ECV Exploited Vulnerabilities Catalog LAST UPDATE: 11.11.2025
DATE |
NAME |
INFO |
CWE |
|
| 2025-11-04 | Gladinet | CentreStack and Triofox | CVE-2025-11371 | Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability: Gladinet CentreStack and Triofox contains a files or directories accessible to external parties vulnerability that allows unintended disclosure of system files. | CWE-552 |
| 2025-11-04 | CWP | Control Web Panel | CVE-2025-48703 | CWP Control Web Panel OS Command Injection Vulnerability: CWP Control Web Panel (formerly CentOS Web Panel) contains an OS command Injection vulnerability that allows unauthenticated remote code execution via shell metacharacters in the t_total parameter in a filemanager changePerm request. A valid non-root username must be known. | CWE-78 |
| 2025-10-30 | XWiki | Platform | CVE-2025-24893 | XWiki Platform Eval Injection Vulnerability: XWiki Platform contains an eval injection vulnerability that could allow any guest to perform arbitrary remote code execution through a request to SolrSearch. | CWE-95 |
| 2025-10-30 | Broadcom | VMware Aria Operations and VMware Tools | CVE-2025-41244 | Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability: Broadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM. | CWE-267 |
| 2025-10-28 | Dassault Systèmes | DELMIA Apriso | CVE-2025-6205 | Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability: Dassault Systèmes DELMIA Apriso contains a missing authorization vulnerability that could allow an attacker to gain privileged access to the application. | CWE-862 |
| 2025-10-28 | Dassault Systèmes | DELMIA Apriso | CVE-2025-6204 | Dassault Systèmes DELMIA Apriso Code Injection Vulnerability: Dassault Systèmes DELMIA Apriso contains a code injection vulnerability that could allow an attacker to execute arbitrary code. | CWE-94 |
| 2025-10-24 | Microsoft | Windows | CVE-2025-59287 | Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability: Microsoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution. | CWE-502 |
| 2025-10-24 | Adobe | Commerce and Magento | CVE-2025-54236 | Adobe Commerce and Magento Improper Input Validation Vulnerability: Adobe Commerce and Magento Open Source contain an improper input validation vulnerability that could allow an attacker to take over customer accounts through the Commerce REST API. | CWE-20 |
| 2025-10-22 | Motex | LANSCOPE Endpoint Manage | CVE-2025-61932 | Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability: Motex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets. | CWE-940 |
| 2025-10-20 | Oracle | E-Business Suite | CVE-2025-61884 | Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability: Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication. | CWE-918 |
| 2025-10-20 | Microsoft | Windows | CVE-2025-33073 | Microsoft Windows SMB Client Improper Access Control Vulnerability: Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate. | CWE-284 |
| 2025-10-20 | Kentico | Xperience CMS | CVE-2025-2747 | Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability: Kentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects. | CWE-288 |
| 2025-10-20 | Kentico | Xperience CMS | CVE-2025-2746 | Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability: Kentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects. | CWE-288 |
| 2025-10-20 | Apple | Multiple Products | CVE-2022-48503 | Apple Multiple Products Unspecified Vulnerability: Apple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | |
| 2025-10-15 | Adobe | Experience Manager (AEM) Form | CVE-2025-54253 | Adobe Experience Manager Forms Code Execution Vulnerability: Adobe Experience Manager Forms in JEE contains an unspecified vulnerability that allows for arbitrary code execution. | |
| 2025-10-14 | SKYSEA | Client View | CVE-2016-7836 | SKYSEA Client View Improper Authentication Vulnerability: SKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program. | CWE-287 |
| 2025-10-14 | Microsoft | Windows | CVE-2025-59230 | Microsoft Windows Improper Access Control Vulnerability: Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally. | CWE-284 |
| 2025-10-14 | Microsoft | Windows | CVE-2025-24990 | Microsoft Windows Untrusted Pointer Dereference Vulnerability: Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges. | CWE-822 |
| 2025-10-14 | IGEL | IGEL OS | CVE-2025-47827 | IGEL OS Use of a Key Past its Expiration Date Vulnerability: IGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image. | CWE-324 |
| 2025-10-09 | Grafana Labs | Grafana | CVE-2021-43798 | Grafana Path Traversal Vulnerability: Grafana contains a path traversal vulnerability that could allow access to local files. | CWE-22 |
| 2025-10-07 | Synacor | Zimbra Collaboration Suite (ZCS) | CVE-2025-27915 | Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that exists in the Classic Web Client due to insufficient sanitization of HTML content in ICS files. When a user views an e-mail message containing a malicious ICS entry, its embedded JavaScript executes via an ontoggle event inside a tag. This allows an attacker to run arbitrary JavaScript within the victim's session, potentially leading to unauthorized actions such as setting e-mail filters to redirect messages to an attacker-controlled address. As a result, an attacker can perform unauthorized actions on the victim's account, including e-mail redirection and data exfiltration. | CWE-79 |
| 2025-10-06 | Oracle | E-Business Suite | CVE-2025-61882 | Oracle E-Business Suite Unspecified Vulnerability: Oracle E-Business Suite contains an unspecified vulnerability in the BI Publisher Integration component. The vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks can result in takeover of Oracle Concurrent Processing. | |
| 2025-10-06 | Mozilla | Multiple Products | CVE-2010-3765 | Mozilla Multiple Products Remote Code Execution Vulnerability: Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption. | |
| 2025-10-06 | Microsoft | Windows | CVE-2011-3402 | Microsoft Windows Remote Code Execution Vulnerability: Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page. | |
| 2025-10-06 | Microsoft | Windows | CVE-2013-3918 | Microsoft Windows Out-of-Bounds Write Vulnerability: Microsoft Windows contains an out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | |
| 2025-10-06 | Microsoft | Windows | CVE-2021-43226 | Microsoft Windows Privilege Escalation Vulnerability: Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms. | |
| 2025-10-06 | Microsoft | Internet Explorer | CVE-2010-3962 | Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability: Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | |
| 2025-10-06 | Linux | Kernel | CVE-2021-22555 | Linux Kernel Heap Out-of-Bounds Write Vulnerability: Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space. | CWE-787 |
| 2025-10-02 | Smartbedded | Meteobridge | CVE-2025-4008 | Smartbedded Meteobridge Command Injection Vulnerability: Smartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices. | |
| 2025-10-02 | Samsung | Mobile Devices | CVE-2025-21043 | Samsung Mobile Devices Out-of-Bounds Write Vulnerability: Samsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code. | CWE-787 |
| 2025-10-02 | Juniper | ScreenOS | CVE-2015-7755 | Juniper ScreenOS Improper Authentication Vulnerability: Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device. | CWE-287 |
| 2025-10-02 | Jenkins | Jenkins | CVE-2017-1000353 | Jenkins Remote Code Execution Vulnerability: Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism. | |
| 2025-10-02 | GNU | GNU Bash | CVE-2014-6278 | GNU Bash OS Command Injection Vulnerability: GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment. | CWE-78 |
| 2025-09-29 | Adminer | Adminer | CVE-2021-21311 | Adminer Server-Side Request Forgery Vulnerability: Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information. | CWE-918 |
| 2025-09-29 | Cisco | IOS and IOS XE | CVE-2025-20352 | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability: Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system. | CWE-121 |
| 2025-09-29 | Fortra | GoAnywhere MFT | CVE-2025-10035 | Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability: Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection. | |
| 2025-09-29 | Libraesva | Email Security Gateway | CVE-2025-59689 | Libraesva Email Security Gateway Command Injection Vulnerability: Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment. | CWE-77 |
| 2025-09-29 | Sudo | Sudo | CVE-2025-32463 | Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability: Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo’s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file. | CWE-829 |
| 2025-09-26 | Cisco | Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense | CVE-2025-20333 | Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability: Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362. | CWE-120 |
| 2025-09-25 | Cisco | Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense | CVE-2025-20362 | Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability: Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333. | CWE-862 |
| 2025-09-23 | Google | Chromium V8 | CVE-2025-10585 | Google Chromium V8 Type Confusion Vulnerability: Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine. | CWE-843 |
| 2025-09-11 | Dassault Systèmes | DELMIA Apriso | CVE-2025-5086 | Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability: Dassault Systèmes DELMIA Apriso contains a deserialization of untrusted data vulnerability that could lead to a remote code execution. | CWE-502 |
| 2025-09-04 |
Sitecore | Multiple Products |
CVE-2025-53690 | Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability: Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud contain a deserialization of untrusted data vulnerability involving the use of default machine keys. This flaw allows attackers to exploit exposed ASP.NET machine keys to achieve remote code execution. | CWE-502 |
| 2025-09-04 |
Android | Runtime |
CVE-2025-48543 | Android Runtime Use-After-Free Vulnerability: Android Runtime contains a use-after-free vulnerability potentially allowing a chrome sandbox escape leading to local privilege escalation. | |
| 2025-09-04 |
Linux | Kernel |
CVE-2025-38352 | Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability: Linux kernel contains a time-of-check time-of-use (TOCTOU) race condition vulnerability that has a high impact on confidentiality, integrity, and availability. | CWE-367 |
| 2025-09-03 |
TP-Link | Multiple Routers |
CVE-2025-9377 | TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability: TP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | CWE-78 |
| 2025-09-03 |
TP-Link | TL-WR841N |
CVE-2023-50224 | TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability: TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | CWE-290 |
|
2025-09-02
|
Meta Platforms | WhatsApp |
CVE-2025-55177 | Meta Platforms WhatsApp Incorrect Authorization Vulnerability: Meta Platforms WhatsApp contains an incorrect authorization vulnerability due to an incomplete authorization of linked device synchronization messages. This vulnerability could allow an unrelated user to trigger processing of content from an arbitrary URL on a target’s device. | CWE-863 |
| 2025-09-02 |
TP-Link | TL-WA855RE |
CVE-2020-24363 | TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability: TP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | CWE-306 |
| 2025-08-29 | Sangoma | FreePBX | CVE-2025-57819 | Sangoma FreePBX Authentication Bypass Vulnerability: Sangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to FreePBX Administrator leading to arbitrary database manipulation and remote code execution. | |
| 2025-08-26 |
NetScaler |
CVE-2025-7775 | Citrix NetScaler Memory Overflow Vulnerability: Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service. | CWE-119 |
| 2025-08-25 | CVE-2024-8069 | Citrix Session Recording Deserialization of Untrusted Data Vulnerability: Citrix Session Recording contains a deserialization of untrusted data vulnerability that allows limited remote code execution with privilege of a NetworkService Account access. Attacker must be an authenticated user on the same intranet as the session recording server. | CWE-502 | |
| 2025-08-25 | CVE-2024-8068 | Citrix Session Recording Improper Privilege Management Vulnerability: Citrix Session Recording contains an improper privilege management vulnerability that could allow for privilege escalation to NetworkService Account access. An attacker must be an authenticated user in the same Windows Active Directory domain as the session recording server domain. | CWE-269 | |
| 2025-08-25 | CVE-2025-48384 | Git Link Following Vulnerability: Git contains a link following vulnerability that stems from Git’s inconsistent handling of carriage return characters in configuration files. | ||
| 2025-08-21 | CVE-2025-43300 | Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability: Apple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework. | CWE-787 | |
| 2025-08-18 | CVE-2025-54948 | Trend Micro Apex One OS Command Injection Vulnerability: Trend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations. | CWE-78 | |
| 2025-08-13 | CVE-2025-8875 | N-able N-Central Insecure Deserialization Vulnerability: N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution. | ||
| 2025-08-13 | N-able | N-Central | CVE-2025-8876 | N-able N-Central Command Injection Vulnerability: N-able N-Central contains a command injection vulnerability via improper sanitization of user input. | |
