Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities326543
CVE-2025-12410
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.07%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SH Contextual Help <= 3.2.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The SH Contextual Help plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.1. This is due to missing or incorrect nonce validation in the sh_contextual_help_dashboard_widget() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-samhoamt
Product-SH Contextual Help
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11758
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 26.17%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier <= 2.0.3 - Missing Authorization to Page Creation and Information Exposure

The All in One Time Clock Lite plugin for WordPress is vulnerable to unauthorized access due to a missing authorization check in all versions up to, and including, 2.0.3. This is due to the plugin exposing admin-level AJAX actions to unauthenticated users via wp_ajax_nopriv_ hooks, while relying only on a nonce check without capability checks. This makes it possible for unauthenticated attackers to create published pages, create shift records with integrity issues, and download time reports containing PII (employee names and work schedules).

Action-Not Available
Vendor-codebangers
Product-All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier
CWE ID-CWE-862
Missing Authorization
CVE-2025-12413
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 2.70%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Social Media WPCF7 Stop Words <= 1.1.3 - Cross-Site Request Forgery to Settings Update

The Social Media WPCF7 Stop Words plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.3. This is due to missing or incorrect nonce validation on the smWpCfSwOptions() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-socialmedialtd
Product-WPCF7 Stop words
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12350
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 30.88%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DominoKit <= 1.1.0 - Missing Authorization to Unauthenticated Settings Update

The DominoKit plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wp_ajax_nopriv_dominokit_option_admin_action AJAX endpoint in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update plugin settings.

Action-Not Available
Vendor-domiinodev
Product-DominoKit
CWE ID-CWE-862
Missing Authorization
CVE-2025-12393
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.47%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Free Quotation <= 3.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting

The Free Quotation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Action-Not Available
Vendor-kris_iv
Product-Free Quotation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12416
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.75%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pagerank Tools <= 1.1.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Pagerank Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Cross-Site Request Forgery in all versions up to, and including, 1.1.5. This is due to missing nonce validation on the pr_save_settings() function and insufficient input sanitization. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The injected scripts will execute whenever a user accesses the plugin's settings page.

Action-Not Available
Vendor-mahype
Product-Pagerank tools
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-10896
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.26% / 48.80%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Plugins <= Multiple Versions - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Upload

Multiple plugins for WordPress with the Jewel Theme Recommended Plugins Library are vulnerable to Unrestricted Upload of File with Dangerous Type via arbitrary plugin installation in all versions up to, and including, 1.0.2.3. This is due to missing capability checks on the '*_recommended_upgrade_plugin' function which allows arbitrary plugin URLs to be installed. This makes it possible for authenticated attackers with subscriber-level access and above to upload arbitrary plugin packages to the affected site's server via a crafted plugin URL, which may make remote code execution possible.

Action-Not Available
Vendor-litonice13
Product-Content Locker for ElementorImage Hover Effects for ElementorImage Comparison Addon for ElementorMaster Blocks – Ultimate Gutenberg Blocks for Marketers
CWE ID-CWE-862
Missing Authorization
CVE-2025-12412
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.75%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Top Bar Notification <= 1.12 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Top Bar Notification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12. This is due to missing or incorrect nonce validation on th tbn_ajax_add() function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-josereyev
Product-Top Bar Notification
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12188
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.44%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-04 Nov, 2025 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Posts Navigation Links for Sections and Headings - Free by WP Masters <= 1.0.1 - Cross-Site Request Forgery to Settings Update

The Posts Navigation Links for Sections and Headings – Free by WP Masters plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the 'wpm_navigation_links_settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-wpmasterscom
Product-Posts Navigation Links for Sections and Headings – Free by WP Masters
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-12683
Assigner-Gridware Cybersecurity
ShareView Details
Assigner-Gridware Cybersecurity
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 3.12%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:23
Updated-04 Nov, 2025 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NULL DACL assigned to Named Pipe communicating with SYSTEM Service

The service employed by Everything, running as SYSTEM, communicates with the lower privileged Everything GUI via a named pipe. The named pipe has a NULL DACL and thus provides all users full permission over it; leading to potential Service Denial Of Service or Privilege escalation(only if chained with other elements) for a local low privilege user.

Action-Not Available
Vendor-Voidtools
Product-Everything
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-12069
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.44%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Global Screen Options <= 0.2 - Cross-Site Request Forgery to Screen Options Update

The WP Global Screen Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing nonce validation on the `updatewpglobalscreenoptions` action handler. This makes it possible for unauthenticated attackers to modify global screen options for all users via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-stiand
Product-WP Global Screen Options
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11008
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 41.08%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CE21 Suite <= 2.3.1 - Unauthenticated Sensitive Information Exposure to Privilege Escalation

The CE21 Suite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.1 via the log file. This makes it possible for unauthenticated attackers to extract sensitive data including authentication credentials, which can be used to log in as other users as long as they have used the plugin's custom authentication feature before. This may include administrators, which makes a complete site takeover possible.

