Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities326829
CVE-2025-11956
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-8.9||HIGH
EPSS-0.05% / 14.57%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 14:51
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in Proliz's OBS

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Proliz Software Ltd. Co. OBS (Student Affairs Information System) allows Stored XSS.This issue affects OBS (Student Affairs Information System): before 25.0401.

Action-Not Available
Vendor-Proliz Software Ltd. Co.
Product-OBS (Student Affairs Information System)
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-10955
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.67%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 14:46
Updated-07 Nov, 2025 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTML Injection in Netcad Software's Netigma

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Netcad Software Inc. Netigma allows XSS Through HTTP Query Strings.This issue affects Netigma: from 6.3.5 before 6.3.5 V8.

Action-Not Available
Vendor-Netcad Software Inc.
Product-Netigma
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-37735
Assigner-Elastic
ShareView Details
Assigner-Elastic
CVSS Score-7||HIGH
EPSS-0.01% / 1.46%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 14:27
Updated-07 Nov, 2025 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.

Action-Not Available
Vendor-Elasticsearch BV
Product-Kibana
CWE ID-CWE-281
Improper Preservation of Permissions
CVE-2025-36054
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 24.92%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 14:11
Updated-12 Dec, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-site scripting vulnerability affect IBM Business Automation Workflow Process Federation Server -

IBM Business Automation Workflow containers 24.0.0 through 24.0.0-IF006, 24.0.1 through 24.0.1-IF004, 25.0.0 through 25.0.0-IF001 and IBM Business Automation Workflow traditional with Process Federation Server 24.0.0 through 24.0.1 and 25.0.0 are vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Action-Not Available
Vendor-IBM Corporation
Product-business_automation_workflowprocess_federation_serverBusiness Automation Workflow containersBusiness Automation Workflow traditional with Process Federation Server
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-11268
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.92%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 08:26
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Strong Testimonials <= 3.2.16 - Unauthenticated Arbitrary Shortcode Execution

The Strong Testimonials plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.2.16. This is due to the software allowing users to submit a testimonial in which a value is not properly validated or sanitized prior to being passed to a do_shortcode call. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes if an administrator previews or publishes a crafted testimonial.

Action-Not Available
Vendor-wpchill
Product-Strong Testimonials
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12360
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 8.89%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 07:27
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Better Find and Replace <= 1.7.7 - Missing Authorization

The Better Find and Replace – AI-Powered Suggestions plugin for WordPress is vulnerable to unauthorized API usage due to a missing capability check on the rtafar_ajax() function in all versions up to, and including, 1.7.7. This makes it possible for authenticated attackers, with Subscriber-level access, to trigger OpenAI API key usage resulting in quota consumption potentially incurring cost.

Action-Not Available
Vendor-codesolz
Product-Better Find and Replace – AI-Powered Suggestions
CWE ID-CWE-285
Improper Authorization
CVE-2025-10259
Assigner-Mitsubishi Electric Corporation
ShareView Details
Assigner-Mitsubishi Electric Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 5.43%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 07:12
Updated-14 Nov, 2025 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial-of-Service(DoS) Vulnerability in TCP Communication Function on MELSEC iQ-F Series CPU module

Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. There is no impact on connections other than the attacked one.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-MELSEC iQ-F Series FX5U-80MT/DSMELSEC iQ-F Series FX5S-80MR/ES-AMELSEC iQ-F Series FX5S-80MR/DSMELSEC iQ-F Series FX5UJ-60MR/DSMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC iQ-F Series FX5S-40MR/ESMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC iQ-F Series FX5S-60MT/DSMELSEC iQ-F Series FX5UJ-24MT/DSSMELSEC iQ-F Series FX5S-30MT/ESSMELSEC iQ-F Series FX5UJ-40MT/DSMELSEC iQ-F Series FX5S-40MT/DSSMELSEC iQ-F Series FX5S-30MR/ES-AMELSEC iQ-F Series FX5S-80MT/ESSMELSEC iQ-F Series FX5U-64MR/ESMELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC iQ-F Series FX5U-32MT/ESSMELSEC iQ-F Series FX5UC-64MT/DMELSEC iQ-F Series FX5S-30MT/ESMELSEC iQ-F Series FX5S-80MR/ESMELSEC iQ-F Series FX5U-64MT/ESSMELSEC iQ-F Series FX5S-40MR/DSMELSEC iQ-F Series FX5UJ-24MR/ES-AMELSEC iQ-F Series FX5S-80MT/ES-AMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-F Series FX5UJ-40MT/ESSMELSEC iQ-F Series FX5UC-32MT/DMELSEC iQ-F Series FX5S-60MT/DSSMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC iQ-F Series FX5S-40MT/ESMELSEC iQ-F Series FX5S-60MT/ESSMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-F Series FX5S-30MT/DSSMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC iQ-F Series FX5U-64MT/DSMELSEC iQ-F Series FX5U-80MR/DSMELSEC iQ-F Series FX5S-60MT/ES-AMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC iQ-F Series FX5S-30MT/DSMELSEC iQ-F Series FX5U-80MT/ESMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC iQ-F Series FX5S-60MT/ESMELSEC iQ-F Series FX5UJ-40MT/DSSMELSEC iQ-F Series FX5UJ-24MR/DSMELSEC iQ-F Series FX5S-60MR/DSMELSEC iQ-F Series FX5U-80MR/ESMELSEC iQ-F Series FX5S-40MT/ES-AMELSEC iQ-F Series FX5S-30MR/ESMELSEC iQ-F Series FX5UC-96MT/DSSMELSEC iQ-F Series FX5S-80MT/DSMELSEC iQ-F Series FX5U-32MT/DSMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC iQ-F Series FX5U-64MT/DSSMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC iQ-F Series FX5S-30MT/ES-AMELSEC iQ-F Series FX5UJ-60MT/DSSMELSEC iQ-F Series FX5U-80MT/ESSMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC iQ-F Series FX5UJ-24MT/DSMELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-F Series FX5U-64MR/DSMELSEC iQ-F Series FX5S-40MR/ES-AMELSEC iQ-F Series FX5S-60MR/ES-AMELSEC iQ-F Series FX5UJ-60MT/DSMELSEC iQ-F Series FX5UJ-40MR/DSMELSEC iQ-F Series FX5S-30MR/DSMELSEC iQ-F Series FX5U-32MR/ESMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC iQ-F Series FX5U-32MT/DSSMELSEC iQ-F Series FX5U-32MT/ESMELSEC iQ-F Series FX5S-40MT/DSMELSEC iQ-F Series FX5UC-96MT/DMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC iQ-F Series FX5S-80MT/DSSMELSEC iQ-F Series FX5U-32MR/DSMELSEC iQ-F Series FX5U-64MT/ES
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2025-12471
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 33.09%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 06:45
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hubbub Lite <= 1.36.0 - Reflected Cross-Site Scripting

The Hubbub Lite – Fast, free social sharing and follow buttons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dpsp_list_attention_search' parameter in all versions up to, and including, 1.36.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Action-Not Available
Vendor-nerdpressteam
Product-Hubbub Lite – Fast, free social sharing and follow buttons
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-9338
Assigner-ASUSTeK Computer Incorporation
ShareView Details
Assigner-ASUSTeK Computer Incorporation
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.89%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 06:02
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper restriction of operations within the bounds of a memory buffer exists in AsIO3.sys driver. This vulnerability can be triggered by manually executing a specially crafted process, potentially leading to local privilage escalation. For additional information, please refer to the 'Security Update for Armoury Crate App' section of the ASUS Security Advisory.

Action-Not Available
Vendor-ASUS (ASUSTeK Computer Inc.)
Product-Armoury Crate
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2025-12560
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.00%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 05:31
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Blog2Social: Social Media Auto Post & Scheduler <= 8.6.0 - Authenticated (Subscriber+) Blind Server-Side Request Forgery via post_url

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 8.6.0 via the getFullContent() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

Action-Not Available
Vendor-pr-gateway
Product-Blog2Social: Social Media Auto Post & Scheduler
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-11271
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 17.06%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 04:36
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Easy Digital Download <= 3.5.2 - Insufficient Verification to Order Manipulation

The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account.

