:59.733000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
c2034e0769df87473eb4ccb437d352843109cd13b72329f1503f0e28ec5b0f30
|
CVE-2025-12300
|
A weakness has been identified in code-projects Simple Food Ordering System 1.0. This issue affects some unknown processing of the file /addcategory.php. This manipulation of the argument cname causes cross site scripting. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
|
8941e5e119d517c93179363ff8e059bf051c48900bb37dc65e1aa5efde569ce3
| 2025-10-27T18:15:36.613000Z
| 2025-10-27T18:15:36.613000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
7940f7d0b551043eb8a9887799f9c050c0bb27c3aa2681429139691105af272c
|
CVE-2025-12301
|
A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Impacted is an unknown function of the file /editproduct.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
|
9e74adb7b608ab3e62ca2ac6d8c6d831fb60e0ce159b1265081ad23da93cb98f
| 2025-10-27T18:15:37.037000Z
| 2025-10-27T18:15:37.037000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b1b87f6e4fbe767389942e70fc240a70ef4f3f94ffa04f9d96a7f75d3da89730
|
CVE-2025-12302
|
A vulnerability was detected in code-projects Simple Food Ordering System 1.0. The affected element is an unknown function of the file /editproduct.php. Performing manipulation of the argument pname/category/price results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
|
61a9fe8ba24ac049ca6311e54ee5fa3c3bf2660824efbdfbf4fb9088efebd148
| 2025-10-27T18:15:37.407000Z
| 2025-10-27T18:15:37.407000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5abd031d6db590c8d33559228d7809ae8da2420a34ab5554fe90952988253e5d
|
CVE-2025-12303
|
A flaw has been found in PHPGurukul Curfew e-Pass Management System 1.0. The impacted element is an unknown function of the file admin-profile.php. Executing manipulation of the argument adminname/email can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used.
|
8be6ff483df3663c85239c98cc9baa657d4ad591fc368e2641a1a86eb9a779ed
| 2025-10-27T18:15:37.827000Z
| 2025-10-27T18:15:37.827000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
1f0cea78cdee0660fcb0d567a1ff87db2aecba815f18b4c613944f44324e02c3
|
CVE-2025-12363
|
Email Password Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
|
9a69a7a023f9b81e2a209f61ca986fd06d0b2f35514efb522bf71386761ec6fb
| 2025-10-27T18:15:38.223000Z
| 2025-10-27T18:15:38.223000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b8150dd7612756cad6f20636e0df186343a80ad447efc364b5405e5f2d92edf7
|
CVE-2025-12364
|
Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
|
0db9ce73b96d09ac0095a18a5385d33e9d4f5f495c16ac8ec4dd16cb414eba80
| 2025-10-27T18:15:38.857000Z
| 2025-10-27T18:15:38.857000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
d79cb791d20406709b620941a0c86cde3538a4b8d5443ebe421e2850ecb9b3c9
|
CVE-2025-54965
|
An XSS issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service does not properly sanitize the job ID parameter before using it in the job status page. An attacker who is able to social engineer a user into clicking a malicious link may be able to execute arbitrary JavaScript in the victim's browser.
|
a00e82b365c7cfaabafb7e2e8407d1f6fb531756a91f1def8b80cb624f4991d5
| 2025-10-27T18:15:41.990000Z
| 2025-10-27T19:16:04.150000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
27925ea0f6d48cecbce12f40a69ad3a591c47a9833f12b2887708692f28f643b
|
CVE-2025-55752
|
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
|
61243c31f49901c08feebd8298de63c67c79b9cf2565e624b68803b3160c5336
| 2025-10-27T18:15:42.283000Z
| 2025-10-27T18:15:42.283000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
4cd79a55af1d2bcb3c1d15a3ad1bd5dbb4bccc2172d6c2fe7f2f26cf6995946e
|
CVE-2025-55754
|
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
|
86104a067cdd116f3e5ce3d51127210fa19da9f7afbb7d2ccd66fe7a12bd3b40
| 2025-10-27T18:15:42.710000Z
| 2025-10-28T14:15:59.900000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
24dd8df47f67372626ad8e810d3ea29d8011781f4e5e8063f055776db4104c15
|
CVE-2025-60982
|
IDOR vulnerability in Educare ERP 1.0 (2025-04-22) allows unauthorized access to sensitive data via manipulated object references. Affected endpoints do not enforce proper authorization checks, allowing authenticated users to access or modify data belonging to other users by changing object identifiers in API requests. Attackers can exploit this flaw to view or modify sensitive records without proper authorization.
|
e8db93a6a7f8d4de44f5350f69383427cb59616d779c05a48de40fe175166d7b
| 2025-10-27T18:15:43.420000Z
| 2025-10-27T19:16:04.487000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
51024ff7ca9c61a517618d888a51f7e0c507558bffdef411e6d8b35cffcf2d1c
|
CVE-2025-60983
|
Reflected Cross Site Scripting vulnerability in Rubikon Banking Solution 4.0.3 in the "Search For Customers Information" endpoints.
