CISA Warns that Two Android Vulnerabilities Are Under Attack
CISA Warns that Two Android Vulnerabilities Are Under Attack CISA warned today that two Android zero-day vulnerabilities are under active attack, within hours of Google releasing patches for the flaws. Both are high-severity Android framework vulnerabilities. C … Read more Published Date: Dec 02, 2025 (1 hour, 18 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-65877 – Lvzhou CMS SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-65877 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]
CVE-2025-65379 – PHPGurukul Billing System SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-65379 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]
CVE-2025-13542 – DesignThemes LMS <= 1.0.4 – Unauthenticated Privilege Escalation
CVE ID : CVE-2025-13542 Published : Dec. 2, 2025, 8:15 p.m. | 1 hour, 24 minutes ago Description : The DesignThemes LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.4. This is due to the ‘dtlms_register_user_front_end’ function not restricting what user roles a user can register with. This makes […]
CVE-2025-13658 – Industrial Video & Control Longwatch has a Code Injection vulnerability
Affected Products The following products are affected by CVE-2025-13658 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet
CVE-2025-13510 – Iskra iHUB and iHUB Lite has a Missing Authentication for Critical Function vulnerabilitiy
Affected Products The following products are affected by CVE-2025-13510 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below. No affected product recoded yet
CVE-2025-66468 – Aimeos GrapesJS CMS extension possible stores XSS exploitable by authenticated editors
The Aimeos GrapesJS CMS extension provides page editor for creating content pages based on extensible components. Prior to 2021.10.8, 2022.10.8, 2023.10.8, 2024.10.8, and 2025.10.8, Javascript code can be injected by malicious editors for a stored XSS attack if the standard Content Security Policy is disabled. This vulnerability is fixed in 2021.10.8, 2022.10.8, 2023.10.8, 2024.10.8, and […]
CVE-2025-66460 – Lookyloo vulnerable to XSS due to lack of escaping in HTML elements passed to Datatables
The following table lists the changes that have been made to the CVE-2025-66460 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]
CVE-2025-66459 – Lookyloo vulnerable to XSS due to unescaped error message passed to innerHTML
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other. Prior to 1.35.3, a XSS vulnerability can be triggered when a user submits a list of URLs to capture, one of them contains a HTML element, and the capture fails. Then, […]
CVE-2025-66458 – Lookyloo has multiple XSS due to unsafe use of f-strings in Markup
The following table lists the changes that have been made to the CVE-2025-66458 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Dec. 02, 2025 Action […]