443 CVEs tracked today. 25 Critical, 239 High, 161 Medium, 10 Low.
-
CVE-2025-49533
CRITICAL
CVSS 9.8
Adobe Experience Manager versions 6.5.23.0 and earlier contain a deserialization of untrusted data vulnerability that allows unauthenticated remote code execution. No user interaction is required, making this a direct attack against enterprise content management infrastructure.
Deserialization
RCE
Adobe
Experience Manager
-
CVE-2025-49704
HIGH
CVSS 8.8
Microsoft Office SharePoint contains a code injection vulnerability (CVE-2025-49704, CVSS 8.8) enabling authenticated attackers to execute arbitrary code over the network. KEV-listed with EPSS 63.8%, this vulnerability requires only basic SharePoint authentication and enables server-level code execution, threatening the documents, workflows, and data stored across the organization's SharePoint infrastructure.
Microsoft
RCE
Code Injection
Sharepoint Server
-
CVE-2025-49535
CRITICAL
CVSS 9.3
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in a Security feature bypass. An attacker could exploit this vulnerability to access sensitive information or denial of service by bypassing security measures. Exploitation of this issue does not require user interaction and scope is changed. The vulnerable component is restricted to internal IP addresses.
XXE
Denial Of Service
Coldfusion
-
CVE-2025-48384
HIGH
CVSS 8.0
Git contains a CRLF injection vulnerability (CVE-2025-48384, CVSS 8.0) in its config handling that allows attackers to escape header lines and modify config values. KEV-listed, this vulnerability in the world's most widely used version control system enables config injection attacks that could lead to arbitrary code execution through Git hooks, credential theft, or repository manipulation.
Information Disclosure
Ubuntu
Debian
Git
Debian Linux
-
CVE-2025-47981
CRITICAL
CVSS 9.8
Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows 10 21h2
Windows 11 23h2
-
CVE-2025-42980
CRITICAL
CVSS 9.1
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
Deserialization
Sap
-
CVE-2025-42967
CRITICAL
CVSS 9.9
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with user level privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
Sap
RCE
Code Injection
-
CVE-2025-42966
CRITICAL
CVSS 9.1
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
Deserialization
Sap
Java
-
CVE-2025-42964
CRITICAL
CVSS 9.1
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
Deserialization
Sap
-
CVE-2025-42963
CRITICAL
CVSS 9.1
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
Deserialization
Sap
Java
-
CVE-2025-40736
CRITICAL
CVSS 9.8
A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application exposes an endpoint that allows an unauthorized modification of administrative credentials. This could allow an unauthenticated attacker to reset the superadmin password and gain full control of the application (ZDI-CAN-26569).
Authentication Bypass
Sinec Nms
-
CVE-2025-40717
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the pagina.filter.categoria mensaje in /QuiterGatewayWeb/api/v1/sucesospagina.
SQLi
Quiter Gateway
-
CVE-2025-40716
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the suceso.contenido mensaje in /QMSCliente/Sucesos.action.
SQLi
Quiter Gateway
-
CVE-2025-40715
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo mensaje in /QISClient/api/v1/sucesospaginas.
SQLi
Quiter Gateway
-
CVE-2025-40714
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo id_factura in /<Client>FacturaE/listado_facturas_ficha.jsp.
SQLi
Quiter Gateway
-
CVE-2025-40713
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the campo parameter in/<Client>FacturaE/BusquedasFacturasSesion.
SQLi
Quiter Gateway
-
CVE-2025-40712
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the id_concesion parameter in /<Client>FacturaE/DescargarFactura.
SQLi
Quiter Gateway
-
CVE-2025-40711
CRITICAL
CVSS 9.8
SQL injection vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to retrieve, create, update and delete databases through the id_concesion parameter in /<Client>FacturaE/VerFacturaPDF.
SQLi
Quiter Gateway
-
CVE-2025-37103
CRITICAL
CVSS 9.8
Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication. Successful exploitation could allow a remote attacker to gain administrative access to the system.
Authentication Bypass
-
CVE-2025-27203
CRITICAL
CVSS 9.6
Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.
Deserialization
RCE
Adobe
Connect
-
CVE-2025-25270
CRITICAL
CVSS 9.8
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
RCE
Charx Sec 3000 Firmware
Charx Sec 3100 Firmware
Charx Sec 3150 Firmware
Charx Sec 3050 Firmware
-
CVE-2025-21450
CRITICAL
CVSS 9.1
Cryptographic issue occurs due to use of insecure connection method while downloading.
Authentication Bypass
Snapdragon 480 5g Mobile Firmware
Wcd9375 Firmware
Sdx61 Firmware
Qca6584au Firmware
-
CVE-2025-20684
CRITICAL
CVSS 9.8
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416939; Issue ID: MSV-3422.
Buffer Overflow
Memory Corruption
Privilege Escalation
Software Development Kit
-
CVE-2025-20683
CRITICAL
CVSS 9.8
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416938; Issue ID: MSV-3444.
Buffer Overflow
Memory Corruption
Privilege Escalation
Software Development Kit
Openwrt
-
CVE-2025-20682
CRITICAL
CVSS 9.8
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416937; Issue ID: MSV-3445.
Buffer Overflow
Memory Corruption
Privilege Escalation
Software Development Kit
Openwrt
-
CVE-2025-20681
CRITICAL
CVSS 9.8
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416936; Issue ID: MSV-3446.
Buffer Overflow
Memory Corruption
Privilege Escalation
Software Development Kit
Openwrt
-
CVE-2025-20680
CRITICAL
CVSS 9.8
In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418044; Issue ID: MSV-3482.
Heap Overflow
Buffer Overflow
Privilege Escalation
Nbiot Sdk
-
CVE-2025-6771
HIGH
CVSS 7.2
OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2,12.4.0.3 and 12.3.0.3 allows a remote authenticated attacker with high privileges to achieve remote code execution
RCE
Command Injection
Ivanti
Endpoint Manager Mobile
-
CVE-2025-6770
HIGH
CVSS 7.2
OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution
RCE
Command Injection
Ivanti
Endpoint Manager Mobile
-
CVE-2025-53547
HIGH
CVSS 8.5
Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.
RCE
Code Injection
Kubernetes
Debian
Helm
-
CVE-2025-53513
HIGH
CVSS 8.8
The /charms endpoint on a Juju controller lacked sufficient authorization checks, allowing any user with an account on the controller to upload a charm. Uploading a malicious charm that exploits a Zip Slip vulnerability could allow an attacker to gain access to a machine running a unit through the affected charm.
Information Disclosure
Ubuntu
Debian
Juju
Suse
-
CVE-2025-53372
HIGH
CVSS 7.5
node-code-sandbox-mcp is a Node.js-based Model Context Protocol server that spins up disposable Docker containers to execute arbitrary JavaScript. Prior to 1.3.0, a command injection vulnerability exists in the node-code-sandbox-mcp MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to child_process.execSync, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges on the host machine, bypassing the sandbox protection of running code inside docker. This vulnerability is fixed in 1.3.0.
RCE
Node.js
Command Injection
Docker
-
CVE-2025-53355
HIGH
CVSS 7.5
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. A command injection vulnerability exists in the mcp-server-kubernetes MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to child_process.execSync, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. This vulnerability is fixed in 2.5.0.
RCE
Command Injection
Kubernetes
-
CVE-2025-50130
HIGH
CVSS 7.8
A heap-based buffer overflow vulnerability exists in VS6Sim.exe contained in V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD.
Opening V9 files or X1 files specially crafted by an attacker on the affected product may lead to arbitrary code execution.
Heap Overflow
RCE
Buffer Overflow
-
CVE-2025-49753
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2025
Windows Server 2019
-
CVE-2025-49744
HIGH
CVSS 7.0
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows 10 22h2
Windows Server 2016
-
CVE-2025-49742
HIGH
CVSS 7.8
Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows 10 21h2
Windows Server 2008
-
CVE-2025-49740
HIGH
CVSS 8.8
Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network.
Microsoft
Authentication Bypass
Windows Server 2019
Windows 10 22h2
Windows Server 2025
-
CVE-2025-49739
HIGH
CVSS 8.8
Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network.
Authentication Bypass
Visual Studio 2017
Visual Studio
Visual Studio 2022
Visual Studio 2019
-
CVE-2025-49738
HIGH
CVSS 7.8
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Pc Manager
-
CVE-2025-49737
HIGH
CVSS 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Teams allows an authorized attacker to elevate privileges locally.
Microsoft
Race Condition
Information Disclosure
Teams
-
CVE-2025-49735
HIGH
CVSS 8.1
Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2025
-
CVE-2025-49733
HIGH
CVSS 7.8
Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 11 23h2
-
CVE-2025-49732
HIGH
CVSS 7.8
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows 10 1809
Windows 10 22h2
-
CVE-2025-49730
HIGH
CVSS 7.8
Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2012
Windows 10 22h2
-
CVE-2025-49729
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2012
Windows Server 2019
-
CVE-2025-49727
HIGH
CVSS 7.0
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2025
Windows 11 22h2
-
CVE-2025-49726
HIGH
CVSS 7.8
Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 10 22h2
-
CVE-2025-49725
HIGH
CVSS 7.8
Use after free in Windows Notification allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 10 22h2
-
CVE-2025-49724
HIGH
CVSS 8.8
Use after free in Windows Connected Devices Platform Service allows an unauthorized attacker to execute code over a network.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 11 22h2
-
CVE-2025-49723
HIGH
CVSS 8.8
Missing authorization in Windows StateRepository API allows an authorized attacker to perform tampering locally.
Microsoft
Authentication Bypass
Windows Server 2019
Windows 10 21h2
Windows Server 2025
-
CVE-2025-49721
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Fast FAT Driver allows an unauthorized attacker to elevate privileges locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2012
Windows Server 2019
-
CVE-2025-49719
HIGH
CVSS 7.5
Improper input validation in SQL Server allows an unauthorized attacker to disclose information over a network.
Information Disclosure
Sql Server 2019
Sql Server 2016
Sql Server 2022
Sql Server 2017
-
CVE-2025-49718
HIGH
CVSS 7.5
Use of uninitialized resource in SQL Server allows an unauthorized attacker to disclose information over a network.
Information Disclosure
Sql Server 2022
Sql Server 2019
-
CVE-2025-49717
HIGH
CVSS 8.5
Heap-based buffer overflow in SQL Server allows an authorized attacker to execute code over a network.
Heap Overflow
Buffer Overflow
Sql Server 2019
Sql Server 2022
-
CVE-2025-49716
HIGH
CVSS 7.5
Uncontrolled resource consumption in Windows Netlogon allows an unauthorized attacker to deny service over a network.
Microsoft
Denial Of Service
Windows Server 2012
Windows Server 2016
Windows Server 2022
-
CVE-2025-49714
HIGH
CVSS 7.8
A security vulnerability in Trust boundary violation in Visual Studio Code - Python extension (CVSS 7.8) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.