|
77acaa63dee5b67b74edaaabec82b649f8a06bfc4a3ed34bb8570aec320fb515
| 2025-10-27T18:15:43.590000Z
| 2025-10-27T19:16:04.687000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fa6cc66a2fefe647fca986765c8a4f444f1b0bb0b672035d7bc125e88a2e98ea
|
CVE-2025-61385
|
SQL injection vulnerability in tlocke pg8000 1.31.4 allows remote attackers to execute arbitrary SQL commands via a specially crafted Python list input to function pg8000.native.literal.
|
64aa62b8148702561e2c1264d5ab03414d632b7303855bca7281a90658246716
| 2025-10-27T18:15:43.760000Z
| 2025-10-28T16:15:39.513000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b2774608b53d4fef5aabf0b8ed1ec57b3817068b622bc28f629dcd4838641f09
|
CVE-2025-61795
|
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
|
0b3c02364faeab8b66a1aef8a7b4dffcebfca03931e21bb761af406be81d81eb
| 2025-10-27T18:15:44.200000Z
| 2025-10-27T19:16:05.193000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
d84a09ed68ea698ac4f7229fec5d7b860c85d6f5ac9de40858257b8c8faf0298
|
CVE-2025-12304
|
A vulnerability has been found in dulaiduwang003 TIME-SEA-PLUS up to fb299162f18498dd9cf17da906886d80a077d53b. This affects the function alipayIsSucceed of the file PayController.java of the component Order Status Handler. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
|
c3fba6bdc5a5600bd707340820ff84a8f1421c529f751868999df563269dca80
| 2025-10-27T19:16:01.597000Z
| 2025-10-27T19:16:01.597000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
a8e29b63f2eada5110adf7bb1025b31c7319ec0a19aa9bed4c1f58b54d844e84
|
CVE-2025-12305
|
A vulnerability was found in quequnlong shiyi-blog up to 1.2.1. This impacts an unknown function of the file src/main/java/com/mojian/controller/SysJobController.java of the component Job Handler. The manipulation results in deserialization. The attack can be executed remotely. The exploit has been made public and could be used.
|
6cf664f2da0c6c2daa78702ffb0fd94485fe5a0a2fd77430af3c287fc033ecd3
| 2025-10-27T19:16:01.790000Z
| 2025-10-27T19:16:01.790000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fb4d7231fcf50fffb9973369fb1a058f381a8b0e5cc214069efe83673f6dccd6
|
CVE-2025-12306
|
A vulnerability was determined in code-projects Nero Social Networking Site 1.0. Affected is an unknown function of the file /acceptoffres.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
|
aa5c41a408243418c2e13709d1cc2cfcff86c68b721c822c5872ed48eaf0e4bb
| 2025-10-27T19:16:01.977000Z
| 2025-10-27T19:16:01.977000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
e241091a6804bf167449b6853faf0160242fc616341223a3c84c43c8fee5e988
|
CVE-2025-12307
|
A vulnerability was identified in code-projects Nero Social Networking Site 1.0. Affected by this vulnerability is an unknown functionality of the file /addfriend.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
|
87dacafad583397546e1c1dd4d9499fa54bdcdddfb3d45229e79c347756ab2ed
| 2025-10-27T19:16:02.160000Z
| 2025-10-27T19:16:02.160000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
7ef7feaf37931ff0397b8abdfc2d608d01f01e5dcc38cfcc0bc9778787233d2a
|
CVE-2025-12308
|
A security flaw has been discovered in code-projects Nero Social Networking Site 1.0. Affected by this issue is some unknown functionality of the file /deletemessage.php. Performing manipulation of the argument message_id results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
|
131ddd31891adccafb2bb69c7ba360cf113163d06351eeaf3bf43d5e4f8386e9
| 2025-10-27T19:16:02.333000Z
| 2025-10-27T19:16:02.333000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fd409a34b278c054e3bcfce49909bee759abeee97c4c7dcf6b68bbaabb439e0f
|
CVE-2025-12309
|
A weakness has been identified in code-projects Nero Social Networking Site 1.0. This affects an unknown part of the file /friendprofile.php. Executing manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
|
f1c7fa6253d032a6ad2dba7402518792cfbce88aebdc186ee151e4c93d295405
| 2025-10-27T19:16:02.507000Z
| 2025-10-27T19:16:02.507000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5cbded06842963c399a983856212b063c8c6732133dc824d6f49e1ac4c0b8a0c
|
CVE-2025-12365
|
Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
|
93372c607a41e97523f49cfc1458b8d006abaece410828bf9388bc4a4aa9749f
| 2025-10-27T19:16:02.793000Z
| 2025-10-27T19:16:02.793000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
c75a0469229f105965af0a467db2b34b98d2dc895ad275aaffd9d2cd500dfe41
|
CVE-2025-32785
|
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable to cross-site scripting (XSS) via the Address field in the Subscribed Lists group management section. An authenticated user can inject malicious JavaScript by adding a payload to the Address field when creating or editing a list entry. The vulnerability is triggered when another user navigates to the Tools section and performs a gravity database update. The Address field does not properly sanitize input, allowing special characters and script tags to bypass validation. This has been patched in version 6.3.
