๐จ CVE-2025-6790
The Quiz and Survey Master (QSM) WordPress plugin before 10.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
๐@cveNotify
The Quiz and Survey Master (QSM) WordPress plugin before 10.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
๐@cveNotify
WPScan
QSM < 10.2.3 - Template Creation via CSRF
See details on QSM < 10.2.3 - Template Creation via CSRF CVE 2025-6790. View the latest Plugin Vulnerabilities on WPScan.
๐จ CVE-2025-7808
The WP Shopify WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
๐@cveNotify
The WP Shopify WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
๐@cveNotify
WPScan
WP Shopify < 1.5.4 - Reflected XSS
See details on WP Shopify < 1.5.4 - Reflected XSS CVE 2025-7808. View the latest Plugin Vulnerabilities on WPScan.
๐จ CVE-2025-8046
The Injection Guard WordPress plugin before 1.2.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
๐@cveNotify
The Injection Guard WordPress plugin before 1.2.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
๐@cveNotify
WPScan
Injection Guard < 1.2.8 - Reflected XSS via $_SERVER['REQUEST_URI']
See details on Injection Guard < 1.2.8 - Reflected XSS via $_SERVER['REQUEST_URI'] CVE 2025-8046. View the latest Plugin Vulnerabilities on WPScan.
๐จ CVE-2025-8939
A vulnerability was determined in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/WifiGuestSet. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability was determined in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/WifiGuestSet. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
lin-cve/Tenda AC20/Tenda AC20.md at main ยท lin-3-start/lin-cve
Contribute to lin-3-start/lin-cve development by creating an account on GitHub.
๐จ CVE-2025-8940
A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this vulnerability is the function strcpy of the file /goform/saveParentControlInfo. The manipulation of the argument Time leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this vulnerability is the function strcpy of the file /goform/saveParentControlInfo. The manipulation of the argument Time leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
lin-cve/Tenda AC20-2/Tenda AC20-2.md at main ยท lin-3-start/lin-cve
Contribute to lin-3-start/lin-cve development by creating an account on GitHub.
๐จ CVE-2025-8946
A vulnerability has been found in projectworlds Online Notes Sharing Platform 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument User leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability has been found in projectworlds Online Notes Sharing Platform 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument User leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
Projectworlds Online Notes Sharing Platform Project V1.0 /login.php SQL injection ยท Issue #1 ยท guoma-book/CVE
NAME OF AFFECTED PRODUCT(S) ยท Online Notes Sharing Platform Vendor Homepage ยท https://projectworlds.in/free-projects/php-projects/online-notes-sharing-platform-php-mysql-project/ AFFECTED AND/OR FI...
๐ฅ1
๐จ CVE-2025-8947
A vulnerability was found in projectworlds Visitor Management System 1.0. This issue affects some unknown processing of the file /query_data.php. The manipulation of the argument dateF/dateP leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability was found in projectworlds Visitor Management System 1.0. This issue affects some unknown processing of the file /query_data.php. The manipulation of the argument dateF/dateP leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
Projectworlds Visitor Management System Project V1.0 /query_data.php SQL injection ยท Issue #3 ยท guoma-book/CVE
NAME OF AFFECTED PRODUCT(S) ยท Visitor Management System Vendor Homepage ยท https://projectworlds.in/visitor-management-system-in-php-and-mysql/ AFFECTED AND/OR FIXED VERSION(S) submitter ยท guoma Vul...
๐จ CVE-2025-8948
A vulnerability was determined in projectworlds Visitor Management System 1.0. Affected is an unknown function of the file /front.php. The manipulation of the argument rid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability was determined in projectworlds Visitor Management System 1.0. Affected is an unknown function of the file /front.php. The manipulation of the argument rid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
Projectworlds Visitor Management System Project V1.0 /front.php SQL injection ยท Issue #5 ยท guoma-book/CVE
NAME OF AFFECTED PRODUCT(S) ยง Visitor Management System Vendor Homepage ยง https://projectworlds.in/visitor-management-system-in-php-and-mysql/ AFFECTED AND/OR FIXED VERSION(S) submitter ยง guoma Vul...
๐จ CVE-2025-8949
A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
๐@cveNotify
A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
๐@cveNotify
GitHub
D-Link DIR-825 Rev.B 2.10 devices ping_response.cgi stack-based buffer overflow ยท Issue #16 ยท i-Corner/cve
D-Link DIR-825 Rev.B 2.10 devices ping_response.cgi stack-based buffer overflow CVE-2025-8949 Vendor:D-Link Product:DIR-825 Version:Rev.B 2.10 Type:Stack Overflow Author:iC0rner Institution:i_c0rne...
๐จ CVE-2025-27388
Loading arbitrary external URLs through WebView components introduces malicious JS code that can steal arbitrary user tokens.
๐@cveNotify
Loading arbitrary external URLs through WebView components introduces malicious JS code that can steal arbitrary user tokens.