Python
Authentication Bypass
-
CVE-2025-49711
HIGH
CVSS 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Office
-
CVE-2025-49705
HIGH
CVSS 7.8
Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
Microsoft
Heap Overflow
Buffer Overflow
365 Apps
Office
-
CVE-2025-49703
HIGH
CVSS 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Office Long Term Servicing Channel
-
CVE-2025-49702
HIGH
CVSS 7.8
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
Microsoft
Memory Corruption
Authentication Bypass
365 Apps
Office Long Term Servicing Channel
-
CVE-2025-49701
HIGH
CVSS 8.8
Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Microsoft
Authentication Bypass
Sharepoint Server
-
CVE-2025-49700
HIGH
CVSS 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Office
-
CVE-2025-49699
HIGH
CVSS 7.0
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Office Long Term Servicing Channel
-
CVE-2025-49698
HIGH
CVSS 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Word
-
CVE-2025-49697
HIGH
CVSS 8.4
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
Microsoft
Heap Overflow
Buffer Overflow
Office Online Server
365 Apps
-
CVE-2025-49696
HIGH
CVSS 8.4
Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.
Microsoft
Heap Overflow
Buffer Overflow
Office
Office Long Term Servicing Channel
-
CVE-2025-49695
HIGH
CVSS 8.4
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Office
-
CVE-2025-49694
HIGH
CVSS 7.8
Null pointer dereference in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
Microsoft
Null Pointer Dereference
Denial Of Service
Windows 11 24h2
Windows Server 2022 23h2
-
CVE-2025-49693
HIGH
CVSS 7.8
A privilege escalation vulnerability in Double free in Microsoft Brokering File System (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Information Disclosure
Windows 11 24h2
Windows Server 2022 23h2
Windows 11 22h2
-
CVE-2025-49691
HIGH
CVSS 8.0
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over an adjacent network.
Microsoft
Heap Overflow
Buffer Overflow
Windows 10 1607
Windows 11 22h2
-
CVE-2025-49690
HIGH
CVSS 7.4
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an unauthorized attacker to elevate privileges locally.
Race Condition
Authentication Bypass
Windows 11 23h2
Windows 10 21h2
Windows 11 24h2
-
CVE-2025-49689
HIGH
CVSS 7.8
Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
Information Disclosure
Buffer Overflow
Windows Server 2022 23h2
Windows Server 2019
Windows 10 22h2
-
CVE-2025-49688
HIGH
CVSS 8.8
CVE-2025-49688 is a security vulnerability (CVSS 8.8) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Authentication Bypass
Windows Server 2022
Windows Server 2022 23h2
Windows Server 2012
-
CVE-2025-49687
HIGH
CVSS 8.8
Out-of-bounds read in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Buffer Overflow
Windows 10 22h2
Windows 11 23h2
-
CVE-2025-49686
HIGH
CVSS 7.8
Null pointer dereference in Windows TCP/IP allows an authorized attacker to elevate privileges locally.
Microsoft
Null Pointer Dereference
Denial Of Service
Windows Server 2022
Windows Server 2019
-
CVE-2025-49685
HIGH
CVSS 7.0
Use after free in Microsoft Windows Search Component allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2022
-
CVE-2025-49683
HIGH
CVSS 7.8
Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally.
Heap Overflow
Buffer Overflow
Windows 10 22h2
Windows 10 21h2
Windows 11 24h2
-
CVE-2025-49682
HIGH
CVSS 7.3
Use after free in Windows Media allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 11 24h2
-
CVE-2025-49680
HIGH
CVSS 7.3
Improper link resolution before file access ('link following') in Windows Performance Recorder allows an authorized attacker to deny service locally.
Microsoft
Information Disclosure
Windows 11 24h2
Windows Server 2025
Windows 10 21h2
-
CVE-2025-49679
HIGH
CVSS 7.8
A privilege escalation vulnerability in Numeric truncation error in Windows Shell (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Information Disclosure
Windows 10 22h2
Windows Server 2019
Windows Server 2016
-
CVE-2025-49678
HIGH
CVSS 7.0
Null pointer dereference in Windows NTFS allows an authorized attacker to elevate privileges locally.
Microsoft
Race Condition
Denial Of Service
Windows Server 2016
Windows 10 22h2
-
CVE-2025-49677
HIGH
CVSS 7.0
Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 11 22h2
-
CVE-2025-49676
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2022 23h2
Windows Server 2025
-
CVE-2025-49675
HIGH
CVSS 7.8
Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2025
Windows 10 22h2
-
CVE-2025-49674
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2022 23h2
Windows Server 2022
-
CVE-2025-49673
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2016
Windows Server 2012
-
CVE-2025-49672
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2019
Windows Server 2025
-
CVE-2025-49669
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2008
Windows Server 2019
-
CVE-2025-49668
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2008
Windows Server 2012
-
CVE-2025-49667
HIGH
CVSS 7.8
A privilege escalation vulnerability in Double free in Windows Win32K - ICOMP (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Information Disclosure
Windows Server 2025
Windows 10 1809
Windows Server 2012
-
CVE-2025-49666
HIGH
CVSS 7.2
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2022
Windows Server 2016
-
CVE-2025-49665
HIGH
CVSS 7.8
Concurrent execution using shared resource with improper synchronization ('race condition') in Workspace Broker allows an authorized attacker to elevate privileges locally.
Race Condition
Information Disclosure
Windows 10 1607
Windows Server 2022
Windows 10 1507
-
CVE-2025-49663
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2019
Windows Server 2025
-
CVE-2025-49661
HIGH
CVSS 7.8
A privilege escalation vulnerability in Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Information Disclosure
Windows Server 2008
Windows Server 2022 23h2
Windows 10 1507
-
CVE-2025-49660
HIGH
CVSS 7.8
Use after free in Windows Event Tracing allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 10 21h2
-
CVE-2025-49659
HIGH
CVSS 7.8
Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.
Microsoft
Buffer Overflow
Windows Server 2025
Windows 10 1809
Windows Server 2019
-
CVE-2025-49657
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2016
Windows Server 2008
-
CVE-2025-49551
HIGH
CVSS 8.8
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Use of Hard-coded Credentials vulnerability that could result in privilege escalation. An attacker could leverage this vulnerability to gain unauthorized access to sensitive systems or data. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.
Privilege Escalation
Authentication Bypass
Coldfusion
-
CVE-2025-49538
HIGH
CVSS 7.4
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an XML Injection vulnerability that could lead to arbitrary file system read. An attacker can exploit this issue by injecting crafted XML or XPath queries to access unauthorized files or lead to denial of service. Exploitation of this issue does not require user interaction, and attack must have access to shared secrets.
Denial Of Service
Coldfusion
-
CVE-2025-49537
HIGH
CVSS 7.9
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead to arbitrary code execution by a high-privileged attacker. Exploitation of this issue requires user interaction and scope is changed. The vulnerable component is restricted to internal IP addresses.
RCE
Command Injection
Coldfusion
-
CVE-2025-49536
HIGH
CVSS 7.3
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.
Authentication Bypass
Coldfusion
-
CVE-2025-49532
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Integer Overflow
Illustrator
-
CVE-2025-49531
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Integer Overflow
Illustrator
-
CVE-2025-49530
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Illustrator
-
CVE-2025-49529
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Memory Corruption
Illustrator
-
CVE-2025-49528
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Stack Overflow
Illustrator
-
CVE-2025-49527
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Stack Overflow
Illustrator
-
CVE-2025-49526
HIGH
CVSS 7.8
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Illustrator
-
CVE-2025-48824
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2012
Windows Server 2008
-
CVE-2025-48822
HIGH
CVSS 8.6
Out-of-bounds read in Windows Hyper-V allows an unauthorized attacker to execute code locally.
Microsoft
Information Disclosure
Buffer Overflow
Windows 11 23h2
Windows Server 2016
-
CVE-2025-48821
HIGH
CVSS 7.1
Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows 10 1507
-
CVE-2025-48820
HIGH
CVSS 7.8
Improper link resolution before file access ('link following') in Windows AppX Deployment Service allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Windows 11 22h2
Windows Server 2019
Windows 11 24h2
-
CVE-2025-48819
HIGH
CVSS 7.1
Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 10 1809
Windows Server 2022 23h2
-
CVE-2025-48817
HIGH
CVSS 8.8
Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
Path Traversal
Windows 10 21h2
Windows 10 1809
Windows Server 2025
Windows Server 2008
-
CVE-2025-48816
HIGH
CVSS 7.8
Integer overflow or wraparound in HID class driver allows an authorized attacker to elevate privileges locally.
Information Disclosure
Buffer Overflow
Windows 11 22h2
Windows Server 2022 23h2
Windows 10 22h2
-
CVE-2025-48815
HIGH
CVSS 7.8
Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Memory Corruption
Windows 10 1607
Windows Server 2016
-
CVE-2025-48814
HIGH
CVSS 7.5
Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network.
Microsoft
Authentication Bypass
Windows Server 2022 23h2
Windows Server 2008
Windows 10 1809
-
CVE-2025-48806
HIGH
CVSS 7.8
Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2008
-
CVE-2025-48805
HIGH
CVSS 7.8
Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2025
Windows 10 21h2
-
CVE-2025-48799
HIGH
CVSS 7.8
Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Windows 10 1607
Windows 11 24h2
Windows 11 22h2
-
CVE-2025-48385
HIGH
CVSS 8.6
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
RCE
Ubuntu
Debian
Redhat
Suse
-
CVE-2025-48000
HIGH
CVSS 7.8
Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.
Microsoft
Race Condition
Denial Of Service
Windows Server 2022 23h2
Windows 11 23h2
-
CVE-2025-47998
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2019
Windows Server 2016
-
CVE-2025-47996
HIGH
CVSS 7.8
Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Buffer Overflow
Windows Server 2016
Windows 10 1507
-
CVE-2025-47994
HIGH
CVSS 7.8
Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.
Deserialization
Microsoft
Office Long Term Servicing Channel
Sharepoint Enterprise Server
Office
-
CVE-2025-47993
HIGH
CVSS 7.8
Improper access control in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.
Microsoft
Authentication Bypass
Windows Server 2022 23h2
Windows 11 24h2
Windows Server 2025
-
CVE-2025-47991
HIGH
CVSS 7.8
Use after free in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2022
-
CVE-2025-47988
HIGH
CVSS 7.5
Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.
Microsoft
RCE
Code Injection
Azure Monitor Agent
-
CVE-2025-47987
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2012
Windows Server 2019
-
CVE-2025-47986
HIGH
CVSS 8.8
Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2022
Windows 10 1809
-
CVE-2025-47985
HIGH
CVSS 7.8
A privilege escalation vulnerability in Untrusted pointer dereference in Windows Event Tracing (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Information Disclosure
Windows 10 1607
Windows 11 23h2
Windows 10 1507
-
CVE-2025-47984
HIGH
CVSS 7.5
Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.
Microsoft
Information Disclosure
Windows Server 2008
Windows 11 22h2
Windows 10 22h2
-
CVE-2025-47982
HIGH
CVSS 7.8
Improper input validation in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Windows 10 1607
Windows Server 2025
Windows 11 23h2
-
CVE-2025-47976
HIGH
CVSS 7.8
Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.
Microsoft
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2022 23h2
-
CVE-2025-47975
HIGH
CVSS 7.0
A privilege escalation vulnerability in Double free in Windows SSDP Service (CVSS 7.0) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Information Disclosure
Windows 10 1809
Windows 11 22h2
Windows 11 24h2
-
CVE-2025-47973
HIGH
CVSS 7.8
Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
Buffer Overflow
Windows Server 2008
Windows Server 2016
Windows 10 21h2
Windows Server 2012
-
CVE-2025-47972
HIGH
CVSS 8.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network.