Action-Not Available
Vendor-Awesome Motive Inc.
Product-Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
CWE ID-CWE-807
Reliance on Untrusted Inputs in a Security Decision
CVE-2025-12563
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 9.54%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 04:36
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Blog2Social: Social Media Auto Post & Scheduler <= 8.6.0 - Incorrect Authorization to Video File Upload

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to limited file upload due to an incorrect capability check on theuploadVideo() function in all versions up to, and including, 8.6.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload mp4 files to the 'wp-content/uploads/<YYYY>/<MM>/' directory.

Action-Not Available
Vendor-pr-gateway
Product-Blog2Social: Social Media Auto Post & Scheduler
CWE ID-CWE-862
Missing Authorization
CVE-2025-61994
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 10.59%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 04:14
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site scripting vulnerability exists in GROWI prior to v7.2.10. If a malicious user creates a page containing crafted contents, an arbitrary script may be executed on the web browser of a victim user who accesses the page.

Action-Not Available
Vendor-GROWI, Inc.
Product-GROWI
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-10691
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 2.46%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 03:27
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Easy Email Subscription <= 1.3 - Cross-Site Request Forgery to Arbitrary Subscriber Deletion

The Easy Email Subscription plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing or incorrect nonce validation on the show_editsub_page() function. This makes it possible for unauthenticated attackers to delete arbitrary subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-yudiz
Product-Easy Email Subscription
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-10683
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.9||MEDIUM
EPSS-0.03% / 9.62%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 02:31
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Easy Email Subscription <= 1.3 - Authenticated (Admin+) SQL Injection via uid

The Easy Email Subscription plugin for WordPress is vulnerable to SQL Injection via the 'uid' parameter in all versions up to, and including, 1.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Action-Not Available
Vendor-yudiz
Product-Easy Email Subscription
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-64171
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.03% / 9.34%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:23
Updated-06 Nov, 2025 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MARIN3R: Cross-Namespace Vulnerability in the Operator

MARIN3R is a lightweight, CRD based envoy control plane for kubernetes. In versions 0.13.3 and below, there is a cross-namespace secret access vulnerability in the project's DiscoveryServiceCertificate which allows users to bypass RBAC and access secrets in unauthorized namespaces. This issue is fixed in version 0.13.4.

Action-Not Available
Vendor-3scale-sre
Product-marin3r
CWE ID-CWE-862
Missing Authorization
CVE-2025-64164
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.9||HIGH
EPSS-0.07% / 21.05%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:07
Updated-07 Nov, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DataEase is vulnerable to Oracle JNDI Injection

Dataease is an open source data visualization analysis tool. In versions 2.10.14 and below, DataEase did not properly filter when establishing JDBC connections to Oracle, resulting in a risk of JNDI injection (Java Naming and Directory Interface injection). This issue is fixed in version 2.10.15.

Action-Not Available
Vendor-DataEase (FIT2CLOUD Inc.)
Product-dataeasedataease
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-63551
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.31%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-07 Nov, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Server-Side Request Forgery (SSRF) vulnerability, achievable through an XML External Entity (XXE) injection, exists in MetInfo Content Management System (CMS) thru 8.1. This flaw stems from a defect in the XML parsing logic, which allows an attacker to construct a malicious XML entity that forces the server to initiate an HTTP request to an arbitrary internal or external network address. Successful exploitation could lead to internal network reconnaissance, port scanning, or the retrieval of sensitive information. The vulnerability may be present in the backend API called by or associated with the path `/admin/#/webset/?head_tab_active=0`, where user-provided XML data is processed.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-60541
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.06% / 19.34%
||
7 Day CHG+0.01%
Published-06 Nov, 2025 | 00:00
Updated-31 Dec, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Server-Side Request Forgery (SSRF) in the /api/proxy/ component of linshenkx prompt-optimizer v1.3.0 to v1.4.2 allows attackers to scan internal resources via a crafted request.

Action-Not Available
Vendor-linshenkxn/a
Product-prompt_optimizern/a
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-27919
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.06% / 17.42%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-12 Nov, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in AnyDesk through 9.0.4. A remotely connected user with the "Control my device" permission can manipulate remote AnyDesk settings and create a password for the Full Access profile without needing confirmation from the counterparty. Consequently, the attacker can later connect without this counterparty confirmation.