Action-Not Available
Vendor-CE21, LLC.
Product-CE21 Suite
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-12401
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.07%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Label Plugins <= 0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting

The Label Plugins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5. This is due to missing or incorrect nonce validation on the label_plugins_options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-theode
Product-Label Plugins
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-11007
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 48.66%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Unauthenticated Privilege Escalation via Plugin Settings Update

The CE21 Suite plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the wp_ajax_nopriv_ce21_single_sign_on_save_api_settings AJAX action in versions 2.2.1 to 2.3.1. This makes it possible for unauthenticated attackers to update the plugin's API settings including a secret key used for authentication. This allows unauthenticated attackers to create new admin accounts on an affected site.

Action-Not Available
Vendor-CE21, LLC.
Product-CE21 Suite
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-12070
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.44%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:26
Updated-04 Nov, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ViaAds <= 2.1.1 - Cross-Site Request Forgery to API Key Update

The ViaAds plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing nonce validation on the `ViaAds_pluginHandler` function. This makes it possible for unauthenticated attackers to modify the plugin's API key and cookie consent settings via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-viaads
Product-ViaAds
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-47370
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 9.01%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reachable Assertion in BT Controller

Transient DOS when a remote device sends an invalid connection request during BT connectable LE scan.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcs9100_firmwareqcs6490sm7675qcs5430qamsrv1m_firmwaresa8150p_firmwarewcd9385wsa8835_firmwareqcc2073_firmwaresc8380xpsm8750_firmwaresnapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391qam8775p_firmwaresm8550psa8145p_firmwareqca8081_firmwarefastconnect_6900sa9000pqam8295p_firmwareqca8081sa8770pqca6574snapdragon_778g_5g_mobile_platform_firmwareqcs5430_firmwareqcm6490qcs8550_firmwaresa8775pwsa8830sm8735wcd9340qcc2073qcc7226snapdragon_auto_5g_modem-rf_gen_2_firmwareqcs8550sa7775p_firmwareqcs4490sa8775p_firmwaresm8550p_firmwareqcc5161_firmwarewcd9380_firmwaresnapdragon_auto_5g_modem-rf_firmwaresm7675pqca6595auqcn9012_firmwareqcm4490snapdragon_8_gen_3_mobile_platform_firmwaresa8255pqcm6490_firmwarewcd9395_firmwareqca8695ausm7325pqca6678aqwsa8845_firmwareqcn7605_firmwarewcd9370_firmwareqcn9011_firmwaresa6150p_firmwareqfw7124snapdragon_782g_mobile_platform_\(sm7325-af\)fastconnect_6900_firmwareqmp1000_firmwaresm8650q_firmwarewcn7750_firmwareqamsrv1ms3_sound_platformwsa8810_firmwaresxr2350p_firmwaresnapdragon_8_gen_2_mobile_platformsa8150psxr2250pqmp1000qcc710_firmwaresa4155pwcd9360snapdragon_ar2_gen_1_platformqca6777aq_firmwarewsa8810s5_sound_platformwcd9395snapdragon_x72_5g_modem-rf_systemwcd9378_firmwares5_sound_platform_firmwareqcc5161ar8035snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)wsa8832_firmwarewcn6755_firmwareqcn7605sa8195p_firmwaresnapdragon_auto_4g_modemsa6150pqca6678aq_firmwaresnapdragon_8_gen_3_mobile_platformsa8155psnapdragon_778g_5g_mobile_platformssg2125p_firmwaresdx55_firmwareqca6696_firmwarewsa8832wcn3950_firmwaresnapdragon_ar1_gen_1_platformwcd9375video_collaboration_vc3_platformqcs615_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm8735_firmwarewcd9390_firmwaresm7325p_firmwarewsa8815wcd9370wsa8815_firmwareqcc7225qcc7225_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcc7228sa8145psnapdragon_7c\+_gen_3_compute_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hcsrb31024_firmwareqca6574_firmwareqca6698aqsxr1230psxr2230psa8155qca6584auqfw7124_firmwarewsa8845h_firmwaresnapdragon_auto_5g_modem-rfqam8650psa8620pqca6777aqsm8750p_firmwaresm8635ssg2125pqcn9012snapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresa7255p_firmwarewsa8845fastconnect_7800_firmwareqca6391_firmwaresa8255p_firmwaresa4150ps3_gen_2_sound_platformqca6595snapdragon_782g_mobile_platform_\(sm7325-af\)_firmwarewcn7750qcn6274_firmwarefastconnect_6700srv1h_firmwareqam8295psm8635_firmwaresa6155wsa8840sa8650pwcd9385_firmwareqam8775psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareqca6688aqs5_gen_2_sound_platform_firmwareqam8255p_firmwaresm7675p_firmwaresa8650p_firmwaresm8635pqca6554a_firmwaressg2115p_firmwarewcd9378qca6797aq_firmwaresxr2350psnapdragon_x75_5g_modem-rf_systemqca6584au_firmwareqcs4490_firmwaresnapdragon_auto_4g_modem_firmwareqca6688aq_firmwareqcn7606_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6595au_firmwaresa6155pqcm4490_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcc2076qcn6274snapdragon_7c\+_gen_3_computewsa8845hqfw7114_firmwareqca6574a_firmwareqcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresm8750snapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwareqam8650p_firmwareqca6797aqsa8770p_firmwaresm8750psm7675_firmwaresm8650qqca6554aqca8337qcn6224_firmwares3_gen_2_sound_platform_firmwaresc8380xp_firmwareqcc7226_firmwaresxr2230p_firmwareqca8695au_firmwareqca6595_firmwareqcc2076_firmwareqamsrv1hqca6574au_firmwareqcn9011wsa8835sa8155_firmwaresa6145pwcd9390srv1m_firmwaresa4150p_firmwares5_gen_2_sound_platformsa9000p_firmwareqca6787aqwcd9340_firmwaresa7775psa8195psrv1mssg2115pvideo_collaboration_vc3_platform_firmwaresa6155_firmwaresdx55sa8295pfastconnect_6700_firmwarewcd9375_firmwareqcm5430_firmwareqcm5430wcd9380qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwaresa7255psa6155p_firmwarecsrb31024qcn7606qcs615qca8337_firmwareqca6787aq_firmwarefastconnect_7800wcd9360_firmwareqca6564au_firmwares3_sound_platform_firmwareqca6696wcn6755qca6574aqcs9100sxr2330p_firmwareqcn6224wsa8840_firmwareqca6564auqcc7228_firmwaresa8295p_firmwareqcs6490_firmwarewcn3950sxr2330pSnapdragon
CWE ID-CWE-617
Reachable Assertion
CVE-2025-47368
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in DSP Service

