Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities324260
CVE-2025-1547
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.29%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 22:11
Updated-10 Dec, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Authenticated Stack Overflow in Certificate Request Command

A stack-based buffer overflow vulnerability [CWE-121] in WatchGuard Fireware OS's certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_t35firebox_nv5firebox_m5800firebox_m570firewarefirebox_m370firebox_t70firebox_m670firebox_m270fireboxcloudfirebox_t15firebox_m690firebox_t55firebox_t40firebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_t20firebox_m4800firebox_m290fireboxvfirebox_m590firebox_t45firebox_t25firebox_t85Fireware OS
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-66509
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.9||HIGH
EPSS-0.09% / 25.63%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 22:10
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LaraDashboard: 1-Click Pre-Auth RCE via Host Header + Module Installation Chain

LaraDashboard is an all-In-one solution to start a Laravel Application. In 2.3.0 and earlier, the password reset flow trusts the Host header, allowing attackers to redirect the administrator’s reset token to an attacker-controlled server. This can be combined with the module installation process to automatically execute the ServiceProvider::boot() method, enabling arbitrary PHP code execution.

Action-Not Available
Vendor-laradashboard
Product-laradashboard
CWE ID-CWE-284
Improper Access Control
CVE-2025-66506
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.03%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 22:04
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fulcio allocates excessive memory during token parsing

Fulcio is a free-to-use certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.3, function identity.extractIssuerURL splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request with an (invalid) OIDC identity token in the payload containing many period characters, a call to extractIssuerURL incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This vulnerability is fixed in 1.8.3.

Action-Not Available
Vendor-sigstore
Product-fulcio
CWE ID-CWE-405
Asymmetric Resource Consumption (Amplification)
CVE-2025-1910
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 1.83%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:56
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Mobile VPN with SSL Local Privilege Escalation via Update Package

The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM on the Windows machine where the VPN Client is installed.This issue affects the Mobile VPN with SSL Client 12.0 up to and including 12.11.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-Mobile VPN with SSL Client
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2025-12986
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-6||MEDIUM
EPSS-0.02% / 4.51%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:55
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of Service Vulnerability in Silicon Labs WF200 and WGM160P Devices

When a WF200/WGM160P device is configured to operate as an Access Point, it may be vulnerable to a denial of service triggered by a malformed packet. The device may recover automatically or require a hard reset.

Action-Not Available
Vendor-silabs.com
Product-Gecko SDK
CWE ID-CWE-410
Insufficient Resource Pool
CVE-2025-6946
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:48
Updated-10 Dec, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in IPS Configuration

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the IPS module. This vulnerability requires an authenticated administrator session to a locally managed Firebox. This issue affects Firebox: from 12.0 through 12.11.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_t35firebox_nv5firebox_m5800firebox_m570firewarefirebox_m370firebox_t70firebox_m670firebox_m270fireboxcloudfirebox_t15firebox_m690firebox_t55firebox_t40firebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_t20firebox_m4800firebox_m290fireboxvfirebox_m590firebox_t45firebox_t25firebox_t85Fireware OS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-1545
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-8.2||HIGH
EPSS-0.07% / 22.73%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:48
Updated-10 Dec, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox XPath Injection Vulnerability in Web CGI

An XPath Injection vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to retrieve sensitive information from the Firebox configuration through an exposed authentication or management web interface. This vulnerability only affects Firebox systems that have at least one authentication hotspot configured.This issue affects Fireware OS 11.11 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-91
XML Injection (aka Blind XPath Injection)
CVE-2025-11838
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-8.7||HIGH
EPSS-0.06% / 18.53%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:48
Updated-16 Dec, 2025 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox iked Memory Corruption Vulnerability