Action-Not Available
Vendor-anydeskn/a
Product-anydeskn/a
CWE ID-CWE-284
Improper Access Control
CVE-2025-27918
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 23.75%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-08 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in AnyDesk for Windows before 9.0.5, AnyDesk for macOS before 9.0.1, AnyDesk for Linux before 7.0.0, AnyDesk for iOS before 7.1.2, and AnyDesk for Android before 8.0.0. It has an integer overflow and resultant heap-based buffer overflow via a UDP packet during processing of an Identity user image within the Discovery feature, or when establishing a connection between any two clients.

Action-Not Available
Vendor-anydeskn/a
Product-anydeskn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-27917
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 50.10%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-08 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in AnyDesk for Windows before 9.0.5, AnyDesk for macOS before 9.0.1, AnyDesk for Linux before 7.0.0, AnyDesk for iOS before 7.1.2, and AnyDesk for Android before 8.0.0. Remote Denial of Service can occur because of incorrect deserialization that results in failed memory allocation and a NULL pointer dereference.

Action-Not Available
Vendor-anydeskn/a
Product-anydeskn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-27916
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.22%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-08 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in AnyDesk for Windows before 9.0.6 and AnyDesk for Android before 8.0.0. When the connection between two clients is established via an IP address, it is possible to manipulate the data and spoof the AnyDesk ID.

Action-Not Available
Vendor-anydeskn/a
Product-anydeskn/a
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2025-63589
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.06% / 19.19%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-10 Nov, 2025 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A reflected XSS vulnerability exists in CMSimple_XH 1.8's index.php router when attacker-controlled path segments are not sanitized or encoded before being inserted into the generated HTML (navigation links, breadcrumbs, search form action, footer links). An attacker-controlled string placed in the URL path is reflected into multiple HTML elements, allowing execution of arbitrary JavaScript in victims' browsers visiting a crafted URL.

Action-Not Available
Vendor-cmsimple-xhn/a
Product-cmsimple_xhn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-63588
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.06% / 20.26%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-10 Nov, 2025 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated reflected cross-site scripting vulnerability in the query handling of CMSimpleXH allows remote attackers to inject and execute arbitrary JavaScript in a victim's browser via a crafted request (e.g., a maliciously crafted POST login). Successful exploitation may lead to theft of session cookies, credential disclosure, or other client-side impacts.

Action-Not Available
Vendor-cmsimple-xhn/a
Product-cmsimple_xhn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-63560
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.05%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-10 Nov, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in KiloView Dual Channel 4k HDMI & 3G-SDI HEVC Video Encoder Firmware v.1.20.0006 allows a remote attacker to cause a denial of service via the systemctrl API System/reFactory component.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-59396
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-Not Assigned
EPSS-0.04% / 12.70%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-10 Nov, 2025 | 23:15
Rejected-10 Nov, 2025 | 22:50
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Not a security vulnerability

Action-Not Available
Vendor-
Product-
CVE-2025-63307
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.04% / 12.94%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-08 Dec, 2025 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

alexusmai laravel-file-manager 3.3.1 is vulnerable to Cross Site Scripting (XSS). The application permits user-controlled upload, create, and rename of files to HTML and SVG types and serves those files inline without adequate content-type validation or output sanitization.

Action-Not Available
Vendor-alexusmain/a
Product-laravel_file_managern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-59392
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 6.40%
||
7 Day CHG~0.00%
Published-06 Nov, 2025 | 00:00
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Elspec G5 devices through 1.2.2.19, a person with physical access to the device can reset the Admin password by inserting a USB drive (containing a publicly documented reset string) into a USB port.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-64163
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.9||HIGH
EPSS-0.07% / 22.31%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:52
Updated-07 Nov, 2025 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DataEase's DB2 is vulnerable to SSRF

DataEase is an open source data visualization analysis tool. In versions 2.10.14 and below, the vendor added a blacklist to filter ldap:// and ldaps://. However, omission of protection for the dns:// protocol results in an SSRF vulnerability. This issue is fixed in version 2.10.15.