Microsoft
Race Condition
Information Disclosure
Windows Server 2016
Windows Server 2022
-
CVE-2025-47971
HIGH
CVSS 7.8
Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.
Buffer Overflow
Windows 10 22h2
Windows 10 1607
Windows 10 1507
Windows 10 1809
-
CVE-2025-47422
HIGH
CVSS 7.5
Advanced Installer before 22.6 has an uncontrolled search path element local privilege escalation vulnerability. When running as SYSTEM in certain configurations, Advanced Installer looks in standard-user writable locations for non-existent binaries and executes them as SYSTEM. A low-privileged attacker can place a malicious binary in a targeted folder; when the installer is executed, the attacker achieves arbitrary SYSTEM code execution.
RCE
Privilege Escalation
-
CVE-2025-47178
HIGH
CVSS 8.0
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.
Microsoft
SQLi
Configuration Manager 2503
-
CVE-2025-47159
HIGH
CVSS 7.8
Protection mechanism failure in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 10 1507
Windows 10 22h2
-
CVE-2025-47136
HIGH
CVSS 7.8
InDesign Desktop versions 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Integer Overflow
Indesign
-
CVE-2025-47134
HIGH
CVSS 7.8
InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Indesign
-
CVE-2025-47133
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Buffer Overflow
Memory Corruption
Framemaker
-
CVE-2025-47132
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Buffer Overflow
Memory Corruption
Framemaker
-
CVE-2025-47131
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Adobe
Framemaker
-
CVE-2025-47130
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Integer Overflow
Framemaker
-
CVE-2025-47129
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Buffer Overflow
Memory Corruption
Framemaker
-
CVE-2025-47128
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Integer Overflow
Framemaker
-
CVE-2025-47127
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Buffer Overflow
Memory Corruption
Framemaker
-
CVE-2025-47126
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Buffer Overflow
Memory Corruption
Framemaker
-
CVE-2025-47125
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Adobe
Framemaker
-
CVE-2025-47124
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Buffer Overflow
Memory Corruption
Framemaker
-
CVE-2025-47123
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Adobe
Framemaker
-
CVE-2025-47122
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Adobe
Framemaker
-
CVE-2025-47121
HIGH
CVSS 7.8
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Adobe
Memory Corruption
Framemaker
-
CVE-2025-47103
HIGH
CVSS 7.8
InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Indesign
-
CVE-2025-47099
HIGH
CVSS 7.8
InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Incopy
-
CVE-2025-47098
HIGH
CVSS 7.8
InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Memory Corruption
Incopy
-
CVE-2025-47097
HIGH
CVSS 7.8
InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Integer Overflow
Incopy
-
CVE-2025-43594
HIGH
CVSS 7.8
InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Indesign
-
CVE-2025-43592
HIGH
CVSS 7.8
InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Memory Corruption
Indesign
-
CVE-2025-43591
HIGH
CVSS 7.8
InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Indesign
-
CVE-2025-43582
HIGH
CVSS 7.8
Substance3D - Viewer versions 0.22 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user, scope unchanged. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Heap Overflow
RCE
Buffer Overflow
Substance 3d Viewer
-
CVE-2025-43019
HIGH
CVSS 7.8
A potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion.
Privilege Escalation
Support Assistant
-
CVE-2025-42959
HIGH
CVSS 8.1
A security vulnerability in An unauthenticated attacker may exploit a scenario where a (CVSS 8.1). High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-42953
HIGH
CVSS 8.1
CVE-2025-42953 is a security vulnerability (CVSS 8.1). High severity vulnerability requiring prompt remediation.
Sap
Authentication Bypass
-
CVE-2025-42952
HIGH
CVSS 7.7
A security vulnerability in SAP Business Warehouse and SAP Plug-In Basis (CVSS 7.7) that allows an authenticated attacker. High severity vulnerability requiring prompt remediation.
Sap
Authentication Bypass
-
CVE-2025-41668
HIGH
CVSS 8.8
CVE-2025-41668 is a security vulnerability (CVSS 8.8). High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-41667
HIGH
CVSS 8.8
CVE-2025-41667 is a security vulnerability (CVSS 8.8). High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-41666
HIGH
CVSS 8.8
CVE-2025-41666 is a security vulnerability (CVSS 8.8). High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-41224
HIGH
CVSS 8.8
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RSL910NC (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.
Information Disclosure
-
CVE-2025-40741
HIGH
CVSS 7.8
A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted CFG files.
This could allow an attacker to execute code in the context of the current process.
Buffer Overflow
Stack Overflow
Solid Edge
-
CVE-2025-40740
HIGH
CVSS 7.8
A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files.
This could allow an attacker to execute code in the context of the current process.
Information Disclosure
Buffer Overflow
Solid Edge
-
CVE-2025-40739
HIGH
CVSS 7.8
A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 5). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files.
This could allow an attacker to execute code in the context of the current process.
Information Disclosure
Buffer Overflow
Solid Edge
-
CVE-2025-40738
HIGH
CVSS 8.8
A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application does not properly validate file paths when extracting uploaded ZIP files. This could allow an attacker to write arbitrary files to restricted locations and potentially execute code with elevated privileges (ZDI-CAN-26572).
Path Traversal
Sinec Nms
-
CVE-2025-40737
HIGH
CVSS 8.8
A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application does not properly validate file paths when extracting uploaded ZIP files. This could allow an attacker to write arbitrary files to restricted locations and potentially execute code with elevated privileges (ZDI-CAN-26571).
Path Traversal
Sinec Nms
-
CVE-2025-40735
HIGH
CVSS 8.8
A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected devices are vulnerable to SQL injection. This could allow an unauthenticated remote attacker to execute arbitrary SQL queries on the server database.
SQLi
Sinec Nms
-
CVE-2025-40718
HIGH
CVSS 7.5
Improper error handling vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to send malformed payloads to generate error messages containing sensitive information.
Information Disclosure
Quiter Gateway
-
CVE-2025-38236
HIGH
CVSS 7.8
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Don't leave consecutive consumed OOB skbs.
Jann Horn reported a use-after-free in unix_stream_read_generic().
The following sequences reproduce the issue:
$ python3
from socket import *
s1, s2 = socketpair(AF_UNIX, SOCK_STREAM)
s1.send(b'x', MSG_OOB)
s2.recv(1, MSG_OOB) # leave a consumed OOB skb
s1.send(b'y', MSG_OOB)
s2.recv(1, MSG_OOB) # leave a consumed OOB skb
s1.send(b'z', MSG_OOB)
s2.recv(1) # recv 'z' illegally
s2.recv(1, MSG_OOB) # access 'z' skb (use-after-free)
Even though a user reads OOB data, the skb holding the data stays on
the recv queue to mark the OOB boundary and break the next recv().
After the last send() in the scenario above, the sk2's recv queue has
2 leading consumed OOB skbs and 1 real OOB skb.
Then, the following happens during the next recv() without MSG_OOB
1. unix_stream_read_generic() peeks the first consumed OOB skb
2. manage_oob() returns the next consumed OOB skb
3. unix_stream_read_generic() fetches the next not-yet-consumed OOB skb
4. unix_stream_read_generic() reads and frees the OOB skb
, and the last recv(MSG_OOB) triggers KASAN splat.
The 3. above occurs because of the SO_PEEK_OFF code, which does not
expect unix_skb_len(skb) to be 0, but this is true for such consumed
OOB skbs.
while (skip >= unix_skb_len(skb)) {
skip -= unix_skb_len(skb);
skb = skb_peek_next(skb, &sk->sk_receive_queue);
...
}
In addition to this use-after-free, there is another issue that
ioctl(SIOCATMARK) does not function properly with consecutive consumed
OOB skbs.
So, nothing good comes out of such a situation.
Instead of complicating manage_oob(), ioctl() handling, and the next
ECONNRESET fix by introducing a loop for consecutive consumed OOB skbs,
let's not leave such consecutive OOB unnecessarily.
Now, while receiving an OOB skb in unix_stream_recv_urg(), if its
previous skb is a consumed OOB skb, it is freed.
[0]:
BUG: KASAN: slab-use-after-free in unix_stream_read_actor (net/unix/af_unix.c:3027)
Read of size 4 at addr ffff888106ef2904 by task python3/315
CPU: 2 UID: 0 PID: 315 Comm: python3 Not tainted 6.16.0-rc1-00407-gec315832f6f9 #8 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.fc42 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl (lib/dump_stack.c:122)
print_report (mm/kasan/report.c:409 mm/kasan/report.c:521)
kasan_report (mm/kasan/report.c:636)
unix_stream_read_actor (net/unix/af_unix.c:3027)
unix_stream_read_generic (net/unix/af_unix.c:2708 net/unix/af_unix.c:2847)
unix_stream_recvmsg (net/unix/af_unix.c:3048)
sock_recvmsg (net/socket.c:1063 (discriminator 20) net/socket.c:1085 (discriminator 20))
__sys_recvfrom (net/socket.c:2278)
__x64_sys_recvfrom (net/socket.c:2291 (discriminator 1) net/socket.c:2287 (discriminator 1) net/socket.c:2287 (discriminator 1))
do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1))
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f8911fcea06
Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 <48> 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08
RSP: 002b:00007fffdb0dccb0 EFLAGS: 00000202 ORIG_RAX: 000000000000002d
RAX: ffffffffffffffda RBX: 00007fffdb0dcdc8 RCX: 00007f8911fcea06
RDX: 0000000000000001 RSI: 00007f8911a5e060 RDI: 0000000000000006
RBP: 00007fffdb0dccd0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000202 R12: 00007f89119a7d20
R13: ffffffffc4653600 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Allocated by task 315:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:60 (discriminator 1) mm/kasan/common.c:69 (discriminator 1))
__kasan_slab_alloc (mm/kasan/common.c:348)
kmem_cache_alloc_
---truncated---
Linux
Use After Free
Memory Corruption
Information Disclosure
Ubuntu
-
CVE-2025-37102
HIGH
CVSS 7.2
An authenticated command injection vulnerability exists in the Command line interface of HPE Networking Instant On Access Points.
A successful exploitation could allow a remote attacker with elevated privileges to execute arbitrary commands on the underlying operating system as a highly privileged user.
Command Injection
-
CVE-2025-36600
HIGH
CVSS 8.2
A remote code execution vulnerability in an externally developed component (CVSS 8.2). High severity vulnerability requiring prompt remediation.
RCE
Dell
Latitude 12 Rugged Extreme 7214 Firmware
-
CVE-2025-33054
HIGH
CVSS 8.1
A security vulnerability in Insufficient UI warning of dangerous operations in Remote Desktop Client (CVSS 8.1) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.
Authentication Bypass
Windows 11 24h2
Windows Server 2025
Windows 11 22h2
Windows 11 23h2
-
CVE-2025-30312
HIGH
CVSS 7.8
Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Dimension
-
CVE-2025-27061
HIGH
CVSS 7.8
Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware.
Buffer Overflow
Memory Corruption
Qca6698au Firmware
Snapdragon Ar2 Gen 1 Firmware
Sm8635p Firmware
-
CVE-2025-27058
HIGH
CVSS 7.8
Memory corruption while processing packet data with exceedingly large packet.
Buffer Overflow
Wsa8845 Firmware
Wsa8840 Firmware
Fastconnect 6900 Firmware
Wsa8845h Firmware
-
CVE-2025-27057
HIGH
CVSS 7.5
Transient DOS while handling beacon frames with invalid IE header length.
Buffer Overflow
Ipq5300 Firmware
Ipq5424 Firmware
Qca6696 Firmware
Ipq5332 Firmware
-
CVE-2025-27056
HIGH
CVSS 7.8
Memory corruption during sub-system restart while processing clean-up to free up resources.
Buffer Overflow
Use After Free
Memory Corruption
Wsa8845 Firmware
Wcd9380 Firmware
-
CVE-2025-27055
HIGH
CVSS 7.8
Memory corruption during the image encoding process.
Buffer Overflow
Wsa8810 Firmware
Sc8180x Ad Firmware
Wsa8845h Firmware
Sm6250 Firmware
-
CVE-2025-27052
HIGH
CVSS 7.8
Memory corruption while processing data packets in diag received from Unix clients.
Buffer Overflow
Sm8635p Firmware
Qcn6274 Firmware
Wcd9370 Firmware
Sxr2230p Firmware
-
CVE-2025-27051
HIGH
CVSS 7.8
CVE-2025-27051 is a security vulnerability (CVSS 7.8). High severity vulnerability requiring prompt remediation.
Buffer Overflow
Qcc2073 Firmware
Sc8380xp Firmware
Qcc2076 Firmware
Wcd9380 Firmware
-
CVE-2025-27050
HIGH
CVSS 7.8
Memory corruption while processing event close when client process terminates abruptly.
Buffer Overflow
Use After Free
Memory Corruption
Qca6420 Firmware
Sm6250 Firmware
-
CVE-2025-27047
HIGH
CVSS 7.8
Memory corruption while processing the TESTPATTERNCONFIG escape path.
Buffer Overflow
Use After Free
Memory Corruption
Wsa8845 Firmware
Qcm5430 Firmware
-
CVE-2025-27046
HIGH
CVSS 7.8
CVE-2025-27046 is a security vulnerability (CVSS 7.8). High severity vulnerability requiring prompt remediation.
Buffer Overflow
Wcd9385 Firmware
Wsa8815 Firmware
Wsa8835 Firmware
Sc8180x Ad Firmware
-
CVE-2025-27044
HIGH
CVSS 7.8
Memory corruption while executing timestamp video decode command with large input values.
Buffer Overflow
Memory Corruption
Wcd9380 Firmware
Fastconnect 6900 Firmware
Wsa8845 Firmware
-
CVE-2025-27043
HIGH
CVSS 7.8
Memory corruption while processing manipulated payload in video firmware.
Buffer Overflow
Qcn5224 Firmware
Video Collaboration Vc3 Platform Firmware
Qmp1000 Firmware
Ar8035 Firmware
-
CVE-2025-27042
HIGH
CVSS 7.8
Memory corruption while processing video packets received from video firmware.
Buffer Overflow
Sg4150p Firmware
Sd888 Firmware
Qcm5430 Firmware
Qca6420 Firmware
-
CVE-2025-25271
HIGH
CVSS 8.8
A security vulnerability in An unauthenticated adjacent attacker (CVSS 8.8). High severity vulnerability requiring prompt remediation.
Information Disclosure
Charx Sec 3000 Firmware
Charx Sec 3150 Firmware
Charx Sec 3100 Firmware
Charx Sec 3050 Firmware
-
CVE-2025-25269
HIGH
CVSS 8.4
An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.
Command Injection
Privilege Escalation
Charx Sec 3000 Firmware
Charx Sec 3150 Firmware
Charx Sec 3100 Firmware
-
CVE-2025-25268
HIGH
CVSS 8.8
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
Authentication Bypass
Charx Sec 3100 Firmware
Charx Sec 3150 Firmware
Charx Sec 3050 Firmware
Charx Sec 3000 Firmware
-
CVE-2025-24006
HIGH
CVSS 7.8
A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
Privilege Escalation
Charx Sec 3000 Firmware
Charx Sec 3150 Firmware
Charx Sec 3050 Firmware
Charx Sec 3100 Firmware
-
CVE-2025-24005
HIGH
CVSS 7.8
A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.
Privilege Escalation
Charx Sec 3000 Firmware
Charx Sec 3150 Firmware
Charx Sec 3100 Firmware
Charx Sec 3050 Firmware
-
CVE-2025-24003
HIGH
CVSS 8.2
An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these stations.
Buffer Overflow
Charx Sec 3050 Firmware
Charx Sec 3100 Firmware
Charx Sec 3000 Firmware
Charx Sec 3150 Firmware
-
CVE-2025-23365
HIGH
CVSS 7.8
A vulnerability has been identified in TIA Administrator (All versions < V3.0.6). The affected application allows low-privileged users to trigger installations by overwriting cache files and modifying the downloads path. This would allow an attacker to escalate privilege and exceute arbitrary code.
RCE
Authentication Bypass
Tia Administrator
-
CVE-2025-21466
HIGH
CVSS 7.8
Memory corruption while processing a private escape command in an event trigger.
Buffer Overflow
Use After Free
Memory Corruption
Wcd9340 Firmware
Sc8180x Aaab Firmware
-
CVE-2025-21454
HIGH
CVSS 7.5
Transient DOS while processing received beacon frame.
Buffer Overflow
Snapdragon 4 Gen 1 Mobile Firmware
Sd855 Firmware
Vision Intelligence 400 Firmware
Sa8650p Firmware
-
CVE-2025-21449
HIGH
CVSS 7.5
Transient DOS may occur while processing malformed length field in SSID IEs.
Buffer Overflow
Ar8031 Firmware
Snapdragon 8 Gen 1 Mobile Firmware
Snapdragon 695 5g Mobile Firmware
Sxr1230p Firmware
-
CVE-2025-21446
HIGH
CVSS 7.5
Transient DOS may occur when processing vendor-specific information elements while parsing a WLAN frame for BTM requests.
Buffer Overflow
Qcn9000 Firmware
Qcn9100 Firmware
Wsa8845 Firmware
Qca6574a Firmware
-
CVE-2025-21445
HIGH
CVSS 7.8
Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host.
Buffer Overflow
Sa7255p Firmware
Qca6696 Firmware
Qam8295p Firmware
Sa8255p Firmware
-
CVE-2025-21444
HIGH
CVSS 7.8
Memory corruption while copying the result to the transmission queue in EMAC.
Buffer Overflow
Qam8620p Firmware
Qamsrv1m Firmware
Sa8620p Firmware
Sa8775p Firmware
-
CVE-2025-21432
HIGH
CVSS 7.8
CVE-2025-21432 is a security vulnerability (CVSS 7.8). High severity vulnerability requiring prompt remediation.
Buffer Overflow
Qam8255p Firmware
Sm7675 Firmware
Sa6145p Firmware
Qsm8350 Firmware
-
CVE-2025-21427
HIGH
CVSS 8.2
Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network.
Information Disclosure
Buffer Overflow
Wcn3610 Firmware
Qam8650p Firmware
Video Collaboration Vc1 Platform Firmware
-
CVE-2025-21422
HIGH
CVSS 7.1
Cryptographic issue while processing crypto API calls, missing checks may lead to corrupted key usage or IV reuses.
Information Disclosure
Snapdragon 860 Mobile Firmware
Qca6678aq Firmware
Wcn7880 Firmware
Qdx1011 Firmware
-
CVE-2025-21166
HIGH
CVSS 7.8
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Substance 3d Designer
-
CVE-2025-21165
HIGH
CVSS 7.8
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Substance 3d Designer
-
CVE-2025-21164
HIGH
CVSS 7.8
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
RCE
Buffer Overflow
Memory Corruption
Substance 3d Designer
-
CVE-2025-21006
HIGH
CVSS 7.0
Out-of-bounds write in handling of macro blocks for MPEG4 codec in libsavsvc.so prior to Android 15 allows local attackers to write out-of-bounds memory.
Google
Buffer Overflow
Memory Corruption
Android
-
CVE-2025-20686
HIGH
CVSS 8.8
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415570; Issue ID: MSV-3404.
Heap Overflow
RCE
Buffer Overflow
Software Development Kit
Openwrt
-
CVE-2025-20685
HIGH
CVSS 8.8
In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00416226; Issue ID: MSV-3409.
Heap Overflow
RCE
Buffer Overflow
Openwrt
Software Development Kit
-
CVE-2025-7346
HIGH
CVSS 8.7
CVE-2025-7346 is a security vulnerability (CVSS 8.7). High severity vulnerability requiring prompt remediation.
Authentication Bypass
Debian
-
CVE-2025-7345
HIGH
CVSS 7.5
A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.
RCE
Buffer Overflow
Ubuntu
Debian
Redhat
-
CVE-2025-7327
HIGH
CVSS 8.8
The Widget for Google Reviews plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.15 via the layout parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This is limited to just PHP files.
PHP
Google
RCE
Path Traversal
WordPress
-
CVE-2025-7326
HIGH
CVSS 7.0
A privilege escalation vulnerability in Weak authentication in EOL ASP.NET Core (CVSS 7.0) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.
Microsoft
Authentication Bypass
-
CVE-2025-7199
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, has been found in code-projects Library System 1.0. This issue affects some unknown processing of the file /notapprove.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Library System
-
CVE-2025-7198
HIGH
CVSS 7.3
A vulnerability classified as critical was found in code-projects Jonnys Liquor 1.0. This vulnerability affects unknown code of the file /admin/admin-area.php. The manipulation of the argument drink leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Jonnys Liquor
-
CVE-2025-7197
HIGH
CVSS 7.3
A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Jonnys Liquor
-
CVE-2025-7196
HIGH
CVSS 7.3
A vulnerability was found in code-projects Jonnys Liquor 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /browse.php. The manipulation of the argument Search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Jonnys Liquor
-
CVE-2025-7194
HIGH
CVSS 8.8
A vulnerability was found in D-Link DI-500WF 17.04.10A1T. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file ip_position.asp of the component jhttpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Buffer Overflow
Di 500wf Firmware
D-Link
-
CVE-2025-7193
HIGH
CVSS 7.3
A vulnerability was found in itsourcecode Agri-Trading Online Shopping System up to 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/suppliercontroller.php. The manipulation of the argument supplier leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Agri Trading Online Shopping System
-
CVE-2025-7191
HIGH
CVSS 7.3
A vulnerability has been found in code-projects Student Enrollment System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Student Enrollment
-
CVE-2025-7185
HIGH
CVSS 7.3
A vulnerability was found in code-projects Library System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /approve.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Library System
-
CVE-2025-7184
HIGH
CVSS 7.3
A vulnerability was found in code-projects Library System 1.0. It has been classified as critical. This affects an unknown part of the file /user/teacher/books.php. The manipulation of the argument Search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Library System
-
CVE-2025-7183
HIGH
CVSS 7.3
A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /pages/customer_account.php. The manipulation of the argument Customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Sales And Inventory System
-
CVE-2025-7180
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, has been found in code-projects Staff Audit System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument User leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Staff Audit System
-
CVE-2025-7179
HIGH
CVSS 7.3
A vulnerability classified as critical was found in code-projects Library System 1.0. This vulnerability affects unknown code of the file /add-teacher.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Library System
-
CVE-2025-7178
HIGH
CVSS 7.3
A vulnerability classified as critical has been found in code-projects Food Distributor Site 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Food Distributor Site
-
CVE-2025-7176
HIGH
CVSS 7.3
A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view-medhistory.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Hospital Management System
-
CVE-2025-7174
HIGH
CVSS 7.3
A vulnerability was found in code-projects Library System 1.0 and classified as critical. This issue affects some unknown processing of the file /teacher-issue-book.php. The manipulation of the argument idn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Library System
-
CVE-2025-7173
HIGH
CVSS 7.3
A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-student.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Library System
-
CVE-2025-7172
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, was found in code-projects Crime Reporting System 1.0. This affects an unknown part of the file /headlogin.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Crime Reporting System
-
CVE-2025-7171
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, has been found in code-projects Crime Reporting System 1.0. Affected by this issue is some unknown functionality of the file /policelogin.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Crime Reporting System
-
CVE-2025-7170
HIGH
CVSS 7.3
A vulnerability classified as critical was found in code-projects Crime Reporting System 1.0. Affected by this vulnerability is an unknown functionality of the file /registration.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Crime Reporting System
-
CVE-2025-7169
HIGH
CVSS 7.3
A vulnerability classified as critical has been found in code-projects Crime Reporting System 1.0. Affected is an unknown function of the file /complainer_page.php. The manipulation of the argument location leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Crime Reporting System
-
CVE-2025-7168
HIGH
CVSS 7.3
A vulnerability was found in code-projects Crime Reporting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /userlogin.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Crime Reporting System
-
CVE-2025-7165
HIGH
CVSS 7.3
A vulnerability was found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Cyber Cafe Management System
-
CVE-2025-7164
HIGH
CVSS 7.3
A vulnerability has been found in PHPGurukul/Campcodes Cyber Cafe Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Cyber Cafe Management System
-
CVE-2025-7160
HIGH
CVSS 7.3
A vulnerability classified as critical has been found in PHPGurukul Zoo Management System 2.1. This affects an unknown part of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-7157
HIGH
CVSS 7.3
A vulnerability was found in code-projects Online Note Sharing 1.0. It has been classified as critical. Affected is an unknown function of the file /login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Online Note Sharing
-
CVE-2025-7155
HIGH
CVSS 7.3
A vulnerability, which was classified as critical, was found in PHPGurukul Online Notes Sharing System 1.0. This affects an unknown part of the file /Dashboard of the component Cookie Handler. The manipulation of the argument sessionid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The original researcher disclosure suspects an XPath Injection vulnerability; however, the provided attack payload appears to be characteristic of an SQL Injection attack.
SQLi
Online Notes Sharing System
-
CVE-2025-7146
HIGH
CVSS 7.5
A arbitrary file access vulnerability in iPublish System developed by Jhenggao (CVSS 7.5). High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-7037
HIGH
CVSS 7.2
SQL injection in Ivanti Endpoint Manager before version 2024 SU3 and 2022 SU8 Security Update 1 allows a remote authenticated attacker with admin privileges to read arbitrary data from the database
Ivanti
SQLi
Endpoint Manager
-
CVE-2025-6996
HIGH
CVSS 8.4
A security vulnerability in the agent of Ivanti Endpoint Manager (CVSS 8.4) that allows a local authenticated attacker. High severity vulnerability requiring prompt remediation.
Information Disclosure
Ivanti
Endpoint Manager
-
CVE-2025-6995
HIGH
CVSS 8.4
A security vulnerability in the agent of Ivanti Endpoint Manager (CVSS 8.4) that allows a local authenticated attacker. High severity vulnerability requiring prompt remediation.
Information Disclosure
Ivanti
Endpoint Manager
-
CVE-2025-6759
HIGH
CVSS 7.8
Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS
Microsoft
Citrix
Privilege Escalation
Virtual Apps And Desktops
Windows
-
CVE-2025-6746
HIGH
CVSS 8.8
The WoodMart plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.2.3 via the 'layout' attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php files can be uploaded and included.
PHP
RCE
Information Disclosure
WordPress
Lfi
-
CVE-2025-6744
HIGH
CVSS 7.3
The The Woodmart theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.2.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode through the woodmart_get_products_shortcode() function. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
WordPress
RCE
Code Injection
Woodmart
PHP
-
CVE-2025-3648
HIGH
CVSS 8.2
A security vulnerability in A vulnerability (CVSS 8.2) that allows unauthenticated and authenticated users. High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-0928
HIGH
CVSS 8.8
In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution.
RCE
Authentication Bypass
Ubuntu
Debian
Juju
-
CVE-2024-56468
HIGH
CVSS 7.5
IBM InfoSphere Data Replication VSAM for z/OS Remote Source 11.4 could allow a remote user to cause a denial of service by sending an invalid HTTP request to the log reading service.
IBM
Buffer Overflow
Stack Overflow
Denial Of Service
Infosphere Data Replication
-
CVE-2024-52965
HIGH
CVSS 7.2
A security vulnerability in Fortinet FortiOS (CVSS 7.2). High severity vulnerability requiring prompt remediation.
Fortinet
Information Disclosure
Fortiproxy
Fortios
-
CVE-2024-31854
HIGH
CVSS 8.1
A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check device's certificate common name against an expected value.
This could allow an attacker to execute an on-path network (MitM) attack.
Information Disclosure
Sicam Toolbox Ii
-
CVE-2024-31853
HIGH
CVSS 8.1
A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check the extended key usage attribute of that device's certificate.
This could allow an attacker to execute an on-path network (MitM) attack.
Information Disclosure
Sicam Toolbox Ii
-
CVE-2023-52236
HIGH
CVSS 7.0
A security vulnerability in A vulnerability (CVSS 7.0). High severity vulnerability requiring prompt remediation.
Information Disclosure
-
CVE-2025-53545
MEDIUM
CVSS 6.9
Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Users can circumvent 2FA login for users due to a lack of server side validation for the same. This vulnerability is fixed in commit ddb439f8eb1816010f2ef653a908648b71f9bba8.
Authentication Bypass
-
CVE-2025-53512
MEDIUM
CVSS 6.5
The /log endpoint on a Juju controller lacked sufficient authorization checks, allowing unauthorized users to access debug messages that could contain sensitive information.
Information Disclosure
Ubuntu
Debian
Juju
Suse
-
CVE-2025-53480
MEDIUM
CVSS 5.4
The CheckUser extension’s Special:Investigate page has a vulnerability in the Account information tab, where specific internationalized messages are rendered without proper escaping. Attackers can exploit this by appending ?uselang=x-xss to the URL, causing reflected XSS when the UI renders affected message keys.
This issue affects Mediawiki - CheckUser extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
XSS
-
CVE-2025-53479
MEDIUM
CVSS 5.4
The CheckUser extension’s Special:CheckUser interface is vulnerable to reflected XSS via the rev-deleted-user message. This message is rendered without proper escaping, making it possible to inject JavaScript through the uselang=x-xss language override mechanism.
This issue affects Mediawiki - CheckUser extension: from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
XSS
-
CVE-2025-49722
MEDIUM
CVSS 5.7
Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network.
Microsoft
Denial Of Service
Windows 10 21h2
Windows Server 2016
Windows 10 1507
-
CVE-2025-49706
MEDIUM
CVSS 6.5
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
Microsoft
Authentication Bypass
Sharepoint Enterprise Server
Sharepoint Server
-
CVE-2025-49684
MEDIUM
CVSS 5.5
Buffer over-read in Storage Port Driver allows an authorized attacker to disclose information locally.
Buffer Overflow
Windows 10 1507
Windows Server 2016
Windows Server 2019
Windows Server 2025
-
CVE-2025-49681
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
Microsoft
Information Disclosure
Buffer Overflow
Windows Server 2012
Windows Server 2022
-
CVE-2025-49671
MEDIUM
CVSS 6.5
Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
Microsoft
Information Disclosure
Buffer Overflow
Windows Server 2022
Windows Server 2025
-
CVE-2025-49670
MEDIUM
CVSS 6.5
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Microsoft
Heap Overflow
Buffer Overflow
Windows Server 2012
Windows Server 2025
-
CVE-2025-49664
MEDIUM
CVSS 5.5
Exposure of sensitive information to an unauthorized actor in Windows User-Mode Driver Framework Host allows an authorized attacker to disclose information locally.
Microsoft
Information Disclosure
Windows Server 2019
Windows 11 22h2
Windows 10 21h2
-
CVE-2025-49658
MEDIUM
CVSS 5.5
Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally.
Microsoft
Information Disclosure
Buffer Overflow
Windows Server 2019
Windows Server 2012
-
CVE-2025-49547
MEDIUM
CVSS 5.4
Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Scope is changed.
XSS
Adobe
Experience Manager
-
CVE-2025-49545
MEDIUM
CVSS 6.2
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A high-privilege authenticated attacker can force the application to make arbitrary requests via injection of URLs. Exploitation of this issue does not require user interaction and scope is changed. The vulnerable component is restricted to internal IP addresses.
SSRF
Coldfusion
-
CVE-2025-49544
MEDIUM
CVSS 6.8
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to access sensitive information or bypass security measures. Exploitation of this issue does not require user interaction and scope is changed.
XXE
Coldfusion
-
CVE-2025-49543
MEDIUM
CVSS 4.3
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses.
XSS
Coldfusion
-
CVE-2025-49542
MEDIUM
CVSS 5.2
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser, scope is changed. The vulnerable component is restricted to internal IP addresses.
XSS
Coldfusion
-
CVE-2025-49541
MEDIUM
CVSS 4.3
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses.
XSS
Coldfusion
-
CVE-2025-49540
MEDIUM
CVSS 4.3
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses.
XSS
Coldfusion
-
CVE-2025-49539
MEDIUM
CVSS 4.5
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in a security feature bypass. A high-privileged attacker could leverage this vulnerability to access sensitive information. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses.
XXE
Coldfusion
-
CVE-2025-49534
MEDIUM
CVSS 5.4
Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Scope is changed.
XSS
Adobe
Experience Manager
-
CVE-2025-49525
MEDIUM
CVSS 5.5
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Illustrator
-
CVE-2025-49524
MEDIUM
CVSS 5.5
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Null Pointer Dereference
Denial Of Service
Illustrator
-
CVE-2025-48823
MEDIUM
CVSS 5.9
Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose information over a network.
Microsoft
Information Disclosure
Windows 10 1607
Windows 10 22h2
Windows 11 22h2
-
CVE-2025-48818
MEDIUM
CVSS 6.8
Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Microsoft
Authentication Bypass
Windows 11 22h2
Windows 10 1809
Windows 10 22h2
-
CVE-2025-48812
MEDIUM
CVSS 5.5
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
Microsoft
Information Disclosure
Buffer Overflow
Excel
365 Apps
-
CVE-2025-48811
MEDIUM
CVSS 6.7
A privilege escalation vulnerability (CVSS 6.7) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows Server 2022 23h2
Windows Server 2016
Windows 10 1507
-
CVE-2025-48810
MEDIUM
CVSS 5.5
CVE-2025-48810 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows 11 24h2
Windows Server 2025
Windows
-
CVE-2025-48809
MEDIUM
CVSS 5.5
CVE-2025-48809 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows 11 24h2
Windows Server 2025
Windows
-
CVE-2025-48808
MEDIUM
CVSS 5.5
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
Microsoft
Information Disclosure
Windows Server 2019
Windows Server 2022 23h2
Windows Server 2025
-
CVE-2025-48804
MEDIUM
CVSS 6.8
A security vulnerability in Acceptance of extraneous untrusted data with trusted data in Windows BitLocker (CVSS 6.8) that allows an unauthorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 11 23h2
Windows 10 1607
-
CVE-2025-48803
MEDIUM
CVSS 6.7
A privilege escalation vulnerability (CVSS 6.7) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows 11 22h2
Windows 11 23h2
Windows 10 21h2
-
CVE-2025-48802
MEDIUM
CVSS 6.5
Improper certificate validation in Windows SMB allows an authorized attacker to perform spoofing over a network.