Memory corruption when dereferencing an invalid userspace address in a user buffer during MCDM IOCTL processing.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6900wsa8845hwsa8840wcd9380_firmwarewsa8845_firmwaresc8380xp_firmwarewsa8840_firmwarewcd9385_firmwarewcd9385wsa8845fastconnect_6900_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47367
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in WinBlast Driver

Memory corruption while accessing a buffer during IOCTL processing.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072x2000094_firmwareqcs6490wcd9375video_collaboration_vc3_platformwcd9380_firmwarex2000090x2000086_firmwaresc8380xp_firmwareqcs5430x2000090_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwarewcd9385x2000077_firmwarewsa8835_firmwarefastconnect_7800sc8380xpfastconnect_7800_firmwarewsa8835wcd9370xg101039fastconnect_6900qcc2072_firmwareqcm6490_firmwaresnapdragon_7c\+_gen_3_computex2000086wsa8845hx2000092snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarexg101039_firmwarexg101002fastconnect_6700snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_7c\+_gen_3_compute_firmwareqcs5430_firmwareqcm6490wsa8830wsa8840wsa8845_firmwarewcd9370_firmwarewsa8840_firmwarewcd9378cxg101032wcd9385_firmwarewcd9378c_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)video_collaboration_vc3_platform_firmwarex2000077wsa8830_firmwarex2000094fastconnect_6900_firmwarexg101032_firmwarewcd9375_firmwarexg101002_firmwarex2000092_firmwarefastconnect_6700_firmwareqcm5430_firmwareqcm5430qcs6490_firmwarewcd9380wsa8845h_firmwareSnapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-47365
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow or Wraparound in Automotive Platform

Memory corruption while processing large input data from a remote source via a communication interface.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwareqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255psa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255pqca8695ausa8145pqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqam8650p_firmwareSnapdragon
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-47362
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.46%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Automotive Software platform based on QNX

Information disclosure while processing message from client with invalid payload.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pmsm8996auqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwaresnapdragon_820_automotive_platformqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255pqca6584au_firmwaresa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255psnapdragon_820_automotive_platform_firmwareqca8695ausa8145pmsm8996au_firmwareqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqca6584auqam8650p_firmwareSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-47361
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Automotive Software platform based on QNX

