Critical - CVE-2025-0912 - The Donations Widget plugin for WordPress is...
The Donations Widget plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.4 via deserialization of untrusted input from the Donation Form through...
Medium - CVE-2025-1321 - The teachPress plugin for WordPress is...
The teachPress plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tpsearch' shortcode in all versions up to, and including, 9.0.7 due to...
High - CVE-2025-1639 - The Animation Addons for Elementor Pro plugin...
The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler()...
NA - CVE-2025-1900 - A vulnerability was found in PHPGurukul...
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /add-table.php. The...
NA - CVE-2025-1901 - A vulnerability was found in PHPGurukul...
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/check_availability.php. The...
NA - CVE-2025-1902 - A vulnerability was found in PHPGurukul Student...
A vulnerability was found in PHPGurukul Student Record System 3.2. It has been declared as critical. This vulnerability affects unknown code of the file /password-recovery.php. The manipulation of...
NA - CVE-2025-1903 - A vulnerability was found in Codezips Online...
A vulnerability was found in Codezips Online Shopping Website 1.0. It has been rated as critical. This issue affects some unknown processing of the file /cart_add.php. The manipulation of the...
NA - CVE-2025-20024 - in OpenHarmony v5.0.2 and prior versions allow...
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted...