{"cves":[{"cve_id":"CVE-2026-6318","summary":"Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.3218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/495996858"],"published_time":"2026-04-15T20:16:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6313","summary":"Insufficient policy enforcement in CORS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/498765210"],"published_time":"2026-04-15T20:16:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6314","summary":"Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07258,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/498782145"],"published_time":"2026-04-15T20:16:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6316","summary":"Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.3218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/499384399"],"published_time":"2026-04-15T20:16:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6317","summary":"Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.3218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/500091052"],"published_time":"2026-04-15T20:16:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6308","summary":"Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26209,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/497412658"],"published_time":"2026-04-15T20:16:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6309","summary":"Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.1042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/497846428"],"published_time":"2026-04-15T20:16:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6310","summary":"Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.1042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/497969820"],"published_time":"2026-04-15T20:16:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6311","summary":"Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07413,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/498201025"],"published_time":"2026-04-15T20:16:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6312","summary":"Insufficient policy enforcement in Passwords in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00848,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/498269651"],"published_time":"2026-04-15T20:16:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6301","summary":"Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/495273999"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6302","summary":"Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13367,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/495477995"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6303","summary":"Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.3218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/496282147"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6304","summary":"Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.1042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/496393742"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6305","summary":"Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08135,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/496618639"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6306","summary":"Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24477,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/496907110"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6307","summary":"Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09433,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/497404188"],"published_time":"2026-04-15T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6296","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/490170083"],"published_time":"2026-04-15T20:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6297","summary":"Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01076,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/493628982"],"published_time":"2026-04-15T20:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6298","summary":"Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00924,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/495700484"],"published_time":"2026-04-15T20:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6299","summary":"Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13367,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/497053588"],"published_time":"2026-04-15T20:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-6300","summary":"Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13367,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/491994185"],"published_time":"2026-04-15T20:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27299","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to access sensitive files or data on the system. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12814,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27300","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27301","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27293","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27294","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27295","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27296","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27297","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27298","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27290","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue does not require user interaction.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27292","summary":"Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09351,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb26-36.html"],"published_time":"2026-04-14T23:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-34631","summary":"InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb26-33.html"],"published_time":"2026-04-14T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27287","summary":"InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01938,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb26-33.html"],"published_time":"2026-04-14T21:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-34618","summary":"Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-42.html"],"published_time":"2026-04-14T20:16:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-34630","summary":"Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-39.html"],"published_time":"2026-04-14T20:16:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27289","summary":"Photoshop Desktop versions 27.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/photoshop/apsb26-40.html"],"published_time":"2026-04-14T20:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27310","summary":"Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00749,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-39.html"],"published_time":"2026-04-14T20:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27311","summary":"Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00749,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-39.html"],"published_time":"2026-04-14T20:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27312","summary":"Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00749,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-39.html"],"published_time":"2026-04-14T20:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27313","summary":"Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-39.html"],"published_time":"2026-04-14T20:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27222","summary":"Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Divide By Zero vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application or render it unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.0445,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-39.html"],"published_time":"2026-04-14T20:16:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-34622","summary":"Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00217,"ranking_epss":0.44332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb26-44.html"],"published_time":"2026-04-14T17:16:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-34626","summary":"Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary file system read in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00055,"ranking_epss":0.17326,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb26-44.html"],"published_time":"2026-04-14T17:16:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27284","summary":"InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-32.html"],"published_time":"2026-04-14T17:16:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27285","summary":"InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application or disrupt its functionality. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.0445,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-32.html"],"published_time":"2026-04-14T17:16:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27286","summary":"InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-32.html"],"published_time":"2026-04-14T17:16:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27238","summary":"InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-32.html"],"published_time":"2026-04-14T17:16:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27283","summary":"InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09351,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-32.html"],"published_time":"2026-04-14T17:16:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-34621","summary":"Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.04558,"ranking_epss":0.89211,"kev":true,"propose_action":"Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.","ransomware_campaign":"Unknown","references":["https://helpx.adobe.com/security/products/acrobat/apsb26-43.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-34621"],"published_time":"2026-04-11T07:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5911","summary":"Policy bypass in ServiceWorkers in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09657,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485785246"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5912","summary":"Integer overflow in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/486498791"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5913","summary":"Out of bounds read in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Low)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/487195286"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5914","summary":"Type Confusion in CSS in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/490023239"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5915","summary":"Insufficient validation of untrusted input in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/494341335"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5918","summary":"Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/490139441"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5919","summary":"Insufficient validation of untrusted input in WebSockets in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.11095,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/483423893"],"published_time":"2026-04-08T22:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5902","summary":"Race in Media in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to corrupt media stream metadata via a crafted HTML page. (Chromium security severity: Low)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00096,"ranking_epss":0.26618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/483109205"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5903","summary":"Policy bypass in IFrameSandbox in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/483771899"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5904","summary":"Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/483851888"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5905","summary":"Incorrect security UI in Permissions in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05764,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/483899628"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5906","summary":"Incorrect security UI in Omnibox in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07941,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484082189"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5907","summary":"Insufficient data validation in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted video file. (Chromium security severity: Low)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484665123"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5908","summary":"Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485115554"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5909","summary":"Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485203821"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5910","summary":"Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485212874"],"published_time":"2026-04-08T22:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5892","summary":"Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to install a PWA without user consent via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07786,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/487568011"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5893","summary":"Race in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08353,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/487768771"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5894","summary":"Inappropriate implementation in PDF in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05562,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/481882038"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5895","summary":"Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. (Chromium security severity: Low)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/374285495"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5896","summary":"Policy bypass in Audio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass sandbox download restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/40064543"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5897","summary":"Incorrect security UI in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/419921726"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5898","summary":"Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/470295118"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5899","summary":"Insufficient policy enforcement in History Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02832,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/474817168"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5900","summary":"Policy bypass in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass of multi-download protections via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/475265304"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5901","summary":"Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to bypass enterprise host restrictions for cookie modification via a crafted Chrome Extension. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05513,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/479673903"],"published_time":"2026-04-08T22:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5884","summary":"Insufficient validation of untrusted input in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00138,"ranking_epss":0.33574,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484547633"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5885","summary":"Insufficient validation of untrusted input in WebML in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13251,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485203823"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5887","summary":"Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10152,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/486079015"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5888","summary":"Uninitialized Use in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/486506202"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5889","summary":"Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an attacker to read potentially sensitive information from encrypted PDFs via a brute-force attack. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":6e-05,"ranking_epss":0.00426,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/486906037"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5890","summary":"Race in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07613,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/487259772"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5891","summary":"Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16799,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/487471101"],"published_time":"2026-04-08T22:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5874","summary":"Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485397279"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5875","summary":"Policy bypass in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06915,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/430198264"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5876","summary":"Side-channel information leakage in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.1026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/41485206"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5877","summary":"Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.34012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/333024273"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5878","summary":"Incorrect security UI in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07941,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/365089001"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5880","summary":"Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/424995036"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5881","summary":"Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06915,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/454162508"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5882","summary":"Incorrect security UI in Fullscreen in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07941,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/480993682"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5883","summary":"Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00129,"ranking_epss":0.32341,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/482958590"],"published_time":"2026-04-08T22:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5865","summary":"Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00104,"ranking_epss":0.283,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/491884710"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5866","summary":"Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.34012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/492218537"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5867","summary":"Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/492668885"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5869","summary":"Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/493708165"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5870","summary":"Integer overflow in Skia in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/495534710"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5871","summary":"Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00104,"ranking_epss":0.283,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/495679730"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5872","summary":"Use after free in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.34012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/496281816"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5873","summary":"Out of bounds read and write in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/496301615"],"published_time":"2026-04-08T22:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5858","summary":"Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00081,"ranking_epss":0.2378,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/493319454"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5859","summary":"Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/494158331"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5860","summary":"Use after free in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/486495143"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5861","summary":"Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.34012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/486927780"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5862","summary":"Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/470566252"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5863","summary":"Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484527367"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5864","summary":"Heap buffer overflow in WebAudio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/490642831"],"published_time":"2026-04-08T22:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-39844","summary":"NiceGUI is a Python-based UI framework. Prior to 3.10.0, Since PurePosixPath only recognizes forward slashes (/) as path separators, an attacker can bypass this sanitization on Windows by using backslashes (\\) in the upload filename. Applications that construct file paths using file.name (a pattern demonstrated in NiceGUI's bundled examples) are vulnerable to arbitrary file write on Windows. This vulnerability is fixed in 3.10.0.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/zauberzeug/nicegui/commit/d38a702e3af2da5b0708f689be8d71413fc77056","https://github.com/zauberzeug/nicegui/releases/tag/v3.10.0","https://github.com/zauberzeug/nicegui/security/advisories/GHSA-w8wv-vfpc-hw2w"],"published_time":"2026-04-08T21:16:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-35560","summary":"Improper certificate validation in the identity provider connection components in Amazon Athena ODBC driver before 2.1.0.0 might allow a man-in-the-middle threat actor to intercept authentication credentials due to insufficient default transport security when connecting to identity providers. This only applies to connections with external identity providers and does not apply to connections with Athena.\n\nTo remediate this issue, users should upgrade to version 2.1.0.0.","cvss":9.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":9.1,"epss":0.00035,"ranking_epss":0.10156,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://aws.amazon.com/security/security-bulletins/2026-013-aws/","https://docs.aws.amazon.com/athena/latest/ug/odbc-v2-driver-release-notes.html","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Linux/AmazonAthenaODBC-2.1.0.0.rpm","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/Intel/AmazonAthenaODBC-2.1.0.0_x86.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/arm/AmazonAthenaODBC-2.1.0.0_arm.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Windows/AmazonAthenaODBC-2.1.0.0.msi"],"published_time":"2026-04-03T21:17:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-35561","summary":"Insufficient authentication security controls in the browser-based authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to intercept or hijack authentication sessions due to insufficient protections in the browser-based authentication flows.\n\nTo remediate this issue, users should upgrade to version 2.1.0.0.","cvss":9.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":9.1,"epss":0.0009,"ranking_epss":0.25397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://aws.amazon.com/security/security-bulletins/2026-013-aws/","https://docs.aws.amazon.com/athena/latest/ug/odbc-v2-driver-release-notes.html","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Linux/AmazonAthenaODBC-2.1.0.0.rpm","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/Intel/AmazonAthenaODBC-2.1.0.0_x86.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/arm/AmazonAthenaODBC-2.1.0.0_arm.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Windows/AmazonAthenaODBC-2.1.0.0.msi"],"published_time":"2026-04-03T21:17:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-35562","summary":"Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during the driver's parsing operations.\n\nTo remediate this issue, users should upgrade to version 2.1.0.0.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.7,"epss":0.00105,"ranking_epss":0.28525,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://aws.amazon.com/security/security-bulletins/2026-013-aws/","https://docs.aws.amazon.com/athena/latest/ug/odbc-v2-driver-release-notes.html","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Linux/AmazonAthenaODBC-2.1.0.0.rpm","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/Intel/AmazonAthenaODBC-2.1.0.0_x86.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/arm/AmazonAthenaODBC-2.1.0.0_arm.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Windows/AmazonAthenaODBC-2.1.0.0.msi"],"published_time":"2026-04-03T21:17:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-35558","summary":"Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection parameters that are processed by the driver during user-initiated authentication.\n\nTo remediate this issue, users should upgrade to version 2.1.0.0.","cvss":7.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":7.3,"epss":0.00154,"ranking_epss":0.36091,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://aws.amazon.com/security/security-bulletins/2026-013-aws/","https://docs.aws.amazon.com/athena/latest/ug/odbc-v2-driver-release-notes.html","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Linux/AmazonAthenaODBC-2.1.0.0.rpm","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/Intel/AmazonAthenaODBC-2.1.0.0_x86.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/arm/AmazonAthenaODBC-2.1.0.0_arm.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Windows/AmazonAthenaODBC-2.1.0.0.msi"],"published_time":"2026-04-03T21:17:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-35559","summary":"Out-of-bounds write in the query processing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to crash the driver by using specially crafted data that is processed by the driver during query operations.\n\nTo remediate this issue, users should upgrade to version 2.1.0.0.","cvss":7.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":7.1,"epss":0.00073,"ranking_epss":0.22226,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://aws.amazon.com/security/security-bulletins/2026-013-aws/","https://docs.aws.amazon.com/athena/latest/ug/odbc-v2-driver-release-notes.html","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Linux/AmazonAthenaODBC-2.1.0.0.rpm","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/Intel/AmazonAthenaODBC-2.1.0.0_x86.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Mac/arm/AmazonAthenaODBC-2.1.0.0_arm.pkg","https://downloads.athena.us-east-1.amazonaws.com/drivers/ODBC/v2.1.0.0/Windows/AmazonAthenaODBC-2.1.0.0.msi"],"published_time":"2026-04-03T21:17:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1243","summary":"IBM Content Navigator 3.0.15, 3.1.0, and 3.2.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7268006"],"published_time":"2026-04-02T01:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13916","summary":"IBM Aspera Shares 1.9.9 through 1.11.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7267848"],"published_time":"2026-04-01T21:16:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5286","summary":"Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/493900619"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5287","summary":"Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/494644471"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5288","summary":"Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.1948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/495507390"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5289","summary":"Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/495931147"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5290","summary":"Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/496205576"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5291","summary":"Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/490118036"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5292","summary":"Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.1948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/492213293"],"published_time":"2026-04-01T05:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5278","summary":"Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/490254128"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5279","summary":"Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/490642836"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5280","summary":"Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/491515787"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5281","summary":"Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03278,"ranking_epss":0.87196,"kev":true,"propose_action":"Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/491518608","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-5281"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5282","summary":"Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.1948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/491655161"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5283","summary":"Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02506,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/492131521"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5284","summary":"Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/492139412"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5285","summary":"Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/492228019"],"published_time":"2026-04-01T05:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5272","summary":"Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06762,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/491732188"],"published_time":"2026-04-01T05:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5273","summary":"Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.2013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/493952652"],"published_time":"2026-04-01T05:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5274","summary":"Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20966,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/488596746"],"published_time":"2026-04-01T05:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5275","summary":"Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.21904,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/489494022"],"published_time":"2026-04-01T05:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5276","summary":"Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.1367,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/489711638"],"published_time":"2026-04-01T05:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-5277","summary":"Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24736,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html","https://issues.chromium.org/issues/489791424"],"published_time":"2026-04-01T05:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3774","summary":"The application allows PDF JavaScript and document/print actions (such as WillPrint/DidPrint) to update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing. These script‑driven updates are not fully covered by the existing redaction, encryption, and printing logic, which, under specific document structures and user workflows, may cause a small amount of sensitive content to remain unremoved or unencrypted as expected, or result in printed output that slightly differs from what was reviewed on screen.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2026-04-01T02:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3775","summary":"The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02776,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2026-04-01T02:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3776","summary":"The application does not validate the presence of required appearance (AP) data before accessing stamp annotation resources. When a PDF contains a stamp annotation missing its AP entry, the code continues to dereference the associated object without a prior null or validity check, which allows a crafted document to trigger a null pointer dereference and crash the application, resulting in denial of service.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.0335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2026-04-01T02:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3777","summary":"The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03661,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2026-04-01T02:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3778","summary":"The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02604,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2026-04-01T02:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13855","summary":"IBM Storage Protect Server 8.2.0 IBM Storage Protect Plus Server is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.2882,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7267783"],"published_time":"2026-04-01T01:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2123","summary":"A security audit identified a privilege escalation\nvulnerability in Operations Agent(<=OA 12.29) on Windows. Under specific conditions\nOperations Agent may run executables from specific writeable locations.Thanks to Manuel Rickli & Philippe Leiser of\nOneconsult AG for reporting this vulnerability","cvss":8.6,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.6,"epss":0.00013,"ranking_epss":0.0225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://portal.microfocus.com/s/article/KM000046068"],"published_time":"2026-03-31T18:16:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-22561","summary":"Uncontrolled search path elements in Anthropic Claude for Windows installer (Claude Setup.exe) versions prior to 1.1.3363 allow local privilege escalation via DLL search-order hijacking. The installer loads DLLs (e.g., profapi.dll) from its own directory after UAC elevation, enabling arbitrary code execution if a malicious DLL is planted alongside the installer.","cvss":4.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":4.7,"epss":0.0001,"ranking_epss":0.01147,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://trust.anthropic.com/resources?s=1cvig6ldp3zvuj1yffzr11&name=cve-2026-22561-dll-search-order-hijacking-in-claude-for-windows-installer"],"published_time":"2026-03-31T16:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27309","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10329,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-27T22:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2485","summary":"IBM Infosphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266765"],"published_time":"2026-03-25T21:16:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2483","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266764"],"published_time":"2026-03-25T21:16:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1014","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to exposure of sensitive information via JSON server response manipulation.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02436,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266736"],"published_time":"2026-03-25T21:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1015","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266740"],"published_time":"2026-03-25T21:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1262","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an information disclosure vulnerability.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08118,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266748"],"published_time":"2026-03-25T21:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1561","summary":"IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is vulnerable to server-side request forgery (SSRF). This may allow remote attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.08997,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7267347"],"published_time":"2026-03-25T21:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36422","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 IBM InfoSphere DataStage Flow Designer is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02933,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266685"],"published_time":"2026-03-25T21:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14912","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07391,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266698"],"published_time":"2026-03-25T21:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14915","summary":"IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is affected by privilege escalation. A privileged user could gain additional access to the application server.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7267345"],"published_time":"2026-03-25T21:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14917","summary":"IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty could provide weaker than expected security when administering security settings.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10888,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7267362"],"published_time":"2026-03-25T21:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14974","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable due to Insecure Direct Object Reference (IDOR).","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.14948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266723"],"published_time":"2026-03-25T21:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36258","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 product stores user credentials and other sensitive information in plain text which can be read by a local user.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01983,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266489"],"published_time":"2026-03-25T21:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14807","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00046,"ranking_epss":0.13948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7267526"],"published_time":"2026-03-25T21:16:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14808","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques.","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08118,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266695"],"published_time":"2026-03-25T21:16:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14810","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 does not invalidate a session after privileges have been modified which could allow an authenticated user to retain access to sensitive information. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE: CWE-613: Insufficient Session Expiration CVSS Source: IBM CVSS Base score: 6.3 CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08001,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266696"],"published_time":"2026-03-25T21:16:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14790","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information due to insufficiently protected credentials.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08417,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7266688"],"published_time":"2026-03-25T20:16:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-32948","summary":"sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process(\"cmd\", \"/c\", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands. This issue has been patched in version 1.12.7.","cvss":6.