|
611b9daed81cb21d80e5b12a1e75f3ddfee72897381252c4d270de4213d3157a
| 2025-10-27T19:16:03.123000Z
| 2025-10-27T19:16:03.123000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
deb6ae1242c3e57c7ce879e001f76d50a7c21b0b4fff8b04a45829d171867ab7
|
CVE-2025-36007
|
IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to privilege escalation due to improper privilege assignment to an update script.
|
fc725a50daa8f5f617e2ca86dccf445cfde10e0a42109f738b8aecf5f16bf4f0
| 2025-10-27T19:16:03.283000Z
| 2025-10-27T19:16:03.283000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
e12fb2657dbfd92626b144c6a3822da7a62f3a1a981eb9ffd17deef66ecb9b22
|
CVE-2025-36138
|
IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
a13944d7994c9928da7e411023400097c1db126e22137c313cbddcc0ac54691b
| 2025-10-27T19:16:03.527000Z
| 2025-10-27T19:16:03.527000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
3d69cb45b24f59d1ab307b7f7611de08f73456494a08e29cb3d816f80c40ec4c
|
CVE-2025-36170
|
IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
a13944d7994c9928da7e411023400097c1db126e22137c313cbddcc0ac54691b
| 2025-10-27T19:16:03.673000Z
| 2025-10-27T19:16:03.673000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
c452539f9ef2cfd3815e7a415ac26dada7ca75898a2cb3cb813fce8c603012f7
|
CVE-2025-46602
|
Dell SupportAssist OS Recovery, versions prior to 5.5.15.0, contain an Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
|
7ea5a872d6636d5254ce2b9e5cc8ce46c2b1df41d0dc7af0c8147730453a5373
| 2025-10-27T19:16:03.837000Z
| 2025-10-27T19:16:03.837000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
97b6cf10b0e9ad589746e9204246c0d91a92f5027edb8b2f7d7363c6e4207290
|
CVE-2025-53533
|
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions 6.2.1 and earlier are vulnerable to reflected cross-site scripting (XSS) via a malformed URL path. The 404 error page includes the requested path in the class attribute of the body tag without proper sanitization or escaping. An attacker can craft a URL containing an onload attribute that will execute arbitrary JavaScript code in the browser when a victim visits the malicious link. If an attacker sends a crafted pi-hole link to a victim and the victim visits it, attacker-controlled JavaScript code is executed in the browser of the victim. This has been patched in version 6.3.
|
cb7d6b0398c8bb3de6e69825850084953de56c0a601aa35f4fc28a3562113644
| 2025-10-27T19:16:04.003000Z
| 2025-10-27T19:16:04.003000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5cf6e622bb2848fc128f610d1a712b19a6b8705999dc7055d2c81fcd238e01dd
|
CVE-2025-61099
|
FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.
|
af74710a3bed37658375adfff412ca3b53d0ed5f4c4933b692721231111e2340
| 2025-10-27T19:16:04.880000Z
| 2025-10-28T18:15:39.540000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
573f985528dacda40db8b85ce980c8d320664029349a1da9f710f10efc693e35
|
CVE-2025-61100
|
FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the ospf_opaque_lsa_dump function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) under specific malformed LSA conditions.
|
c4daf52bf4205e8f22453d24c869b48a52c23f71f08947307f722e862f22f2f2
| 2025-10-27T19:16:05.060000Z
| 2025-10-28T18:15:39.717000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
f3c41c98a572cd8e7552da2da4ca0894e0898875c30cdeb412c1043b9baa390d
|
CVE-2025-62253
|
Open redirect vulnerability in page administration in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter.