Memory corruption when triggering a subsystem crash with an out-of-range identifier.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwareqam8650psa8620psa8770p_firmwaresa7255psa8295p_firmwaresrv1l_firmwareqamsrv1m_firmwareqca6688aq_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca8695au_firmwaresrv1lqca6595au_firmwareqca6595_firmwareqca6595auqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqca6696qam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwareqca8695ausa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775pqam8620psa8650psrv1hsrv1mqam8775pqca6688aqqca6698aqsa8540p_firmwaresa8295pqamsrv1msa8540pqam8255p_firmwareqca6797aqqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574auSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-47360
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack-based Buffer Overflow in Automotive Software platform based on QNX

Memory corruption while processing client message during device management.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8150pqam8650psa8620psa8770p_firmwaresrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8150p_firmwareqca8695au_firmwareqca6595_firmwareqamsrv1hqca6574au_firmwareqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa6145psa8145p_firmwaresa9000pqam8295p_firmwaresrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775pqam8295psa8775psa8650psa8195psrv1mqam8775pqca6688aqsa8540p_firmwaresa8195p_firmwaresa8295psa6150pqam8255p_firmwaresa8155psa8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareqca6574ausa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwaresa6145p_firmwaresa7255psa6155p_firmwareqca6688aq_firmwaresa8620p_firmwareqam8255psa8155p_firmwareqca6797aqsrv1lqca6595au_firmwareqca6595ausa6155pqca6696sa8255pqca8695ausa8145pqam8620psrv1hsa6150p_firmwareqca6698aqqamsrv1msa8540psa8295p_firmwareqam8650p_firmwareSnapdragon
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-47357
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8||HIGH
EPSS-0.01% / 1.27%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Critical Function in SMSS

Information Disclosure when a user-level driver performs QFPROM read or write operations on Fuse regions.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqam8620p_firmwareqca6797aq_firmwareqca6696_firmwareqcs9100_firmwareqam8650psa8620psa8770p_firmwaresa7255psrv1l_firmwareqamsrv1m_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca6797aqsrv1lqca6595au_firmwareqca6595_firmwareqca6595auqamsrv1hqca6698aq_firmwaresa8255p_firmwareqca6696qam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000psrv1m_firmwaresa8770psa9000p_firmwareqcs9100srv1h_firmwaresa7775psa8775pqca6678aqqam8620psa8650psrv1hsrv1mqam8775pqca6698aqqamsrv1mqam8255p_firmwareqca6678aq_firmwareqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareSnapdragon
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-47353
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed Dangerous Method or Function in Automotive Software platform based on QNX

Memory corruption while processing request sent from GVM.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa8775p_firmwareqca6797aq_firmwareqam8650psa8620psa8770p_firmwaresa7255pqamsrv1m_firmwaresa7255p_firmwaresa8620p_firmwareqam8255pqca6595_firmwareqamsrv1hqca6698aq_firmwaresa8255p_firmwareqam8775p_firmwareqca6595sa8255psa8650p_firmwaresa9000psrv1m_firmwaresa8770psa9000p_firmwaresrv1h_firmwaresa7775psa8775psa8650psrv1hsrv1mqam8775pqca6698aqqamsrv1mqam8255p_firmwareqca6797aqqam8650p_firmwaresa7775p_firmwareqamsrv1h_firmwareSnapdragon
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2025-47352
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Validation of Array Index in Audio

Memory corruption while processing audio streaming operations.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcc2072_firmwareqcc2072x2000086wsa8845hx2000092x2000094_firmwarexg101039_firmwarexg101002wsa8840wsa8845_firmwarex2000090x2000086_firmwarex2000090_firmwarewsa8840_firmwarewcd9378cwsa8845xg101032wcd9378c_firmwarex2000077x2000077_firmwarex2000094fastconnect_7800xg101032_firmwarefastconnect_7800_firmwarexg101002_firmwarex2000092_firmwarexg101039wsa8845h_firmwareSnapdragon
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2025-27074
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-8.8||HIGH
EPSS-0.01% / 2.15%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Calculation of Buffer Size in SCE-Mink