A memory corruption vulnerability in WatchGuard Fireware OS may allow an unauthenticated attacker to trigger a Denial of Service (DoS) condition in the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer. This vulnerability affects Fireware OS 12.6.1 up to and including 12.11.4 and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_t55firewarefirebox_m5800firebox_t40firebox_t25firebox_m590firebox_m440firebox_m290firebox_m270firebox_m390firebox_t85firebox_t115-wfirebox_m570firebox_t145-wfirebox_t125-wfirebox_m5600firebox_t45firebox_t20firebox_m670firebox_m4600firebox_m4800fireboxcloudfirebox_t145firebox_t80firebox_t185firebox_nv5firebox_m370firebox_t70firebox_m470firebox_t125firebox_m690fireboxvFireware OS
CWE ID-CWE-763
Release of Invalid Pointer or Reference
CVE-2025-13940
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.01% / 1.48%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:47
Updated-10 Dec, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Boot Time System Integrity Check Bypass

An Expected Behavior Violation [CWE-440] vulnerability in WatchGuard Fireware OS may allow an attacker to bypass the Fireware OS boot time system integrity check and prevent the Firebox from shutting down in the event of a system integrity check failure. The on-demand system integrity check in the Fireware Web UI will correctly show a failed system integrity check message in the event of a failure.This issue affects Fireware OS: from 12.8.1 through 12.11.4, from 2025.1 through 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-13939
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:47
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Gateway Wireless Controller

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (Gateway Wireless Controller module) allows Stored XSS.This issue affects Fireware OS 11.7.2 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-13938
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:47
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Autotask Technology Integration Configuration

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (Autotask Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-13937
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:47
Updated-10 Dec, 2025 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in ConnectWise Technology Integration Configuration

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (ConnectWise Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-13936
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:45
Updated-10 Dec, 2025 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Stored Cross-Site-Scripting (XSS) Vulnerability in Tigerpaw Technology Integration Configuration

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS (Tigerpaw Technology Integration module) allows Stored XSS.This issue affects Fireware OS 12.4 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-12196
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-8.6||HIGH
EPSS-0.13% / 32.99%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:45
Updated-10 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Authenticated Out of Bounds Write in Management CLI Ping Command

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS's CLI could allow an authenticated privileged user to execute arbitrary code via a specially crafted CLI command.This vulnerability affects Fireware OS 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-53704
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.7||HIGH
EPSS-0.03% / 9.85%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:44
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MAXHUB Pivot Weak Password Recovery Mechanism for Forgotten Password

The password reset mechanism for the Pivot client application is weak, and it may allow an attacker to take over the account.

Action-Not Available
Vendor-MAXHUB
Product-Pivot client application
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2025-12195
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-8.6||HIGH
EPSS-0.13% / 32.99%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:43
Updated-10 Dec, 2025 | 15:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Authenticated Out of Bounds Write in Management CLI IPSec Configuration

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS's CLI could allow an authenticated privileged user to execute arbitrary code via specially crafted IPSec configuration CLI commands.This vulnerability affects Fireware OS 11.0 up to and including 11.12.4+541730, 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-12026
Assigner-WatchGuard Technologies, Inc.
ShareView Details
Assigner-WatchGuard Technologies, Inc.
CVSS Score-8.6||HIGH
EPSS-0.10% / 27.79%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:43
Updated-10 Dec, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WatchGuard Firebox Authenticated Out of Bounds Write in certd

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS’s certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This vulnerability affects Fireware OS 12.0 up to and including 12.11.4, 12.5 up to and including 12.5.13, and 2025.1 up to and including 2025.1.2.

Action-Not Available
Vendor-WatchGuard Technologies, Inc.
Product-firebox_m390firebox_nv5firebox_m570firewarefirebox_t70firebox_m670firebox_t115-wfirebox_t15firebox_t125-wfirebox_m440firebox_m4600firebox_m470firebox_m5600firebox_t80firebox_m290fireboxvfirebox_t25firebox_t145firebox_t35firebox_m5800firebox_t145-wfirebox_m370firebox_m270fireboxcloudfirebox_m690firebox_t55firebox_t40firebox_t20firebox_m4800firebox_m590firebox_t125firebox_t45firebox_t185firebox_t85Fireware OS
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-10285
Assigner-Silicon Labs
ShareView Details
Assigner-Silicon Labs
CVSS Score-7.4||HIGH
EPSS-0.02% / 5.41%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:36
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simplcity Device Manager exposes NTLMv2 hash

The web interface of the Silicon Labs Simplicity Device Manager is exposed publicly and can be used to extract the NTLMv2 hash which an attacker could use to crack the user's domain password.