|
546b7154086bab9efbb3ec6fb5c5480979f3eaa30dd002ae177fd1dcd3e8844f
| 2025-10-27T19:16:05.350000Z
| 2025-10-27T19:16:05.350000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
4f2414a271ae55742c6c342d0ea98ddd742af52acc0d5d580a0682790989842a
|
CVE-2025-12310
|
A security vulnerability has been detected in VirtFusion up to 6.0.2. This vulnerability affects unknown code of the file /account/_settings of the component Email Change Handler. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
197deb407c8a0191cff6dbc6e4049a232f86aa0ec3b89a1bf4ced9820cc0f909
| 2025-10-27T20:15:51.943000Z
| 2025-10-27T20:15:51.943000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
f98b5386eeaeaca4ef02b23f187756caaaf3137025d0e23181e9ecf51774c7ac
|
CVE-2025-12311
|
A vulnerability was detected in PHPGurukul Curfew e-Pass Management System 1.0. This issue affects some unknown processing of the file edit-category-detail.php. The manipulation of the argument catname results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
|
9733fe3f721081216e85a75dff35d787cf75b329a5720dfcc3930a1ea2683c8c
| 2025-10-27T20:15:52.210000Z
| 2025-10-27T20:15:52.210000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
de8991aca8733afdb55eea3695a29e40e071abfef2dae4dbacda9a62afc90182
|
CVE-2025-12312
|
A flaw has been found in PHPGurukul Curfew e-Pass Management System 1.0. Impacted is an unknown function of the file view-pass-detail.php. This manipulation of the argument Fullname/Category causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used.
|
c552e2b0af5b6e2be6f5843d94e85a5919ba4c2778506943e75740e25380ca62
| 2025-10-27T20:15:52.387000Z
| 2025-10-27T20:15:52.387000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b48ede4a0e617fdae021f6a29815a12335c82afe4de1f40927036183f041a99b
|
CVE-2025-12313
|
A vulnerability has been found in D-Link DI-7001 MINI 19.09.19A1/24.04.18B1. The affected element is an unknown function of the file /msp_info.htm. Such manipulation of the argument cmd leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
a71a08c6775714d2a924a96804462a21ad9747ba0636ff069f4d054894cf60fe
| 2025-10-27T20:15:52.553000Z
| 2025-10-27T20:15:52.553000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
61b96805ccd9a0980bf0ed7984e39eed9547fdf366e7759c4b81c3117f5a58d7
|
CVE-2025-12314
|
A vulnerability was found in code-projects Food Ordering System 1.0. The impacted element is an unknown function of the file /admin/deleteitem.php. Performing manipulation of the argument itemID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
|
83499c67d49f813e4ca4f9f8ed9b4beca964386dacaeb84e58b273543cf9e399
| 2025-10-27T20:15:52.723000Z
| 2025-10-27T20:15:52.723000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
86a4d731c758db1c87b6d81e3a9cba9925f035c41c093336c084c1bcf0055855
|
CVE-2025-12315
|
A vulnerability was determined in code-projects Food Ordering System 1.0. This affects an unknown function of the file /admin/menu.php. Executing manipulation of the argument itemPrice can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
|
c654533fc72bef2d4ae6f7613e8d2125fdb86bbedb2a691ffdce346b3f34d2ca
| 2025-10-27T20:15:52.897000Z
| 2025-10-27T20:15:52.897000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
0a2ecc5b494e91dfefc038fac9235d598eef77ee18f95f5051c9586daff0650b
|
CVE-2025-58356
|
Constellation is the first Confidential Kubernetes. The Constellation CVM image uses LUKS2-encrypted volumes for persistent storage. When opening an encrypted storage device, the CVM uses the libcryptsetup function crypt_activate_by_passhrase. If the VM is successful in opening the partition with the disk encryption key, it treats the volume as confidential. However, due to the unsafe handling of null keyslot algorithms in the cryptsetup 2.8.1, it is possible that the opened volume is not encrypted at all. Cryptsetup prior to version 2.8.1 does not report an error when processing LUKS2-formatted disks that use the cipher_null-ecb algorithm in the keyslot encryption field. This vulnerability is fixed in 2.24.0.
|
8cabf80e022d2f2f6377c4fff4ed7c0e8eabe8e50e53b48b783053d19fdb1172
| 2025-10-27T20:15:53.480000Z
| 2025-10-27T20:15:53.480000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
108f67bbd7440b9acd12b5dd41d99426b986a0d2792210ab660b543ab46291d1
|
CVE-2025-59151
|
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface before 6.3 is vulnerable to Carriage Return Line Feed (CRLF) injection. When a request is made to a file ending with the .lp extension, the application performs a redirect without properly sanitizing the input. An attacker can inject carriage return and line feed characters (%0d%0a) to manipulate both the headers and the content of the HTTP response. This enables the injection of arbitrary HTTP response headers, potentially leading to session fixation, cache poisoning, and the weakening or bypassing of browser-based security mechanisms such as Content Security Policy or X-XSS-Protection. This vulnerability is fixed in 6.3.
