cve_id
stringlengths
13
15
summary
stringlengths
15
4k
description_hash
stringlengths
64
64
published_date
timestamp[us, tz=UTC]date
2025-07-31 14:15:34
2025-10-29 13:15:34
modified_date
timestamp[us, tz=UTC]date
2025-07-31 18:42:37
2025-10-29 13:53:20
is_rejected
bool
2 classes
source
stringclasses
1 value
source_url
stringclasses
7 values
retrieved_at
timestamp[us, tz=UTC]date
2025-10-29 13:52:01
2025-10-29 13:52:01
source_record_hash
stringlengths
64
64
CVE-2025-36121
IBM OpenPages 9.1 and 9.0 is vulnerable to HTML injection. A remotely authenticated attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.
eef5e53df3e6cde9550ad04c2ac1b5b8f40537a5bff9578c49527b012b9d2563
2025-10-27T15:15:38.473000Z
2025-10-27T15:15:38.473000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
49a4a4300af65dafe15278edec226fb8998bf6c4db33a0a5aa88d959d4c5f127
CVE-2025-52264
StarCharge Artemis AC Charger 7-22 kW v1.0.4 was discovered to contain a stack overflow via the cgiMain function at download.cgi.
e51e999a9f95dc44a9709b48fc810641ca2cfed702ca31d9de22791b9845c2cc
2025-10-27T15:15:38.637000Z
2025-10-27T15:15:38.637000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
da32aa2e7ab616abe4e444183d2c2e2ef178af681e5c0b5714ed833165964fbe
CVE-2025-52268
StarCharge Artemis AC Charger 7-22 kW v1.0.4 was discovered to contain a hardcoded AES key which allows attackers to forge or decrypt valid login tokens.
78a7506e422183fad7f02a0476a298c1a48e206ba814702986d6148352661d4e
2025-10-27T15:15:38.750000Z
2025-10-27T20:15:53.300000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b1366f00d492e2000b20fa500c900b1265f07f514ba5ede9464733dc51e2ed6d
CVE-2025-61482
Improper handling of OTP/TOTP/HOTP values in NetKnights GmbH privacyIDEA Authenticator v.4.3.0 on Android allows local attackers with root access to bypass two factor authentication. By hooking into app crypto routines and intercepting decryption paths, attacker can recover plaintext secrets, enabling generation of valid one-time passwords, and bypassing authentication for enrolled accounts.
e783856ba363f3f422c57c6f1eae44b9d3ac0aa5c8073ac7f08760eec08b91ed
2025-10-27T15:15:38.917000Z
2025-10-27T18:15:43.947000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
9aacc1bb10ad37c39147ed4010fc50900d78d54780af7c50a7d64ff40323e98e
CVE-2023-37749
Incorrect access control in the REST API endpoint of HubSpot v1.29441 allows unauthenticated attackers to view users' data without proper authorization.
8e1c6ba62683617ab00423778110db58fb1ca5d8f870e0f80ab35da3fa368e1f
2025-10-27T16:15:34.270000Z
2025-10-27T20:15:50.090000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b7e26b68661cbd89586b300f82275be9b02d26705419a89ae81ab62f088fd23a
CVE-2023-49440
AhnLab EPP 1.0.15 is vulnerable to SQL Injection via the "preview parameter."
f7f74470bd50d2bf49ad139423221fcde0c6649f823388282f9ee215233db8e6
2025-10-27T16:15:35.147000Z
2025-10-27T20:15:51.040000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
d5a8d4b6c718411dc43d28611028fee8e61284ded96eb5c4ba160645eadccb5c
CVE-2025-10023
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Services Meta-services modules) allows Stored XSS by users with elevated privileges.This issue affects Infra Monitoring: from 24.10.0 before 24.10.9, from 24.04.0 before 24.04.16, from 23.10.0 before 23.10.26.
43639b0cb36be294ae9e4bf5d4846dab3b58281351277dfb1ea1b295f4fb3f46
2025-10-27T16:15:35.287000Z
2025-10-27T16:15:35.287000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
9e13f991b6262dd4083e3a97a8eb37f4f32ad4f9b686c53b68ebd91625062ed2
CVE-2025-12291
A vulnerability was found in ashymuzuro Full-Ecommece-Website and Muzuro Ecommerce System up to 1.1.0. This affects an unknown part of the file /admin/index.php?add_product of the component Add Product Page. The manipulation results in unrestricted upload. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
1c714b73ece54a5088822a6b80a74048a7e22bbea4bfeb9b8f5595b761c1b14f
2025-10-27T16:15:38.080000Z
2025-10-27T16:15:38.080000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
ec98767a576a209e31402cb205e93e4d39e9c90568489ab1ab15f686de3d2076
CVE-2025-12292
A vulnerability was determined in SourceCodester Point of Sales 1.0. This vulnerability affects unknown code of the file /index.php. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
951cc602a55c87053926b944e2a8c9ebae444fd2bcc5d4f6775093e94f9b30cf
2025-10-27T16:15:38.257000Z
2025-10-27T16:15:38.257000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
1bbf471a08f428ac4d9fc8be2d093f47b475076ed808f7657fa3fac130c65956
CVE-2025-12293
A vulnerability was identified in SourceCodester Point of Sales 1.0. This issue affects some unknown processing of the file /category.php. Such manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
73e0e1efb102002ddb26e790ad23a8cc0c677ea3e66b5e26b1db14d732c9f896
2025-10-27T16:15:38.437000Z
2025-10-27T16:15:38.437000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
dadec7849d63ab62885f3b0fbd5a2a0c9aebddd04cdbe3ace5d89c593a99af8f
CVE-2025-12294
A security flaw has been discovered in SourceCodester Point of Sales 1.0. Impacted is an unknown function of the file /delete_category.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
c93bae6e6a70e2443dbd9526f09761b28d2f8a931758eac23359982892ab56fe
2025-10-27T16:15:38.617000Z
2025-10-27T16:15:38.617000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
3c665980a795f95d238e2a2212a0464f418fcab62d5a661e7f1f10f0770cb60c
CVE-2025-34133
Wimi Teamwork versions prior to 7.38.17 contains a cross-site request forgery (CSRF) vulnerability in its API. The API accepts any authenticated request that contains a JSON field named 'csrf_token' without validating the field’s value; only the presence of the field is checked. An attacker can craft a cross-site request that causes a logged-in victim’s browser to submit a JSON POST containing an arbitrary or empty 'csrf_token', and the API will execute the request with the victim’s privileges. Successful exploitation can allow an attacker to perform privileged actions as the victim potentially resulting in account takeover, privilege escalation, or service disruption.
