5.5

CVSS3.1

CVE-2025-60753 - libarchive: bsdtar hangs and OOMs with zero-length pattern matches

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 6, 2025, 7:45 p.m.

5.3

CVSS3.1

CVE-2025-59716 -

ownCloud Guests before 0.12.5 allows unauthenticated user enumeration via the /apps/guests/register/{email}/{token} endpoint. Because of insufficient validation of the supplied token in showPasswordForm, the server responds differently when an e-mail address corresponds to a valid pending guest use…

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 6, 2025, 7:45 p.m.

6.5

CVSS3.1

CVE-2025-55341 -

Cross Site Scripting vulnerability in Quipux 4.0.1 through e1774ac allows anexos/anexos_nuevo.php asocImgRad.

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 6, 2025, 7:45 p.m.

7.1

CVSS3.1

CVE-2025-61084 -

MDaemon Mail Server 23.5.2 validates SPF, DKIM, and DMARC using the email enclosed in angle brackets (<>) in the From: header of SMTP DATA. An attacker can craft a From: header with multiple invisible Unicode thin spaces to display a spoofed sender while passing validation, allowing email spoofing …

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 6, 2025, 7:45 p.m.

7.3

CVSS4.0

CVE-2025-31133 - runc container escape via "masked path" abuse due to mount race conditions

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was a…

πŸ“… Published: Nov. 5, 2025, midnight πŸ”„ Last Modified: Nov. 6, 2025, 8:19 p.m.

8.7

CVSS4.0

CVE-2025-64110 - Cursor: Authentication Bypass Possible via New Cursorignore Write

Cursor is a code editor built for programming with AI. In versions 1.7.23 and below, a logic bug allows a malicious agent to read sensitive files that should be protected via cursorignore. An attacker who has already achieved prompt injection, or a malicious model, could create a new cursorignore f…

πŸ“… Published: Nov. 4, 2025, 11:24 p.m. πŸ”„ Last Modified: Nov. 7, 2025, 2:26 p.m.

8.8

CVSS3.1

CVE-2025-64109 - Cursor CLI Beta: Command Injection via Untrusted MCP Configuration

Cursor is a code editor built for programming with AI. In versions and below, a vulnerability in the Cursor CLI Beta allowed an attacker to achieve remote code execution through the MCP (Model Context Protocol) server mechanism by uploading a malicious MCP configuration in .cursor/mcp.json file in …

πŸ“… Published: Nov. 4, 2025, 11:09 p.m. πŸ”„ Last Modified: Nov. 7, 2025, 2:26 p.m.

8.8

CVSS3.1

CVE-2025-64108 - Cursor's Sensitive File Modification can Lead to NTFS Path Quirks

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files…

πŸ“… Published: Nov. 4, 2025, 10:58 p.m. πŸ”„ Last Modified: Nov. 7, 2025, 2:26 p.m.

8.8

CVSS3.1

CVE-2025-64107 - Cursor is Vulnerable to Path Manipulation Using Backslashes on Windows

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kin…

πŸ“… Published: Nov. 4, 2025, 10:51 p.m. πŸ”„ Last Modified: Nov. 7, 2025, 2:26 p.m.

6

CVSS4.0

CVE-2025-59596 -

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

πŸ“… Published: Nov. 4, 2025, 10:51 p.m. πŸ”„ Last Modified: Nov. 6, 2025, 7:45 p.m.
Total resulsts: 317435
Page 52 of 31,744
Β« previous page Β» next page
Filters