Microsoft
Information Disclosure
Windows Server 2022 23h2
Windows Server 2022
Windows 11 22h2
-
CVE-2025-48800
MEDIUM
CVSS 6.8
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Microsoft
Authentication Bypass
Windows 10 1607
Windows Server 2022
Windows 11 23h2
-
CVE-2025-48386
MEDIUM
CVSS 6.3
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), leading to potential buffer overflows. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
Buffer Overflow
Ubuntu
Debian
Redhat
Suse
-
CVE-2025-48003
MEDIUM
CVSS 6.8
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Microsoft
Authentication Bypass
Windows 10 22h2
Windows Server 2022
Windows 11 22h2
-
CVE-2025-48002
MEDIUM
CVSS 5.7
Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to disclose information over an adjacent network.
Microsoft
Information Disclosure
Buffer Overflow
Windows 11 24h2
Windows Server 2025
-
CVE-2025-48001
MEDIUM
CVSS 6.8
Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 11 24h2
Windows 10 21h2
-
CVE-2025-47999
MEDIUM
CVSS 6.8
A security vulnerability in Missing synchronization in Windows Hyper-V (CVSS 6.8) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows 10 1607
Windows Server 2022 23h2
Windows Server 2019
-
CVE-2025-47980
MEDIUM
CVSS 6.2
Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally.
Microsoft
Information Disclosure
Windows Server 2022
Windows 11 24h2
Windows 10 1809
-
CVE-2025-47978
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network.
Microsoft
Information Disclosure
Buffer Overflow
Windows Server 2022 23h2
Windows Server 2022
-
CVE-2025-47135
MEDIUM
CVSS 5.5
Dimension versions 4.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Dimension
-
CVE-2025-47120
MEDIUM
CVSS 5.5
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Buffer Overflow
Adobe
Stack Overflow
Framemaker
-
CVE-2025-47119
MEDIUM
CVSS 5.5
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Null Pointer Dereference
Adobe
Denial Of Service
Framemaker
-
CVE-2025-47109
MEDIUM
CVSS 5.5
After Effects versions 25.2, 24.6.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Null Pointer Dereference
Denial Of Service
After Effects
-
CVE-2025-43587
MEDIUM
CVSS 5.5
After Effects versions 25.2, 24.6.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
After Effects
-
CVE-2025-43584
MEDIUM
CVSS 5.5
Substance3D - Viewer versions 0.22 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Substance 3d Viewer
-
CVE-2025-43583
MEDIUM
CVSS 5.5
Substance3D - Viewer versions 0.22 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Null Pointer Dereference
Denial Of Service
Substance 3d Viewer
-
CVE-2025-43580
MEDIUM
CVSS 5.5
Audition versions 25.2, 24.6.3 and earlier are affected by an Access of Memory Location After End of Buffer vulnerability that could result in application denial-of-service. An attacker could leverage this vulnerability to crash the application or disrupt its functionality. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Denial Of Service
Audition
-
CVE-2025-43001
MEDIUM
CVSS 6.9
SAPCAR allows an attacker logged in with high privileges to override the permissions of the current and parent directories of the user or process extracting the archive, leading to privilege escalation. On successful exploitation, an attacker could modify the critical files by tampering with signed archives without breaking the signature, but it has a low impact on the confidentiality and availability of the system.
Privilege Escalation
-
CVE-2025-42992
MEDIUM
CVSS 6.9
SAPCAR allows an attacker logged in with high privileges to create a malicious SAR archive in SAPCAR. This could enable the attacker to exploit critical files and directory permissions without breaking signature validation, resulting in potential privilege escalation. This has high impact on integrity, but low impact on confidentiality and availability of the system.
Privilege Escalation
-
CVE-2025-42986
MEDIUM
CVSS 4.3
Due to a missing authorization check in an obsolete RFC enabled function module in SAP BASIS, an authenticated low-privileged attacker could call a Remote Function Call (RFC), potentially accessing restricted system information. This results in low impact on confidentiality, with no impact on integrity or availability of the application.
Sap
Authentication Bypass
Sap Basis
-
CVE-2025-42985
MEDIUM
CVSS 6.1
Due to insufficient sanitization in the SAP BusinessObjects Content Administrator Workbench, attackers could craft malicious URLs and execute scripts in a victim�s browser. This could potentially lead to the exposure or modification of web client data, resulting in low impact on confidentiality and integrity, with no impact on application availability.
Sap
Open Redirect
-
CVE-2025-42981
MEDIUM
CVSS 6.1
Due to an open redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft a URL link embedding a malicious script at a location not properly sanitized. When a victim clicks on this link, the script executes within the victim's browser, redirecting them to a site controlled by the attacker. This allows the attacker to access and/or modify restricted information related to the web client. While the vulnerability poses no impact on data availability, it presents a considerable risk to confidentiality and integrity.
Sap
Open Redirect
-
CVE-2025-42979
MEDIUM
CVSS 5.6
CVE-2025-42979 is a security vulnerability (CVSS 5.6). Remediation should follow standard vulnerability management procedures.
Microsoft
Sap
Information Disclosure
Windows
-
CVE-2025-42974
MEDIUM
CVSS 4.3
CVE-2025-42974 is a security vulnerability (CVSS 4.3) that allows access. Remediation should follow standard vulnerability management procedures.
Authentication Bypass
-
CVE-2025-42973
MEDIUM
CVSS 5.4
Due to a Cross-Site Scripting vulnerability in SAP Data Services Management Console, an authenticated attacker could exploit the search functionality associated with DQ job status reports. By intercepting requests, malicious script can be injected and subsequently executed when a user loads the affected page. This results in a limited impact on the confidentiality and integrity of user session information, while availability remains unaffected.
Sap
XSS
-
CVE-2025-42971
MEDIUM
CVSS 4.0
A memory corruption vulnerability exists in SAPCAR allowing an attacker to craft malicious SAPCAR archives. When a high privileged victim extracts this malicious archive, it gets processed by SAPCAR on their system, resulting in out-of-bounds memory read and write. This could lead to file extraction and file overwrite outside the intended directories. This vulnerability has low impact on the confidentiality, integrity and availability of the application.
Buffer Overflow
Memory Corruption
-
CVE-2025-42970
MEDIUM
CVSS 5.8
SAPCAR improperly sanitizes the file paths while extracting SAPCAR archives. Due to this, an attacker could craft a malicious SAPCAR archive containing directory traversal sequences. When a high privileged victim extracts this malicious archive, it is then processed by SAPCAR on their system, causing files to be extracted outside the intended directory and overwriting files in arbitrary locations. This vulnerability has a high impact on the integrity and availability of the application with no impact on confidentiality.
Path Traversal
-
CVE-2025-42969
MEDIUM
CVSS 6.1
SAP NetWeaver Application Server ABAP and ABAP Platform allows an unauthenticated attacker to inject a malicious script into a dynamically crafted URL. The victim, when tricked into clicking on this crafted URL unknowingly executes the malicious payload in their browser. On successful exploitation, the attacker can access or modify sensitive information within the scope of victim's web browser, with no impact on availability of the application.
Sap
XSS
-
CVE-2025-42968
MEDIUM
CVSS 5.0
SAP NetWeaver allows an authenticated non-administrative user to call the remote-enabled function module which could grants access to non-sensitive information about the SAP system and OS without requiring any specific knowledge or controlled conditions. This leads to a low impact on confidentiality with no effect on integrity or availability of the application.
Sap
Authentication Bypass
Netweaver
-
CVE-2025-42965
MEDIUM
CVSS 4.1
SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application.
Sap
Information Disclosure
SSRF
-
CVE-2025-42962
MEDIUM
CVSS 6.1
SAP Business Warehouse (Business Explorer Web) allows an attacker to create a malicious link. If an authenticated user clicks on this link, the injected script gets executed within the scope of victim�s browser. This potentially leads to an impact on confidentiality and integrity. Availability is not impacted.
Sap
XSS
-
CVE-2025-42961
MEDIUM
CVSS 4.9
Due to a missing authorization check in SAP NetWeaver Application server for ABAP, an authenticated user with high privileges could exploit the insufficient validation of user permissions to access sensitive database tables. By leveraging overly permissive access configurations, unauthorized reading of critical data is possible, resulting in a significant impact on the confidentiality of the information stored. However, the integrity and availability of the system remain unaffected.
Sap
Authentication Bypass
-
CVE-2025-42960
MEDIUM
CVSS 4.3
CVE-2025-42960 is a security vulnerability (CVSS 4.3) that allows an authenticated attacker. Remediation should follow standard vulnerability management procedures.
Sap
Authentication Bypass
-
CVE-2025-42956
MEDIUM
CVSS 6.1
SAP NetWeaver Application Server ABAP and ABAP Platform allows an unauthenticated attacker to create a malicious link which they can make publicly available. When an authenticated victim clicks on this malicious link, injected input data will be used by the web site page generation to create content which when executed in the victim's browser leading to low impact on Confidentiality and Integrity with no effect on Availability of the application.
Sap
XSS
Sap Basis
-
CVE-2025-41665
MEDIUM
CVSS 6.5
An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file.
Privilege Escalation
-
CVE-2025-41223
MEDIUM
CVSS 4.8
A security vulnerability in A vulnerability (CVSS 4.8). Remediation should follow standard vulnerability management procedures.
Information Disclosure
-
CVE-2025-41222
MEDIUM
CVSS 5.3
A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). Affected devices do not properly handle malformed TLS handshake messages. This could allow an attacker with network access to the webserver to cause a denial of service resulting in the web server and the device to crash.
Denial Of Service
-
CVE-2025-40742
MEDIUM
CVSS 5.3
A security vulnerability in A vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures.
Authentication Bypass
-
CVE-2025-40721
MEDIUM
CVSS 5.4
Reflected Cross-site Scripting (XSS) vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL trhough the id_factura parameter in /<Client>FacturaE/listado_facturas_ficha.jsp.
XSS
Quiter Gateway
-
CVE-2025-40720
MEDIUM
CVSS 6.1
Reflected Cross-site Scripting (XSS) vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL trhough the campo parameter in /<Client>FacturaE/VerFacturaPDF.
XSS
Quiter Gateway
-
CVE-2025-40719
MEDIUM
CVSS 6.1
Reflected Cross-site Scripting (XSS) vulnerability in versions prior to 4.7.0 of Quiter Gateway by Quiter. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending a malicious URL trhough the id_concesion parameter in /<Client>FacturaE/VerFacturaPDF.
XSS
Quiter Gateway
-
CVE-2025-40593
MEDIUM
CVSS 6.5
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0). The affected application allows to control the device by storing arbitrary files in the SFTP folder of the device. This could allow an attacker to cause a denial of service condition.
