5.3

CVSS4.0

CVE-2025-9153 - itsourcecode Online Tour and Travel Management System travellers.php unrestricted upload

A vulnerability was detected in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument photo results in unrestricted upload. The attack can be launched remotely. The exploit is…

πŸ“… Published: Aug. 19, 2025, 6:32 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:32 p.m.

9.7

CVSS3.1

CVE-2025-55733 - DeepChat One-click Remote Code Execution through Custom URL Handling

DeepChat is a smart assistant that connects powerful AI to your personal world. DeepChat before 0.3.1 has a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted deepchat: URL on any website, including a malicious one they contro…

πŸ“… Published: Aug. 19, 2025, 6:26 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:26 p.m.

9.8

CVSS3.1

CVE-2025-55306 - GenX_FX authentication bypass in JWT validation

GenX_FX is an advance IA trading platform that will focus on forex trading. A vulnerability was identified in the GenX FX backend where API keys and authentication tokens may be exposed if environment variables are misconfigured. Unauthorized users could gain access to cloud resources (Google Cloud…

πŸ“… Published: Aug. 19, 2025, 6:19 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:19 p.m.

5.1

CVSS4.0

CVE-2025-43737 -

A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8 and 2025.Q1.0 through 2025.Q1.15 allows a remote authenticated user to inject JavaScript code via _com_liferay_journal_web_portlet_JournalPortlet_backURL parameter.

πŸ“… Published: Aug. 19, 2025, 6:13 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:13 p.m.

4.9

CVSS3.1

CVE-2025-31988 - HCL Digital Experience is susceptible to cross site scripting (XSS)

HCL Digital Experience is susceptible to cross site scripting (XSS) in an administrative UI with restricted access.

πŸ“… Published: Aug. 19, 2025, 6:12 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:12 p.m.

6.9

CVSS4.0

CVE-2025-55303 - Unauthorized third-party images in Astro’s _image endpoint

Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an …

πŸ“… Published: Aug. 19, 2025, 6:08 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:08 p.m.

5.3

CVSS4.0

CVE-2025-9151 - LiuYuYang01 ThriveX-Blog web updateJsonValueByName improper authorization

A security flaw has been discovered in LiuYuYang01 ThriveX-Blog up to 3.1.7. Affected by this vulnerability is the function updateJsonValueByName of the file /web_config/json/name/web. Performing manipulation results in improper authorization. It is possible to initiate the attack remotely. The exp…

πŸ“… Published: Aug. 19, 2025, 6:02 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:02 p.m.

8.2

CVSS3.1

CVE-2025-8450 - Unrestricted File Upload in FileCatalyst

Improper Access Control issue in the Workflow component of Fortra's FileCatalyst allows unauthenticated users to upload arbitrary files via the order forms page.

πŸ“… Published: Aug. 19, 2025, 6:01 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 6:01 p.m.

6.5

CVSS3.1

CVE-2025-55295 - qBit Manage Path Traversal Vulnerability

qBit Manage is a tool that helps manage tedious tasks in qBittorrent and automate them. A path traversal vulnerability exists in qbit_manage's web API that allows authenticated users to read arbitrary files from the server filesystem through the restore_config_from_backup endpoint. The vulnerabilit…

πŸ“… Published: Aug. 19, 2025, 5:46 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 5:46 p.m.

9.8

CVSS3.1

CVE-2025-55294 - Command Injection via `format` option in screenshot-desktop

screenshot-desktop allows capturing a screenshot of your local machine. This vulnerability is a command injection issue. When user-controlled input is passed into the format option of the screenshot function, it is interpolated into a shell command without sanitization. This results in arbitrary co…

πŸ“… Published: Aug. 19, 2025, 5:34 p.m. πŸ”„ Last Modified: Aug. 19, 2025, 5:34 p.m.
Total resulsts: 306500
Page 42 of 30,650
Β« previous page Β» next page
Filters