6.1

CVSS3.1

CVE-2025-60932 -

Multiple stored cross-site scripting (XSS) vulnerabilities in the Current Goals function of HR Performance Solutions Performance Pro v3.19.17 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Goal Name, Goal Notes, Action Step Name, Action Step Descri…

πŸ“… Published: Oct. 21, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.4

CVSS3.1

CVE-2025-60506 -

Moodle PDF Annotator plugin v1.5 release 9 allows stored cross-site scripting (XSS) via the Public Comments feature. An attacker with a low-privileged account (e.g., Student) can inject arbitrary JavaScript payloads into a comment. When any other user (Student, Teacher, or Admin) views the annotate…

πŸ“… Published: Oct. 21, 2025, midnight πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

10

CVSS4.0

CVE-2025-12001 - Incorrect Content-Type Header

Lack of application manifest sanitation could lead to potential stored XSS.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

πŸ“… Published: Oct. 20, 2025, 9:53 p.m. πŸ”„ Last Modified: Nov. 7, 2025, 8:15 p.m.

5

CVSS3.1

CVE-2025-11536 - Element Pack Addons for Elementor <= 8.2.5 - Authenticated (Subscriber+) Blind Server-Side Request …

The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 8.2.5 via the wp_ajax_import_elementor_template action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to …

πŸ“… Published: Oct. 20, 2025, 9:23 p.m. πŸ”„ Last Modified: April 22, 2026, 12:45 p.m.

10

CVSS4.0

CVE-2018-25118 - GeoVision Command Injection RCE via /PictureCatch.cgi

GeoVision embedded IP devices, confirmed onΒ GV-BX1500 andΒ GV-MFD1501, contain a remote command injection vulnerability viaΒ /PictureCatch.cgi that enables an attacker to execute arbitrary commands on the device. The vulnerable models have been declared end-of-life (EOL) by the vendor. VulnCheck has …

πŸ“… Published: Oct. 20, 2025, 9:14 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.5

CVSS4.0

CVE-2025-62658 - SQL injection in WatchAnalytics through Special:ClearPendingReviews

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation MediaWiki WatchAnalytics extension allows SQL Injection.This issue affects MediaWiki WatchAnalytics extension: 1.43, 1.44.

πŸ“… Published: Oct. 20, 2025, 8:23 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.8

CVSS4.0

CVE-2025-62657 - Stored XSS through system messages in PageForms

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki PageForms extension allows Stored XSS.This issue affects MediaWiki PageForms extension: 1.44.

πŸ“… Published: Oct. 20, 2025, 8:19 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.8

CVSS4.0

CVE-2025-62656 - GlobalBlocking Special:GlobalBlockList vulnerable to message key stored XSS

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki GlobalBlocking extension allows Stored XSS.This issue affects MediaWiki GlobalBlocking extension: 1.43, 1.44.

πŸ“… Published: Oct. 20, 2025, 8:15 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.4

CVSS3.1

CVE-2025-62528 - Taguette cross-site scripting vulnerability via tag name, tag description, document name and docume…

Taguette is an open source qualitative research tool. An issue has been discovered in Taguette versions prior to 1.5.0. It was possible for a project member to put JavaScript in name or description fields which would run on project load. This issue has been patched in version 1.5.0.

πŸ“… Published: Oct. 20, 2025, 8:03 p.m. πŸ”„ Last Modified: Oct. 30, 2025, 5 p.m.

7.1

CVSS3.1

CVE-2025-62527 - Taguette vulnerable to password reset link poisoning

Taguette is an open source qualitative research tool. An issue has been discovered in Taguette versions prior to 1.5.0. It was possible for an attacker to request password reset email containing a malicious link, allowing the attacker to set the email if clicked by the victim. This issue has been p…

πŸ“… Published: Oct. 20, 2025, 8:03 p.m. πŸ”„ Last Modified: Oct. 30, 2025, 5 p.m.
Total resulsts: 349182
Page 3362 of 34,919
Β« previous page Β» next page
Filters