|
c16f39a1d7d31387ab76c02f4beebed9f38ec77ddb9ee7ec056b24e72bd88b48
| 2025-10-27T20:15:53.630000Z
| 2025-10-27T20:15:53.630000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
9c54516a613dde69768f6cf38650498fc9e0ea7f6ae4a148e7b7ec5599c0745c
|
CVE-2025-61101
|
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_rmt_itf_addr function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
|
bc227312c30c86385d36291d66a34896df9d7f3640b23e6207a5da258fb7c13d
| 2025-10-27T20:15:54.050000Z
| 2025-10-28T18:15:39.910000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
cb39f90a974a417605e804da8c0a8ac82fd35defd378f896905012287680e1da
|
CVE-2025-61102
|
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
|
61810ba094bf503e238838dff5d2df2a312d10903a9b751ee88f805bbb1c5f3d
| 2025-10-27T20:15:54.150000Z
| 2025-10-28T17:15:38.040000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
4fbfd549ef54d7ce291c20069c6c13b27702ce9ccffee7ef9ea65b1e0bd6073c
|
CVE-2025-61105
|
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
|
93a31f16c74c1b7ec4308abe94d915f8a9db8ff62b6f42b4dda982ef2775b100
| 2025-10-27T20:15:54.240000Z
| 2025-10-28T18:15:40.483000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
644dbc57f3a497909913d93647d7d735837d4232b46180985524bfc6cb6859a2
|
CVE-2025-62263
|
Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.3.7 through 7.4.3.103, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 service pack 3 through update 36 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an Account Role’s “Title” text field to (1) view account role page, or (2) select account role page.
Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.3.7 through 7.4.3.103, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 service pack 3 through update 36 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an Organization’s “Name” text field to (1) view account page, (2) view account organization page, or (3) select account organization page.
|
50db7ade263efef8371d302b2711dd46423625d8d134bdeb2b07f210a2d4feaa
| 2025-10-27T20:15:54.603000Z
| 2025-10-27T20:15:54.603000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
89626dc94e22aefb5277cdee2319034698a10858f50f8086174ad3280d15c986
|
CVE-2025-62516
|
Landlord Onboarding & Rental Signup introduces the landlord onboarding workflow and rental signup system for VivaTurbo Rentals & Property Services. In 2.0.0 and earlier, a vulnerability was identified in the TurboTenant property listing activation workflow that could allow unauthorized access to certain Stripe payment session data. This could potentially expose sensitive business metadata, including landlord dashboard sync details and tenant information. The issue affects the API endpoints handling the property listing activation, subscription metadata, and payment link generation.
|
436e4930641257a5db8d113a887f0baa90181dd91f897a475bf5c8e582f4e2e7
| 2025-10-27T20:15:54.740000Z
| 2025-10-27T20:15:54.740000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
e740706a2a0bec069346a50c286d03641b619435e9aed2fc657debcdc79bcc51
|
CVE-2025-62594
|
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. ImageMagick versions prior to 7.1.2-8 are vulnerable to denial-of-service due to unsigned integer underflow and division-by-zero in the CLAHEImage function. When tile width or height is zero, unsigned underflow occurs in pointer arithmetic, leading to out-of-bounds memory access, and division-by-zero causes immediate crashes. This issue has been patched in version 7.1.2-8.
|
5449319d7c54c9772ee72fdc1244ef0e198e6187b75b792d2b5b4895c0c95f53
| 2025-10-27T20:15:54.893000Z
| 2025-10-27T20:15:54.893000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5c2a6bbd253fb3cfca7ea3cb48c2d67da8d1a0d8c0d25184be62b7707ac0be26
|
CVE-2025-12316
|
A vulnerability was identified in code-projects Courier Management System 1.0. This impacts an unknown function of the file /courier/edit-courier.php. The manipulation of the argument OfficeName leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
|
72c673be237812d665d79d34c39828e0940728d798ea1704d888506d3fd8943c
| 2025-10-27T21:15:35.570000Z
| 2025-10-28T15:16:09.017000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fc3c368d15473ebcdfc8e5cd9ecdc2dfe5e4a8968309f53b25122f020143554c
|
CVE-2025-12322
|
A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
|
34a26b1d91eda74798075e6d3299015339f2632875190de52fd392e67d5c8af9
| 2025-10-27T21:15:36.160000Z
| 2025-10-28T15:16:09.443000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
ab47756314dd7031ff00987660f6ebcf13f322f19e777b3f1b288fe1017023be
|
CVE-2025-12325
|
A vulnerability has been found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
d05e9cb182dbb4b7a8eca2349d32ee08ba5192b58520ba8c9e569b3f43495680
| 2025-10-27T21:15:36.343000Z
| 2025-10-28T15:16:09.573000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
785cc918f74f2b264d1ba5294e249ef1cdb0f312b6a59d33d1b97c3d4cd4400a
|
CVE-2025-12326
|
A vulnerability was found in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. This vulnerability affects unknown code of the file /process.php of the component POST Request Handler. The manipulation of the argument un results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
|
4df562b302798a8f964df4a59b4dc9a36ac11d9b46fb9dc0b492dfc9a464100a
| 2025-10-27T21:15:36.520000Z
| 2025-10-27T21:15:36.520000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5e17cd08aba9b318ea22ff02efd893684a6f5b98f61ec31837627c30094b246e
|
CVE-2025-12327
|
A vulnerability was determined in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. This issue affects some unknown processing of the file /description.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
|
58c3508ad2d2f07002da41715740c144886878b1d01ea1b21720658078a32e44
| 2025-10-27T21:15:36.713000Z
| 2025-10-27T21:15:36.713000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
b348169d66273127f2d1dbcda0f39ecc27ea7eac53d9baff123d739e28ea105c
|
CVE-2025-62262
|
Information exposure through log file vulnerability in LDAP import feature in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows local users to view user email address in the log files.