Action-Not Available
Vendor-silabs.com
Product-Simplicity Studio V6
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-13932
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.3||HIGH
EPSS-0.04% / 13.24%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:17
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SolisCloud API suffers from a Broken Access Control vulnerability, specifically an Insecure Direct Object Reference (IDOR), where any authenticated user can access detailed data of any plant by altering the plant_id in the request.

Action-Not Available
Vendor-SolisCloud
Product-Monitoring Platform (Cloud API & Device Control API)
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-66238
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.4||HIGH
EPSS-0.05% / 14.79%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:10
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sunbird DCIM dcTrack and Power IQ Authentication Bypass Using an Alternate Path or Channel

DCIM dcTrack allows an attacker to misuse certain remote access features. An authenticated user with access to the appliance's virtual console could exploit these features to redirect network traffic, potentially accessing restricted services or data on the host machine.

Action-Not Available
Vendor-Sunbird
Product-DCIM dcTrackIQ
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-66237
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.4||HIGH
EPSS-0.01% / 2.10%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 21:02
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sunbird DCIM dcTrack and Power IQ Use of Hard-coded Credentials

DCIM dcTrack platforms utilize default and hard-coded credentials for access. An attacker could use these credentials to administer the database, escalate privileges on the platform or execute system commands on the host.

Action-Not Available
Vendor-Sunbird
Product-DCIM dcTrackIQ
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-66479
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-1.8||LOW
EPSS-0.02% / 5.33%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:57
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Anthropic Sandbox Runtime Incorrectly Implemented Network Sandboxing

Anthropic Sandbox Runtime is a lightweight sandboxing tool for enforcing filesystem and network restrictions on arbitrary processes at the OS level, without requiring a container. Prior to 0.0.16, due to a bug in sandboxing logic, sandbox-runtime did not properly enforce a network sandbox if the sandbox policy did not configure any allowed domains. This could allow sandboxed code to make network requests outside of the sandbox. A patch for this was released in v0.0.16.

Action-Not Available
Vendor-anthropic-experimental
Product-sandbox-runtime
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2025-65959
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.03% / 9.07%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:46
Updated-10 Dec, 2025 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open WebUI vulnerable to Stored DOM XSS via Note 'Download PDF'

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Stored XSS vulnerability was discovered in Open-WebUI's Notes PDF download functionality. An attacker can import a Markdown file containing malicious SVG tags into Notes, allowing them to execute arbitrary JavaScript code and steal session tokens when a victim downloads the note as PDF. This vulnerability can be exploited by any authenticated user, and unauthenticated external attackers can steal session tokens from users (both admin and regular users) by sharing specially crafted markdown files. This vulnerability is fixed in 0.6.37.

Action-Not Available
Vendor-openwebuiopen-webui
Product-open_webuiopen-webui
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-66576
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.9||HIGH
EPSS-0.39% / 59.47%
||
7 Day CHG-0.07%
Published-04 Dec, 2025 | 20:46
Updated-17 Dec, 2025 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Keyboard Desktop 1.0.1 - Remote Code Execution (RCE)

Remote Keyboard Desktop 1.0.1 enables remote attackers to execute system commands via the rundll32.exe exported function export, allowing unauthenticated code execution.

Action-Not Available
Vendor-remotecontrolioRemotecontrolio
Product-remote_keyboard_desktopRemote Keyboard Desktop
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-66575
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.5||HIGH
EPSS-0.08% / 23.53%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:46
Updated-17 Dec, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VeeVPN 1.6.1 - Unquoted Service Path Remote Code Execution

VeeVPN 1.6.1 contains an unquoted service path vulnerability in the VeePNService that allows remote attackers to execute code during startup or reboot with escalated privileges. Attackers can exploit this by providing a malicious service name, allowing them to inject commands and run as LocalSystem.

