6.5
CVE-2025-6013 - Vault LDAP MFA Enforcement Bypass When Using Username As Alias
Vault and Vault Enterpriseβs (βVaultβ) ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and β¦
9.3
CVE-2025-22470 -
CL4/6NX Plus and CL4/6NX-J Plus (Japan model) with the firmware versions prior to 1.15.5-r1 allow crafted dangerous files to be uploaded. An arbitrary Lua script may be executed on the system with the root privilege.
6.9
CVE-2025-22469 -
OS command injection vulnerability exists in CL4/6NX Plus and CL4/6NX-J Plus (Japan model) with the firmware versions prior to 1.15.5-r1. An arbitrary OS command may be executed on the system with a certain non-administrative user privilege.
8.7
CVE-2025-7771 - Code Execution / Escalation of Privileges in ThrottleStop
ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace function. This insecure implementation can be exploited by a malicious user-mode application to patch the running Windows kernel and invoke arbitrarβ¦
5.3
CVE-2025-8620 - GiveWP β Donation Plugin and Fundraising Platform <= 4.6.0 - Unauthenticated Donor Data Exposure
The GiveWP β Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id.
3.7
CVE-2025-8556 - Github.com/cloudflare/circl: circl-fourq: missing and wrong validation can lead to incorrect results
A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vulnerability allows an attacker to compromise session security via low-order point injection and incorrect point validation during Diffie-Hellman key exchange.
5.1
CVE-2025-7202 - Cross-Site Request Forgery (CSRF) allowed remote control of Elgato Key Lights
A Cross-Site Request Forgery (CSRF) in Elgato's Key Lights and related light products allows an attacker to host a malicious webpage that remotely controlles the victim's lights.
7.5
CVE-2025-47324 - Exposure of Sensitive Information Through Metadata in Powerline Communication Firmware
Information disclosure while accessing and modifying the PIB file of a remote device via powerline.
7.8
CVE-2025-27076 - Time-of-check Time-of-use (TOCTOU) Race Condition in Display
Memory corruption while processing simultaneous requests via escape path.
7.8
CVE-2025-27075 - Improper Validation of Array Index in Bluetooth HOST
Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host.