General-Purpose System Vulnerabilities
Vulnerabilities related to traditional IT systems, servers, and desktop applications.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2025-53259 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability i… | High (7.5) | 2025-06-27 | General-Purpose |
| CVE-2025-53258 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wow-Company Hover… | High (7.6) | 2025-06-27 | General-Purpose |
| CVE-2025-53257 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability i… | High (7.5) | 2025-06-27 | General-Purpose |
| CVE-2025-53256 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySM… | High (7.6) | 2025-06-27 | General-Purpose |
| CVE-2025-53255 | Missing Authorization vulnerability in Nabil Lemsieh HurryTimer allows Exploiting Incorrectly Configured Access Control… | Medium (5.3) | 2025-06-27 | General-Purpose |