658a747cf63f3d870cf5dfe3c1197ea1ecaae33363c4be53c0477d35b501f81c
2025-10-27T16:15:39.683000Z
2025-10-27T16:15:39.683000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
86a43347f7250932f781c33d9aecb6496a8efc2e95b55b75756d2955b38ea711
CVE-2025-60424
A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1.2 and v2024R2 allows attackers to bypass authentication via a bruteforce attack.
e86d5901ac6a2d4de449494430194bf8feec4a917854916c6b2f8ae57e0dd43e
2025-10-27T16:15:41.753000Z
2025-10-27T16:15:41.753000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
290627ec83579ce9e571a47c27c1e8724651fc997a0683c536abe15c3b8238f4
CVE-2025-60425
Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.
a5dec0da1986413245d0286bae01ac49226e77274fd9fae92c39fd360109d9d9
2025-10-27T16:15:42.040000Z
2025-10-27T20:15:53.773000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
e5d8a5d5e23f8b61c8461ae0888f6f53c5498dfbc6d014da13c98e1fe5865227
CVE-2025-60791
Easywork Enterprise 2.1.3.354 is vulnerable to Cleartext Storage of Sensitive Information in Memory. The application leaves valid device-bound license keys in process memory after a failed activation attempt. The keys can be obtained by attaching a debugger or analyzing the process/memory dump and then they can be used to activate the software on the same machine without purchasing.
cc4e3d7c55fe22111af7995697b3b8370b2593556dcbb440a87d202aceab9de0
2025-10-27T16:15:42.510000Z
2025-10-27T20:15:53.910000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
8da602152173f27fed2fe67cb206d4317f67c38bb2eba3baf994aa84905180f9
CVE-2025-61247
indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in the password parameter of login.php.
f1a40a1b887f8b328cb677f6086a3e9ab4d311840a5f28a912a8d15f4046b3e1
2025-10-27T16:15:42.717000Z
2025-10-27T20:15:54.333000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
98121badadb5709f2bdd7c0f3fa1f41c6503b80fc240f289a175efe1adc014e2
CVE-2025-12295
A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element is the function sub_40C6B8 of the component Firmware Update Handler. Executing manipulation can lead to improper verification of cryptographic signature. The attack can be launched remotely. Attacks of this nature are highly complex. The exploitability is described as difficult. The exploit has been made available to the public and could be exploited. This vulnerability only affects products that are no longer supported by the maintainer.
2507cef1b552f35d125564bfc7b155b0f5e19c97fdb9a6698514deb77574ee25
2025-10-27T17:15:36.510000Z
2025-10-27T17:15:36.510000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fd611399246afc79aad6fff2bcc17c8b0d10ee34a66ab32f63a65189602e6989
CVE-2025-12296
A security vulnerability has been detected in D-Link DAP-2695 2.00RC13. The impacted element is the function sub_4174B0 of the component Firmware Update Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
7536a13d34cb5882a4914cca520917c37666c1577970ca72ea0018cba1a7657c
2025-10-27T17:15:37.103000Z
2025-10-27T17:15:37.103000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
0dcb1673ee78143e742c4f5e355326cd65dcb2970a9ecb33a4c46157ded8d25b
CVE-2025-12297
A vulnerability was detected in atjiu pybbs up to 6.0.0. This affects an unknown function of the file UserApiController.java. The manipulation results in information disclosure. The attack may be launched remotely. The exploit is now public and may be used.
2fc13f2bdaa6e1d81b0c282dd0eaeafc7840ea6c2ff86698ce67af1b66f4ef0a
2025-10-27T17:15:37.300000Z
2025-10-27T17:15:37.300000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fc859777f14a7542cf824049eb9647bb382818d7d2c4a322479eafd156625f61
CVE-2025-12298
A vulnerability was identified in code-projects Simple Food Ordering System 1.0. This affects an unknown part of the file /editcategory.php. The manipulation of the argument pname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
e560e290a7ac5ed5d222c4a66feb85a8484c3fdcdf8148f66ed70fe366c249b9
2025-10-27T17:15:37.483000Z
2025-10-27T17:15:37.483000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
d0323d22af9f4e6a04e059af8fe784f24be0111783295ecd5f8c67a38f768605
CVE-2025-12299
A security flaw has been discovered in code-projects Simple Food Ordering System 1.0. This vulnerability affects unknown code of the file /addproduct.php. The manipulation of the argument pname/category/price results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
658d5abfba5c42ea3a3e871a2de09c2f8f40b180ec1a1005261ae7014bd7e6ac
2025-10-27T17:15:37.673000Z
2025-10-27T17:15:37.673000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
74be6c4cf53f5f0a846547e8272f8843506377efe804cfa573c7371f2956803a
CVE-2025-27222
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/getCobrandingData endpoint to retrieve files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to read any local server file that is accessible by the TRUfusion user and can also be used to leak cleartext passwords of TRUfusion Enterprise itself.
b40b52f8ff45c3cb1364160addf0f5550aaf024e3085be9284966ab965620fbc
2025-10-27T17:15:37.853000Z
2025-10-27T21:15:36.910000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
efa95d7ad957eae475e6c2dad4fd8be8654198f7dce56777ff17f3360c86aaa7
CVE-2025-27223
TRUfusion Enterprise through 7.10.4.0 exposes the encrypted COOKIEID as an authentication mechanism for some endpoints such as /trufusionPortal/getProjectList. However, the application uses a static key to create the encrypted cookie, ultimately allowing anyone to forge cookies and gain access to sensitive internal information.
68a67329023ef9feb6bd71240e058be7143979c8ac0e6802b49de24775541ae5
2025-10-27T17:15:37.973000Z
2025-10-28T14:15:58.293000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
6a382e84905a769f232bc9692cb075354202b8e2ab30599886f48fe7996f1a8c
CVE-2025-27224
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to write to any filename with any file type at any location on the local server, ultimately allowing execution of arbitrary code.
5612ac1a1c0436d6f0be46c6e0bff5abf2bb7589e87cf118e68f2b7e2e2c6f8a
2025-10-27T17:15:38.090000Z
2025-10-28T14:15:58.493000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
d45eb1f29dd843f312de04c6219cd19064b7ca97353e0833e91f827e70647751
CVE-2025-27225
TRUfusion Enterprise through 7.10.4.0 exposes the /trufusionPortal/jsp/internal_admin_contact_login.jsp endpoint to unauthenticated users. This endpoint discloses sensitive internal information including PII to unauthenticated attackers.
