Latest CVE Feed
-
4.7
MEDIUMCVE-2025-59448
Components of the YoSmart YoLink ecosystem through 2025-10-02 leverage unencrypted MQTT to communicate over the internet. An attacker with the ability to monitor network traffic could therefore obtain sensitive information or tamper with the traffic to co... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
2.2
LOWCVE-2025-59447
The YoSmart YoLink Smart Hub device 0382 exposes a UART debug interface. An attacker with direct physical access can leverage this interface to read a boot log, which includes network access credentials.... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Information Disclosure
-
3.6
LOWCVE-2025-61984
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansio... Read more
Affected Products : openssh- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Authentication
-
6.5
MEDIUMCVE-2025-61766
Bucket is a MediaWiki extension to store and retrieve structured data on articles. Prior to version 1.0.0, infinite recursion can occur if a user queries a bucket using the `!=` comparator. This will result in PHP's call stack limit exceeding, and/or incr... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Denial of Service
-
9.1
CRITICALCVE-2025-57247
The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() ... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Authorization
-
8.5
HIGHCVE-2025-36355
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.... Read more
- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Cross-Site Scripting
-
7.3
HIGHCVE-2025-36354
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow an unauthenticated user to execute arbitrary commands with lower user privileges on the system due to improper validat... Read more
- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-61224
Cross Site Scripting vulnerability in DokuWiki 2025-05-14a 'Librarian'[56.1] allows a remote attacker to execute arbitrary code via the q parameter... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Cross-Site Scripting
-
9.6
CRITICALCVE-2025-59159
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.13.4, the web user interface for SillyTavern is s... Read more
Affected Products :- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
9.3
CRITICALCVE-2025-52472
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 4.3-milestone-1 and prior to versions 16.10.9, 17.4.2, and 17.5.0, the REST search URL is vulnerable to HQL injection via the `ord... Read more
Affected Products : xwiki- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Injection
-
9.2
CRITICALCVE-2025-49594
XWiki OIDC has various tools to manipulate OpenID Connect protocol in XWiki. Starting in version 2.17.1 and prior to version 2.18.2, anyone with VIEW access to a user profile can create a token for that user. If that XWiki instance is configured to allow ... Read more
Affected Products : openid_connect- Published: Oct. 06, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-37728
Insufficiently Protected Credentials in the Crowdstrike connector can lead to Crowdstrike credentials being leaked. A malicious user can access cached credentials from a Crowdstrike connector in another space by creating and running a Crowdstrike connecto... Read more
Affected Products : kibana- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Information Disclosure
-
5.3
MEDIUMCVE-2025-53476
A denial of service vulnerability exists in the ModbusTCP server functionality of OpenPLC _v3 a931181e8b81e36fadf7b74d5cba99b73c3f6d58. A specially crafted series of network connections can lead to the server not processing subsequent Modbus requests. An ... Read more
Affected Products : openplc_v3_firmware- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Denial of Service
-
7.2
HIGHCVE-2023-6215
A potential security vulnerability has been identified in HP Sure Start’s protection of the Intel Flash Descriptor in certain HP PC products, which might allow security bypass, arbitrary code execution, loss of integrity or confidentiality, or denial of s... Read more
Affected Products :- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2022-50509
In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50511
In the Linux kernel, the following vulnerability has been resolved: lib/fonts: fix undefined behavior in bit shift for get_default_font Shifting signed 32-bit value by 31 bits is undefined, so changing significant bit to unsigned. The UBSAN warning cal... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50514
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: fix refcount leak on error path When failing to allocate report_desc, opts->refcnt has already been incremented so it needs to be decremented to avoid leaving the op... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
-
0.0
NACVE-2022-50518
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix locking in pdc_iodc_print() firmware call Utilize pdc_lock spinlock to protect parallel modifications of the iodc_dbuf[] buffer, check length to prevent buffer overflow of i... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50520
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios() As comment of pci_get_class() says, it returns a pci_device with its refcount increased and decreased the refcount for... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2022-50521
In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer memory (out.pointer) returned by wmi_evaluate_method() is not freed after the call, so it leads to memory ... Read more
Affected Products : linux_kernel- Published: Oct. 07, 2025
- Modified: Oct. 08, 2025
- Vuln Type: Memory Corruption