Latest CVE Feed
-
4.3
MEDIUMCVE-2025-52671
Debug information disclosure in the SQL error message to in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes non-admin users to acquire information about the software, PHP and database versions currently in use.... Read more
Affected Products : revive_adserver- Published: Nov. 20, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Information Disclosure
-
7.5
HIGHCVE-2025-56527
Plaintext password storage in Kotaemon 0.11.0 in the client's localStorage.... Read more
Affected Products : kotaemon- Published: Nov. 18, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Cryptography
-
6.1
MEDIUMCVE-2025-56526
Cross site scripting (XSS) vulnerability in Kotaemon 0.11.0 allowing attackers to execute arbitrary code via a crafted PDF.... Read more
Affected Products : kotaemon- Published: Nov. 18, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-64756
Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing fi... Read more
Affected Products : glob- Published: Nov. 17, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-64718
js-yaml is a JavaScript YAML parser and dumper. In js-yaml 4.1.0 and below, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents m... Read more
- Published: Nov. 13, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Misconfiguration
-
5.4
MEDIUMCVE-2025-55129
HackerOne community member Kassem S.(kassem_s94) has reported that username handling in Revive Adserver was still vulnerable to impersonation attacks after the fix for CVE-2025-52672, via several alternate techniques. Homoglyphs based impersonation has be... Read more
Affected Products : revive_adserver- Published: Dec. 02, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Authentication
-
7.1
HIGHCVE-2025-33194
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause improper processing of input data. A successful exploit of this vulnerability might lead to information disclosure or denial of service.... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Information Disclosure
-
8.0
HIGHCVE-2025-33188
NVIDIA DGX Spark GB10 contains a vulnerability in hardware resources where an attacker could tamper with hardware controls. A successful exploit of this vulnerability might lead to information disclosure, data tampering, or denial of service.... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Information Disclosure
-
9.3
CRITICALCVE-2025-33187
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, ... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Authorization
-
7.8
HIGHCVE-2025-33189
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause an out-of-bound write. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, information disclosure, or e... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2025-33190
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware where an attacker could cause an out-of-bound write. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, or escalation of privileges.... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Memory Corruption
-
5.7
MEDIUMCVE-2025-33191
NVIDIA DGX Spark GB10 contains a vulnerability in OSROOT firmware, where an attacker could cause an invalid memory read. A successful exploit of this vulnerability might lead to denial of service.... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Memory Corruption
-
5.7
MEDIUMCVE-2025-33192
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause an arbitrary memory read. A successful exploit of this vulnerability might lead to denial of service.... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Memory Corruption
-
5.7
MEDIUMCVE-2025-33193
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT firmware, where an attacker could cause improper validation of integrity. A successful exploit of this vulnerability might lead to information disclosure.... Read more
- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Information Disclosure
-
2.1
LOWCVE-2025-13837
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues... Read more
Affected Products : python- Published: Dec. 01, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Denial of Service
-
7.3
HIGHCVE-2025-33205
NVIDIA NeMo framework contains a vulnerability in a predefined variable, where an attacker could cause inclusion of functionality from an untrusted control sphere by use of a predefined variable. A successful exploit of this vulnerability may lead to code... Read more
Affected Products : nemo- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Misconfiguration
-
7.8
HIGHCVE-2025-33204
NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP and LLM components, where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability may lead to code execution, escalation of pr... Read more
Affected Products : nemo- Published: Nov. 25, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Injection
-
6.9
MEDIUMCVE-2025-62687
Cross-site request forgery vulnerability exists in LogStare Collector. If a user views a crafted page while logged, unintended operations may be performed.... Read more
- Published: Nov. 21, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Cross-Site Request Forgery
-
6.9
MEDIUMCVE-2025-64299
LogStare Collector improperly handles the password hash data. An administrative user may obtain the other users' password hashes.... Read more
- Published: Nov. 21, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Information Disclosure
-
8.4
HIGHCVE-2025-64695
Uncontrolled search path element issue exists in the installer of LogStare Collector (for Windows). If exploited, arbitrary code may be executed with the privilege of the user invoking the installer.... Read more
- Published: Nov. 21, 2025
- Modified: Dec. 02, 2025
- Vuln Type: Path Traversal