8.4

CVSS4.0

CVE-2025-58776 -

KV Studio versions 12.23 and prior contain a stack-based buffer overflow vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.

๐Ÿ“… Published: Oct. 2, 2025, 5:50 a.m. ๐Ÿ”„ Last Modified: Oct. 2, 2025, 5:50 a.m.

8.4

CVSS4.0

CVE-2025-58775 -

KV STUDIO and VT5-WX15/WX12 contain a stack-based buffer overflow vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.

๐Ÿ“… Published: Oct. 2, 2025, 5:50 a.m. ๐Ÿ”„ Last Modified: Oct. 2, 2025, 5:50 a.m.

8.7

CVSS4.0

CVE-2025-11020 - Remote Code Execution in MarkAny SafePC Enterprise

An attacker can obtain server information using Path Traversal vulnerability to conduct SQL Injection, which possibly exploits Unrestricted Upload of File with Dangerous Type vulnerability in MarkAny SafePC Enterprise on Windows, Linux.This issue affects SafePC Enterprise: V7.0.* (V7.0.YYYY.MM.DD) โ€ฆ

๐Ÿ“… Published: Oct. 2, 2025, 5:15 a.m. ๐Ÿ”„ Last Modified: Oct. 2, 2025, 5:15 a.m.

9.4

CVSS4.0

CVE-2025-11221 - Remote Code Execution in GTONE ChangeFlow

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Unrestricted Upload of File with Dangerous Type vulnerability in GTONE ChangeFlow allows Path Traversal, Accessing Functionality Not Properly Constrained by ACLs.This issue affects ChangeFlow: from All versions through โ€ฆ

๐Ÿ“… Published: Oct. 2, 2025, 5:15 a.m. ๐Ÿ”„ Last Modified: Oct. 2, 2025, 5:15 a.m.

7.1

CVSS4.0

CVE-2025-11182 - File Download in GTONE ChangeFlow

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Download of Code Without Integrity Check vulnerability in GTONE ChangeFlow allows Path Traversal.This issue affects ChangeFlow: All versions to v9.0.1.1.

๐Ÿ“… Published: Oct. 2, 2025, 5:15 a.m. ๐Ÿ”„ Last Modified: Oct. 2, 2025, 5:15 a.m.

0.0

CVE-2025-60660 -

Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function.

๐Ÿ“… Published: Oct. 2, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 2, 2025, 4:10 p.m.

0.0

CVE-2025-32942 -

SSH Tectia Server before 6.6.6 sometimes allows attackers to read and alter a user's session traffic.

๐Ÿ“… Published: Oct. 2, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 2, 2025, 6:55 p.m.

0.0

CVE-2025-61096 -

PHPGurukul Online Shopping Portal Project v2.1 is vulnerable to SQL Injection in /shopping/login.php via the fullname parameter.

๐Ÿ“… Published: Oct. 2, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 2, 2025, 2:32 p.m.

0.0

CVE-2025-56162 -

YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin pasโ€ฆ

๐Ÿ“… Published: Oct. 2, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 2, 2025, 3:46 p.m.

0.0

CVE-2025-56154 -

htmly v3.0.8 is vulnerable to Cross Site Scripting (XSS) in the /author/:name endpoint of the affected application. The name parameter is not properly sanitized before being reflected in the HTML response, allowing attackers to inject arbitrary JavaScript payloads.

๐Ÿ“… Published: Oct. 2, 2025, midnight ๐Ÿ”„ Last Modified: Oct. 2, 2025, 4:05 p.m.
Total resulsts: 312538
Page 10 of 31,254
ยซ previous page ยป next page
Filters