Latest CVE Feed
-
0.0
NACVE-2025-12440
Inappropriate implementation in Autofill in Google Chrome prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to obtain potentially sensitive information from process memory via a crafted HTML page. (Chr... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Information Disclosure
-
0.0
NACVE-2025-12439
Inappropriate implementation in App-Bound Encryption in Google Chrome on Windows prior to 142.0.7444.59 allowed a local attacker to obtain potentially sensitive information from process memory via a malicious file. (Chromium security severity: Medium)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Information Disclosure
-
0.0
NACVE-2025-12438
Use after free in Ozone in Google Chrome on Linux and ChromeOS prior to 142.0.7444.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: Medium)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-12437
Use after free in PageInfo in Google Chrome prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-12436
Policy bypass in Extensions in Google Chrome prior to 142.0.7444.59 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension. (Chromium securit... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Information Disclosure
-
0.0
NACVE-2025-12435
Incorrect security UI in Omnibox in Google Chrome on Android prior to 142.0.7444.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Cross-Site Scripting
-
0.0
NACVE-2025-12434
Race in Storage in Google Chrome on Windows prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Race Condition
-
0.0
NACVE-2025-12433
Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-12432
Race in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-12431
Inappropriate implementation in Extensions in Google Chrome prior to 142.0.7444.59 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Hig... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-12430
Object lifecycle issue in Media in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Misconfiguration
-
0.0
NACVE-2025-12429
Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-12428
Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)... Read more
Affected Products : edge_chromium- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption
-
0.0
NACVE-2025-63288
In Open5GS 2.7.6, AMF crashes when receiving an abnormal NGSetupRequest message, resulting in denial of service.... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2025-47773
Combodo iTop is a web based IT service management tool. Versions prior to 2.7.13 and 3.2.2 are vulnerable to cross-site scripting when a dashboard is edited via an AJAX call. Versions 2.7.13 and 3.2.2 protect rendered HTML content.... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Cross-Site Scripting
-
8.6
HIGHCVE-2025-47286
Combodo iTop is a web based IT service management tool. In versions prior to 2.7.13 and 3.2.2, an administrator can, by editing the configuration of the iTop instance, execute code on the server. Versions 2.7.13 and 3.2.2 escape and check the config param... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Misconfiguration
-
5.9
MEDIUMCVE-2025-43723
Dell PowerScale OneFS, versions prior to 9.10.1.3 and versions 9.11.0.0 through 9.12.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerabilit... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Cryptography
-
6.3
MEDIUMCVE-2025-43079
The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to MacOS and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninst... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Misconfiguration
-
8.6
HIGHCVE-2025-12967
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Se... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Authorization
-
0.0
NACVE-2025-63835
A stack-based buffer overflow vulnerability was discovered in Tenda AC18 v15.03.05.05_multi. The vulnerability exists in the guestSsid parameter of the /goform/WifiGuestSet interface. Remote attackers can exploit this vulnerability by sending oversized da... Read more
Affected Products :- Published: Nov. 10, 2025
- Modified: Nov. 10, 2025
- Vuln Type: Memory Corruption