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":6.7,"epss":0.00025,"ranking_epss":0.06702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/sbt/sbt/commit/1ce945b6b79cbe3cef6c0fe9efbbd2904e0f479e","https://github.com/sbt/sbt/commit/3a474ab060df4dbfa825a7e7bc97e00056519800","https://github.com/sbt/sbt/releases/tag/v1.12.7","https://github.com/sbt/sbt/security/advisories/GHSA-x4ff-q6h8-v7gw"],"published_time":"2026-03-24T20:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4675","summary":"Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.22106,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/488270257"],"published_time":"2026-03-24T01:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4676","summary":"Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/488613135"],"published_time":"2026-03-24T01:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4677","summary":"Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/490533968"],"published_time":"2026-03-24T01:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4678","summary":"Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/491164019"],"published_time":"2026-03-24T01:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4679","summary":"Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29154,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/491516670"],"published_time":"2026-03-24T01:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4680","summary":"Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.34012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/491869946"],"published_time":"2026-03-24T01:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4673","summary":"Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/485397284"],"published_time":"2026-03-24T01:17:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4674","summary":"Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/488188166"],"published_time":"2026-03-24T01:17:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-32310","summary":"Cryptomator encrypts data being stored on cloud infrastructure. From version 1.6.0 to before version 1.19.1, vault configuration is parsed before its integrity is verified, and the masterkeyfile loader uses the unverified keyId as a filesystem path. The loader resolves keyId.getSchemeSpecificPart() directly against the vault path and immediately calls Files.exists(...). This allows a malicious vault config to supply parent-directory escapes, absolute local paths, or UNC paths (e.g., masterkeyfile://attacker/share/masterkey.cryptomator). On Windows, the UNC variant is especially dangerous because Path.resolve(\"//attacker/share/...\") becomes \\\\attacker\\share\\..., so the existence check can trigger outbound SMB access before the user even enters a passphrase. This issue has been patched in version 1.19.1.","cvss":4.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07537,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/cryptomator/cryptomator/commit/1e3dfe3de1623b1b85d24db91e49d31d1ea11f40","https://github.com/cryptomator/cryptomator/pull/4180","https://github.com/cryptomator/cryptomator/releases/tag/1.19.1","https://github.com/cryptomator/cryptomator/security/advisories/GHSA-5phc-5pfx-hr52"],"published_time":"2026-03-20T19:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4458","summary":"Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/489619753"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4459","summary":"Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/490246422"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4460","summary":"Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/490254124"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4461","summary":"Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/490558172"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4462","summary":"Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/491080830"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4463","summary":"Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/491358681"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4464","summary":"Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/487208468"],"published_time":"2026-03-20T02:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4451","summary":"Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30315,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/487768779"],"published_time":"2026-03-20T02:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4452","summary":"Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/487977696"],"published_time":"2026-03-20T02:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4454","summary":"Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/488585488"],"published_time":"2026-03-20T02:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4455","summary":"Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/488585504"],"published_time":"2026-03-20T02:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4456","summary":"Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/488617440"],"published_time":"2026-03-20T02:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4457","summary":"Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00082,"ranking_epss":0.23984,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/488803413"],"published_time":"2026-03-20T02:16:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4444","summary":"Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20875,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/486349161"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4445","summary":"Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/486421953"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4446","summary":"Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/486421954"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4447","summary":"Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26347,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/486657483"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4448","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/486972661"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4449","summary":"Use after free in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/487117772"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4450","summary":"Out of bounds write in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27869,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/487746373"],"published_time":"2026-03-20T02:16:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4439","summary":"Out of bounds memory access in WebGL in Google Chrome on Android prior to 146.0.7680.153 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/475877320"],"published_time":"2026-03-20T02:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4440","summary":"Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/485935305"],"published_time":"2026-03-20T02:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4441","summary":"Use after free in Base in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00109,"ranking_epss":0.29228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/489381399"],"published_time":"2026-03-20T02:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4442","summary":"Heap buffer overflow in CSS in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/484751092"],"published_time":"2026-03-20T02:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-4443","summary":"Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html","https://issues.chromium.org/issues/485292589"],"published_time":"2026-03-20T02:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-31994","summary":"OpenClaw versions prior to 2026.2.19 contain a local command injection vulnerability in Windows scheduled task script generation due to unsafe handling of cmd metacharacters and expansion-sensitive characters in gateway.cmd files. Local attackers with control over service script generation arguments can inject arbitrary commands by providing metacharacter-only values or CR/LF sequences that execute unintended code in the scheduled task context.","cvss":6.9,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":6.9,"epss":0.0005,"ranking_epss":0.15284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/openclaw/openclaw/commit/280c6b117b2f0e24f398e5219048cd4cc3b82396","https://github.com/openclaw/openclaw/security/advisories/GHSA-mqr9-vqhq-3jxw","https://www.vulncheck.com/advisories/openclaw-local-command-injection-via-unsafe-cmd-argument-handling-in-windows-scheduled-task"],"published_time":"2026-03-19T02:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-31995","summary":"OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism that allows attackers to inject arbitrary commands through tool-provided arguments. When spawn failures trigger shell fallback with shell: true, attackers can exploit cmd.exe command interpretation to execute malicious commands by controlling workflow arguments.","cvss":5.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":5.8,"epss":0.00037,"ranking_epss":0.10823,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/openclaw/openclaw/commit/ba7be018da354ea9f803ed356d20464df0437916","https://github.com/openclaw/openclaw/security/advisories/GHSA-fg3m-vhrr-8gj6","https://www.vulncheck.com/advisories/openclaw-command-injection-via-windows-shell-fallback-in-lobster-extension"],"published_time":"2026-03-19T02:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1267","summary":"IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an unauthorized access to sensitive application data and administrative functionalities due to lack of proper access controls.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13535,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7263581"],"published_time":"2026-03-17T22:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14806","summary":"IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an attacker to trick the caching mechanism into storing and serving sensitive, user-specific responses as publicly cacheable resources.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7263581"],"published_time":"2026-03-17T22:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13212","summary":"IBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated user to cause a denial of service in the email service due to improper control of interaction frequency.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16304,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7263486"],"published_time":"2026-03-16T14:17:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13459","summary":"IBM Aspera Console 3.3.0 through 3.4.8 could allow a privileged user to cause a denial of service due to improper enforcement of behavioral workflow.","cvss":2.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.7,"cvss_v4":null,"epss":0.00055,"ranking_epss":0.17224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7263486"],"published_time":"2026-03-16T14:17:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13460","summary":"IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate usernames due to an observable response discrepancy.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.1103,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7263486"],"published_time":"2026-03-16T14:17:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3909","summary":"Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00288,"ranking_epss":0.52319,"kev":true,"propose_action":"Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/491421267","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3909"],"published_time":"2026-03-13T19:55:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3910","summary":"Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00665,"ranking_epss":0.71267,"kev":true,"propose_action":"Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/491410818","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3910"],"published_time":"2026-03-13T19:55:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3934","summary":"Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/478783560"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3935","summary":"Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07968,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/479326680"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3936","summary":"Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/481920229"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3937","summary":"Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/473118648"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3938","summary":"Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10214,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/474763968"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3939","summary":"Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file. (Chromium security severity: Low)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/40058077"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3940","summary":"Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/470574526"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3941","summary":"Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10814,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/474670215"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3942","summary":"Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/475238879"],"published_time":"2026-03-11T22:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3925","summary":"Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/418214610"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3926","summary":"Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00094,"ranking_epss":0.26219,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/478659010"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3927","summary":"Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/474948986"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3928","summary":"Insufficient policy enforcement in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03549,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/435980394"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3929","summary":"Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09951,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/477180001"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3930","summary":"Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/476898368"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3931","summary":"Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.2482,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/417599694"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3932","summary":"Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/478296121"],"published_time":"2026-03-11T22:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3917","summary":"Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/483569512"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3918","summary":"Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/483853103"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3919","summary":"Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09955,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/444176961"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3920","summary":"Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/482875307"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3921","summary":"Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/484946544"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3922","summary":"Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/485397139"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3923","summary":"Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.30677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/485935314"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3924","summary":"use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/487338366"],"published_time":"2026-03-11T22:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3913","summary":"Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00079,"ranking_epss":0.23482,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/483445078"],"published_time":"2026-03-11T22:16:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3914","summary":"Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/481776048"],"published_time":"2026-03-11T22:16:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3915","summary":"Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00079,"ranking_epss":0.23482,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/483971526"],"published_time":"2026-03-11T22:16:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3916","summary":"Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24923,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/482828615"],"published_time":"2026-03-11T22:16:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27270","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06841,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27271","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27272","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21333","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21362","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27267","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27268","summary":"Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06841,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-18.html"],"published_time":"2026-03-10T23:16:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27221","summary":"Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by an Improper Certificate Validation vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to spoof the identity of a signer. Exploitation of this issue requires user interaction.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.07005,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb26-26.html"],"published_time":"2026-03-10T22:16:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27278","summary":"Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb26-26.html"],"published_time":"2026-03-10T22:16:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27220","summary":"Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb26-26.html"],"published_time":"2026-03-10T22:16:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2713","summary":"IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.03903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7263031"],"published_time":"2026-03-10T20:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27279","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-10T19:17:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27273","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-10T19:17:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27274","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-10T19:17:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27275","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-10T19:17:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27276","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-10T19:17:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27277","summary":"Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html"],"published_time":"2026-03-10T19:17:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-27269","summary":"Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/premiere_pro/apsb26-28.html"],"published_time":"2026-03-10T19:17:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-26127","summary":"Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26127"],"published_time":"2026-03-10T18:18:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3787","summary":"A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way.","cvss":7.3,"cvss_version":4.0,"cvss_v2":6.0,"cvss_v3":7.0,"cvss_v4":7.3,"epss":7e-05,"ranking_epss":0.00538,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://drive.google.com/file/d/14ixv_1i4D2VrZWyl4RKsvFcN1AMF_qNx/view","https://vuldb.com/?ctiid.349754","https://vuldb.com/?id.349754","https://vuldb.com/?submit.767257"],"published_time":"2026-03-08T23:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28721","summary":"Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03785,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8445"],"published_time":"2026-03-06T00:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28722","summary":"Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03785,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8481"],"published_time":"2026-03-06T00:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28723","summary":"Unauthorized report deletion due to insufficient access control. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8486"],"published_time":"2026-03-06T00:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28724","summary":"Unauthorized data access due to insufficient access control validation. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8493"],"published_time":"2026-03-06T00:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28725","summary":"Sensitive information disclosure due to improper configuration of a headless browser. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03462,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8695"],"published_time":"2026-03-06T00:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28726","summary":"Sensitive information disclosure due to improper access control. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8401"],"published_time":"2026-03-06T00:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28715","summary":"Sensitive information disclosure due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.1138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-5910"],"published_time":"2026-03-06T00:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28716","summary":"Information disclosure and manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03072,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-3687"],"published_time":"2026-03-06T00:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28717","summary":"Local privilege escalation due to improper directory permissions. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.","cvss":5.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8363"],"published_time":"2026-03-06T00:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28718","summary":"Denial of service due to insufficient input validation in authentication logging. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28243,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8377"],"published_time":"2026-03-06T00:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28719","summary":"Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8378"],"published_time":"2026-03-06T00:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28720","summary":"Unauthorized modification of settings due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11554,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8379"],"published_time":"2026-03-06T00:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28709","summary":"Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10498,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-5889"],"published_time":"2026-03-06T00:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28710","summary":"Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-9137"],"published_time":"2026-03-06T00:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28711","summary":"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04169,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-2330"],"published_time":"2026-03-06T00:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28712","summary":"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04169,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-2332"],"published_time":"2026-03-06T00:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-28714","summary":"Unnecessary transmission of sensitive cryptographic material. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04494,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-5383"],"published_time":"2026-03-06T00:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30413","summary":"Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40497, Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03041,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/SEC-9386","https://security-advisory.acronis.com/advisories/SEC-8658"],"published_time":"2026-03-06T00:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11790","summary":"Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03665,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/SEC-8658","https://security-advisory.acronis.com/advisories/SEC-9386"],"published_time":"2026-03-06T00:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11791","summary":"Sensitive information disclosure and manipulation due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02836,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-9405"],"published_time":"2026-03-06T00:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11792","summary":"Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 41124.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03785,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-9439"],"published_time":"2026-03-06T00:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30796","summary":"Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext).\n\nThis issue affects RustDesk Server Pro: through 1.7.5.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.7,"epss":0.00023,"ranking_epss":0.06201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30797","summary":"Missing Authorization vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, config import modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files flutter/lib/common.Dart and program routines importConfig() via URI handler.\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":9.3,"epss":0.00061,"ranking_epss":0.19089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/client/","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30798","summary":"Insufficient Verification of Data Authenticity, Improper Handling of Exceptional Conditions vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop, strategy processing modules) allows Protocol Manipulation. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines stop-service handler in heartbeat loop.\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":8.2,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.2,"epss":0.00031,"ranking_epss":0.08798,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/client/","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30793","summary":"Cross-Site Request Forgery (CSRF) vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, FFI bridge modules) allows Privilege Escalation. This vulnerability is associated with program files flutter/lib/common.Dart, src/flutter_ffi.Rs and program routines URI handler for rustdesk://password/, bind.MainSetPermanentPassword().\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":9.3,"epss":0.00038,"ranking_epss":0.11413,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://github.com/rustdesk/hbb_common","https://github.com/rustdesk/rustdesk","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30794","summary":"Improper Certificate Validation vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (HTTP API client, TLS transport modules) allows Adversary in the Middle (AiTM). This vulnerability is associated with program files src/hbbs_http/http_client.Rs and program routines TLS retry with danger_accept_invalid_certs(true).\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":9.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":9.1,"epss":0.00041,"ranking_epss":0.12346,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://github.com/rustdesk/rustdesk","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30795","summary":"Cleartext Transmission of Sensitive Information vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop modules) allows Sniffing Attacks. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines Heartbeat JSON payload construction (preset-address-book-password).\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.7,"epss":0.00022,"ranking_epss":0.059,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://github.com/rustdesk/rustdesk","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30785","summary":"Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id().\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":8.2,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":8.2,"epss":5e-05,"ranking_epss":0.00256,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://github.com/rustdesk/rustdesk/discussions/4979","https://github.com/rustdesk/rustdesk/discussions/9229","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30789","summary":"Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction.\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":9.3,"epss":0.00166,"ranking_epss":0.37732,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/client/","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30790","summary":"Improper Restriction of Excessive Authentication Attempts, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Peer authentication, API login modules), rustdesk-server RustDesk Server (OSS) rustdesk-server on Windows, MacOS, Linux (Peer authentication, API login modules) allows Password Brute Forcing. This vulnerability is associated with program files src/server/connection.Rs and program routines Salt/challenge generation, SHA256(SHA256(pwd+salt)+challenge) verification.\n\nThis issue affects RustDesk Server Pro: through 1.7.5; RustDesk Server (OSS): through 1.1.15.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":9.3,"epss":0.00151,"ranking_epss":0.35741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://github.com/rustdesk","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30792","summary":"A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options().\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":9.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":9.1,"epss":0.00067,"ranking_epss":0.20577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/self-host/client-configuration/advanced-settings/","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30783","summary":"A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Client signaling, API sync loop, config management modules) allows Privilege Abuse. This vulnerability is associated with program files src/rendezvous_mediator.Rs, src/hbbs_http/sync.Rs and program routines API sync loop, api-server config handling.\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":8.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":8.8,"epss":0.00133,"ranking_epss":0.32854,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/client/","https://www.vulsec.org/"],"published_time":"2026-03-05T16:16:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3598","summary":"Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Config string generation, web console export modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program routines Config export/generation routines.\n\nThis issue affects RustDesk Server Pro: through 1.7.5.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.7,"epss":0.00023,"ranking_epss":0.06116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/client/","https://www.vulsec.org/"],"published_time":"2026-03-05T15:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-30791","summary":"Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Config import, URI scheme handler, CLI --config modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files flutter/lib/common.Dart, hbb_common/src/config.Rs and program routines parseRustdeskUri(), importConfig().\n\nThis issue affects RustDesk Client: through 1.4.5.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.7,"epss":0.00023,"ranking_epss":0.06116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub","https://rustdesk.com/docs/en/client/","https://www.vulsec.org/"],"published_time":"2026-03-05T15:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3540","summary":"Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00081,"ranking_epss":0.23782,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484088917"],"published_time":"2026-03-04T20:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3541","summary":"Inappropriate implementation in CSS in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484811719"],"published_time":"2026-03-04T20:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3542","summary":"Inappropriate implementation in WebAssembly in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00078,"ranking_epss":0.23295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485152421"],"published_time":"2026-03-04T20:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3543","summary":"Inappropriate implementation in V8 in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485267831"],"published_time":"2026-03-04T20:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3544","summary":"Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.25974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485683110"],"published_time":"2026-03-04T20:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3545","summary":"Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.3202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/487383169"],"published_time":"2026-03-04T20:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3536","summary":"Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/485622239"],"published_time":"2026-03-04T20:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3537","summary":"Object lifecycle issue in PowerVR in Google Chrome on Android prior to 145.0.7632.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.25289,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/474266014"],"published_time":"2026-03-04T20:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3538","summary":"Integer overflow in Skia in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/484983991"],"published_time":"2026-03-04T20:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3539","summary":"Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.008,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/483853098"],"published_time":"2026-03-04T20:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-15558","summary":"Docker CLI for Windows searches for plugin binaries in C:\\ProgramData\\Docker\\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, and allow privilege-escalation if the docker CLI is executed as a privileged user.\n\nThis issue affects Docker CLI: through 29.1.5 and Windows binaries acting as a CLI-plugin manager using the  github.com/docker/cli/cli-plugins/manager https://pkg.go.dev/github.com/docker/cli@v29.1.5+incompatible/cli-plugins/manager  package, such as Docker Compose.\n\nThis issue does not impact non-Windows binaries, and projects not using the plugin-manager code.","cvss":7.0,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":7.0,"epss":0.00023,"ranking_epss":0.061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.docker.com/desktop/release-notes/","https://github.com/docker/cli/pull/6713","https://www.zerodayinitiative.com/advisories/ZDI-CAN-28304/"],"published_time":"2026-03-04T17:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0704","summary":"In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.","cvss":5.9,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":5.9,"epss":0.00082,"ranking_epss":0.24069,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://advisories.octopus.com/post/2026/sa2026-01"],"published_time":"2026-02-25T13:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-0976","summary":"Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager.This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.4-00; Hitachi Configuration Manager: from 8.6.1-00 before 11.0.5-00.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00033,"ranking_epss":0.09585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-110/index.html"],"published_time":"2026-02-25T05:17:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-5781","summary":"Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager, Hitachi Device Manager allows Session Hijacking.This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.5-00; Hitachi Configuration Manager: from 8.5.1-00 before 11.0.5-00; Hitachi Device Manager: from 8.4.1-00 before 8.6.5-00.","cvss":5.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.2,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.0308,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-111/index.html"],"published_time":"2026-02-25T03:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3063","summary":"Inappropriate implementation in DevTools in Google Chrome prior to 145.0.7632.116 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via DevTools. (Chromium security severity: High)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":6e-05,"ranking_epss":0.00402,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/485287859"],"published_time":"2026-02-23T23:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3061","summary":"Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.0851,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/482862710"],"published_time":"2026-02-23T23:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-3062","summary":"Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.0851,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/483751167"],"published_time":"2026-02-23T23:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30411","summary":"Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.","cvss":10.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8768"],"published_time":"2026-02-20T01:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30412","summary":"Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.","cvss":10.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11137,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8598"],"published_time":"2026-02-20T01:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30416","summary":"Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.","cvss":10.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.0248,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://security-advisory.acronis.com/advisories/SEC-8766"],"published_time":"2026-02-20T01:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-25766","summary":"Echo is a Go web framework. In versions 5.0.0 through 5.0.2 on Windows, Echo’s `middleware.Static` using the default filesystem allows path traversal via backslashes, enabling unauthenticated remote file read outside the static root. In `middleware/static.go`, the requested path is unescaped and normalized with `path.Clean` (URL semantics). `path.Clean` does not treat `\\` as a path separator, so `..\\` sequences remain in the cleaned path. The resulting path is then passed to `currentFS.Open(...)`. When the filesystem is left at the default (nil), Echo uses `defaultFS` which calls `os.Open` (`echo.go:792`). On Windows, `os.Open` treats `\\` as a path separator and resolves `..\\`, allowing traversal outside the static root. Version 5.0.3 fixes the issue.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20055,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/labstack/echo/commit/b1d443086ea27cf51345ec72a71e9b7e9d9ce5f1","https://github.com/labstack/echo/pull/2891","https://github.com/labstack/echo/security/advisories/GHSA-pgvm-wxw2-hrv9"],"published_time":"2026-02-19T16:27:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2441","summary":"Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00354,"ranking_epss":0.57801,"kev":true,"propose_action":"Google Chromium CSS contains a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/483569511","https://github.com/huseyinstif/CVE-2026-2441-PoC/blob/main/poc.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-2441"],"published_time":"2026-02-13T19:17:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2026","summary":"A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Windows hosts could allow unauthorized access, potentially permitting Denial of Service (DoS) attacks.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":5.4,"epss":0.00011,"ranking_epss":0.01274,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2026-05"],"published_time":"2026-02-13T17:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2319","summary":"Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/40071155"],"published_time":"2026-02-11T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2320","summary":"Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/435684924"],"published_time":"2026-02-11T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2321","summary":"Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.32184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/461877477"],"published_time":"2026-02-11T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2322","summary":"Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/470928605"],"published_time":"2026-02-11T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2323","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01035,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/467442136"],"published_time":"2026-02-11T19:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2313","summary":"Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0007,"ranking_epss":0.21488,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/467297219"],"published_time":"2026-02-11T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2314","summary":"Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.14475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/478560268"],"published_time":"2026-02-11T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2315","summary":"Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/479242793"],"published_time":"2026-02-11T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2316","summary":"Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08001,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/422531206"],"published_time":"2026-02-11T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2317","summary":"Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04422,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/464173573"],"published_time":"2026-02-11T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-2318","summary":"Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08682,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/363930141"],"published_time":"2026-02-11T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21344","summary":"Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html"],"published_time":"2026-02-10T19:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21345","summary":"Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html"],"published_time":"2026-02-10T19:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21346","summary":"Bridge versions 15.1.3, 16.