Action-Not Available
Vendor-DataEase (FIT2CLOUD Inc.)
Product-dataeasedataease
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-64114
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 20.71%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:30
Updated-24 Nov, 2025 | 20:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ClipBucket v5: SQL Injection possible through ClipBucket Custom Fields plugin

ClipBucket v5 is an open source video sharing platform. Versions 5.5.2 - #151 and below allow authenticated administrators with plugin management privileges to execute arbitrary SQL commands against the database through its ClipBucket Custom Fields plugin. The vulnerabilities require the Custom Fields plugin to be installed and accessible, and can only be exploited by users with administrative access to the plugin interface. This issue is fixed in version 5.5.2 - #.

Action-Not Available
Vendor-oxygenzMacWarrior
Product-clipbucketclipbucket-v5
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-62596
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.67%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:14
Updated-10 Nov, 2025 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youki container escape and denial of service due to arbitrary write gadgets and procfs write redirects

Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7.

Action-Not Available
Vendor-youki-devyouki-dev
Product-youkiyouki
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-62161
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.80%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 23:09
Updated-10 Nov, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youki container escape via "masked path" abuse due to mount race conditions

Youki is a container runtime written in Rust. In versions 0.5.6 and below, the initial validation of the source /dev/null is insufficient, allowing container escape when youki utilizes bind mounting the container's /dev/null as a file mask. This issue is fixed in version 0.5.7.

Action-Not Available
Vendor-youki-devyouki-dev
Product-youkiyouki
CWE ID-CWE-363
Race Condition Enabling Link Following
CWE ID-CWE-61
UNIX Symbolic Link (Symlink) Following
CVE-2025-55278
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-8.1||HIGH
EPSS-0.02% / 4.45%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 22:44
Updated-06 Nov, 2025 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL DevOps Loop is susceptible to an improper authentication vulnerability

Improper authentication in the API authentication middleware of HCL DevOps Loop allows authentication tokens to be accepted without proper validation of their expiration and cryptographic signature. As a result, an attacker could potentially use expired or tampered tokens to gain unauthorized access to sensitive resources and perform actions with elevated privileges.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-DevOps Loop
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-12779
Assigner-Amazon
ShareView Details
Assigner-Amazon
CVSS Score-8.8||HIGH
EPSS-0.02% / 5.35%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 21:20
Updated-10 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, a local user may be able to extract another local user's authentication token from the shared client machine and access their WorkSpace. To mitigate this issue, users should upgrade to the Amazon WorkSpaces client for Linux version 2025.0 or later.

Action-Not Available
Vendor-Amazon
Product-Amazon WorkSpaces
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-10853
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-5.2||MEDIUM
EPSS-0.03% / 8.61%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 19:21
Updated-13 Nov, 2025 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting (XSS) in Management Console of Multiple WSO2 Products Due to Improper Output Encoding

A reflected cross-site scripting (XSS) vulnerability exists in the management console of multiple WSO2 products due to improper output encoding. By tampering with specific parameters, a malicious actor can inject arbitrary JavaScript into the response, leading to reflected XSS. Successful exploitation could result in UI manipulation, redirection to malicious websites, or data theft from the browser. However, session-related sensitive cookies are protected with the httpOnly flag, which mitigates the risk of session hijacking.

Action-Not Available
Vendor-WSO2 LLC
Product-universal_gatewayidentity_serverenterprise_integratoropen_banking_amtraffic_manageropen_banking_iamidentity_server_as_key_managerapi_control_planeapi_managerWSO2 Open Banking AMWSO2 Traffic Managerorg.wso2.carbon.identity.inbound.auth.oauth2:org.wso2.carbon.identity.oauth.uiWSO2 Open Banking IAMWSO2 Identity ServerWSO2 API Control PlaneWSO2 Identity Server as Key ManagerWSO2 Universal Gatewayorg.wso2.carbon.governance:org.wso2.carbon.governance.wsdltool.uiorg.wso2.carbon.registry:org.wso2.carbon.registry.resource.uiorg.wso2.carbon.registry:org.wso2.carbon.registry.info.uiWSO2 API ManagerWSO2 Enterprise Integrator
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-5770
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 12.25%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 19:02
Updated-13 Nov, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting (XSS) in Authentication Endpoints of Multiple WSO2 Products

A reflected cross-site scripting (XSS) vulnerability exists in the authentication endpoints of multiple WSO2 products due to a lack of output encoding. A malicious actor can inject arbitrary JavaScript payloads into the authentication endpoint, which are reflected back in the response, enabling browser-based attacks. Exploitation may result in redirection to malicious websites, UI manipulation, or unauthorized data access from the victim’s browser. However, session-related cookies are protected with the httpOnly flag, which mitigates session hijacking via this vector.