519e5f9dc7eb5b43673cd4ff88e6b97064b6ce23e52288dff1368d4e9d3eb693
2025-10-27T17:15:38.210000Z
2025-10-27T19:16:02.947000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fbbdd41141449bb0e3c7fb452ea95da30f881adb3f2f7017adf8f827503ab406
CVE-2025-54967
An issue was discovered in BAE SOCET GXP before 4.6.0.3. It permits external entities in certain XML-based files. An attacker who is able to social engineer a SOCET GXP user into opening a malicious file can trigger a variety of outbound requests, potentially compromising sensitive information in the process.
4a91cefc65ae71e97a1ecbd87e22ce38babcaff4284e4c55c273ec1593396b71
2025-10-27T17:15:38.337000Z
2025-10-28T14:15:59.387000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
0f639cef1898b71f49df423c998e7e94711c135feba0112d7c7e1d64952df960
CVE-2025-54968
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users.
ac2d163bb1303075c4509fa42564b9062f3e2bb35c559baa3f009d6bb25a958a
2025-10-27T17:15:38.470000Z
2025-10-28T14:15:59.563000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
9195e382f8fa74c1bff0bfd7290267721fcda0ec3135d36ca200f2944acb85d2
CVE-2025-54969
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service does not implement CSRF protections. An attacker who social engineers a valid user into clicking a malicious link or visiting a malicious website may be able to submit requests to the Job Status Service without the user's knowledge.
143c2ba1fe5f88d8782f53f5eee177fff7895202a202232337c5388096aebd4e
2025-10-27T17:15:38.587000Z
2025-10-27T19:16:04.317000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
f614dcab0abfbe2eac1d866951b51fd2ddc461a959287f77ffca43bcaa24e4a2
CVE-2025-54970
An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service fails to authenticate requests. In some configurations, this may allow remote or local users to abort jobs or read information without the permissions of the job owner.
32d97a81133069ae9ce4535b05962f4a4e07c943162f9afb8b9b83da3e504fcd
2025-10-27T17:15:38.703000Z
2025-10-28T14:15:59.733000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
c2034e0769df87473eb4ccb437d352843109cd13b72329f1503f0e28ec5b0f30
CVE-2025-12300
A weakness has been identified in code-projects Simple Food Ordering System 1.0. This issue affects some unknown processing of the file /addcategory.php. This manipulation of the argument cname causes cross site scripting. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
8941e5e119d517c93179363ff8e059bf051c48900bb37dc65e1aa5efde569ce3
2025-10-27T18:15:36.613000Z
2025-10-27T18:15:36.613000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
7940f7d0b551043eb8a9887799f9c050c0bb27c3aa2681429139691105af272c
CVE-2025-12301
A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Impacted is an unknown function of the file /editproduct.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
9e74adb7b608ab3e62ca2ac6d8c6d831fb60e0ce159b1265081ad23da93cb98f
2025-10-27T18:15:37.037000Z
2025-10-27T18:15:37.037000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b1b87f6e4fbe767389942e70fc240a70ef4f3f94ffa04f9d96a7f75d3da89730
CVE-2025-12302
A vulnerability was detected in code-projects Simple Food Ordering System 1.0. The affected element is an unknown function of the file /editproduct.php. Performing manipulation of the argument pname/category/price results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
61a9fe8ba24ac049ca6311e54ee5fa3c3bf2660824efbdfbf4fb9088efebd148
2025-10-27T18:15:37.407000Z
2025-10-27T18:15:37.407000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5abd031d6db590c8d33559228d7809ae8da2420a34ab5554fe90952988253e5d
CVE-2025-12303
A flaw has been found in PHPGurukul Curfew e-Pass Management System 1.0. The impacted element is an unknown function of the file admin-profile.php. Executing manipulation of the argument adminname/email can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used.
8be6ff483df3663c85239c98cc9baa657d4ad591fc368e2641a1a86eb9a779ed
2025-10-27T18:15:37.827000Z
2025-10-27T18:15:37.827000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
1f0cea78cdee0660fcb0d567a1ff87db2aecba815f18b4c613944f44324e02c3
CVE-2025-12363
Email Password Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
9a69a7a023f9b81e2a209f61ca986fd06d0b2f35514efb522bf71386761ec6fb
2025-10-27T18:15:38.223000Z
2025-10-27T18:15:38.223000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b8150dd7612756cad6f20636e0df186343a80ad447efc364b5405e5f2d92edf7
CVE-2025-12364
Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
0db9ce73b96d09ac0095a18a5385d33e9d4f5f495c16ac8ec4dd16cb414eba80
2025-10-27T18:15:38.857000Z
2025-10-27T18:15:38.857000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
d79cb791d20406709b620941a0c86cde3538a4b8d5443ebe421e2850ecb9b3c9
CVE-2025-54965
An XSS issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service does not properly sanitize the job ID parameter before using it in the job status page. An attacker who is able to social engineer a user into clicking a malicious link may be able to execute arbitrary JavaScript in the victim's browser.
a00e82b365c7cfaabafb7e2e8407d1f6fb531756a91f1def8b80cb624f4991d5
2025-10-27T18:15:41.990000Z
2025-10-27T19:16:04.150000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
27925ea0f6d48cecbce12f40a69ad3a591c47a9833f12b2887708692f28f643b
CVE-2025-55752
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
61243c31f49901c08feebd8298de63c67c79b9cf2565e624b68803b3160c5336
2025-10-27T18:15:42.283000Z
2025-10-27T18:15:42.283000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
4cd79a55af1d2bcb3c1d15a3ad1bd5dbb4bccc2172d6c2fe7f2f26cf6995946e
CVE-2025-55754
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
86104a067cdd116f3e5ce3d51127210fa19da9f7afbb7d2ccd66fe7a12bd3b40
2025-10-27T18:15:42.710000Z
2025-10-28T14:15:59.900000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
24dd8df47f67372626ad8e810d3ea29d8011781f4e5e8063f055776db4104c15
CVE-2025-60982
IDOR vulnerability in Educare ERP 1.0 (2025-04-22) allows unauthorized access to sensitive data via manipulated object references. Affected endpoints do not enforce proper authorization checks, allowing authenticated users to access or modify data belonging to other users by changing object identifiers in API requests. Attackers can exploit this flaw to view or modify sensitive records without proper authorization.
e8db93a6a7f8d4de44f5350f69383427cb59616d779c05a48de40fe175166d7b
2025-10-27T18:15:43.420000Z
2025-10-27T19:16:04.487000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
51024ff7ca9c61a517618d888a51f7e0c507558bffdef411e6d8b35cffcf2d1c
CVE-2025-60983
Reflected Cross Site Scripting vulnerability in Rubikon Banking Solution 4.0.3 in the "Search For Customers Information" endpoints.
