Latest CVE Feed
-
9.8
CRITICALCVE-2025-8610
AOMEI Cyber Backup Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AOMEI Cyber Backup. Authentication is not required to ex... Read more
- Published: Aug. 20, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Authentication
-
5.4
MEDIUMCVE-2025-9237
A vulnerability was found in CodeAstro Ecommerce Website 1.0. This impacts an unknown function of the file /customer/my_account.php?edit_account of the component Edit Your Account Page. Performing manipulation of the argument Username results in cross sit... Read more
Affected Products : ecommerce_website- Published: Aug. 20, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Cross-Site Scripting
-
8.8
HIGHCVE-2025-54131
Cursor is a code editor built for programming with AI. In versions below 1.3, an attacker can bypass the allow list in auto-run mode with a backtick (`) or $(cmd). If a user has swapped Cursor from its default settings (requiring approval for every termin... Read more
Affected Products : cursor- Published: Aug. 01, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-54132
Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive informatio... Read more
Affected Products : cursor- Published: Aug. 01, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Information Disclosure
-
9.6
CRITICALCVE-2025-54133
Cursor is a code editor built for programming with AI. In versions 1.17 through 1.2, there is a UI information disclosure vulnerability in Cursor's MCP (Model Context Protocol) deeplink handler, allowing attackers to execute 2-click arbitrary system comma... Read more
Affected Products : cursor- Published: Aug. 02, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2025-54136
Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file loc... Read more
Affected Products : cursor- Published: Aug. 02, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-54130
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive e... Read more
Affected Products : cursor- Published: Aug. 05, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-54135
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP f... Read more
Affected Products : cursor- Published: Aug. 05, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Misconfiguration
-
7.5
HIGHCVE-2025-55482
Tenda AC6 V15.03.06.23_multi is vulnerable to Buffer Overflow in the formSetCfm function.... Read more
- Published: Aug. 20, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-55498
Tenda AC6 V15.03.06.23_multi was discovered to contain a buffer overflow via the time parameter in the fromSetSysTime function.... Read more
- Published: Aug. 20, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Memory Corruption
-
8.6
HIGHCVE-2025-27392
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new VXLAN configurations. This could allow an authenticated highly-privileged remote at... Read more
- Published: Mar. 11, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Injection
-
7.5
HIGHCVE-2025-2092
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p29, <2.2.0p41 and <=2.1.0p49 (EOL) causes remote site authentication secrets to be written to log files accessible to administrators.... Read more
- Published: Apr. 22, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Information Disclosure
-
5.3
MEDIUMCVE-2025-2596
Session logout could be overwritten in Checkmk GmbH's Checkmk versions <2.3.0p30, <2.2.0p41, and 2.1.0p49 (EOL)... Read more
- Published: Mar. 26, 2025
- Modified: Aug. 25, 2025
-
7.5
HIGHCVE-2025-1075
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators.... Read more
- Published: Feb. 19, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Information Disclosure
-
8.6
HIGHCVE-2025-25297
Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, th... Read more
Affected Products : label_studio- Published: Feb. 14, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Server-Side Request Forgery
-
6.1
MEDIUMCVE-2025-25296
Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's `/projects/upload-example` endpoint allows injection of arbitrary HTML through a `GET` request with an appropriately crafted `label_config` query parameter. By craf... Read more
Affected Products : label_studio- Published: Feb. 14, 2025
- Modified: Aug. 25, 2025
- Vuln Type: Cross-Site Scripting
-
4.8
MEDIUMCVE-2025-8961
A weakness has been identified in LibTIFF 4.7.0. This affects the function main of the file tiffcrop.c of the component tiffcrop. Executing manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been made avai... Read more
Affected Products : libtiff- Published: Aug. 14, 2025
- Modified: Aug. 23, 2025
- Vuln Type: Memory Corruption
-
5.1
MEDIUMCVE-2025-9144
A weakness has been identified in Scada-LTS 2.7.8.1. This vulnerability affects unknown code of the file publisher_edit.shtm. This manipulation of the argument Name causes cross site scripting. The attack can be initiated remotely. The exploit has been ma... Read more
Affected Products : scada-lts- Published: Aug. 19, 2025
- Modified: Aug. 23, 2025
- Vuln Type: Cross-Site Scripting
-
5.1
MEDIUMCVE-2025-9143
A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects an unknown part of the file mailing_lists.shtm. The manipulation of the argument name/userList/address results in cross site scripting. It is possible to launch the attack remotely. Th... Read more
Affected Products : scada-lts- Published: Aug. 19, 2025
- Modified: Aug. 23, 2025
- Vuln Type: Cross-Site Scripting
-
5.1
MEDIUMCVE-2025-9138
A vulnerability was found in Scada-LTS 2.7.8.1. Affected is an unknown function of the file pointHierarchy/new/. Performing manipulation of the argument Title results in cross site scripting. The attack is possible to be carried out remotely. The exploit ... Read more
Affected Products : scada-lts- Published: Aug. 19, 2025
- Modified: Aug. 23, 2025
- Vuln Type: Cross-Site Scripting