Action-Not Available
Vendor-WSO2 LLC
Product-api_control_planeidentity_serverapi_managerWSO2 Identity ServerWSO2 API Control PlaneWSO2 API Manager
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-43418
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.02% / 5.30%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:33
Updated-17 Dec, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1. An attacker with physical access to a locked device may be able to view sensitive user information.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_osipadosiOS and iPadOS
CWE ID-CWE-284
Improper Access Control
CVE-2023-43000
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-8.8||HIGH
EPSS-0.05% / 14.24%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:33
Updated-12 Nov, 2025 | 00:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6. Processing maliciously crafted web content may lead to memory corruption.

Action-Not Available
Vendor-Apple Inc.
Product-safariiphone_osmacosipadosmacOSSafariiOS and iPadOS
CWE ID-CWE-416
Use After Free
CVE-2025-12745
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 3.16%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:32
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QuickJS quickjs.c js_array_buffer_slice buffer over-read

A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch.

Action-Not Available
Vendor-n/a
Product-QuickJS
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-126
Buffer Over-read
CVE-2025-11093
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-8.4||HIGH
EPSS-0.15% / 36.29%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:31
Updated-04 Dec, 2025 | 21:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Code Execution with higher privileged users in Multiple WSO2 Products via Script Mediator Engines (GraalJS and NashornJS)

An arbitrary code execution vulnerability exists in multiple WSO2 products due to insufficient restrictions in the GraalJS and NashornJS Script Mediator engines. Authenticated users with elevated privileges can execute arbitrary code within the integration runtime environment. By default, access to these scripting engines is limited to administrators in WSO2 Micro Integrator and WSO2 Enterprise Integrator, while in WSO2 API Manager, access extends to both administrators and API creators. This may allow trusted-but-privileged users to perform unauthorized actions or compromise the execution environment.

Action-Not Available
Vendor-WSO2 LLC
Product-universal_gatewayapi_managermicro_integratortraffic_managerapi_control_planeenterprise_integratorWSO2 Open Banking AMWSO2 Traffic ManagerWSO2 Open Banking IAMWSO2 API Control PlaneWSO2 Identity Server as Key ManagerWSO2 Micro IntegratorWSO2 Universal Gatewayorg.apache.synapse:synapse-coreorg.apache.synapse:synapse-extensionsWSO2 API ManagerWSO2 Enterprise Integrator
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-31954
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 10.78%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:23
Updated-07 Nov, 2025 | 18:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL iAutomate is susceptible to a sensitive information disclosure

HCL iAutomate v6.5.1 and v6.5.2 is susceptible to a sensitive information disclosure. An HTTP GET method is used to process a request and includes sensitive information in the query string of that request. An attacker could potentially access information or resources they were not intended to see.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-dryice_iautomateiAutomate
CWE ID-CWE-598
Use of GET Request Method With Sensitive Query Strings
CVE-2025-10907
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-8.4||HIGH
EPSS-0.44% / 62.81%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 18:03
Updated-04 Dec, 2025 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authenticated Arbitrary File Upload in Multiple WSO2 Products via SOAP Admin Services Leading to Remote Code Execution

An arbitrary file upload vulnerability exists in multiple WSO2 products due to insufficient validation of uploaded content and destination in SOAP admin services. A malicious actor with administrative privileges can upload a specially crafted file to a user-controlled location within the deployment. Successful exploitation may lead to remote code execution (RCE) on the server, depending on how the uploaded file is processed. By default, this vulnerability is only exploitable by users with administrative access to the affected SOAP services.

