7.5

CVSS3.1

CVE-2025-63248 -

DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing the questionnaire ID with the ID of another questionnaire can enable the deletion of other questionnaires.

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Jan. 8, 2026, 5:47 p.m.

7.1

CVSS3.1

CVE-2025-61084 -

MDaemon Mail Server 23.5.2 validates SPF, DKIM, and DMARC using the email enclosed in angle brackets (<>) in the From: header of SMTP DATA. An attacker can craft a From: header with multiple invisible Unicode thin spaces to display a spoofed sender while passing validation, allowing email spoofing …

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 13, 2025, 2:15 p.m.

9.9

CVSS3.1

CVE-2025-63601 -

Snipe-IT before version 8.3.3 contains a remote code execution vulnerability that allows an authenticated attacker to upload a malicious backup file containing arbitrary files and execute system commands.

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Dec. 1, 2025, 4:15 p.m.

9.8

CVSS3.1

CVE-2025-63334 -

PocketVJ CP PocketVJ-CP-v3 pvj version 3.9.1 contains an unauthenticated remote code execution vulnerability in the submit_opacity.php component. The application fails to sanitize user input in the opacityValue POST parameter before passing it to a shell command, allowing remote attackers to execut…

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Jan. 9, 2026, 5:49 p.m.

8.4

CVSS4.0

CVE-2025-52565 - container escape due to /dev/console mount and related races

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker c…

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Dec. 3, 2025, 6:33 p.m.

9.1

CVSS3.1

CVE-2025-63416 -

** exclusively-hosted-service ** A Stored Cross-Site Scripting (XSS) vulnerability in the chat functionality of the SelfBest platform 2023.3 allows authenticated low-privileged attackers to execute arbitrary JavaScript in the context of other users' sessions. This can be exploited to access adminis…

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 7, 2025, 7:47 p.m.

8.7

CVSS4.0

CVE-2025-64110 - Cursor: Authentication Bypass Possible via New Cursorignore Write

Cursor is a code editor built for programming with AI. In versions 1.7.23 and below, a logic bug allows a malicious agent to read sensitive files that should be protected via cursorignore. An attacker who has already achieved prompt injection, or a malicious model, could create a new cursorignore f…

πŸ“… Published: Nov. 4, 2025, 11:24 p.m. πŸ”„ Last Modified: Nov. 7, 2025, 2:26 p.m.

8.8

CVSS3.1

CVE-2025-64109 - Cursor CLI Beta: Command Injection via Untrusted MCP Configuration

Cursor is a code editor built for programming with AI. In versions and below, a vulnerability in the Cursor CLI Beta allowed an attacker to achieve remote code execution through the MCP (Model Context Protocol) server mechanism by uploading a malicious MCP configuration in .cursor/mcp.json file in …

πŸ“… Published: Nov. 4, 2025, 11:09 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2025-64108 - Cursor's Sensitive File Modification can Lead to NTFS Path Quirks

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files…

πŸ“… Published: Nov. 4, 2025, 10:58 p.m. πŸ”„ Last Modified: Nov. 10, 2025, 6:38 p.m.

8.8

CVSS3.1

CVE-2025-64107 - Cursor is Vulnerable to Path Manipulation Using Backslashes on Windows

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kin…

πŸ“… Published: Nov. 4, 2025, 10:51 p.m. πŸ”„ Last Modified: Nov. 10, 2025, 7:54 p.m.
Total resulsts: 349182
Page 3149 of 34,919
Β« previous page Β» next page
Filters