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-21.html"],"published_time":"2026-02-10T19:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21347","summary":"Bridge versions 15.1.3, 16.0.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-21.html"],"published_time":"2026-02-10T19:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21342","summary":"Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html"],"published_time":"2026-02-10T19:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21343","summary":"Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html"],"published_time":"2026-02-10T19:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21341","summary":"Substance3D - Stager versions 3.1.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10827,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-20.html"],"published_time":"2026-02-10T19:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21350","summary":"After Effects versions 25.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21351","summary":"After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21357","summary":"InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.00998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-17.html"],"published_time":"2026-02-10T18:16:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21358","summary":"InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-17.html"],"published_time":"2026-02-10T18:16:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21332","summary":"InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06841,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-17.html"],"published_time":"2026-02-10T18:16:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21324","summary":"After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02949,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21325","summary":"After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02949,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21326","summary":"After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21327","summary":"After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21328","summary":"After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21329","summary":"After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21330","summary":"After Effects versions 25.6 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.00998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21318","summary":"After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21319","summary":"After Effects versions 25.6 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06841,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21320","summary":"After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21321","summary":"After Effects versions 25.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.00998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21322","summary":"After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02949,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21323","summary":"After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.01912,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb26-15.html"],"published_time":"2026-02-10T18:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21218","summary":"Improper handling of missing special element in .NET allows an unauthorized attacker to perform spoofing over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.13044,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21218"],"published_time":"2026-02-10T18:16:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1769","summary":"Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Xerox CentreWare on Windows allows Stored XSS.This issue affects CentreWare: through 7.0.6. \n\nConsider \nupgrading Xerox® CentreWare Web® to v7.2.2.25 via the software available on Xerox.com","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01552,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-XRX26-003-for-Xerox-CentreWare-Web.pdf"],"published_time":"2026-02-06T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1861","summary":"Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/478942410"],"published_time":"2026-02-03T21:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-1862","summary":"Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00062,"ranking_epss":0.19236,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/479726070","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1862"],"published_time":"2026-02-03T21:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-63372","summary":"Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerability resides in the ZIP file processing component, specifically in the functionality responsible for extracting and handling ZIP archive contents.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00263,"ranking_epss":0.49706,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://articentgroup.com/zip-rar-extractor-tool/"],"published_time":"2026-02-03T18:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-25228","summary":"Signal K Server is a server application that runs on a central hub in a boat. Prior to 2.20.3, a path traversal vulnerability in SignalK Server's applicationData API allows authenticated users on Windows systems to read, write, and list arbitrary files and directories on the filesystem. The validateAppId() function blocks forward slashes (/) but not backslashes (\\), which are treated as directory separators by path.join() on Windows. This enables attackers to escape the intended applicationData directory. This vulnerability is fixed in 2.20.3.","cvss":5.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/SignalK/signalk-server/commit/9bcf61c8fe2cb8a40998b913a02fb64dff9e86c7","https://github.com/SignalK/signalk-server/security/advisories/GHSA-vrhw-v2hw-jffx"],"published_time":"2026-02-02T23:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-24413","summary":"Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not set appropriate permissions for the `%ProgramData%\\icinga2\\var` folder on Windows. This resulted in the its contents - including the private key of the user and synced configuration - being readable by all local users. All installations on Windows are affected. Versions 2.13.14, 2.14.8, and 2.15.2 contains a fix. There are two possibilities to work around the issue without upgrading Icinga 2. Upgrade Icinga for Windows to at least version v1.13.4, v1.12.4, or v1.11.2. These version will automatically fix the ACLs for the Icinga 2 agent as well. Alternatively, manually update the ACL for the given folder `C:\\ProgramData\\icinga2\\var` (and `C:\\Program Files\\WindowsPowerShell\\modules\\icinga-powershell-framework\\certificate` to fix the issue for the Icinga for Windows as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.","cvss":6.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":6.8,"epss":9e-05,"ranking_epss":0.00847,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/Icinga/icinga-powershell-framework/security/advisories/GHSA-88h5-rrm6-5973","https://github.com/Icinga/icinga2/security/advisories/GHSA-vfjg-6fpv-4mmr","https://icinga.com/blog/releasing-icinga-2-v2-15-2-v2-14-8-v2-13-14-and-icinga-for-windows-v1-13-4-v1-12-4-v1-11-2"],"published_time":"2026-01-29T18:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23565","summary":"A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause the NomadBranch.exe process to terminate via crafted requests. This can result in a denial-of-service condition of the Content Distribution Service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.18035,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23566","summary":"A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to inject, tamper with, or forge log entries in \\Nomad Branch.log via crafted data sent to the UDP network handler. This can impact log integrity and nonrepudiation.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.19977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23567","summary":"An integer underflow in the UDP command handler of the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to trigger a heap-based buffer overflow and cause a denial-of-service (service crash) via specially crafted UDP packets.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05657,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23568","summary":"An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause information disclosure or denial-of-service via a special crafted packet. The leaked memory could be used to bypass ASLR and facilitate further exploitation.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00965,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23569","summary":"An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows a remote attacker to leak stack memory and cause a denial of service via a crafted request. The leaked stack memory could be used to bypass ASLR remotely and facilitate exploitation of other vulnerabilities on the affected system.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16918,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23570","summary":"A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20728,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23571","summary":"A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected.","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00069,"ranking_epss":0.21149,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/"],"published_time":"2026-01-29T09:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23563","summary":"Improper Link Resolution Before File Access (invoked by 1E‑Explorer‑TachyonCore‑DeleteFileByPath instruction) in TeamViewer DEX - 1E Client before version 26.1 on Windows allows a low‑privileged local attacker to delete protected system files via a crafted RPC control junction or symlink that is followed when the delete instruction executes.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10913,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/"],"published_time":"2026-01-29T09:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23564","summary":"A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/"],"published_time":"2026-01-29T09:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23889","summary":"pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's tarball extraction allows malicious packages to write files outside the package directory on Windows. The path normalization only checks for `./` but not `.\\`. On Windows, backslashes are directory separators, enabling path traversal. This vulnerability is Windows-only. This issue impacts Windows pnpm users and Windows CI/CD pipelines (GitHub Actions Windows runners, Azure DevOps). It can lead to overwriting `.npmrc`, build configs, or other files. Version 10.28.1 contains a patch.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.03979,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pnpm/pnpm/commit/6ca07ffbe6fc0e8b8cdc968f228903ba0886f7c0","https://github.com/pnpm/pnpm/releases/tag/v10.28.1","https://github.com/pnpm/pnpm/security/advisories/GHSA-6x96-7vc8-cm3p"],"published_time":"2026-01-26T22:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58740","summary":"The use of a hard-coded encryption key in calls to the Password function in C2SGlobalSettings.dll in Milner ImageDirector Capture on Windows allows a local attacker to decrypt database credentials by reading the cryptographic key from the executable.\n\nThis issue affects ImageDirector Capture: from 7.0.9 before 7.6.3.25808.","cvss":8.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":8.5,"epss":0.0001,"ranking_epss":0.01181,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://sra.io/advisories"],"published_time":"2026-01-20T22:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58742","summary":"Insufficiently Protected Credentials, Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Connection Settings dialog in Milner ImageDirector Capture on Windows allows Adversary in the Middle (AiTM) by modifying the 'Server' field to redirect client authentication.This issue affects ImageDirector Capture: from 7.0.9 before 7.6.3.25808.","cvss":8.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":8.5,"epss":0.00044,"ranking_epss":0.13299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://sra.io/advisories"],"published_time":"2026-01-20T22:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58743","summary":"Use of a Broken or Risky Cryptographic Algorithm (DES) vulnerability \n\nin the Password class in C2SConnections.dll in Milner ImageDirector Capture on Windows allows Encryption Brute Forcing to obtain database credentials.This issue affects ImageDirector Capture: from 7.0.9.0 before 7.6.3.25808.","cvss":7.2,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":7.2,"epss":0.0001,"ranking_epss":0.00985,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://sra.io/advisories"],"published_time":"2026-01-20T22:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58744","summary":"Use of Default Credentials, Hard-coded Credentials vulnerability in C2SGlobalSettings.dll in \n\n Milner ImageDirector Capture on Windows allows decryption of document archive files using credentials decrypted with hard-coded application encryption key.\n\nThis issue affects ImageDirector Capture: from 7.0.9.0 before 7.6.3.25808.","cvss":6.9,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":6.9,"epss":0.00023,"ranking_epss":0.06046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://sra.io/advisories"],"published_time":"2026-01-20T22:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33229","summary":"NVIDIA Nsight Visual Studio for Windows contains a vulnerability in Nsight Monitor where an attacker can execute arbitrary code with the same privileges as the NVIDIA Nsight Visual Studio Edition Monitor application. A successful exploit of this vulnerability may lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05155,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-33229","https://nvidia.custhelp.com/app/answers/detail/a_id/5755","https://www.cve.org/CVERecord?id=CVE-2025-33229"],"published_time":"2026-01-20T18:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33231","summary":"NVIDIA Nsight Systems for Windows contains a vulnerability in the application’s DLL loading mechanism where an attacker could cause an uncontrolled search path element by exploiting insecure DLL search paths. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service and information disclosure.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.04833,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-33231","https://nvidia.custhelp.com/app/answers/detail/a_id/5755","https://www.cve.org/CVERecord?id=CVE-2025-33231"],"published_time":"2026-01-20T18:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0906","summary":"Incorrect security UI  in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/467448811"],"published_time":"2026-01-20T05:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0907","summary":"Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/444653104"],"published_time":"2026-01-20T05:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0908","summary":"Use after free in ANGLE in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.14474,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/452209503"],"published_time":"2026-01-20T05:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0901","summary":"Inappropriate implementation in Blink in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/40057499"],"published_time":"2026-01-20T05:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0902","summary":"Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/469143679"],"published_time":"2026-01-20T05:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0903","summary":"Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59 allowed a remote attacker to bypass dangerous file type protections via a malicious file. (Chromium security severity: Medium)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11384,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/444803530"],"published_time":"2026-01-20T05:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0904","summary":"Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/452209495"],"published_time":"2026-01-20T05:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0905","summary":"Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/465466773"],"published_time":"2026-01-20T05:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0900","summary":"Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/465730465"],"published_time":"2026-01-20T05:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0899","summary":"Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html","https://issues.chromium.org/issues/458914193"],"published_time":"2026-01-20T05:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-23512","summary":"SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, there is a Untrusted Search Path vulnerability when Advanced Options setting is trigger. The application executes notepad.exe without specifying an absolute path when using the Advanced Options setting. On Windows, this allows execution of a malicious notepad.exe placed in the application's installation directory, leading to arbitrary code execution.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05309,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/sumatrapdfreader/sumatrapdf/commit/2762e02a8cd7cb779c934a44257aac56ab7de673","https://github.com/sumatrapdfreader/sumatrapdf/security/advisories/GHSA-rqg5-gj63-x4mv"],"published_time":"2026-01-14T21:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21287","summary":"Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13519,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb26-09.html"],"published_time":"2026-01-13T20:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21283","summary":"Bridge versions 15.1.2, 16.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb26-07.html"],"published_time":"2026-01-13T19:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21288","summary":"Illustrator versions 29.8.3, 30.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06529,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-03.html"],"published_time":"2026-01-13T19:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21304","summary":"InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-02.html"],"published_time":"2026-01-13T19:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21275","summary":"InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-02.html"],"published_time":"2026-01-13T19:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21276","summary":"InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-02.html"],"published_time":"2026-01-13T19:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21277","summary":"InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-02.html"],"published_time":"2026-01-13T19:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21278","summary":"InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08064,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb26-02.html"],"published_time":"2026-01-13T19:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21280","summary":"Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb26-03.html"],"published_time":"2026-01-13T19:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21281","summary":"InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb26-04.html"],"published_time":"2026-01-13T19:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21267","summary":"Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10748,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html"],"published_time":"2026-01-13T19:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21268","summary":"Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html"],"published_time":"2026-01-13T19:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21271","summary":"Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html"],"published_time":"2026-01-13T19:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21272","summary":"Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system write. An attacker could leverage this vulnerability to manipulate or inject malicious data into files on the system. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14617,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html"],"published_time":"2026-01-13T19:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21274","summary":"Dreamweaver Desktop versions 21.6 and earlier are affected by an Incorrect Authorization vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass security measures and execute unauthorized code. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16213,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb26-01.html"],"published_time":"2026-01-13T19:16:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69271","summary":"Insufficiently Protected Credentials vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Sniffing Attacks.This issue affects DX NetOps Spectrum: 24.3.13 and earlier.","cvss":2.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":2.3,"epss":0.00049,"ranking_epss":0.15199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69272","summary":"Cleartext Transmission of Sensitive Information vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Sniffing Attacks.This issue affects DX NetOps Spectrum: 21.2.1 and earlier.","cvss":5.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":5.3,"epss":0.0002,"ranking_epss":0.05416,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69273","summary":"Improper Authentication vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Authentication Bypass.This issue affects DX NetOps Spectrum: 24.3.10 and earlier.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":8.7,"epss":0.00079,"ranking_epss":0.23343,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69274","summary":"Authorization Bypass Through User-Controlled Key vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Privilege Escalation.This issue affects DX NetOps Spectrum: 24.3.10 and earlier.","cvss":2.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":2.3,"epss":0.00062,"ranking_epss":0.19171,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69275","summary":"Dependency on Vulnerable Third-Party Component vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows DOM-Based XSS.This issue affects DX NetOps Spectrum: 24.3.9 and earlier.","cvss":7.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":7.1,"epss":0.00041,"ranking_epss":0.1224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69276","summary":"Deserialization of Untrusted Data vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Object Injection.This issue affects DX NetOps Spectrum: 24.3.13 and earlier.","cvss":2.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":2.3,"epss":0.00228,"ranking_epss":0.45676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69268","summary":"Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Reflected XSS.This issue affects DX NetOps Spectrum: 24.3.8 and earlier.","cvss":5.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":5.3,"epss":0.00041,"ranking_epss":0.1224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69269","summary":"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows OS Command Injection.This issue affects DX NetOps Spectrum: 23.3.6 and earlier.","cvss":7.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":7.1,"epss":0.00158,"ranking_epss":0.36721,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69270","summary":"Information Exposure Through Query Strings in GET Request vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Session Hijacking.This issue affects DX NetOps Spectrum: 24.3.8 and earlier.","cvss":2.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":2.3,"epss":0.00067,"ranking_epss":0.20652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69267","summary":"Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Path Traversal.This issue affects DX NetOps Spectrum: 24.3.8 and earlier.","cvss":8.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":8.8,"epss":0.00068,"ranking_epss":0.20897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36756"],"published_time":"2026-01-12T05:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-21860","summary":"Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.","cvss":6.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":6.3,"epss":0.00022,"ranking_epss":0.05921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pallets/werkzeug/commit/7ae1d254e04a0c33e241ac1cca4783ce6c875ca3","https://github.com/pallets/werkzeug/security/advisories/GHSA-87hc-h4r5-73f7"],"published_time":"2026-01-08T19:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67825","summary":"An issue was discovered in Nitro PDF Pro for Windows before 14.42.0.34. In certain cases, it displays signer information from a non-verified PDF field rather than from the verified certificate subject. This could allow a document to present inconsistent signer details. The display logic was updated to ensure signer information consistently reflects the verified certificate identity.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":1e-05,"ranking_epss":2e-05,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gonitro.com","https://www.gonitro.com/documentation/release-notes"],"published_time":"2026-01-08T18:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69259","summary":"A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations.\r\n\r\nPlease note: authentication is not required in order to exploit this vulnerability..","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00621,"ranking_epss":0.70104,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0022071","https://success.trendmicro.com/ja-JP/solution/KA-0022081","https://www.tenable.com/security/research/tra-2026-01"],"published_time":"2026-01-08T13:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69260","summary":"A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations.\r\n\r\nPlease note: authentication is not required in order to exploit this vulnerability.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00533,"ranking_epss":0.67411,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0022071","https://success.trendmicro.com/ja-JP/solution/KA-0022081","https://www.tenable.com/security/research/tra-2026-01"],"published_time":"2026-01-08T13:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-69258","summary":"A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00632,"ranking_epss":0.70377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0022071","https://success.trendmicro.com/ja-JP/solution/KA-0022081","https://www.tenable.com/security/research/tra-2026-01"],"published_time":"2026-01-08T13:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12776","summary":"The Report Builder component of the application stores user input directly in a web page and displays it to other users, which raised concerns about a possible Cross-Site Scripting (XSS) attack. Proper management of this functionality helps ensure a secure and seamless user experience.  Although the user input is not validated in the report creation, these scripts are not executed when the report is run by end users. The script is executed when the report is modified through the report builder by a user with edit permissions. \n\n\n\n\nThe Report Builder is part of the WebConsole.  The WebConsole package is currently end of life, and is no longer maintained. We strongly recommend against installing or using it in any production environment. However, if you choose to install it, for example, to access functionality like the Report Builder, it must be deployed within a fully isolated network that has no access to sensitive data or internet connectivity. This is a critical security precaution, as the retired package may contain unpatched vulnerabilities and is no longer supported with updates or fixes.","cvss":1.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":1.8,"epss":0.0003,"ranking_epss":0.08561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://documentation.commvault.com/securityadvisories/CV_2025_06_3.html"],"published_time":"2026-01-07T22:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14614","summary":"Insecure Temporary File vulnerability in Altera Quartus Prime Standard \n\nInstaller (SFX)\n\n on Windows, Altera Quartus Prime Lite \n\nInstaller (SFX)\n\n on Windows allows Explore for Predictable Temporary File Names.This issue affects Quartus Prime Standard: from 23.1 through 24.1; Quartus Prime Lite: from 23.1 through 24.1.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00018,"ranking_epss":0.04323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0005"],"published_time":"2026-01-07T12:16:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14625","summary":"Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Standard on Windows (Nios II Command Shell modules), Altera Quartus Prime Lite on Windows (Nios II Command Shell modules) allows Search Order Hijacking.This issue affects Quartus Prime Standard: from 19.1 through 24.1; Quartus Prime Lite: from 19.1 through 24.1.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":6e-05,"ranking_epss":0.00365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://community.altera.com/kb/knowledge-base/how-to-mitigate-the-security-vulnerability-in-the-nios%C2%AE-ii-command-shell-utility/350185","https://www.altera.com/security/security-advisory/asa-0005"],"published_time":"2026-01-07T12:16:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14612","summary":"Insecure Temporary File vulnerability in Altera Quartus Prime Pro \n\nInstaller (SFX)\n\n on Windows allows : Use of Predictable File Names.This issue affects Quartus Prime Pro: from 24.1 through 25.1.1.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00018,"ranking_epss":0.04323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0004"],"published_time":"2026-01-07T02:03:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14596","summary":"Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Pro \n\nInstaller (SFX) \n\non Windows allows Search Order Hijacking.This issue affects Quartus Prime Pro: from 24.1 through 24.3.1.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00017,"ranking_epss":0.0394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0004"],"published_time":"2026-01-07T02:02:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14599","summary":"Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Standard \n\nInstaller (SFX)\n\non Windows, Altera Quartus Prime Lite \n\nInstaller (SFX)\n\n on Windows allows Search Order Hijacking.This issue affects Quartus Prime Standard: from 23.1 through 24.1; Quartus Prime Lite: from 23.1 through 24.1.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00017,"ranking_epss":0.0394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0005"],"published_time":"2026-01-07T02:02:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14605","summary":"Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Pro on Windows (System Console modules) allows Search Order Hijacking.This issue affects Quartus Prime Pro: from 17.0 through 25.1.1.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00017,"ranking_epss":0.0394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0004"],"published_time":"2026-01-07T02:02:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-57836","summary":"An issue was discovered in Samsung Magician 6.3.0 through 8.3.2 on Windows. The installer creates a temporary folder with weak permissions during installation, allowing a non-admin user to perform DLL hijacking and escalate privileges.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02451,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://semiconductor.samsung.com/support/quality-support/product-security-updates/","https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-57836/"],"published_time":"2026-01-05T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67709","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67710","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67711","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67704","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67705","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67706","summary":"ArcGIS Server versions 11.5 and earlier on Windows and Linux do not sufficiently validate uploaded files, enabling a remote unauthenticated attacker to upload arbitrary files to the server’s designated upload directories.\n\nHowever, the server’s architecture enforces controls that restrict uploaded files to non‑executable storage locations and prevent modification or replacement of existing application components or system configurations. Uploaded files cannot be executed, leveraged to escalate privileges, or used to access sensitive data.\n\nBecause the issue does not enable execution, service disruption, unauthorized access, or integrity compromise, its impact on confidentiality, integrity, and availability is low. Note that race conditions, secret values, or man‑in‑the‑middle conditions are required for exploitation.","cvss":5.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67707","summary":"ArcGIS Server versions 11.5 and earlier on Windows and Linux do not sufficiently validate uploaded files, enabling a remote unauthenticated attacker to upload arbitrary files to the server’s designated upload directories.\n\nHowever, the server’s architecture enforces controls that restrict uploaded files to non‑executable storage locations and prevent modification or replacement of existing application components or system configurations. Uploaded files cannot be executed, leveraged to escalate privileges, or used to access sensitive data.\n\nBecause the issue does not enable execution, service disruption, unauthorized access, or integrity compromise, its impact on confidentiality, integrity, and availability is low. Note that race conditions, secret values, or man‑in‑the‑middle conditions are required for exploitation.","cvss":5.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00293,"ranking_epss":0.52725,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67708","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-67703","summary":"There is a stored cross site scripting issue in Esri ArcGIS Server 11.4 and earlier on Windows and Linux that in some configurations allows a remote unauthenticated attacker to store files that contain malicious code that may execute in the context of a victim’s browser.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-2-patch"],"published_time":"2025-12-31T23:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-58315","summary":"Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.","cvss":8.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.5,"epss":0.00016,"ranking_epss":0.03642,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://packetstormsecurity.com/files/177260/","https://www.tosi.net/","https://www.vulncheck.com/advisories/tosibox-key-service-local-privilege-escalation-via-unquoted-service-path","https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php","https://www.zeroscience.mk/en/vulnerabilities/ZSL-2024-5812.php"],"published_time":"2025-12-30T23:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66723","summary":"inMusic Brands Engine DJ before 4.3.4 suffers from Insecure Permissions due to exposed HTTP service in the Remote Library, which allows attackers to access all files and network paths.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05939,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/audiopump/cve-2025-66723","https://www.inmusicbrands.com/"],"published_time":"2025-12-30T21:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66499","summary":"A heap-based buffer overflow vulnerability exists in the PDF parsing of Foxit PDF Reader when processing specially crafted JBIG2 data. An integer overflow in the calculation of the image buffer size may occur, potentially allowing a remote attacker to execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.17046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66494","summary":"A use-after-free vulnerability exists in the PDF file parsing of Foxit PDF Reader before 2025.2.1, 14.0.1, and 13.2.1 on Windows. A PDF object managed by multiple parent objects could be freed while still being referenced, potentially allowing a remote attacker to execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.1861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66495","summary":"A use-after-free vulnerability exists in the annotation handling of Foxit PDF Reader before 2025.2.1, 14.0.1, and 13.2.1 on Windows and MacOS. When opening a PDF containing specially crafted JavaScript, a pointer to memory that has already been freed may be accessed or dereferenced, potentially allowing a remote attacker to execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.1861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66496","summary":"A memory corruption vulnerability exists in the 3D annotation handling of Foxit PDF Reader due to insufficient bounds checking when parsing PRC data. When opening a PDF file containing malformed or specially crafted PRC content, out-of-bounds memory access may occur, resulting in memory corruption.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66497","summary":"A memory corruption vulnerability exists in the 3D annotation handling of Foxit PDF Reader due to insufficient bounds checking when parsing PRC data. When opening a PDF file containing malformed or specially crafted PRC content, out-of-bounds memory access may occur, resulting in memory corruption.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66498","summary":"A memory corruption vulnerability exists in the 3D annotation handling of Foxit PDF Reader due to insufficient bounds checking when parsing U3D data. When opening a PDF file containing malformed or specially crafted PRC content, out-of-bounds memory access may occur, resulting in memory corruption.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.05265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66493","summary":"A use-after-free vulnerability exists in the AcroForm handling of Foxit PDF Reader and Foxit PDF Editor before 2025.2.1,14.0.1 and 13.2.1 \n\non Windows\n\n. When opening a PDF containing specially crafted JavaScript, a pointer to memory that has already been freed may be accessed or dereferenced, potentially allowing a remote attacker to execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.1861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T07:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13941","summary":"A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor Update Service. During plugin installation, incorrect file system permissions are assigned to resources used by the update service. A local attacker with low privileges could modify or replace these resources, which are later executed by the service, resulting in execution of arbitrary code with SYSTEM privileges.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-19T02:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53000","summary":"The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. This issue has been patched in version 7.17.0.","cvss":8.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.5,"epss":0.00016,"ranking_epss":0.03418,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/jupyter/nbconvert/blob/4f61702f5c7524d8a3c4ac0d5fc33a6ac2fa36a7/nbconvert/preprocessors/svg2pdf.py#L104","https://github.com/jupyter/nbconvert/commit/c9ac1d1040459ed1ff9eb34e9918ce5a87cf9d71","https://github.com/jupyter/nbconvert/issues/2258","https://github.com/jupyter/nbconvert/releases/tag/v7.17.0","https://github.com/jupyter/nbconvert/security/advisories/GHSA-xm59-rqc7-hhvf","https://www.imperva.com/blog/code-execution-in-jupyter-notebook-exports","https://www.imperva.com/blog/code-execution-in-jupyter-notebook-exports"],"published_time":"2025-12-17T21:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14765","summary":"Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0018,"ranking_epss":0.39629,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/448294721"],"published_time":"2025-12-16T23:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14766","summary":"Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/466786677"],"published_time":"2025-12-16T23:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-68154","summary":"systeminformation is a System and OS information library for node.js. In versions prior to 5.27.14, the `fsSize()` function in systeminformation is vulnerable to OS command injection on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. The actual exploitability depends on how applications use this function. If an application does not pass user-controlled input to `fsSize()`, it is not vulnerable. Version 5.27.14 contains a patch.