Memory corruption while processing a GP command response.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-mdm9650msm8996auipq8076a_firmwareqcn9001ipq5010pmp8074snapdragon_821_mobile_platform_firmwareqcn5064_firmwareqca6320_firmwareipq8078a_firmwareipq8078aqcn9022_firmwareqcn9070_firmwareqcn9012ipq5028_firmwaresd821_firmwareqca8075qcn6024_firmwareqcn9074_firmwaresnapdragon_429_mobile_platformqca8075_firmwareipq8074_firmwareqcn5052_firmwarewcn3660bipq9008qca8081_firmwareqcn9003qca8081qca6574qcn6112_firmwarepmp8074_firmwareqcn5054ipq8072a_firmwarecsr8811immersive_home_318_platform_firmwareqcn5550ipq8070aqca6564aqcn9001_firmwareqcn5164qcn9002ipq8076qcn9072_firmwareqcn9100_firmwareqcn9070snapdragon_820_mobile_platform_firmwareqcn5154_firmwareqcn5164_firmwaresd820apq8064au_firmwareqca6438qcn6023qca4024_firmwareqca6584au_firmwareqca6234_firmwareqcn6023_firmwareimmersive_home_214_platformsnapdragon_wear_4100\+_platformsnapdragon_wear_4100\+_platform_firmwareipq8173_firmwaresnapdragon_429_mobile_platform_firmwareqca6310_firmwareipq8174_firmwareqcn9012_firmwareqcn5154qcn5124immersive_home_316_platformqcn6024ipq9574apq8064aumsm8996au_firmwaremdm9650_firmwareipq8173qca9984_firmwareqca6574a_firmwareqcn5152_firmwareqcn5152qcn6100_firmwareqcn6100ipq8070_firmwarecsr8811_firmwareqca4024wsa8810_firmwarewcn3620_firmwareipq8071a_firmwareqcn5054_firmwareqcn5550_firmwareqca6174a_firmwareqcn6102qcn9000_firmwarewcn3620wcn3980_firmwareqcn5024_firmwarewcn3610_firmwareqca6438_firmwareqca9984wcn3680b_firmwareqcn6132snapdragon_820_automotive_platformipq8071aqcn6112ipq8174wsa8810ipq8072sdm429w_firmwareqca6310qca6574au_firmwareqcn9024ipq8070a_firmwarewcn3680bqcn9022wcd9335_firmwaresd820_firmwareipq8078qca6174aqca9889ipq8074aqca9888immersive_home_216_platformqcn9074qcn6132_firmwarewcn3980qca6428sdx55immersive_home_216_platform_firmwareimmersive_home_318_platformqca6564a_firmwareqcn9072qcn5122sdm429wwcn3660b_firmwareqca8072qca6574ausdx55_firmwareipq5010_firmwareipq8074a_firmwareipq8078_firmwaresnapdragon_820_mobile_platformqcn9003_firmwareqcn9024_firmwareipq8076aqcn6102_firmwareqca6428_firmwareqcn9000ipq8070qcn9274snapdragon_821_mobile_platformqca9889_firmwareipq8071immersive_home_316_platform_firmwarewcn3610qca6694ipq8072asd821ipq8072_firmwareqca9888_firmwareqcn5022qcn9100qca6564au_firmwarewsa8815ipq8074qcn5022_firmwareqca6320wsa8815_firmwaremdm9640ipq9008_firmwareqcn5052qca6694_firmwareipq8076_firmwaresnapdragon_820_automotive_platform_firmwareqca6574aqcn9274_firmwaremdm9640_firmwareimmersive_home_214_platform_firmwarewcd9335qcn5124_firmwareqcn6122ipq5028qca6234ipq9574_firmwareqca6564auqcn5122_firmwareqcn6122_firmwareqca6574_firmwareqcn5064qcn9002_firmwareqca8072_firmwareipq8071_firmwareqca6584auqcn5024Snapdragon
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2025-27070
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.68%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-bounds Write in Windows Compute

