Search

Search Results (315928 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-55679 1 Microsoft 15 Windows, Windows 10, Windows 10 1809 and 12 more 2025-10-27 5.1 Medium
Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally.
CVE-2025-55326 1 Microsoft 14 Windows, Windows 10, Windows 10 1809 and 11 more 2025-10-27 7.5 High
Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network.
CVE-2025-55331 1 Microsoft 13 Windows, Windows 10, Windows 10 21h2 and 10 more 2025-10-27 7 High
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.
CVE-2025-59284 1 Microsoft 8 Windows, Windows 11, Windows 11 22h2 and 5 more 2025-10-27 3.3 Low
Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.
CVE-2025-55328 1 Microsoft 21 Hyper-v, Server, Windows and 18 more 2025-10-27 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-50175 1 Microsoft 16 Windows, Windows 10, Windows 10 1809 and 13 more 2025-10-27 7.8 High
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-59288 2 Github, Microsoft 3 Github, Azure Playwright, Playwright 2025-10-27 5.3 Medium
Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network.
CVE-2025-55334 1 Microsoft 6 Windows, Windows 11, Windows 11 22h2 and 3 more 2025-10-27 6.2 Medium
Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-55248 4 Apple, Linux, Microsoft and 1 more 22 Macos, Linux Kernel, .net and 19 more 2025-10-27 4.8 Medium
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.
CVE-2025-50152 1 Microsoft 18 Windows, Windows 10, Windows 10 1507 and 15 more 2025-10-27 7.8 High
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2025-57240 1 17gz 1 International Student Service System 2025-10-27 6.1 Medium
Cross site scripting (XSS) vulnerability in 17gz International Student service system 1.0 allows attackers to execute arbitrary code via the registration step.
CVE-2025-12134 2 Bdthemes, Wordpress 2 Zoloblocks, Wordpress 2025-10-27 5.3 Medium
The ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_popup_status() function in all versions up to, and including, 2.3.11. This makes it possible for unauthenticated attackers to enable/disable popups.
CVE-2025-58070 1 Pleasanter 1 Pleasanter 2025-10-27 N/A
Pleasanter contains a stored cross-site scripting vulnerability in Preview for Attachments, which allows an attacker to execute an arbitrary script in a logged-in user's web browser.
CVE-2025-62868 1 Wordpress 1 Wordpress 2025-10-27 8.1 High
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Edge-Themes Edge CPT allows PHP Local File Inclusion.This issue affects Edge CPT: from n/a through 1.4.
CVE-2025-11992 1 Wordpress 1 Wordpress 2025-10-27 6.1 Medium
The Multi Item Responsive Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'mioptions.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2025-11257 2 Limelightmarketing, Wordpress 2 Llm Hubspot Blog Import, Wordpress 2025-10-27 4.3 Medium
The LLM Hubspot Blog Import plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_save_blogs' AJAX endpoint in all versions up to, and including, 1.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger an import of all Hubspot data.
CVE-2025-6440 2 Jma Plugins, Wordpress 2 Woocommerce Designer Pro, Wordpress 2025-10-27 9.8 Critical
The WooCommerce Designer Pro plugin for WordPress, used by the Pricom - Printing Company & Design Services WordPress theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'wcdp_save_canvas_design_ajax' function in all versions up to, and including, 1.9.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2025-11253 1 Aksis Technology 1 Netty Erp 2025-10-27 9.8 Critical
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aksis Technology Inc. Netty ERP allows SQL Injection.This issue affects Netty ERP: before V.1.1000.
CVE-2025-12017 1 Wordpress 1 Wordpress 2025-10-27 6.1 Medium
The VNPAY Payment gateway plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVE-2025-10723 2 Pixelyoursite, Wordpress 2 Pixelyoursite, Wordpress 2025-10-27 2.7 Low
The PixelYourSite WordPress plugin before 11.1.2 does not validate some URL parameters before using them to generate paths passed to function/s, allowing any admins to perform LFI attacks