77acaa63dee5b67b74edaaabec82b649f8a06bfc4a3ed34bb8570aec320fb515
2025-10-27T18:15:43.590000Z
2025-10-27T19:16:04.687000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fa6cc66a2fefe647fca986765c8a4f444f1b0bb0b672035d7bc125e88a2e98ea
CVE-2025-61385
SQL injection vulnerability in tlocke pg8000 1.31.4 allows remote attackers to execute arbitrary SQL commands via a specially crafted Python list input to function pg8000.native.literal.
64aa62b8148702561e2c1264d5ab03414d632b7303855bca7281a90658246716
2025-10-27T18:15:43.760000Z
2025-10-28T16:15:39.513000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b2774608b53d4fef5aabf0b8ed1ec57b3817068b622bc28f629dcd4838641f09
CVE-2025-61795
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
0b3c02364faeab8b66a1aef8a7b4dffcebfca03931e21bb761af406be81d81eb
2025-10-27T18:15:44.200000Z
2025-10-27T19:16:05.193000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
d84a09ed68ea698ac4f7229fec5d7b860c85d6f5ac9de40858257b8c8faf0298
CVE-2025-12304
A vulnerability has been found in dulaiduwang003 TIME-SEA-PLUS up to fb299162f18498dd9cf17da906886d80a077d53b. This affects the function alipayIsSucceed of the file PayController.java of the component Order Status Handler. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
c3fba6bdc5a5600bd707340820ff84a8f1421c529f751868999df563269dca80
2025-10-27T19:16:01.597000Z
2025-10-27T19:16:01.597000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
a8e29b63f2eada5110adf7bb1025b31c7319ec0a19aa9bed4c1f58b54d844e84
CVE-2025-12305
A vulnerability was found in quequnlong shiyi-blog up to 1.2.1. This impacts an unknown function of the file src/main/java/com/mojian/controller/SysJobController.java of the component Job Handler. The manipulation results in deserialization. The attack can be executed remotely. The exploit has been made public and could be used.
6cf664f2da0c6c2daa78702ffb0fd94485fe5a0a2fd77430af3c287fc033ecd3
2025-10-27T19:16:01.790000Z
2025-10-27T19:16:01.790000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fb4d7231fcf50fffb9973369fb1a058f381a8b0e5cc214069efe83673f6dccd6
CVE-2025-12306
A vulnerability was determined in code-projects Nero Social Networking Site 1.0. Affected is an unknown function of the file /acceptoffres.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
aa5c41a408243418c2e13709d1cc2cfcff86c68b721c822c5872ed48eaf0e4bb
2025-10-27T19:16:01.977000Z
2025-10-27T19:16:01.977000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
e241091a6804bf167449b6853faf0160242fc616341223a3c84c43c8fee5e988
CVE-2025-12307
A vulnerability was identified in code-projects Nero Social Networking Site 1.0. Affected by this vulnerability is an unknown functionality of the file /addfriend.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used.
87dacafad583397546e1c1dd4d9499fa54bdcdddfb3d45229e79c347756ab2ed
2025-10-27T19:16:02.160000Z
2025-10-27T19:16:02.160000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
7ef7feaf37931ff0397b8abdfc2d608d01f01e5dcc38cfcc0bc9778787233d2a
CVE-2025-12308
A security flaw has been discovered in code-projects Nero Social Networking Site 1.0. Affected by this issue is some unknown functionality of the file /deletemessage.php. Performing manipulation of the argument message_id results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
131ddd31891adccafb2bb69c7ba360cf113163d06351eeaf3bf43d5e4f8386e9
2025-10-27T19:16:02.333000Z
2025-10-27T19:16:02.333000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fd409a34b278c054e3bcfce49909bee759abeee97c4c7dcf6b68bbaabb439e0f
CVE-2025-12309
A weakness has been identified in code-projects Nero Social Networking Site 1.0. This affects an unknown part of the file /friendprofile.php. Executing manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
f1c7fa6253d032a6ad2dba7402518792cfbce88aebdc186ee151e4c93d295405
2025-10-27T19:16:02.507000Z
2025-10-27T19:16:02.507000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5cbded06842963c399a983856212b063c8c6732133dc824d6f49e1ac4c0b8a0c
CVE-2025-12365
Error Messages Wrapped In HTTP Header.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
93372c607a41e97523f49cfc1458b8d006abaece410828bf9388bc4a4aa9749f
2025-10-27T19:16:02.793000Z
2025-10-27T19:16:02.793000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
c75a0469229f105965af0a467db2b34b98d2dc895ad275aaffd9d2cd500dfe41
CVE-2025-32785
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable to cross-site scripting (XSS) via the Address field in the Subscribed Lists group management section. An authenticated user can inject malicious JavaScript by adding a payload to the Address field when creating or editing a list entry. The vulnerability is triggered when another user navigates to the Tools section and performs a gravity database update. The Address field does not properly sanitize input, allowing special characters and script tags to bypass validation. This has been patched in version 6.3.
611b9daed81cb21d80e5b12a1e75f3ddfee72897381252c4d270de4213d3157a
2025-10-27T19:16:03.123000Z
2025-10-27T19:16:03.123000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
deb6ae1242c3e57c7ce879e001f76d50a7c21b0b4fff8b04a45829d171867ab7
CVE-2025-36007
IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to privilege escalation due to improper privilege assignment to an update script.
fc725a50daa8f5f617e2ca86dccf445cfde10e0a42109f738b8aecf5f16bf4f0
2025-10-27T19:16:03.283000Z
2025-10-27T19:16:03.283000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
e12fb2657dbfd92626b144c6a3822da7a62f3a1a981eb9ffd17deef66ecb9b22
CVE-2025-36138
IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
a13944d7994c9928da7e411023400097c1db126e22137c313cbddcc0ac54691b
2025-10-27T19:16:03.527000Z
2025-10-27T19:16:03.527000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
3d69cb45b24f59d1ab307b7f7611de08f73456494a08e29cb3d816f80c40ec4c
CVE-2025-36170
IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 13 Independent Fix 02 is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
a13944d7994c9928da7e411023400097c1db126e22137c313cbddcc0ac54691b
2025-10-27T19:16:03.673000Z
2025-10-27T19:16:03.673000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
c452539f9ef2cfd3815e7a415ac26dada7ca75898a2cb3cb813fce8c603012f7
CVE-2025-46602
Dell SupportAssist OS Recovery, versions prior to 5.5.15.0, contain an Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure.
