5.5

CVSS4.0

CVE-2025-62608 - MLX has heap-buffer-overflow in load()

MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue …

πŸ“… Published: Nov. 21, 2025, 6:56 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 7:16 p.m.

7.2

CVSS4.0

CVE-2025-62626 -

Improper handling of insufficient entropy in the AMD CPUs could allow a local attacker to influence the values returned by the RDSEED instruction, potentially resulting in the consumption of insufficiently random values.

πŸ“… Published: Nov. 21, 2025, 6:52 p.m. πŸ”„ Last Modified: Nov. 22, 2025, 4:55 a.m.

9.1

CVSS3.1

CVE-2025-64767 - hpke-js reuses AEAD nonces

hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Prior to version 1.7.5, the public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidential…

πŸ“… Published: Nov. 21, 2025, 6:47 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 7:16 p.m.

5.3

CVSS3.1

CVE-2025-29934 -

A bug within some AMD CPUs could allow a local admin-privileged attacker to run a SEV-SNP guest using stale TLB entries, potentially resulting in loss of data integrity.

πŸ“… Published: Nov. 21, 2025, 6:45 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 7:15 p.m.

5.1

CVSS4.0

CVE-2025-64169 - Wazuh NULL pointer dereference in fim_alert line 666

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 3.7.0 to before 4.12.0, fim_alert() implementation does not check whether oldsum->md5 is NULL or not before dereferencing it. A compromised agent can cause a crash of analysisd by sending a sp…

πŸ“… Published: Nov. 21, 2025, 6:39 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 7:16 p.m.

1.8

CVSS4.0

CVE-2025-54866 - Wazuh installation fails to protected authd.pass on Windows

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.3.0 to before 4.13.0, a missing ACL on "C:\Program Files (x86)\ossec-agent\authd.pass" exposes the password to all "Authenticated Users" on the local machine. This issue has been patched in …

πŸ“… Published: Nov. 21, 2025, 6:23 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 7:15 p.m.

7.7

CVSS3.1

CVE-2025-30201 - Wazuh NetNTLMv2 Hash Theft In Multiple Centralized Configuration Capabilities

Wazuh is a free and open source platform used for threat prevention, detection, and response. Prior to version 4.13.0, a vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in various agent configuration settings, potentially leading …

πŸ“… Published: Nov. 21, 2025, 6:17 p.m. πŸ”„ Last Modified: Nov. 22, 2025, 4:55 a.m.

7.4

CVSS3.1

CVE-2025-13132 - Dia: Increased Spoof Risk; Missing full screen toast

This vulnerability allowed a site to enter fullscreen, after a user click, without a full-screen notification (toast) appearing. Without this notification, users could potentially be misled about what site they were on if a malicious site renders a fake UI (like a fake address bar.)

πŸ“… Published: Nov. 21, 2025, 5:55 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 6:15 p.m.

5.3

CVSS4.0

CVE-2025-64483 - Wazuh API – Agent Configuration Has Improper Access Control in Agent Enrollment Endpoint

Wazuh is a security detection, visibility, and compliance open source project. From version 4.9.0 to before 4.13.0, the Wazuh API – Agent Configuration in certain configurations allows authenticated users with read-only API roles to retrieve agent enrollment credentials through the /utils/configura…

πŸ“… Published: Nov. 21, 2025, 5:55 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 6:15 p.m.

7.7

CVSS4.0

CVE-2025-13470 - RNP 0.18.0 Vulnerable PKESK session keys

In RNP version 0.18.0 a refactoring regression causes the symmetric session key used for Public-Key Encrypted Session Key (PKESK) packets to be left uninitialized except for zeroing, resulting in it always being an all-zero byte array. Any data encrypted using public-key encryption in this rel…

πŸ“… Published: Nov. 21, 2025, 5:05 p.m. πŸ”„ Last Modified: Nov. 21, 2025, 6:15 p.m.
Total resulsts: 319161
Page 7 of 31,917
Β« previous page Β» next page
Filters