Denial Of Service
Simatic Cn 4100 Firmware
-
CVE-2025-38237
MEDIUM
CVSS 5.5
CVE-2025-38237 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Linux
Information Disclosure
Ubuntu
Debian
Linux Kernel
-
CVE-2025-31326
MEDIUM
CVSS 4.1
SAP�BusinessObjects Business�Intelligence Platform (Web Intelligence) is vulnerable to HTML Injection, allowing an attacker with basic user privileges to inject malicious code into specific input fields. This could lead to unintended redirects or manipulation of application behavior, such as redirecting users to attacker-controlled domains. This issue primarily affects the integrity of the system. However, the confidentiality and availability of the system remain unaffected.
Sap
XSS
-
CVE-2025-30313
MEDIUM
CVSS 5.5
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Illustrator
-
CVE-2025-29267
MEDIUM
CVSS 6.5
SQL Injection vulnerability in Abis, Inc Adjutant Core Accounting ERP build v.PreBeta250F allows a remote attacker to obtain a sensitive information via the cid parameter in the GET request.
SQLi
-
CVE-2025-27369
MEDIUM
CVSS 4.3
IBM OpenPages with Watson 8.3 and 9.0
is vulnerable to information disclosure of sensitive information due to a weaker than expected security for certain REST end points used for the administration of OpenPages. An authenticated user is able to obtain certain information about system configuration and internal state which is only intended for administrators of the system.
Information Disclosure
IBM
Openpages With Watson
-
CVE-2025-27367
MEDIUM
CVSS 5.3
A security vulnerability in IBM OpenPages with Watson 8.3 and 9.0 (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Authentication Bypass
IBM
Openpages With Watson
-
CVE-2025-27165
MEDIUM
CVSS 5.5
Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Substance 3d Stager
-
CVE-2025-27127
MEDIUM
CVSS 4.3
A vulnerability has been identified in TIA Project-Server (All versions < V2.1.1), TIA Project-Server V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions < V19 Update 4), Totally Integrated Automation Portal (TIA Portal) V20 (All versions < V20 Update 3). The affected application improperly handles uploaded projects in the document root. This could allow an attacker with contributor privileges to cause denial of service by uploading a malicious project.
File Upload
Denial Of Service
-
CVE-2025-26636
MEDIUM
CVSS 5.5
CVE-2025-26636 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows Server 2025
Windows 11 24h2
Windows
-
CVE-2025-24004
MEDIUM
CVSS 5.2
A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a temporary denial-of-service for the stations until they got restarted by the watchdog.
Buffer Overflow
Charx Sec 3150 Firmware
Charx Sec 3000 Firmware
Charx Sec 3100 Firmware
Charx Sec 3050 Firmware
-
CVE-2025-24002
MEDIUM
CVSS 5.3
An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog.
Denial Of Service
Charx Sec 3100 Firmware
Charx Sec 3000 Firmware
Charx Sec 3050 Firmware
Charx Sec 3150 Firmware
-
CVE-2025-23364
MEDIUM
CVSS 6.2
A vulnerability has been identified in TIA Administrator (All versions < V3.0.6). The affected application improperly validates code signing certificates.
This could allow an attacker to bypass the check and exceute arbitrary code during installations.
RCE
Tia Administrator
-
CVE-2025-21433
MEDIUM
CVSS 6.2
Transient DOS when importing a PKCS#8-encoded RSA private key with a zero-sized modulus.
Null Pointer Dereference
Denial Of Service
Wcn6450 Firmware
Qcm2150 Firmware
Snapdragon 888 5g Mobile Firmware
-
CVE-2025-21426
MEDIUM
CVSS 6.6
Memory corruption while processing camera TPG write request.
Buffer Overflow
Wsa8832 Firmware
Wsa8835 Firmware
Snapdragon Ar1 Gen 1 Platform Firmware
Ssg2115p Firmware
-
CVE-2025-21195
MEDIUM
CVSS 6.0
Improper link resolution before file access ('link following') in Service Fabric allows an authorized attacker to elevate privileges locally.
Information Disclosure
Azure Service Fabric
-
CVE-2025-21168
MEDIUM
CVSS 5.5
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Substance 3d Designer
-
CVE-2025-21167
MEDIUM
CVSS 5.5
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Information Disclosure
Buffer Overflow
Substance 3d Designer
-
CVE-2025-21009
MEDIUM
CVSS 5.5
Out-of-bounds read in decoding malformed frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption.
Google
Information Disclosure
Buffer Overflow
Android
-
CVE-2025-21008
MEDIUM
CVSS 5.5
Out-of-bounds read in decoding frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption.
Google
Information Disclosure
Buffer Overflow
Android
-
CVE-2025-21007
MEDIUM
CVSS 5.5
Out-of-bounds write in accessing uninitialized memory in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption.
Google
Buffer Overflow
Memory Corruption
Android
-
CVE-2025-21005
MEDIUM
CVSS 5.5
Improper access control in isemtelephony prior to Android 15 allows local attackers to access sensitive information.
Google
Information Disclosure
Android
-
CVE-2025-21004
MEDIUM
CVSS 6.2
Improper verification of intent by broadcast receiver in System UI for Galaxy Watch prior to SMR Jul-2025 Release 1 allows local attackers to power off the device.
Information Disclosure
Wear Os
-
CVE-2025-21003
MEDIUM
CVSS 4.0
Insecure storage of sensitive information in Emergency SOS prior to SMR Jul-2025 Release 1 allows local attackers to access sensitive information.
Information Disclosure
Android
-
CVE-2025-21002
MEDIUM
CVSS 6.2
A security vulnerability in LeAudioService (CVSS 6.2) that allows local attackers. Remediation should follow standard vulnerability management procedures.
Information Disclosure
Android
-
CVE-2025-21001
MEDIUM
CVSS 6.2
A security vulnerability in LeAudioService (CVSS 6.2) that allows local attackers. Remediation should follow standard vulnerability management procedures.
Information Disclosure
Android
-
CVE-2025-21000
MEDIUM
CVSS 6.2
A security vulnerability in Bluetooth (CVSS 6.2) that allows local attackers. Remediation should follow standard vulnerability management procedures.
Information Disclosure
Android
-
CVE-2025-20999
MEDIUM
CVSS 4.1
Improper authorization in accessing saved Wi-Fi password for Galaxy Tablet prior to SMR Jul-2025 Release 1 allows secondary users to access owner's saved Wi-Fi password.
Authentication Bypass
Android
-
CVE-2025-20998
MEDIUM
CVSS 5.5
A security vulnerability in SamsungAccount for Galaxy Watch (CVSS 5.5) that allows local attackers. Remediation should follow standard vulnerability management procedures.
Information Disclosure
Wear Os
Samsung
-
CVE-2025-20997
MEDIUM
CVSS 6.2
A security vulnerability in Framework for Galaxy Watch (CVSS 6.2) that allows local attackers. Remediation should follow standard vulnerability management procedures.
Information Disclosure
Wear Os
-
CVE-2025-20983
MEDIUM
CVSS 6.4
Out-of-bounds write in checking auth secret in KnoxVault trustlet prior to SMR Jul-2025 Release 1 allows local privileged attackers to write out-of-bounds memory.
Buffer Overflow
Memory Corruption
Android
-
CVE-2025-20982
MEDIUM
CVSS 6.4
Out-of-bounds write in setting auth secret in KnoxVault trustlet prior to SMR Jul-2025 Release 1 allows local privileged attackers to write out-of-bounds memory.
Buffer Overflow
Memory Corruption
Android
-
CVE-2025-20695
MEDIUM
CVSS 6.5
In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09741871; Issue ID: MSV-3317.
Denial Of Service
Software Development Kit
Android
Openwrt
Google
-
CVE-2025-20694
MEDIUM
CVSS 6.5
In Bluetooth FW, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09752821; Issue ID: MSV-3342.
Denial Of Service
Software Development Kit
Android
Openwrt
Google
-
CVE-2025-20693
MEDIUM
CVSS 6.5
In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421.
Information Disclosure
Buffer Overflow
Yocto
Openwrt
Software Development Kit
-
CVE-2025-20692
MEDIUM
CVSS 5.5
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418040; Issue ID: MSV-3476.
Information Disclosure
Buffer Overflow
Software Development Kit
Openwrt
-
CVE-2025-20691
MEDIUM
CVSS 5.5
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418039; Issue ID: MSV-3477.
Information Disclosure
Buffer Overflow
Software Development Kit
Openwrt
-
CVE-2025-20690
MEDIUM
CVSS 5.5
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418038; Issue ID: MSV-3478.
Information Disclosure
Buffer Overflow
Openwrt
Software Development Kit
-
CVE-2025-20689
MEDIUM
CVSS 5.5
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418048; Issue ID: MSV-3479.
Information Disclosure
Buffer Overflow
Openwrt
Software Development Kit
-
CVE-2025-20688
MEDIUM
CVSS 5.5
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418047; Issue ID: MSV-3480.
Information Disclosure
Buffer Overflow
Openwrt
Software Development Kit
-
CVE-2025-20687
MEDIUM
CVSS 5.5
In Bluetooth driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418045; Issue ID: MSV-3481.
Information Disclosure
Buffer Overflow
Denial Of Service
Nbiot Sdk
-
CVE-2025-7363
MEDIUM
CVSS 5.4
The TitleIcon extension for MediaWiki is vulnerable to stored XSS through the #titleicon_unicode parser function. User input passed to this function is wrapped in an HtmlArmor object without sanitization and rendered directly into the page header, allowing attackers to inject arbitrary JavaScript.
This issue affects Mediawiki - TitleIcon extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
XSS
-
CVE-2025-7362
MEDIUM
CVSS 5.4
The MsUpload extension for MediaWiki is vulnerable to stored XSS via the msu-continue system message, which is inserted into the DOM without proper sanitization. The vulnerability occurs in the file upload UI when the same filename is uploaded twice.
This issue affects Mediawiki - MsUpload extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.