7ea5a872d6636d5254ce2b9e5cc8ce46c2b1df41d0dc7af0c8147730453a5373
2025-10-27T19:16:03.837000Z
2025-10-27T19:16:03.837000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
97b6cf10b0e9ad589746e9204246c0d91a92f5027edb8b2f7d7363c6e4207290
CVE-2025-53533
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions 6.2.1 and earlier are vulnerable to reflected cross-site scripting (XSS) via a malformed URL path. The 404 error page includes the requested path in the class attribute of the body tag without proper sanitization or escaping. An attacker can craft a URL containing an onload attribute that will execute arbitrary JavaScript code in the browser when a victim visits the malicious link. If an attacker sends a crafted pi-hole link to a victim and the victim visits it, attacker-controlled JavaScript code is executed in the browser of the victim. This has been patched in version 6.3.
cb7d6b0398c8bb3de6e69825850084953de56c0a601aa35f4fc28a3562113644
2025-10-27T19:16:04.003000Z
2025-10-27T19:16:04.003000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5cf6e622bb2848fc128f610d1a712b19a6b8705999dc7055d2c81fcd238e01dd
CVE-2025-61099
FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the opaque_info_detail function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LS Update packet.
af74710a3bed37658375adfff412ca3b53d0ed5f4c4933b692721231111e2340
2025-10-27T19:16:04.880000Z
2025-10-28T18:15:39.540000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
573f985528dacda40db8b85ce980c8d320664029349a1da9f710f10efc693e35
CVE-2025-61100
FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the ospf_opaque_lsa_dump function at ospf_opaque.c. This vulnerability allows attackers to cause a Denial of Service (DoS) under specific malformed LSA conditions.
c4daf52bf4205e8f22453d24c869b48a52c23f71f08947307f722e862f22f2f2
2025-10-27T19:16:05.060000Z
2025-10-28T18:15:39.717000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
f3c41c98a572cd8e7552da2da4ca0894e0898875c30cdeb412c1043b9baa390d
CVE-2025-62253
Open redirect vulnerability in page administration in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_layout_admin_web_portlet_GroupPagesPortlet_redirect parameter.
546b7154086bab9efbb3ec6fb5c5480979f3eaa30dd002ae177fd1dcd3e8844f
2025-10-27T19:16:05.350000Z
2025-10-27T19:16:05.350000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
4f2414a271ae55742c6c342d0ea98ddd742af52acc0d5d580a0682790989842a
CVE-2025-12310
A security vulnerability has been detected in VirtFusion up to 6.0.2. This vulnerability affects unknown code of the file /account/_settings of the component Email Change Handler. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
197deb407c8a0191cff6dbc6e4049a232f86aa0ec3b89a1bf4ced9820cc0f909
2025-10-27T20:15:51.943000Z
2025-10-27T20:15:51.943000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
f98b5386eeaeaca4ef02b23f187756caaaf3137025d0e23181e9ecf51774c7ac
CVE-2025-12311
A vulnerability was detected in PHPGurukul Curfew e-Pass Management System 1.0. This issue affects some unknown processing of the file edit-category-detail.php. The manipulation of the argument catname results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
9733fe3f721081216e85a75dff35d787cf75b329a5720dfcc3930a1ea2683c8c
2025-10-27T20:15:52.210000Z
2025-10-27T20:15:52.210000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
de8991aca8733afdb55eea3695a29e40e071abfef2dae4dbacda9a62afc90182
CVE-2025-12312
A flaw has been found in PHPGurukul Curfew e-Pass Management System 1.0. Impacted is an unknown function of the file view-pass-detail.php. This manipulation of the argument Fullname/Category causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used.
c552e2b0af5b6e2be6f5843d94e85a5919ba4c2778506943e75740e25380ca62
2025-10-27T20:15:52.387000Z
2025-10-27T20:15:52.387000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b48ede4a0e617fdae021f6a29815a12335c82afe4de1f40927036183f041a99b
CVE-2025-12313
A vulnerability has been found in D-Link DI-7001 MINI 19.09.19A1/24.04.18B1. The affected element is an unknown function of the file /msp_info.htm. Such manipulation of the argument cmd leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
a71a08c6775714d2a924a96804462a21ad9747ba0636ff069f4d054894cf60fe
2025-10-27T20:15:52.553000Z
2025-10-27T20:15:52.553000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
61b96805ccd9a0980bf0ed7984e39eed9547fdf366e7759c4b81c3117f5a58d7
CVE-2025-12314
A vulnerability was found in code-projects Food Ordering System 1.0. The impacted element is an unknown function of the file /admin/deleteitem.php. Performing manipulation of the argument itemID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
83499c67d49f813e4ca4f9f8ed9b4beca964386dacaeb84e58b273543cf9e399
2025-10-27T20:15:52.723000Z
2025-10-27T20:15:52.723000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
86a4d731c758db1c87b6d81e3a9cba9925f035c41c093336c084c1bcf0055855
CVE-2025-12315
A vulnerability was determined in code-projects Food Ordering System 1.0. This affects an unknown function of the file /admin/menu.php. Executing manipulation of the argument itemPrice can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
c654533fc72bef2d4ae6f7613e8d2125fdb86bbedb2a691ffdce346b3f34d2ca
2025-10-27T20:15:52.897000Z
2025-10-27T20:15:52.897000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
0a2ecc5b494e91dfefc038fac9235d598eef77ee18f95f5051c9586daff0650b
CVE-2025-58356
Constellation is the first Confidential Kubernetes. The Constellation CVM image uses LUKS2-encrypted volumes for persistent storage. When opening an encrypted storage device, the CVM uses the libcryptsetup function crypt_activate_by_passhrase. If the VM is successful in opening the partition with the disk encryption key, it treats the volume as confidential. However, due to the unsafe handling of null keyslot algorithms in the cryptsetup 2.8.1, it is possible that the opened volume is not encrypted at all. Cryptsetup prior to version 2.8.1 does not report an error when processing LUKS2-formatted disks that use the cipher_null-ecb algorithm in the keyslot encryption field. This vulnerability is fixed in 2.24.0.
