Latest CVE Feed
-
9.8
CRITICALCVE-2025-12735
The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted context object or use MEM... Read more
Affected Products :- Published: Nov. 05, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
5.4
MEDIUMCVE-2025-13343
A security flaw has been discovered in SourceCodester Interview Management System 1.0. Affected is an unknown function of the file /editQuestion.php. The manipulation of the argument Question results in cross site scripting. It is possible to launch the a... Read more
Affected Products : interview_management_system- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
5.4
MEDIUMCVE-2025-13349
A vulnerability has been found in SourceCodester Student Grades Management System 1.0. This issue affects some unknown processing of the file /grades.php of the component Add New Grade Page. The manipulation of the argument Remarks leads to cross site scr... Read more
Affected Products : student_grades_management_system- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
6.8
MEDIUMCVE-2025-59110
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Implemented CSRF protection mechanism can be bypassed by using CSRF token of other user. It is worth noting that the registration is open and anyone can create an account... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.9
MEDIUMCVE-2025-59111
Windu CMS is vulnerable to Broken Access Control in user editing functionality. Malicious attacker can send a GET request which allows privileged users to delete Super Admins which is not possible with GUI. The vendor was notified early about this vulner... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-59112
Windu CMS is vulnerable to Cross-Site Request Forgery in user editing functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send POST request that deletes given user. The vendor was notified ear... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
7.5
HIGHCVE-2025-59113
Windu CMS implements weak client-side brute-force protection by using parameter loginError. Information about attempt count or timeout is not stored on the server, which allows a malicious attacker to bypass this brute-force protection by resetting this p... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-59114
Windu CMS is vulnerable to Cross-Site Request Forgery in file uploading functionality. Malicious attacker can craft special website, which when visited by the victim, will automatically send malicious file to the server. The vendor was notified early abo... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
5.4
MEDIUMCVE-2025-59115
Windu CMS is vulnerable to Stored Cross-Site Scripting (XSS) in the logon page where input data has no proper validation. Malicious attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting logs page by admin. ... Read more
Affected Products : windu_cms- Published: Nov. 18, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
6.1
MEDIUMCVE-2025-65026
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, The esm.sh CDN service contains a Template Literal Injection vulnerability (CWE-94) in its CSS-to-JavaScript module conversion feature. When a CSS file is ... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
8.2
HIGHCVE-2025-65025
esm.sh is a nobuild content delivery network(CDN) for modern web development. Prior to version 136, the esm.sh CDN service is vulnerable to path traversal during NPM package tarball extraction. An attacker can craft a malicious NPM package containing spec... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Path Traversal
-
6.1
MEDIUMCVE-2025-64984
Kaspersky has fixed a security issue in Kaspersky Endpoint Security for Linux (any version with anti-virus databases prior to 18.11.2025), Kaspersky Industrial CyberSecurity for Linux Nodes (any version with anti-virus databases prior to 18.11.2025), and ... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
7.3
HIGHCVE-2025-63719
Campcodes Online Hospital Management System 1.0 is vulnerable to SQL Injection in /admin/index.php via the parameter username.... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-63371
Milos Paripovic OneCommander 3.102.0.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, specifically in the functionality responsible for extracting and handling ZIP archive contents.... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Path Traversal
-
6.8
MEDIUMCVE-2025-62346
A Cross-Site Request Forgery (CSRF) vulnerability was identified in HCL Glovius Cloud. An attacker can force a user's web browser to execute an unwanted, malicious action on a trusted site where the user is authenticated, specifically on one endpoint.... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Request Forgery
-
0.0
NACVE-2025-60799
phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'qu... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-60798
phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST['query'] directly to the browseQuery function without proper sanitization. An authenticated attack... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-60797
phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->c... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Injection
-
0.0
NACVE-2025-60796
phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations i... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Cross-Site Scripting
-
0.0
NACVE-2025-60794
Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugg... Read more
Affected Products :- Published: Nov. 20, 2025
- Modified: Nov. 20, 2025
- Vuln Type: Information Disclosure