Memory corruption while performing encryption and decryption commands.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_x32_5g_modem-rf_system_firmwareqcs9100_firmwareqdu1000_firmwareqca6426_firmwareqcs6490wcn7861snapdragon_x65_5g_modem-rf_system_firmwaresm7675snapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qcs5430qamsrv1m_firmwaresa8150p_firmwarewcd9385qcn6024_firmwarewsa8835_firmwaresc8380xpsm8750_firmwaresnapdragon_ar1_gen_1_platform_firmwareqfw7114ar8035_firmwareqca6698aq_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwareqca6391qam8775p_firmwaresm8550psa8145p_firmwareqca8081_firmwarefastconnect_6900sa9000pqam8295p_firmwareqca8081sa8770pqca6574qca6431snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwareqca6436_firmwaresa8775pwsa8830qcs5430_firmwareqcm6490qcs8550_firmwaresm8735snapdragon_695_5g_mobile_platformwcd9340snapdragon_auto_5g_modem-rf_gen_2_firmwareqcs8550qdu1110_firmwaresa8540p_firmwareqcs8300wcn6450sm4635_firmwarewcn7860_firmwareqdu1210sa7775p_firmwaresnapdragon_x62_5g_modem-rf_systemsa8775p_firmwareqam8620p_firmwaresm8550p_firmwaresnapdragon_695_5g_mobile_platform_firmwareqru1052_firmwareqru1062qdx1010_firmwarewcd9380_firmwaresm7675pqru1032_firmwaresa8530pqca6595ausm6650p_firmwareqcn9012_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresa8255pqdx1011qcm6490_firmwarewcd9395_firmwaresm7250p_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)qca6678aqwsa8845_firmwarefastconnect_6200sa6150p_firmwareqcn9011_firmwaresnapdragon_888_5g_mobile_platformwcd9370_firmwaresnapdragon_480_5g_mobile_platformqfw7124sm6650wcn7750_firmwareqmp1000_firmwaresnapdragon_662_mobile_platformfastconnect_6900_firmwaresm8650q_firmwareqamsrv1mwsa8810_firmwaresnapdragon_8_gen_2_mobile_platformsa8150psxr2250pqmp1000sa4155pqcc710_firmwareqca6174a_firmwaresnapdragon_ar2_gen_1_platformwsa8810sm7635qcn9024wcd9395snapdragon_x72_5g_modem-rf_systemwcd9378_firmwareqcm4325_firmwareqru1032ar8035sm6650_firmwareqcm8550wsa8832_firmwaresm4635wcn6755_firmwaresa8195p_firmwaresa6150pwcn3988_firmwareqca6678aq_firmwaresnapdragon_8_gen_3_mobile_platformsa8155pssg2125p_firmwareqca6696_firmwaresnapdragon_460_mobile_platformwsa8832sdx61_firmwarewcn3950_firmwaresnapdragon_ar1_gen_1_platformqcn9274video_collaboration_vc3_platformwcd9375qcs615_firmwaresnapdragon_auto_5g_modem-rf_gen_2sm8735_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcd9390_firmwaresrv1lwsa8815wcd9370sd865_5g_firmwarewsa8815_firmwaresnapdragon_8_gen_1_mobile_platformsnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwarewcn3988sdx61snapdragon_662_mobile_platform_firmwaresa8145psnapdragon_ar1_gen_1_platform_\"luna1\"_firmwaresrv1hqcs8300_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_xr2_5g_platform_firmwaresd_8_gen1_5gqdx1010fastconnect_6800qca6421_firmwareqca6574_firmwareqdu1110qca6698aqsxr1230psxr2230pqca6584auwcn7880qfw7124_firmwareqru1052wsa8845h_firmwareqam8650psa8620psm8750p_firmwaresg4150p_firmwaresm8635ssg2125pqcn9012sa7255p_firmwarewsa8845qep8111fastconnect_7800_firmwareqca6391_firmwaresa8255p_firmwaresa4150pqca6595wcn7750wcn6650qcn6274_firmwarefastconnect_6700srv1h_firmwareqam8295psm8635_firmwarewsa8840sa8650pwcn6650_firmwaresnapdragon_xr2_5g_platformwcd9385_firmwaresnapdragon_680_4g_mobile_platformsnapdragon_x62_5g_modem-rf_system_firmwaresnapdragon_x35_5g_modem-rf_systemsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqam8775pwsa8830_firmwaresnapdragon_8\+_gen_2_mobile_platformqca6688aqsm7635_firmwareqam8255p_firmwaresm7675p_firmwaresa8650p_firmwareqdu1010qdu1000sg4150psm8635pqca6797aq_firmwaressg2115p_firmwarewcd9378fastconnect_6800_firmwareqep8111_firmwaresnapdragon_4_gen_1_mobile_platform_firmwaresnapdragon_x75_5g_modem-rf_systemfastconnect_6200_firmwareqca6584au_firmwareqca6421snapdragon_685_4g_mobile_platform_\(sm6225-ad\)qca6688aq_firmwaresnapdragon_680_4g_mobile_platform_firmwaresg8275psa8620p_firmwareqam8255psa8155p_firmwareqca6595au_firmwaresa6155pqru1062_firmwaresnapdragon_ar2_gen_1_platform_firmwaresxr2250p_firmwareqcn6274qca6426wsa8845hqdu1010_firmwareqcn6024qfw7114_firmwareqca6574a_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)sxr2130qcc710sm8635p_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_x55_5g_modem-rf_system_firmwareqdx1011_firmwaresa8540psm8750qca6797aqsnapdragon_8_gen_2_mobile_platform_firmwaresnapdragon_x32_5g_modem-rf_systemqam8650p_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresnapdragon_ar1_gen_1_platform_\"luna1\"sxr1230p_firmwarewcn7861_firmwareqdu1210_firmwareqsm8350_firmwaresnapdragon_x35_5g_modem-rf_system_firmwaresa8770p_firmwaresm8750psm7675_firmwaresrv1l_firmwaresnapdragon_x55_5g_modem-rf_systemsc8380xp_firmwaresd_8_gen1_5g_firmwaresm8650qqca8337qcn6224_firmwaresxr2230p_firmwareqca6595_firmwarewcn7881qcn9011qamsrv1hqca6574au_firmwareqcm8550_firmwarewcn7880_firmwarewsa8835snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sa6145pwcd9390srv1m_firmwaresa4150p_firmwaresa9000p_firmwareqca6174aqcm4325wcn7860wcn7881_firmwaresa7775pwcd9340_firmwarewcn6450_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwaresa8195psrv1msnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)ssg2115pvideo_collaboration_vc3_platform_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwaresa8295pfastconnect_6700_firmwareqcm5430_firmwareqcm5430wcd9375_firmwareqsm8350sg8275p_firmwarewcd9380qamsrv1h_firmwareqca6574ausa4155p_firmwaresa6145p_firmwareqcn9024_firmwaresa7255pqca6436sa6155p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwareqcs615sm7250pqca6431_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqca8337_firmwaresd865_5gsnapdragon_765_5g_mobile_platform_\(sm7250-aa\)sxr2130_firmwarefastconnect_7800snapdragon_460_mobile_platform_firmwareqca6696snapdragon_865_5g_mobile_platformwcn6755qca6574aqcs9100snapdragon_4_gen_1_mobile_platformsnapdragon_480_5g_mobile_platform_firmwareqcn9274_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)qam8620pqcn6224sxr2330p_firmwaresm6650pwsa8840_firmwaresnapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwaresa8530p_firmwaresnapdragon_888_5g_mobile_platform_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresa8295p_firmwareqcs6490_firmwarewcn3950sxr2330psnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)Snapdragon
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-27064
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.46%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 03:19
Updated-05 Nov, 2025 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in Core Services

