Latest CVE Feed
- 
                                
                                3.3LOWCVE-2025-61670Wasmtime is a runtime for WebAssembly. Wasmtime 37.0.0 and 37.0.1 have memory leaks in the C/C++ API when using bindings for the `anyref` or `externref` WebAssembly values. This is caused by a regression introduced during the development of 37.0.0 and all... Read more Affected Products : wasmtime- Published: Oct. 07, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                6.5MEDIUMCVE-2025-56426An issue WebKul Bagisto v.2.3.6 allows a remote attacker to execute arbitrary code via the Cart/Checkout API endpoint, specifically, the price calculation logic fails to validate quantity inputs properly.... Read more Affected Products : bagisto- Published: Oct. 09, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Injection
 
- 
                                
                                8.2HIGHCVE-2025-25017Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)... Read more Affected Products : kibana- Published: Oct. 10, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                8.7HIGHCVE-2025-25018Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)... Read more Affected Products : kibana- Published: Oct. 10, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                5.8MEDIUMCVE-2025-61780Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in `Rack::Sendfile` when running behind a proxy that supports `x-sendfile` headers (such as Nginx). Specially... Read more Affected Products : rack- Published: Oct. 10, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                8.4HIGHCVE-2025-8432Incorrect Default Permissions vulnerability in Centreon Infra Monitoring (MBI modules) allows Embedding Scripts within Scripts by CentreonBI user account on the MBI server This issue affects Infra Monitoring: from 24.10.0 before 24.10.6, from 24.04.0 befo... Read more Affected Products : infra_monitoring- Published: Oct. 27, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                7.8HIGHCVE-2025-8406ZenML version 0.83.1 is affected by a path traversal vulnerability in the `PathMaterializer` class. The `load` function uses `is_path_within_directory` to validate files during `data.tar.gz` extraction, which fails to effectively detect symbolic and hard ... Read more Affected Products : zenml- Published: Oct. 05, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Path Traversal
 
- 
                                
                                9.4CRITICALCVE-2025-61777Flag Forge is a Capture The Flag (CTF) platform. Starting in version 2.0.0 and prior to version 2.3.2, the `/api/admin/badge-templates` (GET) and `/api/admin/badge-templates/create` (POST) endpoints previously allowed access without authentication or auth... Read more Affected Products : flagforge- Published: Oct. 06, 2025
- Modified: Oct. 30, 2025
- Vuln Type: Authentication
 
- 
                                
                                9.8CRITICALCVE-2025-62586OPEXUS FOIAXpress allows a remote, unauthenticated attacker to reset the administrator password. Fixed in FOIAXpress version 11.13.2.0.... Read more Affected Products : foiaxpress- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Authentication
 
- 
                                
                                4.4MEDIUMCVE-2025-61909Icinga 2 is an open source monitoring system. From 2.10.0 to before 2.15.1, 2.14.7, and 2.13.13, the safe-reload script (also used during systemctl reload icinga2) and logrotate configuration shipped with Icinga 2 read the PID of the main Icinga 2 process... Read more Affected Products : icinga- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Authorization
 
- 
                                
                                7.5HIGHCVE-2025-62409Envoy is a cloud-native, open source edge and service proxy. Prior to 1.36.1, 1.35.5, 1.34.9, and 1.33.10, large requests and responses can potentially trigger TCP connection pool crashes due to flow control management in Envoy. It will happen when the co... Read more Affected Products : envoy- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Denial of Service
 
- 
                                
                                9.6CRITICALCVE-2025-11492In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the... Read more Affected Products : automate- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                8.8HIGHCVE-2025-11493The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitu... Read more Affected Products : automate- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Misconfiguration
 
- 
                                
                                5.5MEDIUMCVE-2024-42192HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a credential leakage which could allow an attacker to access other computers or applications.... Read more Affected Products : traveler_for_microsoft_outlook- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                7.5HIGHCVE-2025-62504Envoy is an open source edge and service proxy. Envoy versions earlier than 1.36.2, 1.35.6, 1.34.10, and 1.33.12 contain a use-after-free vulnerability in the Lua filter. When a Lua script executing in the response phase rewrites a response body so that i... Read more Affected Products : envoy- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                6.1MEDIUMCVE-2025-58747Dify is an LLM application development platform. In Dify versions through 1.9.1, the MCP OAuth component is vulnerable to cross-site scripting when a victim connects to an attacker-controlled remote MCP server. The vulnerability exists in the OAuth flow i... Read more Affected Products : dify- Published: Oct. 17, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Cross-Site Scripting
 
- 
                                
                                10.0CRITICALCVE-2025-62168Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn t... Read more Affected Products : squid- Published: Oct. 17, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Information Disclosure
 
- 
                                
                                6.5MEDIUMCVE-2025-62493A vulnerability exists in the QuickJS engine's BigInt string conversion logic (js_bigint_to_string1) due to an incorrect calculation of the required number of digits, which in turn leads to reading memory past the allocated BigInt structure. * The fun... Read more Affected Products : quickjs- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-62494A type confusion vulnerability exists in the handling of the string addition (+) operation within the QuickJS engine. * The code first checks if the left-hand operand is a string. * It then attempts to convert the right-hand operand to a primitiv... Read more Affected Products : quickjs- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Memory Corruption
 
- 
                                
                                8.8HIGHCVE-2025-62495An integer overflow vulnerability exists in the QuickJS regular expression engine (libregexp) due to an inconsistent representation of the bytecode buffer size. * The regular expression bytecode is stored in a DynBuf structure, which correctly uses a ... Read more Affected Products : quickjs- Published: Oct. 16, 2025
- Modified: Oct. 29, 2025
- Vuln Type: Memory Corruption
 
 
                         
                         
                         
                                             
                                            