Latest CVE Feed
- 
                                
                                
7.5
HIGHCVE-2025-1037
By making minor configuration changes to the TropOS 4th Gen device, an authenticated user with the ability to run user level shell commands can enable access via secure shell (SSH) to an unrestricted root shell. This is possible through abuse of a particu... Read more
Affected Products : tropos_4th_gen- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
8.5
HIGHCVE-2025-43017
HP ThinPro 8.1 System management application failed to verify user's true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities.... Read more
Affected Products : hp_thinpro_8.1- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
0.0
NACVE-2025-40056
In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Fix copy_to_iter return value check The return value of copy_to_iter can't be negative, check whether the copied length is equal to the requested length instead of checki... Read more
Affected Products : linux_kernel- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
6.3
MEDIUMCVE-2025-62523
PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 includes a Cross-Origin Resource Sharing (CORS) misconfiguration in its middleware: it reflects the Origin request header back in the Access-Control-... Read more
Affected Products : pilos- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
6.0
MEDIUMCVE-2025-12390
A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during l... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
0.0
NACVE-2025-40070
In the Linux kernel, the following vulnerability has been resolved: pps: fix warning in pps_register_cdev when register device fail Similar to previous commit 2a934fdb01db ("media: v4l2-dev: fix error handling in __video_register_device()"), the release... Read more
Affected Products : linux_kernel- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
5.3
MEDIUMCVE-2025-62800
FastMCP is the standard framework for building MCP applications. Versions prior to 2.13.0 have a reflected cross-site scripting vulnerability in the OAuth client callback page (oauth_callback.py) where unescaped user-controlled values are inserted into th... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-11375
Consul and Consul Enterprise’s (“Consul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterpr... Read more
Affected Products : consul- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-12346
A vulnerability was detected in MaxSite CMS up to 109. This vulnerability affects unknown code of the file application/maxsite/admin/plugins/auto_post/uploads-require-maxsite.php of the component HTTP Header Handler. Performing manipulation of the argumen... Read more
Affected Products : cms- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
4.8
MEDIUMCVE-2025-12330
A security flaw has been discovered in Willow CMS up to 1.4.0. This issue affects some unknown processing of the file /admin/articles/add of the component Add Post Page. The manipulation of the argument title/body results in cross site scripting. The atta... Read more
Affected Products :- Published: Oct. 27, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
6.5
MEDIUMCVE-2025-12347
A flaw has been found in MaxSite CMS up to 109. This issue affects some unknown processing of the file application/maxsite/admin/plugins/editor_files/save-file-ajax.php. Executing manipulation of the argument file_path/content can lead to unrestricted upl... Read more
Affected Products : cms- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
7.5
HIGHCVE-2025-60805
An issue was discovered in BESSystem BES Application Server thru 9.5.x allowing unauthorized attackers to gain sensitive information via the "pre-resource" option in bes-web.xml.... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Information Disclosure
 
 - 
                                
                                
7.1
HIGHCVE-2025-34294
Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Race Condition
 
 - 
                                
                                
7.5
HIGHCVE-2025-60800
Incorrect access control in the /jshERP-boot/user/info interface of jshERP up to commit 90c411a allows attackers to access sensitive information via a crafted GET request.... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Authorization
 
 - 
                                
                                
5.4
MEDIUMCVE-2025-55758
Multiple CSRF attack vectors in JDownloads component 1.0.0-4.0.47 for Joomla were discovered.... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Cross-Site Request Forgery
 
 - 
                                
                                
7.5
HIGHCVE-2025-60349
An issue was discovered in Prevx v3.0.5.220 allowing attackers to cause a denial of service via sending IOCTL code 0x22E044 to the pxscan.sys driver. Any processes listed under registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\pxscan\Files... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-62727
Starlette is a lightweight ASGI framework/toolkit. Prior to 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaust... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
4.8
MEDIUMCVE-2025-62367
Taiga is an open source project management platform. In versions 6.8.3 and earlier, Taiga API is vulnerable to time-based blind SQL injection allowing sensitive data disclosure via response timing. This issue is fixed in version 6.9.0.... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
7.2
HIGHCVE-2025-59837
Astro is a web framework that includes an image proxy. In versions 5.13.4 and later before 5.13.10, the image proxy domain validation can be bypassed by using backslashes in the href parameter, allowing server-side requests to arbitrary URLs. This can lea... Read more
Affected Products :- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Server-Side Request Forgery
 
 - 
                                
                                
0.0
NACVE-2025-40068
In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: Fix integer overflow in run_unpack() The MFT record relative to the file being opened contains its runlist, an array containing information about the file's location on the p... Read more
Affected Products : linux_kernel- Published: Oct. 28, 2025
 - Modified: Oct. 30, 2025
 - Vuln Type: Memory Corruption