Information disclosure while registering commands from clients with diag through diagHal.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca8111qam8650pqcn9012sa7255p_firmwareqca8101qca8075qca8386_firmwareqcn9074_firmwareqcn9160_firmwarewsa8835_firmwareqca8075_firmwareipq9048_firmwarefastconnect_7800_firmwareqca8084qca6698aq_firmwaresa8255p_firmwaresa4150pwcn3660bqcf8001ipq9008qca8081_firmwarefastconnect_6900sa9000pqca8081ipq5302_firmwarewsa8830qca8386sa8650pipq9554_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwarewsa8830_firmwareqca6688aqsa8540p_firmwareqca6564aqca8080_firmwareqcn9160qam8255p_firmwaresa8650p_firmwareqca8111_firmwareipq5302ipq5424_firmwareqca6584au_firmwareqca8102_firmwarewcd9380_firmwareqca6688aq_firmwareqam8255pqcn6432sa8155p_firmwaresa8530pqca8112qca6595au_firmwareqca6595ausa6155pqcn9012_firmwareipq5300_firmwaresa8255pqcn5124qcn5224sxr2250p_firmwareimmersive_home_326_platform_firmwareqcf8000ipq5332qca0000_firmwareipq9574ipq5424ipq5312_firmwareipq9570qca6678aqqca6574a_firmwarefastconnect_6900_firmwaresa8540pqca8385_firmwareqam8650p_firmwareqcn6402qca9377immersive_home_3210_platform_firmwareqcn6412_firmwaresxr2250psa4155pqca8384_firmwareqcn9000_firmwarewcn3980_firmwareqcn6422_firmwarewcn3680b_firmwareqca8082qca8112_firmwareqcn6422qca6574au_firmwareqcn9024wsa8835wcn3680bqca8102sa4150p_firmwaresa9000p_firmwareipq9570_firmwareipq5332_firmwareqca0000qcn9074sa8195pqca8084_firmwarewcn3980qca9367_firmwareqca9367qca9377_firmwaresa8195p_firmwareqca6564a_firmwareqca6678aq_firmwarewcn3660b_firmwareqca8085_firmwaresa8155pwcd9380qcf8000_firmwareqca6574auqcn6432_firmwaresa4155p_firmwaremdm9628ipq5300qcf8001_firmwareqcn9024_firmwareqca8080qcn9000qcn9274qcn6412sa7255psa6155p_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresnapdragon_auto_5g_modem-rf_gen_2ipq9048qca8082_firmwareqxm8083fastconnect_7800immersive_home_3210_platformqcn5224_firmwareqca6564au_firmwaresnapdragon_8_gen_1_mobile_platformipq5312ipq9008_firmwareqca8101_firmwaremdm9628_firmwareqca6574aqcn9274_firmwareqcn6402_firmwareimmersive_home_326_platformqca8385qca8085qcn5124_firmwareipq9554qxm8083_firmwareqca6564auipq9574_firmwaresa8530p_firmwareqca6698aqqca8384qca6584auSnapdragon
CWE ID-CWE-126
Buffer Over-read
CVE-2025-12324
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.77%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 02:26
Updated-05 Nov, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TablePress – Tables in WordPress made easy <= 3.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `table` shortcode attributes in all versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-tobiasbg
Product-TablePress – Tables in WordPress made easy
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-11841
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 10.77%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:50
Updated-04 Nov, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Greenshift – animation and page builder blocks <= 12.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Chart Data Attributes

