9.7

CVSS3.1

CVE-2025-66222 - DeepChat Cross-Site Scripting(XSS) escalate to Remote Code Execution(RCE)

DeepChat is a smart assistant uses artificial intelligence. In 0.5.0 and earlier, there is a Stored Cross-Site Scripting (XSS) vulnerability in the Mermaid diagram renderer allows an attacker to execute arbitrary JavaScript within the application context. By leveraging the exposed Electron IPC brid…

📅 Published: Dec. 3, 2025, 6:34 p.m. 🔄 Last Modified: Dec. 5, 2025, 3:37 p.m.

5

CVSS3.1

CVE-2025-66220 - Envoy’s TLS certificate matcher for `match_typed_subject_alt_names` may incorrectly treat certifica…

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.

📅 Published: Dec. 3, 2025, 6:31 p.m. 🔄 Last Modified: Dec. 5, 2025, 3:44 p.m.

7.2

CVSS4.0

CVE-2025-66208 - Configuration-Dependent RCE (OS Command Injection) in richdocumentscode proxy

Collabora Online - Built-in CODE Server (richdocumentscode) provides a built-in server with all of the document editing features of Collabora Online. In versions prior to 25.04.702, Collabora Online has a Configuration-Dependent RCE (OS Command Injection) in richdocumentscode proxy. Users of Nextcl…

📅 Published: Dec. 3, 2025, 6:25 p.m. 🔄 Last Modified: Dec. 8, 2025, 7:37 p.m.

8.8

CVSS3.1

CVE-2025-33208 -

NVIDIA TAO contains a vulnerability where an attacker may cause a resource to be loaded via an uncontrolled search path. A successful exploit of this vulnerability may lead to escalation of privileges, data tampering, denial of service, information disclosure.

📅 Published: Dec. 3, 2025, 6:19 p.m. 🔄 Last Modified: Jan. 30, 2026, 6:41 p.m.

8.7

CVSS4.0

CVE-2025-66032 - Claude Code Command Validation Bypass Allows Arbitrary Code Execution

Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted co…

📅 Published: Dec. 3, 2025, 6:16 p.m. 🔄 Last Modified: Dec. 5, 2025, 4:29 p.m.

7.5

CVSS3.1

CVE-2025-33211 -

NVIDIA Triton Server for Linux contains a vulnerability where an attacker may cause an improper validation of specified quantity in input. A successful exploit of this vulnerability may lead to denial of service.

📅 Published: Dec. 3, 2025, 6:16 p.m. 🔄 Last Modified: Dec. 5, 2025, 4:33 p.m.

7.5

CVSS3.1

CVE-2025-33201 -

NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause an improper check for unusual or exceptional conditions issue by sending extra large payloads. A successful exploit of this vulnerability may lead to denial of service.

📅 Published: Dec. 3, 2025, 6:15 p.m. 🔄 Last Modified: Dec. 5, 2025, 4:44 p.m.

3.7

CVSS3.1

CVE-2025-64763 - Envoy forwards early CONNECT data in TCP proxy mode

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that data to the upstream TCP connection. If a forwarding…

📅 Published: Dec. 3, 2025, 6:13 p.m. 🔄 Last Modified: Dec. 5, 2025, 4:52 p.m.

7.3

CVSS4.0

CVE-2025-64443 - DNS Rebinding vulnerability present when running MCP Gateway in sse or streaming mode

MCP Gateway allows easy and secure running and deployment of MCP servers. In versions 0.27.0 and earlier, when MCP Gateway runs in sse or streaming transport mode, it is vulnerable to DNS rebinding. An attacker who can get a victim to visit a malicious website or be served a malicious advertisement…

📅 Published: Dec. 3, 2025, 5:41 p.m. 🔄 Last Modified: March 10, 2026, 7:37 p.m.

7.8

CVSS3.1

CVE-2025-54065 - GZDoom engine allows arbitrary code execution via ZScript actor states

GZDoom is a feature centric port for all Doom engine games. GZDoom is an open source Doom engine. In versions 4.14.2 and earlier, ZScript actor state handling allows scripts to read arbitrary addresses, write constants into the JIT-compiled code section, and redirect control flow through crafted FS…

📅 Published: Dec. 3, 2025, 5:02 p.m. 🔄 Last Modified: Dec. 4, 2025, 5:15 p.m.
Total resulsts: 343975
Page 2317 of 34,398
« previous page » next page
Filters