Action-Not Available
Vendor-veevpnVeePN
Product-veevpnVeeVPN
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2025-66574
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 6.51%
||
7 Day CHG-0.02%
Published-04 Dec, 2025 | 20:45
Updated-19 Dec, 2025 | 19:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TranzAxis 3.2.41.10.26 - Stored Cross-Site Scripting (XSS)

TranzAxis 3.2.41.10.26 allows authenticated users to inject cross-site scripting via the `Open Object in Tree` endpoint, allowing attackers to steal session cookies and potentially escalate privileges.

Action-Not Available
Vendor-compassplustechnologiesCompass Plustechologies
Product-tranzaxisTranzAxis
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-66573
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 14.00%
||
7 Day CHG+0.01%
Published-04 Dec, 2025 | 20:45
Updated-23 Dec, 2025 | 00:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Solstice Pod API Session Key Extraction via API Endpoint

Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session information by accessing this endpoint without authentication.

Action-Not Available
Vendor-mersivemersive
Product-solstice_podsolstice_pod_firmwareSolstice Pod API Session Key Extraction via API Endpoint
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-66572
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.16% / 36.98%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:44
Updated-09 Dec, 2025 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Loaded Commerce 6.6 Client-Side Template Injection(CSTI)

Loaded Commerce 6.6 contains a client-side template injection vulnerability that allows unauthenticated attackers to execute code on the server via the search parameter.

Action-Not Available
Vendor-loadedcommerce
Product-Loaded Commerce
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-66571
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.23% / 46.03%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:43
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UNA CMS 9.0.0-RC1 - 14.0.0-RC4 PHP Object Injection

UNA CMS versions 9.0.0-RC1 - 14.0.0-RC4 contain a PHP object injection vulnerability in BxBaseMenuSetAclLevel.php where the profile_id POST parameter is passed to PHP unserialize() without proper handling, allowing remote, unauthenticated attackers to inject arbitrary PHP objects and potentially write and execute arbitrary PHP code.

Action-Not Available
Vendor-Unknown
Product-UNA CMS
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-66555
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.8||HIGH
EPSS-0.25% / 48.34%
||
7 Day CHG+0.05%
Published-04 Dec, 2025 | 20:43
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AirKeyboard iOS App 1.0.5 - Remote Input Injection

AirKeyboard iOS App 1.0.5 contains a missing authentication vulnerability that allows unauthenticated attackers to type arbitrary keystrokes directly into the victim's iOS device in real-time without user interaction, resulting in full remote input control.

Action-Not Available
Vendor-airkeyboardapp
Product-AirKeyboard iOS App
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-58278
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.5||HIGH
EPSS-0.02% / 5.79%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:42
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IndigoSTAR Software - perl2exe <= V30.10C - Arbitrary Code Execution

perl2exe <= V30.10C contains an arbitrary code execution vulnerability that allows local authenticated attackers to execute malicious scripts. Attackers can control the 0th argument of packed executables to execute another executable, allowing them to bypass restrictions and gain unauthorized access.

Action-Not Available
Vendor-IndigoSTAR Software
Product-perl2exe
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-58277
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.14% / 34.42%
||
7 Day CHG+0.03%
Published-04 Dec, 2025 | 20:42
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
R Radio Network FM Transmitter 1.07 System Settings Disclosure

R Radio Network FM Transmitter 1.07 allows unauthenticated attackers to access the admin user's password through the system.cgi endpoint, enabling authentication bypass and FM station setup access.

Action-Not Available
Vendor-R Radio Network
Product-Radio Network FM Transmitter
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2024-58276
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.07% / 22.82%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:41
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Obi08-Enrollment System 1.0 login.php SQL Injection

Obi08/Enrollment System 1.0 contains a SQL injection vulnerability in the keyword parameter of /get_subject.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can use UNION-based injection to extract sensitive information from the users table including usernames and passwords.

Action-Not Available
Vendor-Obi08/Enrollment System
Product-Obi08/Enrollment System
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-58275
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-1.10% / 77.52%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:41
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Easywall 0.3.1 - Authentication Bypass via Command Injection in /ports-save Endpoint

Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server.

Action-Not Available
Vendor-jpylypiw
Product-Easywall
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2023-53735
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 37.54%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:40
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WEBIGniter 28.7.23 Cross-Site Scripting (XSS) in User Creation Process

WEBIGniter 28.7.23 contains a cross-site scripting vulnerability in the user creation process that allows unauthenticated attackers to execute malicious JavaScript code, enabling potential XSS attacks.