|
5eed1e57e0d124f6a2b968ef58803a580cc52b50a5ea69e03cc7ce1fa386e082
| 2025-10-27T21:15:37.577000Z
| 2025-10-27T21:15:37.577000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
71115ce3bdefd6a4fd4115328504575941a01af4077a29a90ae8b91235b393b8
|
CVE-2025-62523
|
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 includes a Cross-Origin Resource Sharing (CORS) misconfiguration in its middleware: it reflects the Origin request header back in the Access-Control-Allow-Origin response header without proper validation or a whitelist, while Access-Control-Allow-Credentials is set to true. This behavior could allow a malicious website on a different origin to send requests (including credentials) to the PILOS API. This may enable exfiltration or actions using the victim’s credentials if the server accepts those cross-origin requests as authenticated. Laravel’s session handling applies additional origin checks such that cross-origin requests are not authenticated by default. Because of these session-origin protections, and in the absence of any other unknown vulnerabilities that would bypass Laravel’s origin/session checks, this reflected-Origin CORS misconfiguration is not believed to be exploitable in typical PILOS deployments. This vulnerability has been patched in PILOS in v4.8.0
|
d266e443e1b16d033f411126e1b1826ab4f7650625f8463a6c3b2b32c69bab50
| 2025-10-27T21:15:37.770000Z
| 2025-10-27T21:15:37.770000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
fbcac4155365c49fd01f8b93239b05325216146d825cf9abc2acceb2438921c4
|
CVE-2025-62524
|
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 exposes the PHP version via the X-Powered-By header, enabling attackers to fingerprint the server and assess potential exploits. This information disclosure vulnerability originates from PHP’s base image. Additionally, the PHP version can also be inferred through the PILOS version displayed in the footer and by examining the source code available on GitHub. This information disclosure vulnerability has been patched in PILOS in v4.8.0.
|
ec63adf195d9fab05605d6810bf332f50a5f79683653ac68750e2127809594bf
| 2025-10-27T21:15:37.930000Z
| 2025-10-27T21:15:37.930000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5b03d40d7505e0083c88a101ad175afdee0cf20b8604337b38b8965309b28485
|
CVE-2025-62725
|
Docker Compose trusts the path information embedded in remote OCI compose artifacts. When a layer includes the annotations com.docker.compose.extends or com.docker.compose.envfile, Compose joins the attacker‑supplied value from com.docker.compose.file/com.docker.compose.envfile with its local cache directory and writes the file there. This affects any platform or workflow that resolves remote OCI compose artifacts, Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud dev environments is affected. An attacker can escape the cache directory and overwrite arbitrary files on the machine running docker compose, even if the user only runs read‑only commands such as docker compose config or docker compose ps. This issue is fixed in v2.40.2.
|
9a17046920db57f89948a3c0eef0e3e5df96b3a0d80622e8736ab2d019361c93
| 2025-10-27T21:15:38.140000Z
| 2025-10-27T21:15:38.140000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
490c44cb04e00af50fc8f05417159fcd5f47e1c8bf6e57b3f6722369720157a1
|
CVE-2025-62782
|
InventoryGui is a library for creating chest GUIs for Bukkit/Spigot plugins. Versions 1.6.3-SNAPSHOT and earlier contain a vulnerability where GUIs using GuiStorageElement can allow item duplication when the experimental Bundle item feature is enabled on the server. The vulnerability is resolved in version 1.6.4-SNAPSHOT.
|
7c21521dde49bd930cc247ef7113444c798c672ddfe53f7ffd8a5a5e4aab3113
| 2025-10-27T21:15:38.287000Z
| 2025-10-27T21:15:38.287000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
ece4b901a6d6ebbca9eb574a72636d05e2599193f5de0eb1a19a8b3e1725b77f
|
CVE-2025-62783
|
InventoryGui is a library for creating chest GUIs for Bukkit/Spigot plugins. Versions 1.6.1-SNAPSHOT and earlier contain a vulnerability where any plugin using the `GuiStorageElement can allow item duplication when the experimental Bundle item feature is enabled on the server. The vulnerability is resolved in version 1.6.2-SNAPSHOT.
