Latest CVE Feed
-
8.4
HIGHCVE-2025-45379
Dell CloudLink, versions prior to 8.2, contain a vulnerability where a privileged user with known password can run command injection from console to gain shell access of system.... Read more
Affected Products : cloudlink- Published: Nov. 05, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Injection
-
5.5
MEDIUMCVE-2025-59184
Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.... Read more
- Published: Oct. 14, 2025
- Modified: Nov. 07, 2025
-
9.1
CRITICALCVE-2025-45378
Dell CloudLink, versions 8.0 through 8.1.2, contain vulnerability on restricted shell. A Privileged user with known password can break into command shell of CloudLink server and gain access of shell and escalate privilege, gain unauthorized access of syst... Read more
Affected Products : cloudlink- Published: Nov. 05, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Authentication
-
10.0
CRITICALCVE-2025-11832
Allocation of Resources Without Limits or Throttling vulnerability in Azure Access Technology BLU-IC2, Azure Access Technology BLU-IC4 allows Flooding.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.... Read more
- Published: Oct. 15, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2025-64106
Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands f... Read more
Affected Products : cursor- Published: Nov. 04, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Misconfiguration
-
10.0
CRITICALCVE-2025-11925
Incorrect Content-Type header in one of the APIs (`text/html` instead of `application/json`) replies may potentially allow injection of HTML/JavaScript into reply.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.... Read more
- Published: Oct. 17, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-63551
A Server-Side Request Forgery (SSRF) vulnerability, achievable through an XML External Entity (XXE) injection, exists in MetInfo Content Management System (CMS) thru 8.1. This flaw stems from a defect in the XML parsing logic, which allows an attacker to ... Read more
Affected Products :- Published: Nov. 06, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Server-Side Request Forgery
-
7.3
HIGHCVE-2025-60541
A Server-Side Request Forgery (SSRF) in the /api/proxy/ component of linshenkx prompt-optimizer v1.3.0 to v1.4.2 allows attackers to scan internal resources via a crafted request.... Read more
Affected Products :- Published: Nov. 06, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Server-Side Request Forgery
-
8.5
HIGHCVE-2025-39663
Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).... Read more
Affected Products : checkmk- Published: Oct. 30, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2025-21078
Use of insufficiently random value of secretKey in Smart Switch prior to version 3.7.68.6 allows adjacent attackers to access backup data from applications.... Read more
Affected Products : smart_switch- Published: Nov. 05, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Cryptography
-
8.1
HIGHCVE-2025-21079
Improper input validation in Samsung Members prior to version 5.5.01.3 allows remote attackers to connect arbitrary URL and launch arbitrary activity with Samsung Members privilege. User interaction is required for triggering this vulnerability.... Read more
Affected Products : members- Published: Nov. 05, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Server-Side Request Forgery
-
9.8
CRITICALCVE-2025-20354
A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX could allow an unauthenticated, remote attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system. This vulnerabi... Read more
Affected Products : unified_contact_center_express- Published: Nov. 05, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-20358
A vulnerability in the Contact Center Express (CCX) Editor application of Cisco Unified CCX could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative permissions pertaining to script creation and execution. This... Read more
Affected Products : unified_contact_center_express- Published: Nov. 05, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Authentication
-
7.5
HIGHCVE-2025-54604
Bitcoin Core through 29.0 allows Uncontrolled Resource Consumption (issue 1 of 2).... Read more
Affected Products : bitcoin_core- Published: Oct. 28, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-54605
Bitcoin Core through 29.0 allows Uncontrolled Resource Consumption (issue 2 of 2).... Read more
Affected Products : bitcoin_core- Published: Oct. 28, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Denial of Service
-
10.0
CRITICALCVE-2025-12422
Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.... Read more
- Published: Oct. 28, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Path Traversal
-
10.0
CRITICALCVE-2025-12423
Protocol manipulation might lead to denial of service.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .... Read more
- Published: Oct. 28, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Denial of Service
-
10.0
CRITICALCVE-2025-12424
Privilege Escalation through SUID-bit Binary.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .... Read more
- Published: Oct. 28, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Authorization
-
10.0
CRITICALCVE-2025-12425
Local Privilege Escalation.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .... Read more
- Published: Oct. 28, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Authorization
-
10.0
CRITICALCVE-2025-12476
Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .... Read more
- Published: Oct. 29, 2025
- Modified: Nov. 07, 2025
- Vuln Type: Authentication