6.4

CVSS3.1

CVE-2025-11186 - Cookie Notice & Compliance for GDPR / CCPA <= 2.5.8 - Authenticated (Contributor+) Stored Cross-Sit…

The Cookie Notice & Compliance for GDPR / CCPA plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cookies_accepted shortcode in all versions up to, and including, 2.5.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes…

πŸ“… Published: Nov. 22, 2025, 5:07 a.m. πŸ”„ Last Modified: April 8, 2026, 4:37 p.m.

2.3

CVSS4.0

CVE-2025-12889 - TLS 1.2 Client Can Downgrade Digest Used

With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.

πŸ“… Published: Nov. 21, 2025, 11:06 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:39 p.m.

2.3

CVSS4.0

CVE-2025-11932 - Timing Side-Channel in PSK Binder Verification

The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder

πŸ“… Published: Nov. 21, 2025, 11:01 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:39 p.m.

2.1

CVSS4.0

CVE-2025-11931 - Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt

Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application.

πŸ“… Published: Nov. 21, 2025, 10:57 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:38 p.m.

1

CVSS4.0

CVE-2025-12888 - Constant Time Issue with Xtensa-based ESP32 and X22519

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X2551…

πŸ“… Published: Nov. 21, 2025, 10:50 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:51 p.m.

6.3

CVSS4.0

CVE-2025-11936 - Potential DoS Vulnerability through Multiple KeyShareEntry with Same Group in TLS 1.3 ClientHello

Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to ex…

πŸ“… Published: Nov. 21, 2025, 10:24 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:50 p.m.

2.3

CVSS4.0

CVE-2025-11933 - DoS Vulnerability in wolfSSL TLS 1.3 CKS Extension

Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.

πŸ“… Published: Nov. 21, 2025, 10:19 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:47 p.m.

8.7

CVSS4.0

CVE-2025-65947 - thread-amount is Vulnerable to Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS

thread-amount is a tool that gets the amount of threads in the current process. Prior to version 0.2.2, there are resource leaks when querying thread counts on Windows and Apple platforms. In Windows platforms, the thread_amount function calls CreateToolhelp32Snapshot but fails to close the returne…

πŸ“… Published: Nov. 21, 2025, 10:15 p.m. πŸ”„ Last Modified: Nov. 25, 2025, 10:16 p.m.

2.1

CVSS4.0

CVE-2025-11934 - Improper Validation of Signature Algorithm Used in TLS 1.3 CertificateVerify

Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously co…

πŸ“… Published: Nov. 21, 2025, 10:12 p.m. πŸ”„ Last Modified: Dec. 8, 2025, 3:48 p.m.

8.1

CVSS3.1

CVE-2025-65946 - Roo Code is Vulnerable to Potential Remote Code Execution via zsh Command Validation Bug

Roo Code is an AI-powered autonomous coding agent that lives in users' editors. Prior to version 3.26.7, Due to an error in validation it was possible for Roo to automatically execute commands that did not match the allow list prefixes. This issue has been patched in version 3.26.7.

πŸ“… Published: Nov. 21, 2025, 10:11 p.m. πŸ”„ Last Modified: Dec. 4, 2025, 4:02 p.m.
Total resulsts: 343919
Page 2405 of 34,392
Β« previous page Β» next page
Filters