7.2

CVSS4.0

CVE-2025-66208 - Configuration-Dependent RCE (OS Command Injection) in richdocumentscode proxy

Collabora Online - Built-in CODE Server (richdocumentscode) provides a built-in server with all of the document editing features of Collabora Online. In versions prior to 25.04.702, Collabora Online has a Configuration-Dependent RCE (OS Command Injection) in richdocumentscode proxy. Users of Nextclโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 6:25 p.m. ๐Ÿ”„ Last Modified: Dec. 8, 2025, 7:37 p.m.

8.8

CVSS3.1

CVE-2025-33208 -

NVIDIA TAO contains a vulnerability where an attacker may cause a resource to be loaded via an uncontrolled search path. A successful exploit of this vulnerability may lead to escalation of privileges, data tampering, denial of service, information disclosure.

๐Ÿ“… Published: Dec. 3, 2025, 6:19 p.m. ๐Ÿ”„ Last Modified: Jan. 30, 2026, 6:41 p.m.

8.7

CVSS4.0

CVE-2025-66032 - Claude Code Command Validation Bypass Allows Arbitrary Code Execution

Claude Code is an agentic coding tool. Prior to 1.0.93, Due to errors in parsing shell commands related to $IFS and short CLI flags, it was possible to bypass the Claude Code read-only validation and trigger arbitrary code execution. Reliably exploiting this requires the ability to add untrusted coโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 6:16 p.m. ๐Ÿ”„ Last Modified: Dec. 5, 2025, 4:29 p.m.

7.5

CVSS3.1

CVE-2025-33211 -

NVIDIA Triton Server for Linux contains a vulnerability where an attacker may cause an improper validation of specified quantity in input. A successful exploit of this vulnerability may lead to denial of service.

๐Ÿ“… Published: Dec. 3, 2025, 6:16 p.m. ๐Ÿ”„ Last Modified: Dec. 5, 2025, 4:33 p.m.

7.5

CVSS3.1

CVE-2025-33201 -

NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause an improper check for unusual or exceptional conditions issue by sending extra large payloads. A successful exploit of this vulnerability may lead to denial of service.

๐Ÿ“… Published: Dec. 3, 2025, 6:15 p.m. ๐Ÿ”„ Last Modified: Dec. 5, 2025, 4:44 p.m.

3.7

CVSS3.1

CVE-2025-64763 - Envoy forwards early CONNECT data in TCP proxy mode

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, when Envoy is configured in TCP proxy mode to handle CONNECT requests, it accepts client data before issuing a 2xx response and forwards that data to the upstream TCP connection. If a forwardingโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 6:13 p.m. ๐Ÿ”„ Last Modified: Dec. 5, 2025, 4:52 p.m.

7.3

CVSS4.0

CVE-2025-64443 - DNS Rebinding vulnerability present when running MCP Gateway in sse or streaming mode

MCP Gateway allows easy and secure running and deployment of MCP servers. In versions 0.27.0 and earlier, when MCP Gateway runs in sse or streaming transport mode, it is vulnerable to DNS rebinding. An attacker who can get a victim to visit a malicious website or be served a malicious advertisementโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 5:41 p.m. ๐Ÿ”„ Last Modified: March 10, 2026, 7:37 p.m.

7.8

CVSS3.1

CVE-2025-54065 - GZDoom engine allows arbitrary code execution via ZScript actor states

GZDoom is a feature centric port for all Doom engine games. GZDoom is an open source Doom engine. In versions 4.14.2 and earlier, ZScript actor state handling allows scripts to read arbitrary addresses, write constants into the JIT-compiled code section, and redirect control flow through crafted FSโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 5:02 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

2.7

CVSS3.1

CVE-2025-20388 - Blind Server Side Request Forgery (SSRF) through Distributed Search Peers in Splunk Enterprise

In Splunk Enterprise versions below 10.0.1, 9.4.6, 9.3.8, and 9.2.10, and Splunk Cloud Platform versions below 10.1.2507.4, 10.0.2503.7, and 9.3.2411.116, a user who holds a role that contains the high privilege capability `change_authentication` could enumerate internal IP addresses and network poโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 5 p.m. ๐Ÿ”„ Last Modified: Dec. 5, 2025, 5:11 p.m.

4.3

CVSS3.1

CVE-2025-20389 - Improper Input Validation in "label" column field in Splunk Secure Gateway App

In Splunk Enterprise versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, and versions below 3.9.10, 3.8.58 and 3.7.28 of the Splunk Secure Gateway app on Splunk Cloud Platform, a low-privileged user that does not hold the "admin" or "power" Splunk roles could craft a malicious payload through the `labโ€ฆ

๐Ÿ“… Published: Dec. 3, 2025, 5 p.m. ๐Ÿ”„ Last Modified: Dec. 5, 2025, 5:05 p.m.
Total resulsts: 349182
Page 2836 of 34,919
ยซ previous page ยป next page
Filters