Search

Search Results (314833 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-9553 1 Drupal 2 Api Key Manager, Drupal 2025-10-21 5.3 Medium
Vulnerability in Drupal API Key manager.This issue affects API Key manager: *.*.
CVE-2025-11618 1 Amazon 1 Freertos-plus-tcp 2025-10-21 4.3 Medium
A missing validation check in FreeRTOS-Plus-TCP's UDP/IPv6 packet processing code can lead to an invalid pointer dereference when receiving a UDP/IPv6 packet with an incorrect IP version field in the packet header. This issue only affects applications using IPv6. We recommend upgrading to the latest version and ensure any forked or derivative code is patched to incorporate the new fixes.
CVE-2025-11380 2 Everestthemes, Wordpress 2 Everest Backup, Wordpress 2025-10-21 5.9 Medium
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'everest_process_status' AJAX action in all versions up to, and including, 2.3.5. This makes it possible for unauthenticated attackers to retrieve back-up file locations that can be subsequently accessed and downloaded. This does require a back-up to be running in order for an attacker to retrieve the back-up location.
CVE-2025-11590 1 Codeastro 1 Gym Management System 2025-10-21 6.3 Medium
A weakness has been identified in CodeAstro Gym Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/equipment-entry.php. Executing manipulation of the argument ename can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-31718 1 Unisoc 11 S8000, T606, T612 and 8 more 2025-10-21 7.5 High
In modem, there is a possible system crash due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed.
CVE-2025-62585 2 Naver, Navercorp 2 Whale Browser, Whale 2025-10-21 7.5 High
Whale browser before 4.33.325.17 allows an attacker to bypass the Content Security Policy via a specific scheme in a dual-tab environment.
CVE-2025-58278 1 Huawei 2 Appgallery, Harmonyos 2025-10-21 6.2 Medium
Identity authentication bypass vulnerability in the Gallery app. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-58277 1 Huawei 2 Camera App, Harmonyos 2025-10-21 4 Medium
Permission verification bypass vulnerability in the Camera app. Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-11593 1 Codeastro 1 Gym Management System 2025-10-21 6.3 Medium
A flaw has been found in CodeAstro Gym Management System 1.0. This vulnerability affects unknown code of the file /admin/actions/delete-equipment.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.
CVE-2025-11592 1 Codeastro 1 Gym Management System 2025-10-21 6.3 Medium
A vulnerability was detected in CodeAstro Gym Management System 1.0. This affects an unknown part of the file /admin/edit-equipmentform.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit is now public and may be used.
CVE-2025-10376 2 Ercbs, Wordpress 2 Course Redirects For Learndash Plugin, Wordpress 2025-10-21 4.3 Medium
The Course Redirects for Learndash plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.4. This is due to missing nonce validation when processing form submissions on the settings page. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2025-9196 2 Sergiotrinity, Wordpress 2 Trinity Audio, Wordpress 2025-10-21 5.3 Medium
The Trinity Audio – Text to Speech AI audio player to convert content into audio plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.21.0 via the ~/admin/inc/phpinfo.php file that gets created on install. This makes it possible for unauthenticated attackers to extract sensitive data including configuration data.
CVE-2025-9626 2 Softwud, Wordpress 2 Page Blocks, Wordpress 2025-10-21 4.3 Medium
The Page Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.0. This is due to missing or incorrect nonce validation on the admin_process_widget_page_change function. This makes it possible for unauthenticated attackers to modify widget page block configurations via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2025-8606 2 Westerndeal, Wordpress 2 Gsheetconnector For Gravity Forms, Wordpress 2025-10-21 2.4 Low
The GSheetConnector For Gravity Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions less than, or equal to, 1.3.23. This is due to missing or incorrect nonce validation on the activate_plugin and deactivate_plugin functions. This makes it possible for attackers to trick authenticated administrators into activating or deactivating specified plugins via a forged request, such as clicking on a malicious link or visiting a compromised page.
CVE-2025-11591 1 Codeastro 1 Gym Management System 2025-10-21 6.3 Medium
A security vulnerability has been detected in CodeAstro Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/actions/delete-member.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
CVE-2025-10185 2 Webaways, Wordpress 2 Nex-forms-ultimate-forms-plugin, Wordpress 2025-10-21 4.9 Medium
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in the action nf_load_form_entries in all versions up to, and including, 9.1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This may be exploitable by lower-level users if access is granted by a site administrator.
CVE-2025-58290 1 Huawei 1 Harmonyos 2025-10-21 3.3 Low
Denial of service (DoS) vulnerability in the office service. Successful exploitation of this vulnerability may affect availability.
CVE-2025-11167 2 Creativemindssolutions, Wordpress 2 Cm Registration, Wordpress 2025-10-21 4.7 Medium
The CM Registration – Tailored tool for seamless login and invitation-based registrations plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 2.5.6. This is due to insufficient validation on the redirect url supplied via the 'redirect_url' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CVE-2025-10129 2 Miksco, Wordpress 2 Live Webcam Widget, Wordpress 2025-10-21 6.4 Medium
The WordPress Live Webcam Widget & Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'webcam' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2025-6439 2 Jma Plugins, Wordpress 2 Woocommerce Designer Pro, Wordpress 2025-10-21 9.8 Critical
The WooCommerce Designer Pro plugin for WordPress, used by the Pricom - Printing Company & Design Services WordPress theme, is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'wcdp_save_canvas_design_ajax' function in all versions up to, and including, 1.9.26. This makes it possible for unauthenticated attackers to delete all files in an arbitrary directory on the server, which can lead to remote code execution, data loss, or site unavailability.