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21766,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/sebhildebrandt/systeminformation/commit/c52f9fd07fef42d2d8e8c66f75b42178da701c68","https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-wphj-fx3q-84ch"],"published_time":"2025-12-16T19:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14373","summary":"Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/461532432"],"published_time":"2025-12-12T20:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14174","summary":"Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01047,"ranking_epss":0.77536,"kev":true,"propose_action":"Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/466192044","https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-14174"],"published_time":"2025-12-12T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-14372","summary":"Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20622,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html","https://issues.chromium.org/issues/460599518"],"published_time":"2025-12-12T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13665","summary":"The System Console Utility for Windows is vulnerable to a DLL planting vulnerability","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00025,"ranking_epss":0.06771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0002"],"published_time":"2025-12-12T03:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13669","summary":"Uncontrolled Search Path Element vulnerability in Altera High Level Synthesis Compiler on Windows allows Search Order Hijacking.This issue affects High Level Synthesis Compiler: from 19.1 through 24.3.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00028,"ranking_epss":0.07782,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0003"],"published_time":"2025-12-12T03:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13670","summary":"The High Level Synthesis Compiler i++ command for Windows is vulnerable to a DLL planting vulnerability","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00025,"ranking_epss":0.06771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0003"],"published_time":"2025-12-12T03:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13668","summary":"A potential security vulnerability in Quartus® Prime Pro Edition Design Software may allow escalation of privilege.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00025,"ranking_epss":0.06771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0001"],"published_time":"2025-12-11T22:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13663","summary":"Under certain circumstances, the Quartus Prime Pro Installer for Windows does not check the permissions of the Quartus target installation directory if the target installation directory already exists.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00019,"ranking_epss":0.04886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0001"],"published_time":"2025-12-11T21:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13664","summary":"A potential security vulnerability in Quartus® Prime Standard Edition Design Software may allow escalation of privilege.","cvss":5.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":5.4,"epss":0.00025,"ranking_epss":0.06771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.altera.com/security/security-advisory/asa-0002"],"published_time":"2025-12-11T21:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59803","summary":"Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59802","summary":"Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.1018,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55307","summary":"An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. Opening a malicious PDF containing a crafted JavaScript call to search.query() with a crafted cDIPath parameter (e.g., \"/\") may cause an out-of-bounds read in internal path-parsing logic, potentially leading to information disclosure or memory corruption.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55308","summary":"An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. A crafted PDF containing JavaScript that calls closeDoc() while internal objects are still in use can cause premature release of these objects. This use-after-free vulnerability may lead to memory corruption, potentially resulting in information disclosure when the PDF is opened.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55309","summary":"An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. A crafted PDF can contain JavaScript that attaches an OnBlur action on a form field that destroys an annotation. During user right-click interaction, the program's internal focus change handling prematurely releases the annotation object, resulting in a use-after-free vulnerability that may cause memory corruption or application crashes.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55310","summary":"An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. An attacker able to alter or replace the static HTML files used by the StartPage feature can cause the application to load malicious or compromised content upon startup. This may result in information disclosure, unauthorized data access, or other security impacts.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":6e-05,"ranking_epss":0.00387,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55311","summary":"An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. A crafted PDF can use JavaScript to alter annotation content and subsequently clear the file's modification status via JavaScript interfaces. This circumvents digital signature verification by hiding document modifications, allowing an attacker to mislead users about the document's integrity and compromise the trustworthiness of signed PDFs.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02939,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55312","summary":"An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. When pages in a PDF are deleted via JavaScript, the application may fail to properly update internal states. Subsequent annotation management operations assume these states are valid, causing dereference of invalid or released memory. This can lead to memory corruption, application crashes, and potentially allow an attacker to execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02605,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55313","summary":"An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. They allow potential arbitrary code execution when processing crafted PDF files. The vulnerability stems from insufficient handling of memory allocation failures after assigning an extremely large value to a form field's charLimit property via JavaScript. This can result in memory corruption and may allow an attacker to execute arbitrary code by persuading a user to open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00018,"ranking_epss":0.04463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55314","summary":"An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. When pages in a PDF are deleted via JavaScript, the application may fail to properly update internal states. Subsequent annotation management operations assume these states are valid, causing dereference of invalid or released memory. This can lead to memory corruption, application crashes, and potentially allow an attacker to execute arbitrary code.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02605,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html"],"published_time":"2025-12-11T16:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-44016","summary":"A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.28988,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/"],"published_time":"2025-12-11T12:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-46266","summary":"A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to coerce the service into transmitting data to an arbitrary internal IP address, potentially leaking sensitive information.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0007,"ranking_epss":0.215,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/"],"published_time":"2025-12-11T12:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12687","summary":"A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to cause a denial of service (application crash) via a crafted command, resulting in service termination.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0009,"ranking_epss":0.25524,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/"],"published_time":"2025-12-11T12:16:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64786","summary":"Acrobat Reader versions 24.001.30264, 20.005.30793, 25.001.20982, 24.001.30273, 20.005.30803 and earlier are affected by an Improper Verification of Cryptographic Signature vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to gain limited unauthorized write access. Exploitation of this issue does not require user interaction.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08047,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-119.html"],"published_time":"2025-12-09T21:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64787","summary":"Acrobat Reader versions 24.001.30264, 20.005.30793, 25.001.20982, 24.001.30273, 20.005.30803 and earlier are affected by an Improper Verification of Cryptographic Signature vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass cryptographic protections and gain limited unauthorized write access. Exploitation of this issue does not require user interaction.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08047,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-119.html"],"published_time":"2025-12-09T21:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64899","summary":"Acrobat Reader versions 24.001.30264, 20.005.30793, 25.001.20982, 24.001.30273, 20.005.30803 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-119.html"],"published_time":"2025-12-09T21:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64785","summary":"Acrobat Reader versions 24.001.30264, 20.005.30793, 25.001.20982, 24.001.30273, 20.005.30803 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue does not require user interaction.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00056,"ranking_epss":0.17539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-119.html"],"published_time":"2025-12-09T21:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64783","summary":"DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html"],"published_time":"2025-12-09T18:16:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64784","summary":"DNG SDK versions 1.7.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure or application denial of service. An attacker could leverage this vulnerability to disclose sensitive memory information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12289,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html"],"published_time":"2025-12-09T18:16:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64893","summary":"DNG SDK versions 1.7.0 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure or application denial of service. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00055,"ranking_epss":0.17325,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html"],"published_time":"2025-12-09T18:16:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64894","summary":"DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this issue to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09973,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html"],"published_time":"2025-12-09T18:16:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13992","summary":"Side-channel information leakage in Navigation and Loading in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/40095391"],"published_time":"2025-12-03T19:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-20386","summary":"In Splunk Enterprise for Windows versions below 10.0.2, 9.4.6, 9.3.8, and 9.2.10, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Splunk Enterprise for Windows Installation directory. This lets non-administrator users on the machine access the directory and all its contents.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13836,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://advisory.splunk.com/advisories/SVD-2025-1205"],"published_time":"2025-12-03T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13751","summary":"Interactive service agent in OpenVPN version 2.5.0 through 2.6.16 and 2.7_alpha1 through 2.7_rc2 on Windows allows a local authenticated user to connect to the service and trigger an error causing a local denial of service.","cvss":1.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":1.3,"epss":0.00037,"ranking_epss":0.10768,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://community.openvpn.net/Security%20Announcements/CVE-2025-13751","https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00153.html","https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00154.html"],"published_time":"2025-12-03T17:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66476","summary":"Vim is an open source, command line text editor. Prior to version 9.1.1947, an uncontrolled search path vulnerability on Windows allows Vim to execute malicious executables placed in the current working directory for the current edited file. On Windows, when using cmd.exe as a shell, Vim resolves external commands by searching the current working directory before system paths. When Vim invokes tools such as findstr for :grep, external commands or filters via :!, or compiler/:make commands, it may inadvertently run a malicious executable present in the same directory as the file being edited. The issue affects Vim for Windows prior to version 9.1.1947.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.0726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/vim/vim/commit/083ec6d9a3b7b09006e0ce69ac802597d25","https://github.com/vim/vim/releases/tag/v9.1.1947","https://github.com/vim/vim/security/advisories/GHSA-g77q-xrww-p834","http://www.openwall.com/lists/oss-security/2025/12/02/5"],"published_time":"2025-12-02T22:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64298","summary":"NMIS/BioDose V22.02 and previous version installations where the embedded Microsoft SQLServer Express is used are exposed in the Windows share accessed by clients in networked installs. By default, this directory has insecure directory paths that allow access to the SQL Server database and configuration files, which can contain sensitive data.","cvss":8.6,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":8.6,"epss":0.00046,"ranking_epss":0.13873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-336-01"],"published_time":"2025-12-02T21:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13634","summary":"Inappropriate implementation in Downloads in Google Chrome on Windows prior to 143.0.7499.41 allowed a local attacker to bypass mark of the web via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":9e-05,"ranking_epss":0.00811,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/429140219"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13635","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 143.0.7499.41 allowed a local attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.0001,"ranking_epss":0.01115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/405727341"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13636","summary":"Inappropriate implementation in Split View in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted domain name. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.317,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/446181124"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13637","summary":"Inappropriate implementation in Downloads in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass download protections via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10534,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/392375329"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13638","summary":"Use after free in Media Stream in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00196,"ranking_epss":0.41522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/448046109"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13639","summary":"Inappropriate implementation in WebRTC in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Low)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16765,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/448408148"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13640","summary":"Inappropriate implementation in Passwords in Google Chrome prior to 143.0.7499.41 allowed a local attacker to bypass authentication via physical access to the device. (Chromium security severity: Low)","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.0002,"ranking_epss":0.0525,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/452071826"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13720","summary":"Bad cast in Loader in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.3502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/457818670"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13721","summary":"Race in v8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00111,"ranking_epss":0.29552,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/355120682"],"published_time":"2025-12-02T19:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13631","summary":"Inappropriate implementation in Google Updater in Google Chrome on Mac prior to 143.0.7499.41 allowed a remote attacker to perform privilege escalation via a crafted file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/448113221"],"published_time":"2025-12-02T19:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13632","summary":"Inappropriate implementation in DevTools in Google Chrome prior to 143.0.7499.41 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. (Chromium security severity: High)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08752,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/439058242"],"published_time":"2025-12-02T19:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13633","summary":"Use after free in Digital Credentials in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00196,"ranking_epss":0.41522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/458082926"],"published_time":"2025-12-02T19:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13630","summary":"Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.3502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/456547591"],"published_time":"2025-12-02T19:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3500","summary":"Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.","cvss":9.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.gendigital.com/us/en/contact-us/security-advisories/"],"published_time":"2025-12-01T16:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-66221","summary":"Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.4, Werkzeug's safe_join function allows path segments with Windows device names. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been patched in version 3.1.4.","cvss":6.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":6.3,"epss":0.00032,"ranking_epss":0.09101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pallets/werkzeug/commit/4b833376a45c323a189cd11d2362bcffdb1c0c13","https://github.com/pallets/werkzeug/releases/tag/3.1.4","https://github.com/pallets/werkzeug/security/advisories/GHSA-hgf8-39gv-g3f2"],"published_time":"2025-11-29T03:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64695","summary":"Uncontrolled search path element issue exists in the installer of LogStare Collector (for Windows). If exploited, arbitrary code may be executed with the privilege of the user invoking the installer.","cvss":8.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.4,"epss":0.0003,"ranking_epss":0.08565,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://jvn.jp/en/jp/JVN77560819/","https://www.logstare.com/vulnerability/2025-001/"],"published_time":"2025-11-21T07:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61949","summary":"LogStare Collector contains a stored cross-site scripting vulnerability in UserManagement. If crafted user information is stored, an arbitrary script may be executed on the web browser of the user who logs in to the product's management page.","cvss":4.