| 2025-08-12 | CVE-2013-3893 | Microsoft Internet Explorer Resource Management Errors Vulnerability: Microsoft Internet Explorer contains a memory corruption vulnerability that allows for remote code execution. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | CWE-399 | |
| 2025-08-12 | CVE-2007-0671 | Microsoft Office Excel Remote Code Execution Vulnerability: Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system. | ||
| 2025-08-12 | CVE-2025-8088 | RARLAB WinRAR Path Traversal Vulnerability: RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files. | CWE-35 | |
|
2025-08-05
|
CVE-2022-40799 | D-Link DNR-322L Download of Code Without Integrity Check Vulnerability: D-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | CWE-494 | |
| 2025-08-05 | CVE-2020-25079 | D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability: D-Link DCS-2530L and DCS-2670L devices contains a command injection vulnerability in the cgi-bin/ddns_enc.cgi. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | CWE-77 | |
| 2025-08-05 | CVE-2020-25078 | D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability: D-Link DCS-2530L and DCS-2670L devices contains an unspecified vulnerability that could allow for remote administrator password disclosure. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | ||
| 2025-07-28 | CVE-2025-20281 | Cisco Identity Services Engine Injection Vulnerability: Cisco Identity Services Engine contains an injection vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input allowing an attacker to exploit this vulnerability by submitting a crafted API request. Successful exploitation could allow an attacker to perform remote code execution and obtaining root privileges on an affected device. | CWE-74 | |
| 2025-07-28 | CVE-2025-20337 | Cisco Identity Services Engine Injection Vulnerability: Cisco Identity Services Engine contains an injection vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC due to insufficient validation of user-supplied input allowing an attacker to exploit this vulnerability by submitting a crafted API request. Successful exploitation could allow an attacker to perform remote code execution and obtaining root privileges on an affected device. | CWE-74 | |
| 2025-07-28 | CVE-2023-2533 | PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability: PaperCut NG/MF contains a cross-site request forgery (CSRF) vulnerability, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. | CWE-352 | |
|
2025-07-22 |
Microsoft | SharePoint |
Microsoft SharePoint Improper Authentication Vulnerability: Microsoft SharePoint contains an improper authentication vulnerability that allows an authorized attacker to perform spoofing over a network. Successfully exploitation could allow an attacker to view sensitive information and make some changes to disclosed information. This vulnerability could be chained with CVE-2025-49704. The update for CVE-2025-53771 includes more robust protections than the update for CVE-2025-49706 |
||
|
2025-07-22 |
Microsoft | SharePoint |
Microsoft SharePoint Code Injection Vulnerability: Microsoft SharePoint contains a code injection vulnerability that could allow an authorized attacker to execute code over a network. This vulnerability could be chained with CVE-2025-49706. The update for CVE-2025-53770 includes more robust protections than the update for CVE-2025-49704. |
||
|
2025-07-22 |
CrushFTP | CrushFTP |
CrushFTP Unprotected Alternate Channel Vulnerability: CrushFTP contains an unprotected alternate channel vulnerability. When the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS. |
||
|
2025-07-22 |
Google | Chromium |
Google Chromium ANGLE and GPU Improper Input Validation Vulnerability: Google Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. |
||
|
2025-07-22 |
SysAid | SysAid On-Prem |
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability: SysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives. |
||
|
2025-07-22 |
SysAid | SysAid On-Prem |
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability: SysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives. |
||
|
2025-07-20 |
Microsoft | SharePoint |
Microsoft SharePoint Deserialization of Untrusted Data Vulnerability: Microsoft SharePoint Server on-premises contains a deserialization of untrusted data vulnerability that could allow an unauthorized attacker to execute code over a network. |
||
|
2025-07-18 |
Fortinet | FortiWeb |
Fortinet FortiWeb SQL Injection Vulnerability: Fortinet FortiWeb contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests. |
||
|
2025-08-04 |
Wing FTP Server |
Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability: Wing FTP Server contains an improper neutralization of null byte or NUL character vulnerability that can allow injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). |
||
|
2025-07-11 |
NetScaler ADC and Gateway |
Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability: Citrix NetScaler ADC and Gateway contain an out-of-bounds read vulnerability due to insufficient input validation. This vulnerability can lead to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. |
||
|
2025-07-28 |
Multi-Router Looking Glass (MRLG) |
Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability: Multi-Router Looking Glass (MRLG) contains a buffer overflow vulnerability that could allow remote attackers to cause an arbitrary memory write and memory corruption. |
||
|
2025-07-28 |
PHPMailer |
PHPMailer Command Injection Vulnerability: PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition. |
|
|
|
2025-07-28 |
Ruby on Rails |
Rails Ruby on Rails Path Traversal Vulnerability: Rails Ruby on Rails contains a path traversal vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. |
||
|
2025-07-28 |
Zimbra Collaboration Suite (ZCS) |
Synacor Zimbra Collaboration Suite (ZCS) Server-Side Request Forgery (SSRF) Vulnerability: Synacor Zimbra Collaboration Suite (ZCS) contains a server-side request forgery (SSRF) vulnerability via the ProxyServlet component. |
||
|
2025-07-23 |
Chromium V8 |
Google Chromium V8 Type Confusion Vulnerability: Google Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. |
||
|
2025-07-22 |
TeleMessage |
TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability: TeleMessage TM SGNL contains an initialization of a resource with an insecure default vulnerability. This vulnerability relies on how the Spring Boot Actuator is configured with an exposed heap dump endpoint at a /heapdump URI. |
||
|
2025-07-22 |
TeleMessage |
TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability: TeleMessage TM SGNL contains an exposure of core dump file to an unauthorized control sphere Vulnerability. This vulnerability is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump. |
||
|
2025-07-21 |
Citrix |
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability: Citrix NetScaler ADC and Gateway contain a buffer overflow vulnerability leading to unintended control flow and Denial of Service. NetScaler must be configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server. |
||
|
2025-07-16 |
AMI |
AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability: AMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. |
||
|
2025-07-16 |
D-Link |
D-Link DIR-859 Router Path Traversal Vulnerability: D-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. |
||
|
2025-07-16 |
Fortinet |
Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability: Fortinet FortiOS contains a use of hard-coded credentials vulnerability that could allow an attacker to cipher sensitive data in FortiOS configuration backup file via knowledge of the hard-coded key. |
||
|
2025-07-08 |
Linux |
Linux Kernel Improper Ownership Management Vulnerability: Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. |
||
|
2025-07-07 |
Apple |
Apple Multiple Products Unspecified Vulnerability: Apple iOS, iPadOS, macOS, watchOS, and visionOS, contain an unspecified vulnerability when processing a maliciously crafted photo or video shared via an iCloud Link. |
||
|
2025-07-01 |
Microsoft |
Microsoft Windows External Control of File Name or Path Vulnerability: Microsoft Windows contains an external control of file name or path vulnerability that could allow an attacker to execute code from a remote WebDAV location specified by the WorkingDirectory attribute of Internet Shortcut files. |
||
|
2025-07-01 |
Wazuh |
Wazuh Server Deserialization of Untrusted Data Vulnerability: Wazuh contains a deserialization of untrusted data vulnerability that allows for remote code execution on Wazuh servers. |
||
|
2025-06-30 |
Erlang |
Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability: Erlang Erlang/OTP SSH server contains a missing authentication for critical function vulnerability. This could allow an attacker to execute arbitrary commands without valid credentials, potentially leading to unauthenticated remote code execution (RCE). |
||
|
2025-06-26 |
|
Google Chromium V8 Out-of-Bounds Read and Write Vulnerability: Google Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. |
||
|
2025-06-24 |
Qualcomm |
Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability: Multiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands. |
