3.8

CVSS3.1

CVE-2025-62794 - GitHub Workflow Updater stored the optional Github token in plaintext

GitHub Workflow Updater is a VS Code extension that automatically pins GitHub Actions to specific commits for enhanced security. Before 0.0.7, any provided Github token would be stored in plaintext in the editor configuration as json on disk, rather than through the more secure "securestorage" api.…

πŸ“… Published: Oct. 28, 2025, 8:53 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.8

CVSS3.1

CVE-2025-62796 - PrivateBin persistent HTML injection in attachment filename enables redirect and defacement

PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Versions 1.7.7 through 2.0.1 allow persistent HTML injection via the unsanitized attachment filename (attachment_name) when attachments are enabled. An attacker can modify attachment_name before encryption so that,…

πŸ“… Published: Oct. 28, 2025, 8:47 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.5

CVSS4.0

CVE-2025-43017 - HP ThinPro 8.1 SP8 Security Updates

HP ThinPro 8.1 System management application failed to verify user's true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities.

πŸ“… Published: Oct. 28, 2025, 8:40 p.m. πŸ”„ Last Modified: Feb. 26, 2026, 4:57 p.m.

6.3

CVSS4.0

CVE-2025-61598 - Discourse is missing Cache-Control response header on error responses

Discourse is an open source discussion platform. Version before 3.6.2 and 3.6.0.beta2, default Cache-Control response header with value no-store, no-cache was missing from error responses. This may caused unintended caching of those responses by proxies potentially leading to cache poisoning attack…

πŸ“… Published: Oct. 28, 2025, 8:38 p.m. πŸ”„ Last Modified: Dec. 3, 2025, 4:31 p.m.

6.5

CVSS3.1

CVE-2025-11374 - Consul's KV endpoint is vulnerable to denial of service

Consul and Consul Enterprise’s (β€œConsul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.

πŸ“… Published: Oct. 28, 2025, 8:19 p.m. πŸ”„ Last Modified: April 20, 2026, 4 p.m.

7.5

CVSS3.1

CVE-2025-62727 - Starlette vulnerable to O(n^2) DoS via Range header merging in starlette.responses.FileResponse

Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion p…

πŸ“… Published: Oct. 28, 2025, 8:14 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.5

CVSS3.1

CVE-2025-11375 - Consul's event endpoint is vulnerable to denial of service

Consul and Consul Enterprise’s (β€œConsul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.

πŸ“… Published: Oct. 28, 2025, 8:12 p.m. πŸ”„ Last Modified: Dec. 22, 2025, 3:55 p.m.

9.1

CVSS3.1

CVE-2025-62368 - Taiga Authenticated Remote Code Execution

Taiga is an open source project management platform. In versions 6.8.3 and earlier, a remote code execution vulnerability exists in the Taiga API due to unsafe deserialization of untrusted data. This issue is fixed in version 6.9.0.

πŸ“… Published: Oct. 28, 2025, 8:08 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

4.8

CVSS3.1

CVE-2025-62367 - Taiga Blind SQL Injection Time Based

Taiga is an open source project management platform. In versions 6.8.3 and earlier, Taiga API is vulnerable to time-based blind SQL injection allowing sensitive data disclosure via response timing. This issue is fixed in version 6.9.0.

πŸ“… Published: Oct. 28, 2025, 8:06 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.2

CVSS3.1

CVE-2025-59837 - astro allows bypass of image proxy domain validation leading to SSRF and potential XSS

Astro is a web framework that includes an image proxy. In versions 5.13.4 and later before 5.13.10, the image proxy domain validation can be bypassed by using backslashes in the href parameter, allowing server-side requests to arbitrary URLs. This can lead to server-side request forgery (SSRF) and …

πŸ“… Published: Oct. 28, 2025, 7:54 p.m. πŸ”„ Last Modified: Nov. 25, 2025, 3:16 p.m.
Total resulsts: 349182
Page 3235 of 34,919
Β« previous page Β» next page
Filters