8cabf80e022d2f2f6377c4fff4ed7c0e8eabe8e50e53b48b783053d19fdb1172
2025-10-27T20:15:53.480000Z
2025-10-27T20:15:53.480000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
108f67bbd7440b9acd12b5dd41d99426b986a0d2792210ab660b543ab46291d1
CVE-2025-59151
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface before 6.3 is vulnerable to Carriage Return Line Feed (CRLF) injection. When a request is made to a file ending with the .lp extension, the application performs a redirect without properly sanitizing the input. An attacker can inject carriage return and line feed characters (%0d%0a) to manipulate both the headers and the content of the HTTP response. This enables the injection of arbitrary HTTP response headers, potentially leading to session fixation, cache poisoning, and the weakening or bypassing of browser-based security mechanisms such as Content Security Policy or X-XSS-Protection. This vulnerability is fixed in 6.3.
c16f39a1d7d31387ab76c02f4beebed9f38ec77ddb9ee7ec056b24e72bd88b48
2025-10-27T20:15:53.630000Z
2025-10-27T20:15:53.630000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
9c54516a613dde69768f6cf38650498fc9e0ea7f6ae4a148e7b7ec5599c0745c
CVE-2025-61101
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_rmt_itf_addr function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
bc227312c30c86385d36291d66a34896df9d7f3640b23e6207a5da258fb7c13d
2025-10-27T20:15:54.050000Z
2025-10-28T18:15:39.910000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
cb39f90a974a417605e804da8c0a8ac82fd35defd378f896905012287680e1da
CVE-2025-61102
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
61810ba094bf503e238838dff5d2df2a312d10903a9b751ee88f805bbb1c5f3d
2025-10-27T20:15:54.150000Z
2025-10-28T17:15:38.040000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
4fbfd549ef54d7ce291c20069c6c13b27702ce9ccffee7ef9ea65b1e0bd6073c
CVE-2025-61105
FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet.
93a31f16c74c1b7ec4308abe94d915f8a9db8ff62b6f42b4dda982ef2775b100
2025-10-27T20:15:54.240000Z
2025-10-28T18:15:40.483000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
644dbc57f3a497909913d93647d7d735837d4232b46180985524bfc6cb6859a2
CVE-2025-62263
Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.3.7 through 7.4.3.103, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 service pack 3 through update 36 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an Account Role’s “Title” text field to (1) view account role page, or (2) select account role page. Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.3.7 through 7.4.3.103, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 service pack 3 through update 36 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an Organization’s “Name” text field to (1) view account page, (2) view account organization page, or (3) select account organization page.
50db7ade263efef8371d302b2711dd46423625d8d134bdeb2b07f210a2d4feaa
2025-10-27T20:15:54.603000Z
2025-10-27T20:15:54.603000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
89626dc94e22aefb5277cdee2319034698a10858f50f8086174ad3280d15c986
CVE-2025-62516
Landlord Onboarding & Rental Signup introduces the landlord onboarding workflow and rental signup system for VivaTurbo Rentals & Property Services. In 2.0.0 and earlier, a vulnerability was identified in the TurboTenant property listing activation workflow that could allow unauthorized access to certain Stripe payment session data. This could potentially expose sensitive business metadata, including landlord dashboard sync details and tenant information. The issue affects the API endpoints handling the property listing activation, subscription metadata, and payment link generation.
436e4930641257a5db8d113a887f0baa90181dd91f897a475bf5c8e582f4e2e7
2025-10-27T20:15:54.740000Z
2025-10-27T20:15:54.740000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
e740706a2a0bec069346a50c286d03641b619435e9aed2fc657debcdc79bcc51
CVE-2025-62594
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. ImageMagick versions prior to 7.1.2-8 are vulnerable to denial-of-service due to unsigned integer underflow and division-by-zero in the CLAHEImage function. When tile width or height is zero, unsigned underflow occurs in pointer arithmetic, leading to out-of-bounds memory access, and division-by-zero causes immediate crashes. This issue has been patched in version 7.1.2-8.
5449319d7c54c9772ee72fdc1244ef0e198e6187b75b792d2b5b4895c0c95f53
2025-10-27T20:15:54.893000Z
2025-10-27T20:15:54.893000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5c2a6bbd253fb3cfca7ea3cb48c2d67da8d1a0d8c0d25184be62b7707ac0be26
CVE-2025-12316
A vulnerability was identified in code-projects Courier Management System 1.0. This impacts an unknown function of the file /courier/edit-courier.php. The manipulation of the argument OfficeName leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
72c673be237812d665d79d34c39828e0940728d798ea1704d888506d3fd8943c
2025-10-27T21:15:35.570000Z
2025-10-28T15:16:09.017000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fc3c368d15473ebcdfc8e5cd9ecdc2dfe5e4a8968309f53b25122f020143554c
CVE-2025-12322
A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function fromNatStaticSetting of the file /goform/NatStaticSetting. Executing manipulation of the argument page can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.
34a26b1d91eda74798075e6d3299015339f2632875190de52fd392e67d5c8af9
2025-10-27T21:15:36.160000Z
2025-10-28T15:16:09.443000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
ab47756314dd7031ff00987660f6ebcf13f322f19e777b3f1b288fe1017023be
CVE-2025-12325
A vulnerability has been found in SourceCodester Best Salon Management System 1.0. This affects an unknown part of the file /panel/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
d05e9cb182dbb4b7a8eca2349d32ee08ba5192b58520ba8c9e569b3f43495680
2025-10-27T21:15:36.343000Z
2025-10-28T15:16:09.573000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
785cc918f74f2b264d1ba5294e249ef1cdb0f312b6a59d33d1b97c3d4cd4400a
CVE-2025-12326
A vulnerability was found in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. This vulnerability affects unknown code of the file /process.php of the component POST Request Handler. The manipulation of the argument un results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
4df562b302798a8f964df4a59b4dc9a36ac11d9b46fb9dc0b492dfc9a464100a
2025-10-27T21:15:36.520000Z
2025-10-27T21:15:36.520000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5e17cd08aba9b318ea22ff02efd893684a6f5b98f61ec31837627c30094b246e
CVE-2025-12327
A vulnerability was determined in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. This issue affects some unknown processing of the file /description.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
58c3508ad2d2f07002da41715740c144886878b1d01ea1b21720658078a32e44
2025-10-27T21:15:36.713000Z
2025-10-27T21:15:36.713000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
b348169d66273127f2d1dbcda0f39ecc27ea7eac53d9baff123d739e28ea105c
CVE-2025-62262
Information exposure through log file vulnerability in LDAP import feature in Liferay Portal 7.4.0 through 7.4.3.97, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows local users to view user email address in the log files.
