Latest CVE Feed
-
8.8
HIGHCVE-2025-49663
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.... Read more
- Published: Jul. 08, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption
-
8.1
HIGHCVE-2025-2743
A vulnerability, which was classified as problematic, has been found in zhijiantianya ruoyi-vue-pro 2.4.1. This issue affects some unknown processing of the file /admin-api/mp/material/upload-temporary of the component Material Upload Interface. The manip... Read more
- Published: Mar. 25, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Path Traversal
-
9.1
CRITICALCVE-2025-2708
A vulnerability, which was classified as critical, was found in zhijiantianya ruoyi-vue-pro 2.4.1. This affects an unknown part of the file /admin-api/infra/file/upload of the component Backend File Upload Interface. The manipulation of the argument path ... Read more
- Published: Mar. 24, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Path Traversal
-
8.4
HIGHCVE-2025-21354
Microsoft Excel Remote Code Execution Vulnerability... Read more
- Published: Jan. 14, 2025
- Modified: Aug. 25, 2025
-
7.8
HIGHCVE-2024-9675
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write)... Read more
Affected Products : enterprise_linux enterprise_linux_server_aus enterprise_linux_server_tus openshift_container_platform enterprise_linux_eus enterprise_linux_for_ibm_z_systems_eus enterprise_linux_for_power_little_endian enterprise_linux_for_power_little_endian_eus enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions enterprise_linux_for_ibm_z_systems +4 more products- Published: Oct. 09, 2024
- Modified: Aug. 25, 2025
-
5.9
MEDIUMCVE-2023-45802
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keepi... Read more
- EPSS Score: %2.08
- Published: Oct. 23, 2023
- Modified: Aug. 25, 2025
-
5.9
MEDIUMCVE-2024-2403
Improper cleanup in temporary file handling component in Devolutions Remote Desktop Manager 2024.1.12 and earlier on Windows allows an attacker that compromised a user endpoint, under specific circumstances, to access sensitive information via residual f... Read more
- Published: Mar. 13, 2024
- Modified: Aug. 25, 2025
-
6.0
MEDIUM- Published: Feb. 11, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Authorization
-
5.4
MEDIUMCVE-2024-47536
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. A user with the editmyprivateinfo right or who can otherwise change their name can XSS themselves by setting their "real name" to an XSS payload. This vulnerability is fixe... Read more
Affected Products : citizen- Published: Sep. 30, 2024
- Modified: Aug. 25, 2025
-
7.0
HIGHCVE-2025-9309
A vulnerability was found in Tenda AC10 16.03.10.13. Affected is an unknown function of the file /etc_ro/shadow of the component MD5 Hash Handler. Performing manipulation results in hard-coded credentials. The attack needs to be approached locally. A high... Read more
- Published: Aug. 21, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-9299
A vulnerability has been found in Tenda M3 1.0.0.12. Affected by this vulnerability is the function formGetMasterPassengerAnalyseData of the file /goform/getMasterPassengerAnalyseData. The manipulation of the argument Time leads to stack-based buffer over... Read more
- Published: Aug. 21, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-9298
A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The expl... Read more
- Published: Aug. 21, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-8610
AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to ex... Read more
- Published: Aug. 20, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-9237
A vulnerability was found in CodeAstro Ecommerce Website 1.0. This impacts an unknown function of the file /customer/my_account.php?edit_account of the component Edit Your Account Page. Performing manipulation of the argument Username results in cross sit... Read more
Affected Products : ecommerce_website- Published: Aug. 20, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2025-54131
Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every termin... Read more
Affected Products : cursor- Published: Aug. 01, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-54132
Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive informatio... Read more
Affected Products : cursor- Published: Aug. 01, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Information Disclosure
-
9.6
CRITICALCVE-2025-54133
Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system comma... Read more
Affected Products : cursor- Published: Aug. 02, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2025-54136
Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file loc... Read more
Affected Products : cursor- Published: Aug. 02, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-54130
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive e... Read more
Affected Products : cursor- Published: Aug. 05, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-54135
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP f... Read more
Affected Products : cursor- Published: Aug. 05, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration