5.4

CVSS3.1

CVE-2025-13558 - Blog2Social <= 8.7.0 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Trashing

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'deleteUserCcDraftPost' function in all versions up to, and including, 8.7.0. This makes it possible for authenticated attackers, with…

πŸ“… Published: Nov. 25, 2025, 4:37 a.m. πŸ”„ Last Modified: April 22, 2026, 12:30 a.m.

4.8

CVSS4.0

CVE-2025-64730 -

Cross-site scripting vulnerability exists in SNC-CX600W all versions. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the product.

πŸ“… Published: Nov. 25, 2025, 4:37 a.m. πŸ”„ Last Modified: Dec. 1, 2025, 3:35 p.m.

2.1

CVSS4.0

CVE-2025-62497 -

Cross-site request forgery vulnerability exists in SNC-CX600W versions prior to Ver.2.8.0. If a user accesses a specially crafted webpage while logged in, unintended operations may be performed.

πŸ“… Published: Nov. 25, 2025, 4:37 a.m. πŸ”„ Last Modified: Dec. 1, 2025, 3:38 p.m.

5.1

CVSS4.0

CVE-2025-64304 -

"FOD" App uses hard-coded cryptographic keys, which may allow a local unauthenticated attacker to retrieve the cryptographic keys.

πŸ“… Published: Nov. 25, 2025, 4:27 a.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

4.3

CVSS3.1

CVE-2025-10646 - Search Exclude <= 2.5.7 – Missing Authorization to Authenticated (Contributor+) Search Settings Mod…

The Search Exclude plugin for WordPress is vulnerable to unauthorized modification of data due to a insufficient capability check on the Base::get_rest_permission() method in all versions up to, and including, 2.5.7. This makes it possible for authenticated attackers, with Contributor-level access …

πŸ“… Published: Nov. 25, 2025, 3:27 a.m. πŸ”„ Last Modified: April 21, 2026, 6:15 p.m.

9.8

CVSS3.1

CVE-2025-6389 - Sneeit Framework <= 8.3 - Unauthenticated Remote Code Execution in sneeit_articles_pagination_callb…

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible …

πŸ“… Published: Nov. 25, 2025, 2:26 a.m. πŸ”„ Last Modified: April 20, 2026, 9:45 p.m.

8.5

CVSS4.0

CVE-2025-59373 -

A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For m…

πŸ“… Published: Nov. 25, 2025, 2:03 a.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.7

CVSS3.1

CVE-2025-65951 - Inside Track / Entropy Derby Timelock Encryption Bypassed via Pre-Computed VDF Output Leakage

Inside Track / Entropy Derby is a research-grade horse-racing betting engine. Prior to commit 2d38d2f, the VDF-based timelock encryption system fails to enforce sequential delay against the betting operator. Bettors pre-compute the entire Wesolowski VDF and include vdfOutputHex in their encrypted b…

πŸ“… Published: Nov. 25, 2025, 12:30 a.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.1

CVSS4.0

CVE-2025-65944 - Sentry-Javascript deals with leaked sensitive headers when `sendDefaultPii` is set to `true`

Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the Sentry SDK has sendDefaultPii: true it is possible to inadvertently send certain sensitive HTTP headers, including the Cookie header, to Sentry. Those headers wo…

πŸ“… Published: Nov. 25, 2025, 12:23 a.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.5

CVSS4.0

CVE-2025-64761 - OpenBao Privileged Operator Identity Group Root Escalation

OpenBao is an open source identity-based secrets management system. Prior to version 2.4.4, a privileged operator could use the identity group subsystem to add a root policy to a group identity group, escalating their or another user's permissions in the system. Specifically this is an issue when: …

πŸ“… Published: Nov. 25, 2025, 12:01 a.m. πŸ”„ Last Modified: Feb. 26, 2026, 4:07 p.m.
Total resulsts: 349182
Page 2911 of 34,919
Β« previous page Β» next page
Filters