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Chart Data attributes in all versions up to, and including, 12.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Action-Not Available
Vendor-wpsoul
Product-Greenshift – animation and page builder blocks
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-43373
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.04% / 13.44%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:18
Updated-17 Dec, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to cause unexpected system termination or corrupt kernel memory.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-43365
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-2.8||LOW
EPSS-0.02% / 5.30%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-05 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial-of-service issue was addressed with improved input validation. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. An unprivileged process may be able to terminate a root processes.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osiOS and iPadOS
CWE ID-CWE-20
Improper Input Validation
CVE-2025-43430
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.99%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed through improved state management. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionoswatchossafariipadostvosSafarivisionOSwatchOSiOS and iPadOSmacOStvOS
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2025-43426
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.83%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1. An app may be able to access sensitive user data.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osipadosiOS and iPadOSmacOS
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-43390
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.32%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1. An app may be able to access user-sensitive data.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-43447
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.72%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved memory handling. This issue is fixed in iOS 26.1 and iPadOS 26.1, watchOS 26.1, macOS Tahoe 26.1, visionOS 26.1. An app may be able to cause unexpected system termination or corrupt kernel memory.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionosipadoswatchosvisionOSwatchOSiOS and iPadOSmacOS
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-43502
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.72%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, Safari 26.1. An app may be able to bypass certain Privacy preferences.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionosipadossafarimacOSSafarivisionOSiOS and iPadOS
CWE ID-CWE-284
Improper Access Control
CVE-2025-43386
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 2.00%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, visionOS 26.1. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionosipadostvostvOSvisionOSmacOSiOS and iPadOS
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-43345
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.64%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-04 Nov, 2025 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A correctness issue was addressed with improved checks. This issue is fixed in tvOS 26, watchOS 26, macOS Sonoma 14.8, iOS 26 and iPadOS 26, macOS Sequoia 15.7, visionOS 26, iOS 18.7 and iPadOS 18.7. An app may be able to access sensitive user data.

Action-Not Available
Vendor-Apple Inc.
Product-tvoswatchosipadosmacosvisionosiphone_osiOS and iPadOStvOSvisionOSwatchOSmacOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-43493
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 10.08%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, visionOS 26.1. Visiting a malicious website may lead to address bar spoofing.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionosipadossafariSafarivisionOSiOS and iPadOSmacOS
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-43387
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.50%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1. A malicious app may be able to gain root privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-43411
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.28%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to access user-sensitive data.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-43446
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 5.72%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to modify protected parts of the file system.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-43503
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.75%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, visionOS 26.1. Visiting a malicious website may lead to user interface spoofing.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionoswatchossafariipadosSafariiOS and iPadOSwatchOSvisionOSmacOS
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-43450
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.97%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved checks. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An app may be able to learn information about the current camera view before being granted camera access.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osipadosiOS and iPadOS
CWE ID-CWE-284
Improper Access Control
CVE-2025-43391
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.63%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-18 Dec, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2, iOS 26.1 and iPadOS 26.1. An app may be able to access sensitive user data.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osmacosipadosiOS and iPadOSmacOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-43407
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.45%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved entitlements. This issue is fixed in tvOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, visionOS 26.1. An app may be able to break out of its sandbox.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionosmacosipadostvostvOSvisionOSmacOSiOS and iPadOS
CWE ID-CWE-284
Improper Access Control
CVE-2025-43309
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-2.4||LOW
EPSS-0.02% / 4.58%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-04 Nov, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved checks. This issue is fixed in iOS 26 and iPadOS 26. An attacker with physical access to an iOS device may be able to view notification contents from the Lock Screen.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osiOS and iPadOS
CWE ID-CWE-284
Improper Access Control
CVE-2025-43427
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 31.64%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed through improved state management. This issue is fixed in tvOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionossafariipadostvosSafarivisionOSiOS and iPadOSmacOStvOS
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-703
Improper Check or Handling of Exceptional Conditions
CVE-2025-43431
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.58%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved memory handling. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, visionOS 26.1. Processing maliciously crafted web content may lead to memory corruption.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osvisionoswatchossafariipadostvosSafarivisionOSwatchOSiOS and iPadOSmacOStvOS
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-43348
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 6.14%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 01:17
Updated-26 Dec, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may bypass Gatekeeper checks.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • ...
  • 178
  • 179
  • 180
  • ...
  • 6530
  • 6531
  • Next