4.6

CVSS3.1

CVE-2025-67342 -

RuoYi versions 4.8.1 and earlier is affected by a stored XSS vulnerability in the /system/menu/edit endpoint. While the endpoint is protected by an XSS filter, the protection can be bypassed. Additionally, because the menu is shared across all users, any user with menu modification permissions can โ€ฆ

๐Ÿ“… Published: Dec. 12, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 19, 2025, 3:44 p.m.

4.3

CVSS3.1

CVE-2025-64011 -

Nextcloud Server 30.0.0 is vulnerable to an Insecure Direct Object Reference (IDOR) in the /core/preview endpoint. Any authenticated user can access previews of arbitrary files belonging to other users by manipulating the fileId parameter. This allows unauthorized disclosure of sensitive data, suchโ€ฆ

๐Ÿ“… Published: Dec. 12, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 19, 2025, 3:47 p.m.

7.5

CVSS3.1

CVE-2025-67779 - next: React Server Components: Denial of Service via Unsafe Deserialization

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests tโ€ฆ

๐Ÿ“… Published: Dec. 11, 2025, 11:36 p.m. ๐Ÿ”„ Last Modified: Dec. 12, 2025, 7:16 p.m.

4.2

CVSS3.1

CVE-2025-67780 -

SpaceX Starlink Dish devices with firmware 2024.12.04.mr46620 (e.g., on Mini1_prod2) allow administrative actions via unauthenticated LAN gRPC requests, aka MARMALADE 2. The cross-origin policy can be bypassed by omitting a Referer header. In some cases, an attacker's ability to read tilt, rotationโ€ฆ

๐Ÿ“… Published: Dec. 11, 2025, 11:05 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.3

CVSS4.0

CVE-2025-66452 - LibreChat's lack of JSON parsing error handling can lead to XSS

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in erroโ€ฆ

๐Ÿ“… Published: Dec. 11, 2025, 10:52 p.m. ๐Ÿ”„ Last Modified: Dec. 15, 2025, 5:35 p.m.

5.3

CVSS4.0

CVE-2025-66451 - LibreChat's Improper Input Validation in Prompt Creation API Enables Unauthorized Permission Changes

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for propโ€ฆ

๐Ÿ“… Published: Dec. 11, 2025, 10:33 p.m. ๐Ÿ”„ Last Modified: Dec. 15, 2025, 5:51 p.m.

8.6

CVSS4.0

CVE-2025-66450 - LibreChat JSON Injection in Chat POST Allows Remote Resource Inclusion and PXSS via Image Upload

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with โ€ฆ

๐Ÿ“… Published: Dec. 11, 2025, 10:05 p.m. ๐Ÿ”„ Last Modified: Dec. 15, 2025, 5:57 p.m.

5.4

CVSS4.0

CVE-2025-13668 - Quartus Prime Pro Edition Advisory

A potential security vulnerability in Quartusยฎ Prime Pro Edition Design Software may allow escalation of privilege.

๐Ÿ“… Published: Dec. 11, 2025, 10:02 p.m. ๐Ÿ”„ Last Modified: Jan. 12, 2026, 3:08 p.m.

8.8

CVSS3.1

CVE-2025-66446 - MaxKB has a Python sandbox LD_PRELOAD bypass

MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.

๐Ÿ“… Published: Dec. 11, 2025, 9:47 p.m. ๐Ÿ”„ Last Modified: Dec. 18, 2025, 8:41 p.m.

8.6

CVSS4.0

CVE-2025-34506 - WBCE CMS 1.6.3 Authenticated Remote Code Execution via Module Upload

WBCE CMS version 1.6.3 and prior contains an authenticated remote code execution vulnerability that allows administrators to upload malicious modules. Attackers can craft a specially designed ZIP module with embedded PHP reverse shell code to gain remote system access when the module is installed.

๐Ÿ“… Published: Dec. 11, 2025, 9:44 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9 p.m.
Total resulsts: 349182
Page 2650 of 34,919
ยซ previous page ยป next page
Filters