8.7

CVSS4.0

CVE-2025-68274 - SIPGO library has response DoS vulnerability via nil pointer dereference

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote a…

📅 Published: Dec. 16, 2025, 10:02 p.m. 🔄 Last Modified: March 5, 2026, 7:52 p.m.

6.5

CVSS3.1

CVE-2025-64520 - GLPI vulnerable to unauthorized access to restricted Knowledge Base items through the API

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

📅 Published: Dec. 16, 2025, 9:59 p.m. 🔄 Last Modified: Feb. 19, 2026, 4:20 p.m.

7.4

CVSS3.1

CVE-2025-53619 -

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of…

📅 Published: Dec. 16, 2025, 9:32 p.m. 🔄 Last Modified: Jan. 2, 2026, 2:57 p.m.

7.4

CVSS3.1

CVE-2025-53618 -

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `grayscale_convert` is called bas…

📅 Published: Dec. 16, 2025, 9:32 p.m. 🔄 Last Modified: Jan. 2, 2026, 2:58 p.m.

7.4

CVSS3.1

CVE-2025-52582 -

An out-of-bounds read vulnerability exists in the Overlay::GrabOverlayFromPixelData functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.

📅 Published: Dec. 16, 2025, 9:32 p.m. 🔄 Last Modified: Jan. 2, 2026, 2:35 p.m.

7.4

CVSS3.1

CVE-2025-48429 -

An out-of-bounds read vulnerability exists in the RLECodec::DecodeByStreams functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to leaking heap data. An attacker can provide a malicious file to trigger this vulnerability.

📅 Published: Dec. 16, 2025, 9:32 p.m. 🔄 Last Modified: Jan. 7, 2026, 10:28 p.m.

6.9

CVSS4.0

CVE-2025-14466 - Güralp Systems Fortimus Series, Minimus Series, and Certimus Series have an Allocation of Resources…

A vulnerability in the web interface of the Güralp Fortimus Series, Minimus Series and Certimus Series allows an unauthenticated attacker with network access to send specially-crafted HTTP requests that can cause the web service process to deliberately restart. Although this mechanism limits the im…

📅 Published: Dec. 16, 2025, 9:31 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.2

CVSS3.1

CVE-2025-13532 - Weak Password Hash in Core Privileged Access Manager (BoKS)

Insecure defaults in the Server Agent component of Fortra's Core Privileged Access Manager (BoKS) can result in the selection of weak password hash algorithms.  This issue affects BoKS Server Agent 9.0 instances that support yescrypt and are running in a BoKS 8.1 domain.

📅 Published: Dec. 16, 2025, 8:01 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

7.1

CVSS4.0

CVE-2025-8872 - A specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may resu…

On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted. This may cause disruption in the OSFPv3 routes on the switch. This issue was discovered inte…

📅 Published: Dec. 16, 2025, 7:32 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

7

CVSS4.0

CVE-2025-14553 - Password Hash Leak Could Lead to Unauthorized Access on Tapo App via Local Network

Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.

📅 Published: Dec. 16, 2025, 6:38 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347814
Page 2425 of 34,782
« previous page » next page
Filters