Latest CVE Feed
- 
                                
                                
7.8
HIGHCVE-2025-43939
Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading... Read more
Affected Products : unity_operating_environment- Published: Oct. 30, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Injection
 
 - 
                                
                                
7.5
HIGHCVE-2025-59459
An attacker that gains SSH access to an unprivileged account may be able to disrupt services (including SSH), causing persistent loss of availability.... Read more
- Published: Oct. 27, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
5.5
MEDIUMCVE-2025-62594
ImageMagick is a software suite to create, edit, compose, or convert bitmap images. ImageMagick versions prior to 7.1.2-8 are vulnerable to denial-of-service due to unsigned integer underflow and division-by-zero in the CLAHEImage function. When tile widt... Read more
Affected Products : imagemagick- Published: Oct. 27, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-59460
The system is deployed in its default state, with configuration settings that do not comply with the latest best practices for restricting access. This increases the risk of unauthorised connections.... Read more
- Published: Oct. 27, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
9.8
CRITICALCVE-2025-59461
A remote unauthenticated attacker may use the unauthenticated C++ API to access or modify sensitive data and disrupt services.... Read more
- Published: Oct. 27, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Authentication
 
 - 
                                
                                
10.0
CRITICALCVE-2025-64095
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated... Read more
Affected Products : dotnetnuke- Published: Oct. 28, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
6.4
MEDIUMCVE-2025-64094
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, sanitization of the content of uploaded SVG files was not covering all possible XSS scenarios. This vulnerability exists becaus... Read more
Affected Products : dotnetnuke- Published: Oct. 28, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Cross-Site Scripting
 
 - 
                                
                                
4.3
MEDIUMCVE-2025-62802
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the out-of-box experience for HTML editing allows unauthenticated users to upload files. This opens a potential vector to other ... Read more
Affected Products : dotnetnuke- Published: Oct. 28, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Misconfiguration
 
 - 
                                
                                
7.5
HIGHCVE-2025-62789
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.11.0, fim_alert() implementation does not check whether the return value of ctime_r is NULL or not before calling strdup() on it. A compromised agent ... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-59462
An attacker who tampers with the C++ CLI client may crash the UpdateService during file transfers, disrupting updates and availability.... Read more
- Published: Oct. 27, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-62788
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.11.0, w_copy_event_for_log() references memory (initially allocated in OS_CleanMSG()) after it has been freed. A compromised agent can potentially com... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.5
HIGHCVE-2025-62787
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.10.2, a buffer over-read occurs in DecodeWinevt() when child_attr[p]->attributes[j] is accessed, because the corresponding index (j) is incorrect. A c... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.5
HIGHCVE-2025-62792
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.12.0, a buffer over-read occurs in w_expression_match() when strlen() is called on str_test, because the corresponding buffer is not being properly NU... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.5
HIGHCVE-2025-62791
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.11.0, DecodeCiscat() implementation does not check the return the value of cJSON_GetObjectItem() for a possible NULL value in case of an error. A comp... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-62790
Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to 4.11.0, fim_fetch_attributes_state() implementation does not check whether time_string is NULL or not before calling strlen() on it. A compromised agent... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
8.1
HIGHCVE-2025-62786
Wazuh is a free and open source platform used for threat prevention, detection, and response. A heap-based out-of-bounds WRITE occurs in decode_win_permissions, resulting in writing a NULL byte 2 bytes before the start of the buffer allocated to decoded_i... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.5
HIGHCVE-2025-62785
Wazuh is a free and open source platform used for threat prevention, detection, and response. fillData() implementation does not check whether value is NULL or not before calling os_strdup() on it. A compromised agent can cause a crash of analysisd by sen... Read more
Affected Products : wazuh- Published: Oct. 29, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
7.5
HIGHCVE-2025-61919
Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcin... Read more
Affected Products : rack- Published: Oct. 10, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service
 
 - 
                                
                                
3.1
LOWCVE-2025-62711
Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called in a ... Read more
Affected Products : wasmtime- Published: Oct. 24, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Memory Corruption
 
 - 
                                
                                
7.5
HIGHCVE-2025-59463
An attacker may cause chunk-size mismatches that block file transfers and prevent subsequent transfers.... Read more
- Published: Oct. 27, 2025
 - Modified: Nov. 03, 2025
 - Vuln Type: Denial of Service