Action-Not Available
Vendor-WEBIGniter
Product-WEBIGniter
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-53734
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.7||HIGH
EPSS-0.16% / 37.47%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:40
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
dawa-pharma-1.0 - SQL Injection via Email Parameter

dawa-pharma-1.0 allows unauthenticated attackers to execute SQL queries on the server, allowing them to access sensitive information and potentially gain administrative access.

Action-Not Available
Vendor-mayuri_k
Product-dawa-pharma
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-27935
Assigner-Ping Identity Corporation
ShareView Details
Assigner-Ping Identity Corporation
CVSS Score-8.6||HIGH
EPSS-0.07% / 21.29%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:38
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass in OTP (One-time Passcode) IdP Adapter Integration Kit

The OTP Integration Kit for PingFederate fails to enforce HTTP method validation and state validation properly. The server advances the authentication state without verifying the OTP, thereby bypassing multi-factor authentication.

Action-Not Available
Vendor-Ping Identity Corp.
Product-One-Time Passcode Integration Kit for PingFederate
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-13543
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-8.8||HIGH
EPSS-0.23% / 45.37%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:27
Updated-09 Dec, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PostGallery <= 1.12.5 - Authenticated (Subscriber+) Arbitrary File Upload

The PostGallery plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'PostGalleryUploader' class functions in all versions up to, and including, 1.12.5. This makes it possible for authenticated attackers, with subscriber-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Action-Not Available
Vendor-rtowebsites
Product-PostGallery
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-12997
Assigner-Medtronic
ShareView Details
Assigner-Medtronic
CVSS Score-2.2||LOW
EPSS-0.03% / 6.93%
||
7 Day CHG-0.00%
Published-04 Dec, 2025 | 20:04
Updated-22 Dec, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Direct Object Reference vulnerability in Medtronic CareLink Network which allows an authenticated attacker with access to specific device and user information to submit web requests to an API endpoint that would expose sensitive user information. This issue affects CareLink Network: before December 4, 2025.

Action-Not Available
Vendor-medtronicMedtronic
Product-carelink_networkCareLink Network
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-12996
Assigner-Medtronic
ShareView Details
Assigner-Medtronic
CVSS Score-4.1||MEDIUM
EPSS-0.01% / 2.33%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:04
Updated-22 Dec, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Medtronic CareLink Network allows a local attacker with access to log files on an internal API server to view plaintext passwords from errors logged under certain circumstances. This issue affects CareLink Network: before December 4, 2025.

Action-Not Available
Vendor-medtronicMedtronic
Product-carelink_networkCareLink Network
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-12995
Assigner-Medtronic
ShareView Details
Assigner-Medtronic
CVSS Score-8.1||HIGH
EPSS-0.11% / 30.26%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 20:03
Updated-22 Dec, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Medtronic CareLink Network allows an unauthenticated remote attacker to perform a brute force attack on an API endpoint that could be used to determine a valid password under certain circumstances. This issue affects CareLink Network: before December 4, 2025.

Action-Not Available
Vendor-medtronicMedtronic
Product-carelink_networkCareLink Network
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-12994
Assigner-Medtronic
ShareView Details
Assigner-Medtronic
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 13.72%
||
7 Day CHG+0.01%
Published-04 Dec, 2025 | 20:02
Updated-22 Dec, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Medtronic CareLink Network allows an unauthenticated remote attacker to initiate a request for security questions to an API endpoint that could be used to determine a valid user account. This issue affects CareLink Network: before December 4, 2025.

Action-Not Available
Vendor-medtronicMedtronic
Product-carelink_networkCareLink Network
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-65958
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.5||HIGH
EPSS-0.04% / 13.00%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 19:55
Updated-10 Dec, 2025 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open WebUI vulnerable to Server-Side Request Forgery (SSRF) via Arbitrary URL Processing in /api/v1/retrieval/process/web

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Server-Side Request Forgery (SSRF) vulnerability in Open WebUI allows any authenticated user to force the server to make HTTP requests to arbitrary URLs. This can be exploited to access cloud metadata endpoints (AWS/GCP/Azure), scan internal networks, access internal services behind firewalls, and exfiltrate sensitive information. No special permissions beyond basic authentication are required. This vulnerability is fixed in 0.6.37.