๐@cveNotify
๐จ CVE-2025-8950
A vulnerability was identified in Campcodes Online Recruitment Management System 1.0. This issue affects some unknown processing of the file /Recruitment/index.php?page=view_vacancy. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability was identified in Campcodes Online Recruitment Management System 1.0. This issue affects some unknown processing of the file /Recruitment/index.php?page=view_vacancy. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
campcodes Online Recruitment Management System V1.0 /Recruitment/index.php?page=view_vacancy SQL injection ยท Issue #1 ยท Noc14/cve
campcodes Online Recruitment Management System V1.0 /Recruitment/index.php?page=view_vacancy SQL injection NAME OF AFFECTED PRODUCT(S) Online Recruitment Management System Vendor Homepage https://w...
๐จ CVE-2025-8951
A vulnerability has been found in PHPGurukul Teachers Record Management System 2.1. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability has been found in PHPGurukul Teachers Record Management System 2.1. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
phpgurukul Teachers Record Management System Project V2.1 /admin/search.php SQL injection ยท Issue #1 ยท zzx-yyds/mycve
phpgurukul Teachers Record Management System Project V2.1 /admin/search.php SQL injection NAME OF AFFECTED PRODUCT(S) Teachers Record Management System Vendor Homepage https://phpgurukul.com/teache...
๐ฅ1
๐จ CVE-2025-6021
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
๐@cveNotify
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
๐@cveNotify
๐จ CVE-2025-48860
A vulnerability in the web application of the ctrlX OS setup mechanism facilitated an authenticated (low privileged) attacker to gain remote access to backup archives created by a user with elevated permissions. Depending on the content of the backup archive, the attacker may have been able to access sensitive data.
๐@cveNotify
A vulnerability in the web application of the ctrlX OS setup mechanism facilitated an authenticated (low privileged) attacker to gain remote access to backup archives created by a user with elevated permissions. Depending on the content of the backup archive, the attacker may have been able to access sensitive data.
๐@cveNotify
Bosch PSIRT
Vulnerabilities in ctrlX OS - Setup
BOSCH-SA-129652: Vulnerabilities in ctrlX OS - Setup
๐จ CVE-2025-48861
A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
๐@cveNotify
A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.
๐@cveNotify
Bosch PSIRT
Vulnerabilities in ctrlX OS - Setup
BOSCH-SA-129652: Vulnerabilities in ctrlX OS - Setup
๐จ CVE-2025-48862
Ambiguous wording in the web interface of the ctrlX OS setup mechanism could lead the user to believe that the backup file is encrypted when a password is set. However, only the private key - if available in the backup - is encrypted, while the backup file itself remains unencrypted.
๐@cveNotify
Ambiguous wording in the web interface of the ctrlX OS setup mechanism could lead the user to believe that the backup file is encrypted when a password is set. However, only the private key - if available in the backup - is encrypted, while the backup file itself remains unencrypted.
๐@cveNotify
Bosch PSIRT
Vulnerabilities in ctrlX OS - Setup
BOSCH-SA-129652: Vulnerabilities in ctrlX OS - Setup
๐ฅ1
๐จ CVE-2025-55346
User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
๐@cveNotify
User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request.
๐@cveNotify
Jfrog
Flowise JS injection remote code execution | JFSA-2025-001379925
CVE-2025-55346, CRITICAL, Flowise JS injection remote code execution
๐จ CVE-2025-7761
Lepszy BIP is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in index.php form in one of the parameters allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened.
The vendor was contacted early about this disclosure but did not respond in any way. Potentially all versions are vulnerable.
๐@cveNotify
Lepszy BIP is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in index.php form in one of the parameters allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened.
The vendor was contacted early about this disclosure but did not respond in any way. Potentially all versions are vulnerable.
๐@cveNotify
๐จ CVE-2025-8047
The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.
๐@cveNotify
The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup.
๐@cveNotify
WPScan
Multiple Plugins from itayamar - Supply Chain Compromise
See details on Multiple Plugins from itayamar - Supply Chain Compromise CVE 2025-8047. View the latest Plugin Vulnerabilities on WPScan.
๐จ CVE-2025-8943
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
๐@cveNotify
The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands.
๐@cveNotify
Jfrog
Flowise OS command remote code execution | JFSA-2025-001380578
CVE-2025-8943, CRITICAL, Flowise OS command remote code execution
๐จ CVE-2025-8955
A vulnerability has been found in PHPGurukul Hospital Management System 4.0. This vulnerability affects unknown code of the file /admin/edit-doctor.php. The manipulation of the argument docfees leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
A vulnerability has been found in PHPGurukul Hospital Management System 4.0. This vulnerability affects unknown code of the file /admin/edit-doctor.php. The manipulation of the argument docfees leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
๐@cveNotify
GitHub
phpgurukul Hospital Management System Project V4.0 /admin/edit-doctor.php?id=1 SQL injection ยท Issue #3 ยท LitBot123/mycve
phpgurukul Hospital Management System Project V4.0 /admin/edit-doctor.php SQL injection NAME OF AFFECTED PRODUCT(S) Hospital Management System Vendor Homepage https://phpgurukul.com/hospital-manage...