cve_id
stringlengths
13
15
summary
stringlengths
15
4k
description_hash
stringlengths
64
64
published_date
timestamp[us, tz=UTC]date
2025-07-31 14:15:34
2025-10-29 13:15:34
modified_date
timestamp[us, tz=UTC]date
2025-07-31 18:42:37
2025-10-29 13:53:20
is_rejected
bool
2 classes
source
stringclasses
1 value
source_url
stringclasses
7 values
retrieved_at
timestamp[us, tz=UTC]date
2025-10-29 13:52:01
2025-10-29 13:52:01
source_record_hash
stringlengths
64
64
CVE-2025-12450
The LiteSpeed Cache plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URLs in all versions up to, and including, 7.5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
dd46b72f0d5a35320d4fa67eff0fb76e6578b80941cdb323c921da65990728a7
2025-10-29T10:15:36.903000Z
2025-10-29T10:15:36.903000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
2d4b74e33ec4515bfac8100d28b9a2aa44be274584bb33337d353918abc3ead5
CVE-2025-12461
This vulnerability allows an attacker to access parts of the application that are not protected by any type of access control. The attacker could access this path ‘…/epsilonnet/License/About.aspx’ and obtain information on both the licence and the configuration of the product by knowing which modules are installed.
39261165c95128c07ef0d733af145ba4a4979b4bfc9515b85b369b814ffafc1c
2025-10-29T11:15:43.883000Z
2025-10-29T11:15:43.883000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
4b1e13dcf7268adbe838a32f0b93e168cad92f3cb9fbcff7ce17c1c3c21a1585
CVE-2023-39177
Rejected reason: Duplicate of CVE-2023-52442.
71e03732cabcbba493496605d1d7c5c213454ac972d534fc520c04e93b742f28
2025-10-29T12:15:32.900000Z
2025-10-29T12:15:32.900000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
95d7821d579dd0aab712aa9e75d98587f350432cc9095f9ec95313063bf6e54d
CVE-2023-39178
Rejected reason: Duplicate of CVE-2023-52441.
77c9a6d02ae6c07595b6d350e74a1892d2360854c8d607a377b5af979ea81f49
2025-10-29T12:15:32.997000Z
2025-10-29T12:15:32.997000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
f10f335ed71e718fa657f64e7ceb0b198a21525c96d7d942b9b11cfa29d70470
CVE-2025-12142
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
73baa633da4fde664ca659ee73c68e12e165663735fd59bc894327e8a198015a
2025-10-29T12:15:35.743000Z
2025-10-29T12:15:35.743000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
96e44ef28b2d8ca645082f34eebd7ac570920564c9f31153e85ecc242994c0e5
CVE-2025-11587
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the activate function in all versions up to, and including, 1.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to link the plugin to their nowbuttons.com account and add malicious buttons to the site. The vulnerability is only exploitable on fresh installs where the plugin has not been previously configured with an API key.
cba78f45159c27334eb67c190e744c7e58968c43ec5b903f0772352734cc3bb2
2025-10-29T13:15:34.350000Z
2025-10-29T13:15:34.350000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
db2c791ef9498c8a2ca1ae9df81a69506c378106fc6cb0b2c3f8b6c1ed28a602
CVE-2025-11632
The Call Now Button – The #1 Click to Call Button for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.5.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate links to billing portal, where they can view and modify billing information of the connected, account, generate chat session tokens, view domain status, etc. This vulnerability was partially fixed in version 1.5.4 and fully fixed in version 1.5.5
2d68df5ea9a96cfa2acd53f75f0cebd941b15f2efa73a9d921200d42ff2644f0
2025-10-29T13:15:35.323000Z
2025-10-29T13:15:35.323000Z
false
nvd
https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-07-31T13:51:37.000Z&pubEndDate=2025-10-29T13:51:37.000Z&resultsPerPage=2000&startIndex=12000
2025-10-29T13:52:01.759408Z
c0ef1349e4dcdcc419991ec48972a45183e1ba48c89d3bd3b4f2bb37ab6896d5