0.0

CVE-2025-67074 -

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serverName`) to /goform/AdvSetMacMtuWan.

๐Ÿ“… Published: Dec. 17, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 18, 2025, 9:57 a.m.

6.1

CVSS3.1

CVE-2025-65233 -

Reflected cross-site scripting (XSS) in SLiMS (slims9_bulian) before 9.6.0 via improper handling of $_SERVER['PHP_SELF' ] in index.php/sysconfig.inc.php, which allows remote attackers to execute arbitrary JavaScript in a victim's browser by supplying a crafted URL path.

๐Ÿ“… Published: Dec. 17, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 17, 2025, 8:48 p.m.

0.0

CVE-2025-67790 -

An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. An unprivileged user could cause occasionally a Blue Screen Of Death (BSOD) on Windows computers by using an IOCTL and an unterminated string.

๐Ÿ“… Published: Dec. 17, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 17, 2025, 8:56 p.m.

7.3

CVSS3.1

CVE-2025-67285 -

A SQL injection vulnerability was found in the '/cts/admin/?page=zone' file of ITSourcecode COVID Tracking System Using QR-Code v1.0. The reason for this issue is that attackers inject malicious code from the parameter 'id' and use it directly in SQL queries without the need for appropriate cleaninโ€ฆ

๐Ÿ“… Published: Dec. 17, 2025, midnight ๐Ÿ”„ Last Modified: Dec. 18, 2025, 9:57 a.m.

8.8

CVSS3.1

CVE-2025-14766 - chromium-browser: Google Chrome V8: Out-of-bounds read and write leads to heap corruption

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ“… Published: Dec. 16, 2025, 10:54 p.m. ๐Ÿ”„ Last Modified: Dec. 18, 2025, 9:15 p.m.

8.8

CVSS3.1

CVE-2025-14765 - chromium-browser: Chromium: Use after free in WebGPU allows remote attacker to exploit heap corruptโ€ฆ

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ“… Published: Dec. 16, 2025, 10:54 p.m. ๐Ÿ”„ Last Modified: Dec. 18, 2025, 7:53 p.m.

8.6

CVSS4.0

CVE-2025-34288 - Nagios XI Privilege Escalation via Writable PHP Include Executed with Sudo

Nagios XI versions prior to 2026R1.1 areย vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A userโ€‘accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a loweโ€ฆ

๐Ÿ“… Published: Dec. 16, 2025, 10:17 p.m. ๐Ÿ”„ Last Modified: Dec. 17, 2025, 9:16 p.m.

8.7

CVSS4.0

CVE-2025-68274 - SIPGO library has response DoS vulnerability via nil pointer dereference

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote aโ€ฆ

๐Ÿ“… Published: Dec. 16, 2025, 10:02 p.m. ๐Ÿ”„ Last Modified: Dec. 21, 2025, 9:15 p.m.

6.5

CVSS3.1

CVE-2025-64520 - GLPI vulnerable to unauthorized access to restricted Knowledge Base items through the API

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

๐Ÿ“… Published: Dec. 16, 2025, 9:59 p.m. ๐Ÿ”„ Last Modified: Dec. 17, 2025, 9:09 p.m.

7.4

CVSS3.1

CVE-2025-53619 -

An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based ofโ€ฆ

๐Ÿ“… Published: Dec. 16, 2025, 9:32 p.m. ๐Ÿ”„ Last Modified: Dec. 18, 2025, 3:08 p.m.
Total resulsts: 323584
Page 80 of 32,359
ยซ previous page ยป next page
Filters