5eed1e57e0d124f6a2b968ef58803a580cc52b50a5ea69e03cc7ce1fa386e082
2025-10-27T21:15:37.577000Z
2025-10-27T21:15:37.577000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
71115ce3bdefd6a4fd4115328504575941a01af4077a29a90ae8b91235b393b8
CVE-2025-62523
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 includes a Cross-Origin Resource Sharing (CORS) misconfiguration in its middleware: it reflects the Origin request header back in the Access-Control-Allow-Origin response header without proper validation or a whitelist, while Access-Control-Allow-Credentials is set to true. This behavior could allow a malicious website on a different origin to send requests (including credentials) to the PILOS API. This may enable exfiltration or actions using the victim’s credentials if the server accepts those cross-origin requests as authenticated. Laravel’s session handling applies additional origin checks such that cross-origin requests are not authenticated by default. Because of these session-origin protections, and in the absence of any other unknown vulnerabilities that would bypass Laravel’s origin/session checks, this reflected-Origin CORS misconfiguration is not believed to be exploitable in typical PILOS deployments. This vulnerability has been patched in PILOS in v4.8.0
d266e443e1b16d033f411126e1b1826ab4f7650625f8463a6c3b2b32c69bab50
2025-10-27T21:15:37.770000Z
2025-10-27T21:15:37.770000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
fbcac4155365c49fd01f8b93239b05325216146d825cf9abc2acceb2438921c4
CVE-2025-62524
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 exposes the PHP version via the X-Powered-By header, enabling attackers to fingerprint the server and assess potential exploits. This information disclosure vulnerability originates from PHP’s base image. Additionally, the PHP version can also be inferred through the PILOS version displayed in the footer and by examining the source code available on GitHub. This information disclosure vulnerability has been patched in PILOS in v4.8.0.
ec63adf195d9fab05605d6810bf332f50a5f79683653ac68750e2127809594bf
2025-10-27T21:15:37.930000Z
2025-10-27T21:15:37.930000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5b03d40d7505e0083c88a101ad175afdee0cf20b8604337b38b8965309b28485
CVE-2025-62725
Docker Compose trusts the path information embedded in remote OCI compose artifacts. When a layer includes the annotations com.docker.compose.extends or com.docker.compose.envfile, Compose joins the attacker‑supplied value from com.docker.compose.file/com.docker.compose.envfile with its local cache directory and writes the file there. This affects any platform or workflow that resolves remote OCI compose artifacts, Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud dev environments is affected. An attacker can escape the cache directory and overwrite arbitrary files on the machine running docker compose, even if the user only runs read‑only commands such as docker compose config or docker compose ps. This issue is fixed in v2.40.2.
9a17046920db57f89948a3c0eef0e3e5df96b3a0d80622e8736ab2d019361c93
2025-10-27T21:15:38.140000Z
2025-10-27T21:15:38.140000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
490c44cb04e00af50fc8f05417159fcd5f47e1c8bf6e57b3f6722369720157a1
CVE-2025-62782
InventoryGui is a library for creating chest GUIs for Bukkit/Spigot plugins. Versions 1.6.3-SNAPSHOT and earlier contain a vulnerability where GUIs using GuiStorageElement can allow item duplication when the experimental Bundle item feature is enabled on the server. The vulnerability is resolved in version 1.6.4-SNAPSHOT.
7c21521dde49bd930cc247ef7113444c798c672ddfe53f7ffd8a5a5e4aab3113
2025-10-27T21:15:38.287000Z
2025-10-27T21:15:38.287000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
ece4b901a6d6ebbca9eb574a72636d05e2599193f5de0eb1a19a8b3e1725b77f
CVE-2025-62783
InventoryGui is a library for creating chest GUIs for Bukkit/Spigot plugins. Versions 1.6.1-SNAPSHOT and earlier contain a vulnerability where any plugin using the `GuiStorageElement can allow item duplication when the experimental Bundle item feature is enabled on the server. The vulnerability is resolved in version 1.6.2-SNAPSHOT.
455cef3f4c59aab0ee2746986c0432f8df7efda6edcbff0d690c7c04f181c790
2025-10-27T21:15:38.450000Z
2025-10-27T21:15:38.450000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
48a5fe14e3e5984def44efee2a4ead43df56c383e86a16452e993c6c101e111c
CVE-2025-62784
InventoryGui is a library for creating chest GUIs for Bukkit/Spigot plugins. Versions before 1.6.5 contain a vulnerability where any plugin using a GUI with the GuiStorageElement and allows taking out items out of that element can allow item duplication when the experimental Bundle item feature is enabled on the server. The vulnerability is resolved in version 1.6.5.
5262d5dbf55e5e60306517eaa6f1bef1c8b13f01535f78e113e81cea74e2bc7c
2025-10-27T21:15:38.593000Z
2025-10-27T21:15:38.593000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
44283fc3a72149db1fcc5b4b72f3b58b7750d3c686fcab724ea5bbe37c1c4ffc
CVE-2025-12328
A vulnerability was identified in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. Impacted is an unknown function of the file /contestproblem.php. Such manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The vendor was contacted early about this disclosure but did not respond in any way.
66af4a6b739b1355c4028d86385290c9ee86064daec5ce69a1d48f3499fd5aa8
2025-10-27T22:15:39.947000Z
2025-10-27T22:15:39.947000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
ea45d28a3f51184fc1893389904f81154c20be23dbfe7436dfe6bfb20145ec26
CVE-2025-12329
A security flaw has been discovered in shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5. The affected element is an unknown function of the file /details.php. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
1fa03e6a6a12f1a4e2e0e1773ee83e14e7de1729fce8fc69e0fc3ac231c1c5a2
2025-10-27T22:15:40.990000Z
2025-10-27T22:15:40.990000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
be3a88924fb1fee4f76aa8aaa3188b6348368252a5c6c293c6d31320d62e8109
CVE-2025-12330
A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
694ee2b9d5c0c65b4edabc8381c20dae50debeb252884f96a4ca3e326e67a82d
2025-10-27T22:15:41.167000Z
2025-10-27T22:15:41.167000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
3312122012736d62700571d756c7cd42c7900a6e72a08e94ca73a49b42e96a2e
CVE-2025-12331
A weakness has been identified in Willow CMS up to 1.4.0. Impacted is an unknown function of the file /admin/images/add. This manipulation causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
a155251e0dc02bf352b04b82a301d385d83cf66535202a87936e2dc86e0726ac
2025-10-27T22:15:41.347000Z
2025-10-27T22:15:41.347000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
58a4df1bf4e673f0bba329d2c42d033cc4349d92f59227c88a0874ee2d647980
CVE-2025-62260
Liferay Portal 7.4.0 through 7.4.3.99, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number of objects returned from Headless API requests, which allows remote attackers to perform denial-of-service (DoS) attacks on the application by executing a request that returns a large number of objects.