|
455cef3f4c59aab0ee2746986c0432f8df7efda6edcbff0d690c7c04f181c790
| 2025-10-27T21:15:38.450000Z
| 2025-10-27T21:15:38.450000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
48a5fe14e3e5984def44efee2a4ead43df56c383e86a16452e993c6c101e111c
|
CVE-2025-62784
|
InventoryGui is a library for creating chest GUIs for Bukkit/Spigot plugins. Versions before 1.6.5 contain a vulnerability where any plugin using a GUI with the GuiStorageElement and allows taking out items out of that element can allow item duplication when the experimental Bundle item feature is enabled on the server. The vulnerability is resolved in version 1.6.5.
|
5262d5dbf55e5e60306517eaa6f1bef1c8b13f01535f78e113e81cea74e2bc7c
| 2025-10-27T21:15:38.593000Z
| 2025-10-27T21:15:38.593000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
44283fc3a72149db1fcc5b4b72f3b58b7750d3c686fcab724ea5bbe37c1c4ffc
|
CVE-2025-12328
|
A vulnerability was identified in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. Impacted is an unknown function of the file /contestproblem.php. Such manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The vendor was contacted early about this disclosure but did not respond in any way.
|
66af4a6b739b1355c4028d86385290c9ee86064daec5ce69a1d48f3499fd5aa8
| 2025-10-27T22:15:39.947000Z
| 2025-10-27T22:15:39.947000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
ea45d28a3f51184fc1893389904f81154c20be23dbfe7436dfe6bfb20145ec26
|
CVE-2025-12329
|
A security flaw has been discovered in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. The affected element is an unknown function of the file /details.php. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
|
1fa03e6a6a12f1a4e2e0e1773ee83e14e7de1729fce8fc69e0fc3ac231c1c5a2
| 2025-10-27T22:15:40.990000Z
| 2025-10-27T22:15:40.990000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
be3a88924fb1fee4f76aa8aaa3188b6348368252a5c6c293c6d31320d62e8109
|
CVE-2025-12330
|
A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
|
694ee2b9d5c0c65b4edabc8381c20dae50debeb252884f96a4ca3e326e67a82d
| 2025-10-27T22:15:41.167000Z
| 2025-10-27T22:15:41.167000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
3312122012736d62700571d756c7cd42c7900a6e72a08e94ca73a49b42e96a2e
|
CVE-2025-12331
|
A weakness has been identified in Willow CMS up to 1.4.0. Impacted is an unknown function of the file /admin/images/add. This manipulation causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
|
a155251e0dc02bf352b04b82a301d385d83cf66535202a87936e2dc86e0726ac
| 2025-10-27T22:15:41.347000Z
| 2025-10-27T22:15:41.347000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
58a4df1bf4e673f0bba329d2c42d033cc4349d92f59227c88a0874ee2d647980
|
CVE-2025-62260
|
Liferay Portal 7.4.0 through 7.4.3.99, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number of objects returned from Headless API requests, which allows remote attackers to perform denial-of-service (DoS) attacks on the application by executing a request that returns a large number of objects.
|
126b98dcc28563d51ba65f2c34d65ceafdcebf793e047a25edf79687c4a9be3f
| 2025-10-27T22:15:41.590000Z
| 2025-10-27T22:15:41.590000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
40261e60b15cbcd45eb28b30d45e4c265af4e20e6a2443f3c11d6135ee1ca905
|
CVE-2025-62261
|
Liferay Portal 7.4.0 through 7.4.3.99, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 34, and older unsupported versions stores password reset tokens in plain text, which allows attackers with access to the database to obtain the token, reset a user’s password and take over the user’s account.
|
bac907180a215710e037c638f1043feebf17cac8943cb489c928039366159626
| 2025-10-27T22:15:41.733000Z
| 2025-10-27T22:15:41.733000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
5c0cdfbadfc7d4972d02a03997f083a0d1fcf72e36d489f2c7c4989ecdf65bc8
|
CVE-2025-62778
|
Frappe Learning is a learning management system. A security issue was identified in Frappe Learning 2.39.1 and earlier, where students were able to access the Quiz Form if they had the URL.
|
40e4eb314e4ed630b62610fb1e3e10d8b98961ecd1082e0462472124ec96a5ee
| 2025-10-27T22:15:41.873000Z
| 2025-10-27T22:15:41.873000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
7ca3c9f79a561d586a7f074dfcdbd6d15b51b5a80b1bebd14312c795247be52d
|
CVE-2025-62779
|
Frappe Learning is a learning system that helps users structure their content. In Frappe Learning 2.39.1 and earlier, users were able to add HTML through input fields in the Job Form.