Action-Not Available
Vendor-openwebuiopen-webui
Product-open_webuiopen-webui
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-12097
Assigner-National Instruments
ShareView Details
Assigner-National Instruments
CVSS Score-8.7||HIGH
EPSS-0.11% / 30.30%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 19:07
Updated-08 Dec, 2025 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure.  Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files.  This vulnerability existed in the NI System Web Server 2012 and prior versions.  It was fixed in 2013.

Action-Not Available
Vendor-NI
Product-LabVIEW
CWE ID-CWE-23
Relative Path Traversal
CVE-2025-65945
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.57%
||
7 Day CHG-0.01%
Published-04 Dec, 2025 | 18:45
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
auth0/node-jws improper HMAC signature verification vulnerability

auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.

Action-Not Available
Vendor-auth0
Product-node-jws
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-14016
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.23%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 18:32
Updated-15 Dec, 2025 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
macrozheng mall-swarm delete improper authorization

A security vulnerability has been detected in macrozheng mall-swarm up to 1.0.3. Affected is the function delete of the file /member/readHistory/delete. Such manipulation of the argument ids leads to improper authorization. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-macrozhengmacrozheng
Product-mall-swarmmall-swarm
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-14015
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-8.7||HIGH
EPSS-0.12% / 31.66%
||
7 Day CHG+0.07%
Published-04 Dec, 2025 | 18:32
Updated-23 Dec, 2025 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
H3C Magic B0 aspForm EditWlanMacList buffer overflow

A weakness has been identified in H3C Magic B0 up to 100R002. This impacts the function EditWlanMacList of the file /goform/aspForm. This manipulation of the argument param causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-New H3C Technologies Co., Ltd.
Product-magic_b0magic_b0_firmwareMagic B0
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-13488
Assigner-Sonatype Inc.
ShareView Details
Assigner-Sonatype Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 16.44%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 18:16
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nexus Repository 3 - Stored Cross-Site Scripting (XSS)

Due to a regression introduced in version 3.83.0, a security header is no longer applied to certain user-uploaded content served from repositories. This may allow an authenticated attacker with repository upload privileges to exploit a stored cross-site scripting (XSS) vulnerability with user context.

Action-Not Available
Vendor-Sonatype, Inc.
Product-Nexus Repository
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-14013
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.03% / 6.23%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 18:02
Updated-10 Dec, 2025 | 21:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JIZHICMS Comment addcomment.html cross site scripting

A vulnerability was identified in JIZHICMS up to 2.5.5. The impacted element is an unknown function of the file /index.php/admins/Comment/addcomment.html of the component Comment Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jizhicmsn/a
Product-jizhicmsJIZHICMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-9127
Assigner-Pure Storage, Inc.
ShareView Details
Assigner-Pure Storage, Inc.
CVSS Score-8.4||HIGH
EPSS-0.02% / 2.76%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 17:59
Updated-08 Dec, 2025 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PX Enterprise Improper Sanitization Vulnerability

A vulnerability exists in PX Enterprise whereby sensitive information may be logged under specific conditions.

Action-Not Available
Vendor-Pure Storage
Product-PX Enterprise
CWE ID-CWE-116
Improper Encoding or Escaping of Output
CVE-2025-14012
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 7.03%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 17:32
Updated-10 Dec, 2025 | 21:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JIZHICMS Batch Delete Comments deleteAll.html delete sql injection

A vulnerability was determined in JIZHICMS up to 2.5.5. The affected element is the function deleteAll/findAll/delete of the file /index.php/admins/Comment/deleteAll.html of the component Batch Delete Comments. Executing manipulation can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jizhicmsn/a
Product-jizhicmsJIZHICMS
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • Previous
  • 1
  • 2
  • ...
  • 79
  • 80
  • 81
  • ...
  • 6485
  • 6486
  • Next