||
|
2025-06-24 |
Qualcomm |
Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability: Multiple Qualcomm chipsets contain an incorrect authorization vulnerability. This vulnerability allows for memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands. |
||
|
2025-06-24 |
Qualcomm |
Qualcomm Multiple Chipsets Use-After-Free Vulnerability: Multiple Qualcomm chipsets contain a use-after-free vulnerability. This vulnerability allows for memory corruption while rendering graphics using Adreno GPU drivers in Chrome. |
||
|
2025-06-23 |
ConnectWise |
ConnectWise ScreenConnect Improper Authentication Vulnerability: ConnectWise ScreenConnect contains an improper authentication vulnerability. This vulnerability could allow a ViewState code injection attack, which could allow remote code execution if machine keys are compromised. |
||
|
2025-06-23 |
Craft CMS |
Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability: Craft CMS contains an external control of assumed-immutable web parameter vulnerability. This vulnerability could allow an unauthenticated client to introduce arbitrary values, such as PHP code, to a known local file location on the server. This vulnerability could be chained with CVE-2024-58136 as represented by CVE-2025-32432. |
||
|
2025-06-12 |
Samsung |
Samsung MagicINFO 9 Server Path Traversal Vulnerability: Samsung MagicINFO 9 Server contains a path traversal vulnerability that allows an attacker to write arbitrary file as system authority. |
||
|
2025-06-09 |
Srimax |
Srimax Output Messenger Directory Traversal Vulnerability: Srimax Output Messenger contains a directory traversal vulnerability that allows an attacker to access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access. |
||
|
2025-06-09 |
Ivanti |
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. |
||
|
2025-06-09 |
Ivanti |
Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) contains an authentication bypass vulnerability in the API component that allows an attacker to access protected resources without proper credentials via crafted API requests. This vulnerability results from an insecure implementation of the Spring Framework open-source library. |
||
|
2025-06-05 |
SAP |
SAP NetWeaver Deserialization Vulnerability: SAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content. |
||
|
2025-06-04 |
Fortinet |
Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability: Fortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests. |
||
|
2025-06-03 |
Microsoft |
Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability: Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally. |
||
|
2025-06-03 |
Microsoft |
Microsoft Windows DWM Core Library Use-After-Free Vulnerability: Microsoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally. |
||
|
2025-06-03 |
Microsoft |
Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability: Microsoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally. |
||
|
2025-06-03 |
Microsoft |
Microsoft Windows Scripting Engine Type Confusion Vulnerability: Microsoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL. |
||
|
2025-06-03 |
Microsoft |
Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability: Microsoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator. |
||
|
2025-06-02 |
TeleMessage |
TeleMessage TM SGNL Hidden Functionality Vulnerability: TeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users. |
||
|
2025-05-27 |
FreeType |
FreeType Out-of-Bounds Write Vulnerability: FreeType contains an out-of-bounds write vulnerability when attempting to parse font subglyph structures related to TrueType GX and variable font files that may allow for arbitrary code execution. |
||
|
2025-05-26 |
Langflow |
Langflow Missing Authentication Vulnerability: Langflow contains a missing authentication vulnerability in the /api/v1/validate/code endpoint that allows a remote, unauthenticated attacker to execute arbitrary code via crafted HTTP requests. |
||
|
2025-05-23 |
Commvault |
Commvault Command Center Path Traversal Vulnerability: Commvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code. |
||
|
2025-05-23 |
Yiiframework |
Yiiframework Yii Improper Protection of Alternate Path Vulnerability: Yii Framework contains an improper protection of alternate path vulnerability that may allow a remote attacker to execute arbitrary code. This vulnerability could affect other products that implement Yii, including—but not limited to—Craft CMS, as represented by CVE-2025-32432. |