Action-Not Available
Vendor-WSO2 LLC
Product-open_banking_iamopen_banking_amapi_manageruniversal_gatewayidentity_servertraffic_manageridentity_server_as_key_managerapi_control_planeenterprise_integratororg.wso2.carbon.mediation:org.wso2.carbon.mediation.libraryWSO2 Identity Serverorg.jaggeryjs:org.jaggeryjs.jaggery.app.mgtWSO2 Identity Server as Key Managerorg.apache.ws.commons.axiom.wso2:axiomorg.wso2.carbon:org.wso2.carbon.utilsorg.wso2.carbon:org.wso2.carbon.baseWSO2 Open Banking AMWSO2 Traffic ManagerWSO2 Open Banking IAMorg.wso2.carbon.deployment:org.wso2.carbon.module.mgtWSO2 API Control Planeorg.wso2.carbon.deployment:org.wso2.carbon.webapp.mgtWSO2 Micro IntegratorWSO2 Universal Gatewayorg.wso2.carbon.event-processing:org.wso2.carbon.event.simulator.coreWSO2 API ManagerWSO2 Enterprise Integrator
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-10713
Assigner-WSO2 LLC
ShareView Details
Assigner-WSO2 LLC
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.66%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 17:18
Updated-04 Dec, 2025 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XML External Entity (XXE) Vulnerability in Multiple WSO2 Products Due to Improper XML Parser Configuration

An XML External Entity (XXE) vulnerability exists in multiple WSO2 products due to improper configuration of the XML parser. The application parses user-supplied XML without applying sufficient restrictions, allowing resolution of external entities. A successful attack could enable a remote, unauthenticated attacker to read sensitive files from the server's filesystem or perform denial-of-service (DoS) attacks that render affected services unavailable.

Action-Not Available
Vendor-WSO2 LLC
Product-open_banking_iamopen_banking_amapi_manageruniversal_gatewayidentity_servertraffic_managerapi_control_planeenterprise_integratororg.wso2.carbon.mediation:org.wso2.carbon.localentryWSO2 Open Banking AMWSO2 Traffic ManagerWSO2 Open Banking IAMWSO2 Identity ServerWSO2 API Control PlaneWSO2 Identity Server as Key ManagerWSO2 Universal GatewayWSO2 API ManagerWSO2 Enterprise Integrator
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2025-43990
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-0.02% / 2.78%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 17:01
Updated-06 Nov, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Command Monitor (DCM), versions prior to 10.12.3.28, contains an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Action-Not Available
Vendor-Dell Inc.
Product-Command Monitor (DCM)
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2025-46366
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.71%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 16:50
Updated-07 Nov, 2025 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user may exploit and gain parallel privilege escalation or access to the database to obtain confidential information.

Action-Not Available
Vendor-Dell Inc.
Product-cloudlinkCloudLink
CWE ID-CWE-256
Plaintext Storage of a Password
CVE-2025-46424
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 0.37%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 16:46
Updated-07 Nov, 2025 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell CloudLink, versions prior to 8.2, contain use of a Cryptographic Primitive with a Risky Implementation vulnerability. A high privileged attacker could potentially exploit this vulnerability leading to Denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-cloudlinkCloudLink
CWE ID-CWE-1240
Use of a Cryptographic Primitive with a Risky Implementation
CVE-2025-46365
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 10.67%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 16:40
Updated-07 Nov, 2025 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell CloudLink, versions prior 8.1.1, contain a Command Injection vulnerability which can be exploited by an Authenticated attacker to cause Command Injection on an affected Dell CloudLink.

Action-Not Available
Vendor-Dell Inc.
Product-cloudlinkCloudLink
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2025-46364
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 17.28%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 16:36
Updated-07 Nov, 2025 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user with known password can run CLI Escape Vulnerability to gain control of system.

Action-Not Available
Vendor-Dell Inc.
Product-cloudlinkCloudLin
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-20304
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.04% / 13.23%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 16:33
Updated-04 Dec, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in the web-based management interface of Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to conduct a reflected XSS attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have at least a low-privileged account on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-20305
Assigner-Cisco Systems, Inc.
ShareView Details
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 12.19%
||
7 Day CHG~0.00%
Published-05 Nov, 2025 | 16:32
Updated-04 Dec, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to obtain sensitive information from an affected device. This vulnerability exists because certain files lack proper data protection mechanisms. An attacker with read-only Administrator privileges could exploit this vulnerability by performing actions where the results should only be viewable to a high-privileged user. A successful exploit could allow the attacker to view passwords that are normally not visible to read-only administrators.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-1220
Insufficient Granularity of Access Control
  • Previous
  • 1
  • 2
  • ...
  • 179
  • 180
  • 181
  • ...
  • 6536
  • 6537
  • Next