Latest CVE Feed
-
4.6
MEDIUMCVE-2025-63433
Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a hardcoded cryptographic key and IV to decrypt update metadata. The key is stored as a static value within the application's code. An attacker with the ability to intercept network traffi... Read more
Affected Products : xtool_anyscan- Published: Nov. 24, 2025
- Modified: Nov. 28, 2025
- Vuln Type: Cryptography
-
4.6
MEDIUMCVE-2025-63432
Xtooltech Xtool AnyScan Android Application 4.40.40 and prior is Missing SSL Certificate Validation. The application fails to properly validate the TLS certificate from its update server. An attacker on the same network can exploit this vulnerability by p... Read more
Affected Products : xtool_anyscan- Published: Nov. 24, 2025
- Modified: Nov. 28, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-65085
A Heap-based Buffer Overflow vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that could allow an attacker to disclose information or execute arbitrary code.... Read more
- Published: Nov. 25, 2025
- Modified: Nov. 28, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-65084
An Out-of-Bounds Write vulnerability is present in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions 12.6.1204.207 and prior that could allow an attacker to disclose information or execute arbitrary code.... Read more
- Published: Nov. 25, 2025
- Modified: Nov. 28, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-29933
Improper input validation within AMD uProf can allow a local attacker to write out of bounds, potentially resulting in a crash or denial of service... Read more
Affected Products : uprof- Published: Nov. 24, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-48510
Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability.... Read more
Affected Products : uprof- Published: Nov. 24, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Information Disclosure
-
5.5
MEDIUMCVE-2025-48511
Improper input validation within AMD uprof can allow a local attacker to write to an arbitrary physical address, potentially resulting in crash or denial of service.... Read more
Affected Products : uprof- Published: Nov. 24, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-64720
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when pr... Read more
Affected Products : libpng- Published: Nov. 25, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Memory Corruption
-
7.1
HIGHCVE-2025-65018
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API fun... Read more
Affected Products : libpng- Published: Nov. 25, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Memory Corruption
-
6.1
MEDIUMCVE-2025-64506
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit ... Read more
Affected Products : libpng- Published: Nov. 25, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Memory Corruption
-
6.1
MEDIUMCVE-2025-64505
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when pro... Read more
Affected Products : libpng- Published: Nov. 25, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Memory Corruption
-
8.8
HIGHCVE-2025-62703
Fugue is a unified interface for distributed computing that lets users execute Python, Pandas, and SQL code on Spark, Dask, and Ray with minimal rewrites. In version 0.9.2 and prior, there is a remote code execution vulnerability by pickle deserialization... Read more
Affected Products :- Published: Nov. 25, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Injection
-
6.1
MEDIUMCVE-2025-63735
A reflected Cross site scripting (XSS) vulnerability in Ruckus Unleashed 200.13.6.1.319 via the name parameter to the the captive-portal endpoint selfguestpass/guestAccessSubmit.jsp.... Read more
Affected Products :- Published: Nov. 25, 2025
- Modified: Nov. 26, 2025
- Vuln Type: Cross-Site Scripting
-
6.1
MEDIUMCVE-2025-63674
An issue in Blurams Lumi Security Camera (A31C) v23.1227.472.2926 allows local physical attackers to execute arbitrary code via overriding the bootloader on the SD card.... Read more
Affected Products :- Published: Nov. 24, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Memory Corruption
-
9.8
CRITICALCVE-2025-6389
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that throu... Read more
Affected Products :- Published: Nov. 25, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Injection
-
8.5
HIGHCVE-2025-59373
A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arb... Read more
Affected Products : myasus- Published: Nov. 25, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Path Traversal
-
9.3
CRITICALCVE-2025-9803
lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensu... Read more
Affected Products : lunary- Published: Nov. 25, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authentication
-
9.8
CRITICALCVE-2025-13559
The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'edukart_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes ... Read more
Affected Products :- Published: Nov. 25, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization
-
7.5
HIGHCVE-2025-12742
A Looker user with a Developer role could cause Looker to execute a malicious command, due to insecure processing of Teradata driver parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-h... Read more
Affected Products :- Published: Nov. 25, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-12043
The Autochat Automatic Conversation plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_nopriv_auycht_saveCid' AJAX endpoint in all versions up to, and including, 1.1.9. This makes it p... Read more
Affected Products : automatic_conversation- Published: Nov. 25, 2025
- Modified: Nov. 25, 2025
- Vuln Type: Authorization