cve_id
stringlengths 13
15
| summary
stringlengths 15
4k
| description_hash
stringlengths 64
64
| published_date
timestamp[us, tz=UTC]date 2025-07-31 14:15:34
2025-10-29 13:15:34
| modified_date
timestamp[us, tz=UTC]date 2025-07-31 18:42:37
2025-10-29 13:53:20
| is_rejected
bool 2
classes | source
stringclasses 1
value | source_url
stringclasses 7
values | retrieved_at
timestamp[us, tz=UTC]date 2025-10-29 13:52:01
2025-10-29 13:52:01
| source_record_hash
stringlengths 64
64
|
|---|---|---|---|---|---|---|---|---|---|
CVE-2025-12450
|
The LiteSpeed Cache plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URLs in all versions up to, and including, 7.5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
dd46b72f0d5a35320d4fa67eff0fb76e6578b80941cdb323c921da65990728a7
| 2025-10-29T10:15:36.903000Z
| 2025-10-29T10:15:36.903000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
2d4b74e33ec4515bfac8100d28b9a2aa44be274584bb33337d353918abc3ead5
|
CVE-2025-12461
|
This vulnerability allows an attacker to access parts of the application that are not protected by any type of access control. The attacker could access this path ‘…/epsilonnet/License/About.aspx’ and obtain information on both the licence and the configuration of the product by knowing which modules are installed.
|
39261165c95128c07ef0d733af145ba4a4979b4bfc9515b85b369b814ffafc1c
| 2025-10-29T11:15:43.883000Z
| 2025-10-29T11:15:43.883000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
4b1e13dcf7268adbe838a32f0b93e168cad92f3cb9fbcff7ce17c1c3c21a1585
|
CVE-2023-39177
|
Rejected reason: Duplicate of CVE-2023-52442.
|
71e03732cabcbba493496605d1d7c5c213454ac972d534fc520c04e93b742f28
| 2025-10-29T12:15:32.900000Z
| 2025-10-29T12:15:32.900000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
95d7821d579dd0aab712aa9e75d98587f350432cc9095f9ec95313063bf6e54d
|
CVE-2023-39178
|
Rejected reason: Duplicate of CVE-2023-52441.
|
77c9a6d02ae6c07595b6d350e74a1892d2360854c8d607a377b5af979ea81f49
| 2025-10-29T12:15:32.997000Z
| 2025-10-29T12:15:32.997000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
f10f335ed71e718fa657f64e7ceb0b198a21525c96d7d942b9b11cfa29d70470
|
CVE-2025-12142
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
|
73baa633da4fde664ca659ee73c68e12e165663735fd59bc894327e8a198015a
| 2025-10-29T12:15:35.743000Z
| 2025-10-29T12:15:35.743000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
96e44ef28b2d8ca645082f34eebd7ac570920564c9f31153e85ecc242994c0e5
|
CVE-2025-11587
|
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.
|
cba78f45159c27334eb67c190e744c7e58968c43ec5b903f0772352734cc3bb2
| 2025-10-29T13:15:34.350000Z
| 2025-10-29T13:15:34.350000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
db2c791ef9498c8a2ca1ae9df81a69506c378106fc6cb0b2c3f8b6c1ed28a602
|
CVE-2025-11632
|
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.5.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate links to billing portal, where they can view and modify billing information of the connected, account, generate chat session tokens, view domain status, etc.
This vulnerability was partially fixed in version 1.5.4 and fully fixed in version 1.5.5
|
2d68df5ea9a96cfa2acd53f75f0cebd941b15f2efa73a9d921200d42ff2644f0
| 2025-10-29T13:15:35.323000Z
| 2025-10-29T13:15:35.323000Z
| false
|
nvd
|
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
| 2025-10-29T13:52:01.759408Z
|
c0ef1349e4dcdcc419991ec48972a45183e1ba48c89d3bd3b4f2bb37ab6896d5
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.