File Upload
XSS
-
CVE-2025-7200
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, was found in krishna9772 Pharmacy Management System up to a2efc8442931ec9308f3b4cf4778e5701153f4e5. Affected is an unknown function of the file quantity_upd.php. The manipulation of the argument med_name/med_cat/ex_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
PHP
SQLi
Pharmacy Management System
-
CVE-2025-7192
MEDIUM
CVSS 6.3
A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
Command Injection
Dir 645 Firmware
D-Link
-
CVE-2025-7190
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. This affects an unknown part of the file /admin/student_edit_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
File Upload
PHP
Authentication Bypass
Library Management System
-
CVE-2025-7189
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, has been found in code-projects Chat System 1.0. Affected by this issue is some unknown functionality of the file /user/send_message.php. The manipulation of the argument msg leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Chat System
-
CVE-2025-7188
MEDIUM
CVSS 6.3
A vulnerability classified as critical was found in code-projects Chat System 1.0. Affected by this vulnerability is an unknown functionality of the file /user/addmember.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Chat System
-
CVE-2025-7187
MEDIUM
CVSS 6.3
A vulnerability classified as critical has been found in code-projects Chat System 1.0. Affected is an unknown function of the file /user/fetch_member.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Chat System
-
CVE-2025-7186
MEDIUM
CVSS 6.3
A vulnerability was found in code-projects Chat System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/fetch_chat.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Chat System
-
CVE-2025-7182
MEDIUM
CVSS 4.3
A vulnerability has been found in itsourcecode Student Transcript Processing System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/modules/subject/edit.php. The manipulation of the argument pre leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
XSS
Student Transcript Processing System
-
CVE-2025-7181
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, was found in code-projects Staff Audit System 1.0. Affected is an unknown function of the file /test.php. The manipulation of the argument uploadedfile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
File Upload
PHP
Authentication Bypass
Staff Audit System
-
CVE-2025-7177
MEDIUM
CVSS 4.7
A vulnerability was found in PHPGurukul Car Washing Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/editcar-washpoint.php. The manipulation of the argument wpid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Car Washing Management System
-
CVE-2025-7175
MEDIUM
CVSS 6.3
A vulnerability was found in code-projects E-Commerce Site 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/users_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
File Upload
PHP
Authentication Bypass
E Commerce Site
-
CVE-2025-7167
MEDIUM
CVSS 6.3
A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Responsive Blog Site
-
CVE-2025-7166
MEDIUM
CVSS 6.3
A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been classified as critical. This affects an unknown part of the file /single.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Responsive Blog Site
-
CVE-2025-7163
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, was found in PHPGurukul Zoo Management System 2.1. Affected is an unknown function of the file /admin/add-animals.php. The manipulation of the argument cnum leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-7162
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, has been found in PHPGurukul Zoo Management System 2.1. This issue affects some unknown processing of the file /admin/add-foreigners-ticket.php. The manipulation of the argument cprice leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-7161
MEDIUM
CVSS 6.3
A vulnerability classified as critical was found in PHPGurukul Zoo Management System 2.1. This vulnerability affects unknown code of the file /admin/add-normal-ticket.php. The manipulation of the argument cprice leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-7159
MEDIUM
CVSS 6.3
A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/manage-animals.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-7158
MEDIUM
CVSS 6.3
A vulnerability was found in PHPGurukul Zoo Management System 2.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/manage-normal-ticket.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
PHP
SQLi
Zoo Management System
-
CVE-2025-7156
MEDIUM
CVSS 6.3
A vulnerability has been found in hitsz-ids airda 0.0.3 and classified as critical. This vulnerability affects the function execute of the file /v1/chat/completions. The manipulation of the argument question leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
SQLi
-
CVE-2025-7154
MEDIUM
CVSS 6.3
A vulnerability, which was classified as critical, has been found in TOTOLINK N200RE 9.3.5u.6095_B20200916/9.3.5u.6139_B20201216. Affected by this issue is the function sub_41A0F8 of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument Hostname leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Command Injection
N200re Firmware
TOTOLINK
-
CVE-2025-7152
MEDIUM
CVSS 6.3
A vulnerability classified as critical has been found in Campcodes Advanced Online Voting System 1.0. Affected is an unknown function of the file /admin/candidates_add.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
File Upload
PHP
Authentication Bypass
Advanced Online Voting System
-
CVE-2025-7031
MEDIUM
CVSS 5.3
Missing Authentication for Critical Function vulnerability in Drupal Config Pages Viewer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Config Pages Viewer: from 0.0.0 before 1.0.4.
Authentication Bypass
Config Pages Viewer
Drupal
-
CVE-2025-7030
MEDIUM
CVSS 6.5
CVE-2025-7030 is a security vulnerability (CVSS 6.5). Remediation should follow standard vulnerability management procedures.
Information Disclosure
Two Factor Authentication
Drupal
-
CVE-2025-6743
MEDIUM
CVSS 6.4
The Woodmart theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'multiple_markers' attribute in all versions up to, and including, 8.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
WordPress
XSS
Woodmart
PHP
-
CVE-2025-6244
MEDIUM
CVSS 6.4
The Essential Addons for Elementor - Popular Elementor Templates and Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the via `Calendar` And `Business Reviews` Widgets attributes in all versions up to, and including, 6.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
WordPress
XSS
Essential Addons For Elementor
PHP
-
CVE-2025-5957
MEDIUM
CVSS 5.3
A security vulnerability in all (CVSS 5.3). Remediation should follow standard vulnerability management procedures.
WordPress
Authentication Bypass
PHP
-
CVE-2025-5570
MEDIUM
CVSS 5.4
The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
WordPress
XSS
Ai Engine
PHP
-
CVE-2025-5537
MEDIUM
CVSS 6.4
The Lightbox & Modal Popup WordPress Plugin - FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and including, 2.7.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
WordPress
XSS
Foobox
PHP
-
CVE-2025-5464
MEDIUM
CVSS 6.5
Insertion of sensitive information into a log file in Ivanti Connect Secure before version 22.7R2.8 allows a local authenticated attacker to obtain that information.
Information Disclosure
Ivanti
Connect Secure
-
CVE-2025-5463
MEDIUM
CVSS 5.5
Insertion of sensitive information into a log file in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a local authenticated attacker to obtain that information.
Information Disclosure
Ivanti
Connect Secure
Policy Secure
-
CVE-2025-5451
MEDIUM
CVSS 4.9
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to trigger a denial of service.
Buffer Overflow
Ivanti
Stack Overflow
Denial Of Service
Connect Secure
-
CVE-2025-5450
MEDIUM
CVSS 6.3
A security vulnerability in the certificate management component of Ivanti Connect Secure (CVSS 6.3) that allows a remote authenticated admin with read-only rights. Remediation should follow standard vulnerability management procedures.
Information Disclosure
Ivanti
Connect Secure
Policy Secure
-
CVE-2025-4663
MEDIUM
CVSS 4.9
An Improper Check for Unusual or
Exceptional Conditions vulnerability in Brocade Fabric OS before 9.2.2.a
could allow an authenticated, network-based attacker to cause a
Denial-of-Service (DoS).
The
vulnerability is encountered when supportsave is invoked remotely,
using ssh command or SANnav inline ssh, and the corresponding ssh
session is terminated with Control C (^c ) before supportsave
completion.
This issue affects Brocade Fabric OS 9.0.0 through 9.2.2
Information Disclosure
Fabric Operating System
-
CVE-2025-3630
MEDIUM
CVSS 6.4
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.6, 6.2.0.0 through 6.2.0.4, IBM Sterling File Gateway
6.0.0.0 through 6.1.2.6, and 6.2.0.0 through 6.2.0.4
is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
XSS
IBM
Sterling B2b Integrator
Sterling File Gateway
-
CVE-2025-2827
MEDIUM
CVSS 4.3
CVE-2025-2827 is a security vulnerability (CVSS 4.3). Remediation should follow standard vulnerability management procedures.
Information Disclosure
IBM
Sterling File Gateway
-
CVE-2025-2793
MEDIUM
CVSS 5.4
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.6, 6.2.0.0 through 6.2.0.4, IBM Sterling File Gateway
6.0.0.0 through 6.1.2.6, and 6.2.0.0 through 6.2.0.4
is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
XSS
IBM
Sterling B2b Integrator
Sterling File Gateway
-
CVE-2025-0293
MEDIUM
CVSS 6.6
A security vulnerability in Ivanti Connect Secure (CVSS 6.6) that allows a remote authenticated attacker with admin rights. Remediation should follow standard vulnerability management procedures.
Code Injection
Ivanti
Connect Secure
Policy Secure
-
CVE-2025-0292
MEDIUM
CVSS 5.5
SSRF in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to access internal network services.
SSRF
Ivanti
Policy Secure
Connect Secure
-
CVE-2024-55599
MEDIUM
CVSS 5.3
A security vulnerability in FortiOS (CVSS 5.3) that allows a remote unauthenticated user. Remediation should follow standard vulnerability management procedures.
Fortinet
Apple
Authentication Bypass
Fortios
Fortisase
-
CVE-2024-53009
MEDIUM
CVSS 5.3
Memory corruption while operating the mailbox in Automotive.
Buffer Overflow
Sa8145p Firmware
Qca6797aq Firmware
Aqt1000 Firmware
Sd675 Firmware
-
CVE-2024-49784
MEDIUM
CVSS 5.3
IBM OpenPages with Watson 8.3 and 9.0
could provide weaker than expected security in storage of encrypted data with AES encryption and CBC mode. If an authenticated remote attacker with access to the database or a local attacker with access to server files could extract the encrypted data values they could exploit this weaker algorithm to use additional cryptographic methods to possibly extract the encrypted data.
Information Disclosure
IBM
Openpages With Watson
-
CVE-2024-49783
MEDIUM
CVSS 5.3
CVE-2024-49783 is a security vulnerability (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Information Disclosure
IBM
Openpages With Watson
-
CVE-2024-36357
MEDIUM
CVSS 5.6
A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
Information Disclosure
Ubuntu
Debian
Redhat
Suse
-
CVE-2024-36350
MEDIUM
CVSS 5.6
A security vulnerability in some AMD processors may allow an attacker to infer data from previous stores (CVSS 5.6) that allows an attacker. Remediation should follow standard vulnerability management procedures. Vendor patch is available.
Information Disclosure
Ubuntu
Debian
Redhat
Suse
-
CVE-2023-43039
MEDIUM
CVSS 6.1
IBM OpenPages with Watson 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session
XSS
IBM
Openpages With Watson
-
CVE-2025-53617
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53616
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53615
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53614
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53613
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53612
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53611
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-53610
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-49760
LOW
CVSS 3.5
A security vulnerability in External control of file name or path in Windows Storage (CVSS 3.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
Windows
-
CVE-2025-49756
LOW
CVSS 3.3
Use of a broken or risky cryptographic algorithm in Office Developer Platform allows an authorized attacker to bypass a security feature locally.
Microsoft
Authentication Bypass
-
CVE-2025-49731
LOW
CVSS 3.1
A privilege escalation vulnerability in Improper handling of insufficient permissions or privileges in Microsoft Teams (CVSS 3.1) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.
Microsoft
Information Disclosure
-
CVE-2025-49546
LOW
CVSS 2.4
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Access Control vulnerability that could lead to a partial application denial-of-service. A high-privileged attacker could exploit this vulnerability to partially disrupt the availability of the application. Exploitation of this issue does not require user interaction and scope is unchanged. The vulnerable component is restricted to internal IP addresses.
Authentication Bypass
-
CVE-2025-42978
LOW
CVSS 3.5
CVE-2025-42978 is a security vulnerability (CVSS 3.5). Remediation should follow standard vulnerability management procedures.
Sap
Information Disclosure
Java
-
CVE-2025-42954
LOW
CVSS 2.7
SAP NetWeaver Business Warehouse CCAW application allows a privileged attacker to cause a high CPU load by executing a RFC enabled function modules without any input parameters, which results in reduced performance or interrupted operation of the affected resource. This leads to low impact on availability of the application, there is no impact on confidentiality and integrity.
Sap
Denial Of Service
-
CVE-2025-24474
LOW
CVSS 2.7
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiManager Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiAnalyzer 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; and FortiAnalyzer Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an authenticated attacker with high privilege to extract database information via crafted requests.
SQLi
Fortinet
-
CVE-2025-7153
LOW
CVSS 3.5
A vulnerability classified as problematic was found in CodeAstro Simple Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /doctor.html of the component POST Parameter Handler. The manipulation of the argument First Name/Last name/Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
XSS
-
CVE-2024-36349
LOW
CVSS 3.8
A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.
Information Disclosure
Ubuntu
Debian
-
CVE-2024-36348
LOW
CVSS 3.8
A transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP feature is enabled, potentially resulting in information leakage.
Information Disclosure
Ubuntu
Debian