|
d5b7ebb777f97c4baa998b0f21dc639dd1b0ac1f4d3a5d8c45bd07cb6ace169b
| 2025-10-27T22:15:42.017000Z
| 2025-10-27T22:15:42.017000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
94f942cf86b30ffd93406f5e1c4d80575d08c1bd21aac08c31cdc06cbf2b693f
|
CVE-2025-62781
|
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. Prior to 4.8.0, users with a local account can change their password while logged in. When doing so, all other active sessions are terminated, except for the currently active one. However, the current session’s token remains valid and is not refreshed. If an attacker has previously obtained this session token through another vulnerability, changing the password will not invalidate their access. As a result, the attacker can continue to act as the user even after the password has been changed. This vulnerability is fixed in 4.8.0.
|
2b9afb04b229618c76af49c440c031845306e8d46c01d47eb12a86d42357782d
| 2025-10-27T22:15:42.153000Z
| 2025-10-27T22:15:42.153000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
84b06375ac2c3c685895589bb50bcfeba2dd8f8378d04c7dc819b53c3e416df8
|
CVE-2025-62793
|
eLabFTW is an open source electronic lab notebook for research labs. The application served uploaded SVG files inline. Because SVG supports active content, an attacker could upload a crafted SVG that executes script when viewed, resulting in stored XSS under the application origin. A victim who opens the SVG URL or any page embedding it could have their session hijacked, data exfiltrated, or actions performed on their behalf. This vulnerability is fixed n 5.3.0.
|
5ef286f5da2fd2dc6656c24e7fc30281240e6ccdc9dcad1bb831dda397d5bd6d
| 2025-10-27T22:15:42.307000Z
| 2025-10-27T22:15:42.307000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
947aa15225b8f89312c62eb8b0b437da90b5116756bb467857879f53dafd88f3
|
CVE-2025-12333
|
A vulnerability has been found in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/supplier_add.php. The manipulation of the argument supp_name/supp_address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
25eb51c956210715952f793152f1915b5584b27401561f7ca84d4143919530ea
| 2025-10-27T23:15:37.360000Z
| 2025-10-27T23:15:37.360000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
a83f0a076ecdfb7d4f145647854b9af04062591c4aff43e802dba8509b9b5805
|
CVE-2025-12334
|
A vulnerability was found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument prod_name/prod_desc/prod_cost results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used.
|
c718fd2ede69aa457cf39659b9227764663354d56c2c87a9aef7993741ee0404
| 2025-10-27T23:15:38.330000Z
| 2025-10-27T23:15:38.330000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
2911682a3cc99a7abbb96c4b061d71bd0f6d7e69ec84fb34043fe6c34e317a8a
|
CVE-2025-62258
|
CSRF vulnerability in Headless API in Liferay Portal 7.4.0 through 7.4.3.107, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to execute any Headless API via the `endpoint` parameter.
|
ebed423eecbaf3029abbd5b6c2ce6773cf5a7f86c5667d2f51045d26030bcfea
| 2025-10-27T23:15:38.520000Z
| 2025-10-27T23:15:38.520000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
88f74fb8a69403687fdb327ad6ca0ed51934d555f0780d9cb395f2c66fb137dc
|
CVE-2025-62259
|
Liferay Portal 7.4.0 through 7.4.3.109, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit access to APIs before a user has verified their email address, which allows remote users to access and edit content via the API.
|
c5b9ceadf26cb14e941a80042528e8d52b81353412dc9ad8af1a1b906e594d5c
| 2025-10-27T23:15:38.670000Z
| 2025-10-27T23:15:38.670000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
e68667851590b9b9b561923ce39e8fd3b9d200e72505bb042a1e566a0ce1d0cf
|
CVE-2025-12332
|
A flaw has been found in SourceCodester Student Grades Management System 1.0. This affects the function delete_user of the file /admin.php. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.
|
2646e7f295bd08afdb3f9dd6044ffa94908f836f5c5ba617a5189b67a51a57b2
| 2025-10-28T00:15:37.573000Z
| 2025-10-28T00:15:37.573000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
55a997f395fc2abb912eba20aa67ad66582ce497402a7957bdd872758f1017c3
|
CVE-2025-12335
|
A vulnerability was determined in code-projects E-Commerce Website 1.0. Affected by this vulnerability is an unknown functionality of the file /pages/supplier_update.php. This manipulation of the argument supp_name/supp_address causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
|
204779880e681efbcac3b89f04832d70e59222c1fcb2f17b5322eb3c6fdf60e9
| 2025-10-28T00:15:37.757000Z
| 2025-10-28T00:15:37.757000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
8deb88218ba826248506b8df013b6f6cac98218bab76971fc2411dff200f366e
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.