Latest CVE Feed
-
7.7
HIGHCVE-2025-30201
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to version 4.13.0, a vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in various agent ... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Authentication
-
5.3
MEDIUMCVE-2025-29934
A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-41735
A low privileged remote attacker can upload any file to an arbitrary location due to missing file check resulting in remote code execution.... Read more
Affected Products : ewio2-m_firmware ewio2-m ewio2-m-bm_firmware ewio2-m-bm ewio2-bm_firmware ewio2-bm- Published: Nov. 18, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Path Traversal
-
7.5
HIGHCVE-2025-41737
Due to webserver misconfiguration an unauthenticated remote attacker is able to read the source of php modules.... Read more
Affected Products : ewio2-m_firmware ewio2-m ewio2-m-bm_firmware ewio2-m-bm ewio2-bm_firmware ewio2-bm- Published: Nov. 18, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Misconfiguration
-
8.8
HIGHCVE-2025-41736
A low privileged remote attacker can upload a new or overwrite an existing python script by using a path traversal of the target filename in php resulting in a remote code execution.... Read more
Affected Products : ewio2-m_firmware ewio2-m ewio2-m-bm_firmware ewio2-m-bm ewio2-bm_firmware ewio2-bm- Published: Nov. 18, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Path Traversal
-
9.8
CRITICALCVE-2025-41734
An unauthenticated remote attacker can execute arbitrary php files and gain full access of the affected devices.... Read more
Affected Products : ewio2-m_firmware ewio2-m ewio2-m-bm_firmware ewio2-m-bm ewio2-bm_firmware ewio2-bm- Published: Nov. 18, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-41733
The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.... Read more
Affected Products : ewio2-m_firmware ewio2-m ewio2-m-bm_firmware ewio2-m-bm ewio2-bm_firmware ewio2-bm- Published: Nov. 18, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Authentication
-
8.8
HIGHCVE-2025-13223
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
- Actively Exploited
- Published: Nov. 17, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Memory Corruption
-
7.2
HIGHCVE-2025-58034
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 throug... Read more
Affected Products : fortiweb- Actively Exploited
- Published: Nov. 18, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Injection
-
9.8
CRITICALCVE-2025-64446
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative comm... Read more
Affected Products : fortiweb- Actively Exploited
- Published: Nov. 14, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Path Traversal
-
4.3
MEDIUMCVE-2025-66112
Missing Authorization vulnerability in WebToffee Accessibility Toolkit by WebYes accessibility-plus allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accessibility Toolkit by WebYes: from n/a through <= 2.0.4.... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2025-66091
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Design Stylish Cost Calculator stylish-cost-calculator allows DOM-Based XSS.This issue affects Stylish Cost Calculator: from n/a through <= 8.1.5.... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Cross-Site Scripting
-
5.3
MEDIUMCVE-2025-64483
Wazuh is a security detection, visibility, and compliance open source project. From version 4.9.0 to before 4.13.0, the Wazuh API – Agent Configuration in certain configurations allows authenticated users with read-only API roles to retrieve agent enrollm... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Authentication
-
7.7
HIGHCVE-2025-13470
In RNP version 0.18.0 a refactoring regression causes the symmetric session key used for Public-Key Encrypted Session Key (PKESK) packets to be left uninitialized except for zeroing, resulting in it always being an all-zero byte array. Any data encryp... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Cryptography
-
7.4
HIGHCVE-2025-13132
This vulnerability allowed a site to enter fullscreen, after a user click, without a full-screen notification (toast) appearing. Without this notification, users could potentially be misled about what site they were on if a malicious site renders a fake U... Read more
Affected Products :- Published: Nov. 21, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Misconfiguration
-
8.3
HIGHCVE-2025-12056
Out-of-bounds Read in Shelly Pro 3EM (before v1.4.4) allows Overread Buffers.... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Memory Corruption
-
8.3
HIGHCVE-2025-11243
Allocation of Resources Without Limits or Throttling vulnerability in Shelly Pro 4PM (before v1.6) allows Excessive Allocation via network.... Read more
Affected Products :- Published: Nov. 19, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Denial of Service
-
4.3
MEDIUMCVE-2025-65220
Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow in: /goform/SetVirtualServerCfg via the list parameter.... Read more
- Published: Nov. 20, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Memory Corruption
-
4.3
MEDIUMCVE-2025-65221
Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the list parameter of /goform/setPptpUserList.... Read more
- Published: Nov. 20, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Memory Corruption
-
4.3
MEDIUMCVE-2025-65222
Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the rebootTime parameter of /goform/SetSysAutoRebbotCfg.... Read more
- Published: Nov. 20, 2025
- Modified: Nov. 21, 2025
- Vuln Type: Memory Corruption