126b98dcc28563d51ba65f2c34d65ceafdcebf793e047a25edf79687c4a9be3f
2025-10-27T22:15:41.590000Z
2025-10-27T22:15:41.590000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
40261e60b15cbcd45eb28b30d45e4c265af4e20e6a2443f3c11d6135ee1ca905
CVE-2025-62261
Liferay Portal 7.4.0 through 7.4.3.99, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 34, and older unsupported versions stores password reset tokens in plain text, which allows attackers with access to the database to obtain the token, reset a user’s password and take over the user’s account.
bac907180a215710e037c638f1043feebf17cac8943cb489c928039366159626
2025-10-27T22:15:41.733000Z
2025-10-27T22:15:41.733000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
5c0cdfbadfc7d4972d02a03997f083a0d1fcf72e36d489f2c7c4989ecdf65bc8
CVE-2025-62778
Frappe Learning is a learning management system. A security issue was identified in Frappe Learning 2.39.1 and earlier, where students were able to access the Quiz Form if they had the URL.
40e4eb314e4ed630b62610fb1e3e10d8b98961ecd1082e0462472124ec96a5ee
2025-10-27T22:15:41.873000Z
2025-10-27T22:15:41.873000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
7ca3c9f79a561d586a7f074dfcdbd6d15b51b5a80b1bebd14312c795247be52d
CVE-2025-62779
Frappe Learning is a learning system that helps users structure their content. In Frappe Learning 2.39.1 and earlier, users were able to add HTML through input fields in the Job Form.
d5b7ebb777f97c4baa998b0f21dc639dd1b0ac1f4d3a5d8c45bd07cb6ace169b
2025-10-27T22:15:42.017000Z
2025-10-27T22:15:42.017000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
94f942cf86b30ffd93406f5e1c4d80575d08c1bd21aac08c31cdc06cbf2b693f
CVE-2025-62781
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. Prior to 4.8.0, users with a local account can change their password while logged in. When doing so, all other active sessions are terminated, except for the currently active one. However, the current session’s token remains valid and is not refreshed. If an attacker has previously obtained this session token through another vulnerability, changing the password will not invalidate their access. As a result, the attacker can continue to act as the user even after the password has been changed. This vulnerability is fixed in 4.8.0.
2b9afb04b229618c76af49c440c031845306e8d46c01d47eb12a86d42357782d
2025-10-27T22:15:42.153000Z
2025-10-27T22:15:42.153000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
84b06375ac2c3c685895589bb50bcfeba2dd8f8378d04c7dc819b53c3e416df8
CVE-2025-62793
eLabFTW is an open source electronic lab notebook for research labs. The application served uploaded SVG files inline. Because SVG supports active content, an attacker could upload a crafted SVG that executes script when viewed, resulting in stored XSS under the application origin. A victim who opens the SVG URL or any page embedding it could have their session hijacked, data exfiltrated, or actions performed on their behalf. This vulnerability is fixed n 5.3.0.
5ef286f5da2fd2dc6656c24e7fc30281240e6ccdc9dcad1bb831dda397d5bd6d
2025-10-27T22:15:42.307000Z
2025-10-27T22:15:42.307000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
947aa15225b8f89312c62eb8b0b437da90b5116756bb467857879f53dafd88f3
CVE-2025-12333
A vulnerability has been found in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/supplier_add.php. The manipulation of the argument supp_name/supp_address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
25eb51c956210715952f793152f1915b5584b27401561f7ca84d4143919530ea
2025-10-27T23:15:37.360000Z
2025-10-27T23:15:37.360000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
a83f0a076ecdfb7d4f145647854b9af04062591c4aff43e802dba8509b9b5805
CVE-2025-12334
A vulnerability was found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument prod_name/prod_desc/prod_cost results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used.
c718fd2ede69aa457cf39659b9227764663354d56c2c87a9aef7993741ee0404
2025-10-27T23:15:38.330000Z
2025-10-27T23:15:38.330000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
2911682a3cc99a7abbb96c4b061d71bd0f6d7e69ec84fb34043fe6c34e317a8a
CVE-2025-62258
CSRF vulnerability in Headless API in Liferay Portal 7.4.0 through 7.4.3.107, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions allows remote attackers to execute any Headless API via the `endpoint` parameter.
ebed423eecbaf3029abbd5b6c2ce6773cf5a7f86c5667d2f51045d26030bcfea
2025-10-27T23:15:38.520000Z
2025-10-27T23:15:38.520000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
88f74fb8a69403687fdb327ad6ca0ed51934d555f0780d9cb395f2c66fb137dc
CVE-2025-62259
Liferay Portal 7.4.0 through 7.4.3.109, and older unsupported versions, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit access to APIs before a user has verified their email address, which allows remote users to access and edit content via the API.
c5b9ceadf26cb14e941a80042528e8d52b81353412dc9ad8af1a1b906e594d5c
2025-10-27T23:15:38.670000Z
2025-10-27T23:15:38.670000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
e68667851590b9b9b561923ce39e8fd3b9d200e72505bb042a1e566a0ce1d0cf
CVE-2025-12332
A flaw has been found in SourceCodester Student Grades Management System 1.0. This affects the function delete_user of the file /admin.php. Executing manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.
2646e7f295bd08afdb3f9dd6044ffa94908f836f5c5ba617a5189b67a51a57b2
2025-10-28T00:15:37.573000Z
2025-10-28T00:15:37.573000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
55a997f395fc2abb912eba20aa67ad66582ce497402a7957bdd872758f1017c3
CVE-2025-12335
A vulnerability was determined in code-projects E-Commerce Website 1.0. Affected by this vulnerability is an unknown functionality of the file /pages/supplier_update.php. This manipulation of the argument supp_name/supp_address causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
204779880e681efbcac3b89f04832d70e59222c1fcb2f17b5322eb3c6fdf60e9
2025-10-28T00:15:37.757000Z
2025-10-28T00:15:37.757000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
8deb88218ba826248506b8df013b6f6cac98218bab76971fc2411dff200f366e