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":4.8,"epss":0.00054,"ranking_epss":0.16832,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://jvn.jp/en/jp/JVN77560819/","https://www.logstare.com/vulnerability/2025-001/"],"published_time":"2025-11-21T07:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62189","summary":"LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.","cvss":5.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":5.3,"epss":0.00056,"ranking_epss":0.17412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://jvn.jp/en/jp/JVN77560819/","https://www.logstare.com/vulnerability/2025-001/"],"published_time":"2025-11-21T07:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62687","summary":"Cross-site request forgery vulnerability exists in LogStare Collector. If a user views a crafted page while logged, unintended operations may be performed.","cvss":6.9,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":6.9,"epss":0.0003,"ranking_epss":0.08443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://jvn.jp/en/jp/JVN77560819/","https://www.logstare.com/vulnerability/2025-001/"],"published_time":"2025-11-21T07:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64299","summary":"LogStare Collector improperly handles the password hash data. An administrative user may obtain the other users' password hashes.","cvss":6.9,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":6.9,"epss":0.00052,"ranking_epss":0.16184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://jvn.jp/en/jp/JVN77560819/","https://www.logstare.com/vulnerability/2025-001/"],"published_time":"2025-11-21T07:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58097","summary":"The installation directory of LogStare Collector is configured with incorrect access permissions. A non-administrative user may manipulate files within the installation directory and execute arbitrary code with the administrative privilege.","cvss":6.8,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":6.8,"epss":0.00017,"ranking_epss":0.03903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://jvn.jp/en/jp/JVN77560819/","https://www.logstare.com/vulnerability/2025-001/"],"published_time":"2025-11-21T07:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11001","summary":"7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00231,"ranking_epss":0.46015,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.zerodayinitiative.com/advisories/ZDI-25-949/"],"published_time":"2025-11-19T22:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13316","summary":"Twonky Server 8.5.2 on Linux and Windows is vulnerable to a cryptographic flaw, use of hard-coded cryptographic keys. An attacker with knowledge of the encrypted administrator password can decrypt the value with static keys to view the plain text password and gain administrator-level access to Twonky Server.","cvss":8.2,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":8.2,"epss":0.67294,"ranking_epss":0.9857,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.rapid7.com/blog/post/cve-2025-13315-cve-2025-13316-critical-twonky-server-authentication-bypass-not-fixed/"],"published_time":"2025-11-19T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13315","summary":"Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":9.3,"epss":0.81601,"ranking_epss":0.99186,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.rapid7.com/blog/post/cve-2025-13315-cve-2025-13316-critical-twonky-server-authentication-bypass-not-fixed/"],"published_time":"2025-11-19T18:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13229","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2219,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/446113731"],"published_time":"2025-11-18T00:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13230","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00096,"ranking_epss":0.26534,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/446124892"],"published_time":"2025-11-18T00:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13226","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00096,"ranking_epss":0.26534,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/446113732"],"published_time":"2025-11-18T00:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13227","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2219,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/446122633"],"published_time":"2025-11-18T00:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13228","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.2219,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/446124893"],"published_time":"2025-11-18T00:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13224","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00066,"ranking_epss":0.20485,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html","https://issues.chromium.org/issues/450328966"],"published_time":"2025-11-17T23:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13223","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02804,"ranking_epss":0.86144,"kev":true,"propose_action":"Google Chromium V8 contains a type confusion vulnerability that allows for heap corruption.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html","https://issues.chromium.org/issues/460017370","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-13223"],"published_time":"2025-11-17T23:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9479","summary":"Out of bounds read in V8 in Google Chrome prior to 133.0.6943.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.22139,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_25.html","https://issues.chromium.org/issues/390743124"],"published_time":"2025-11-14T03:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13097","summary":"Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html","https://issues.chromium.org/issues/402791076"],"published_time":"2025-11-14T03:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13107","summary":"Inappropriate implementation in Compositing in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22399,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/429440615"],"published_time":"2025-11-14T03:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-13178","summary":"Inappropriate implementation in Fullscreen in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22399,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/40068607"],"published_time":"2025-11-14T03:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-7017","summary":"Inappropriate implementation in DevTools in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00079,"ranking_epss":0.23397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/338248595"],"published_time":"2025-11-14T03:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-7021","summary":"Inappropriate implementation in Autofill in Google Chrome on Windows prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","https://issues.chromium.org/issues/40064701"],"published_time":"2025-11-14T03:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12763","summary":"pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09023,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/pgadmin-org/pgadmin4/issues/9323"],"published_time":"2025-11-13T13:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13042","summary":"Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.166 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_11.html","https://issues.chromium.org/issues/457351015"],"published_time":"2025-11-12T17:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64531","summary":"Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html"],"published_time":"2025-11-11T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61833","summary":"Substance3D - Stager versions 3.1.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html"],"published_time":"2025-11-11T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61834","summary":"Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html"],"published_time":"2025-11-11T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61835","summary":"Substance3D - Stager versions 3.1.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html"],"published_time":"2025-11-11T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61831","summary":"Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-109.html"],"published_time":"2025-11-11T18:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61819","summary":"Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/photoshop/apsb25-108.html"],"published_time":"2025-11-11T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61820","summary":"Illustrator versions 28.7.10, 29.8.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-109.html"],"published_time":"2025-11-11T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61815","summary":"InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-106.html"],"published_time":"2025-11-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61816","summary":"InCopy versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-107.html"],"published_time":"2025-11-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61817","summary":"InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-107.html"],"published_time":"2025-11-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61818","summary":"InCopy versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-107.html"],"published_time":"2025-11-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61824","summary":"InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-106.html"],"published_time":"2025-11-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61832","summary":"InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-106.html"],"published_time":"2025-11-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61814","summary":"InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07735,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-106.html"],"published_time":"2025-11-11T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33202","summary":"NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where an attacker could cause a stack overflow by sending extra-large payloads. A successful exploit of this vulnerability might lead to denial of service.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00062,"ranking_epss":0.19366,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-33202","https://nvidia.custhelp.com/app/answers/detail/a_id/5723","https://www.cve.org/CVERecord?id=CVE-2025-33202"],"published_time":"2025-11-11T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-13032","summary":"Double fetch in sandbox kernel driver in Avast/AVG Antivirus <25.3  on windows allows local attacker to escalate privelages via pool overflow.","cvss":9.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.9,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.0821,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.gendigital.com/us/en/contact-us/security-advisories/"],"published_time":"2025-11-11T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12443","summary":"Out of bounds read in WebXR in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05562,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/452071845"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12444","summary":"Incorrect security UI in Fullscreen UI in Google Chrome prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/390571618"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12445","summary":"Policy bypass in Extensions in Google Chrome prior to 142.0.7444.59 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03081,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/428397712"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12446","summary":"Incorrect security UI in SplitView in Google Chrome prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted domain name. (Chromium security severity: Low)","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00055,"ranking_epss":0.17115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/444932667"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12725","summary":"Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24979,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/443906252"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12726","summary":"Inappropriate implementation in Views in Google Chrome on Windows prior to 142.0.7444.137 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25783,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/447172715"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12727","summary":"Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/454485895"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12728","summary":"Inappropriate implementation in Omnibox in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00055,"ranking_epss":0.17115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/452392032"],"published_time":"2025-11-10T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12434","summary":"Race in Storage in Google Chrome on Windows prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12291,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/337356054"],"published_time":"2025-11-10T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12436","summary":"Policy bypass in Extensions in Google Chrome prior to 142.0.7444.59 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension. (Chromium security severity: Medium)","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.0233,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/40054742"],"published_time":"2025-11-10T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12437","summary":"Use after free in PageInfo in Google Chrome prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.25225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/446294487"],"published_time":"2025-11-10T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12439","summary":"Inappropriate implementation in App-Bound Encryption in Google Chrome on Windows prior to 142.0.7444.59 allowed a local attacker to obtain potentially sensitive information from process memory via a malicious file. (Chromium security severity: Medium)","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":3e-05,"ranking_epss":0.00061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/382234536"],"published_time":"2025-11-10T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12440","summary":"Inappropriate implementation in Autofill in Google Chrome prior to 142.0.7444.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Low)","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06897,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/430555440"],"published_time":"2025-11-10T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12441","summary":"Out of bounds read in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.06021,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/444049512"],"published_time":"2025-11-10T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12430","summary":"Object lifecycle issue in Media in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.11012,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/442860743"],"published_time":"2025-11-10T20:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12431","summary":"Inappropriate implementation in Extensions in Google Chrome prior to 142.0.7444.59 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: High)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04171,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/436887350"],"published_time":"2025-11-10T20:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12432","summary":"Race in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15567,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/439522866"],"published_time":"2025-11-10T20:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12433","summary":"Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00016,"ranking_epss":0.03506,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/449760249"],"published_time":"2025-11-10T20:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12429","summary":"Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12092,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/450618029"],"published_time":"2025-11-10T20:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12428","summary":"Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16842,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_28.html","https://issues.chromium.org/issues/447613211"],"published_time":"2025-11-10T20:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12905","summary":"Inappropriate implementation in Downloads in Google Chrome on Windows prior to 140.0.7339.80 allowed a remote attacker to bypass Mark of the Web via a crafted HTML page. (Chromium security severity: Low)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00012,"ranking_epss":0.01483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/431309019"],"published_time":"2025-11-08T00:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11458","summary":"Heap buffer overflow in Sync in Google Chrome prior to 141.0.7390.65 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.13099,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/443196747"],"published_time":"2025-11-06T23:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11460","summary":"Use after free in Storage in Google Chrome prior to 141.0.7390.65 allowed a remote attacker to execute arbitrary code via a crafted video file. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/446722008"],"published_time":"2025-11-06T23:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11756","summary":"Use after free in Safe Browsing in Google Chrome prior to 141.0.7390.107 allowed a remote attacker who had compromised the renderer process to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27649,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_14.html","https://issues.chromium.org/issues/447192722"],"published_time":"2025-11-06T23:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-12036","summary":"Out of bounds memory access in V8 in Google Chrome prior to 141.0.7390.122 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22334,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_21.html","https://issues.chromium.org/issues/452296415"],"published_time":"2025-11-06T23:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11211","summary":"Out of bounds read in Media in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11203,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/441917796"],"published_time":"2025-11-06T22:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11212","summary":"Inappropriate implementation in Media in Google Chrome on Windows prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.28991,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/420734141"],"published_time":"2025-11-06T22:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11215","summary":"Off by one error in V8 in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11429,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/439758498"],"published_time":"2025-11-06T22:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11219","summary":"Use after free in V8 in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Low)","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/439772737"],"published_time":"2025-11-06T22:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11205","summary":"Heap buffer overflow in WebGPU in Google Chrome prior to 141.0.7390.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26277,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/442444724"],"published_time":"2025-11-06T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11206","summary":"Heap buffer overflow in Video in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26276,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/444755026"],"published_time":"2025-11-06T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11207","summary":"Side-channel information leakage in Storage in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/428189824"],"published_time":"2025-11-06T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11208","summary":"Inappropriate implementation in Media in Google Chrome prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00047,"ranking_epss":0.14212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/397878997"],"published_time":"2025-11-06T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11210","summary":"Side-channel information leakage in Tab in Google Chrome prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05776,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/440523110"],"published_time":"2025-11-06T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33131","summary":"IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7249336"],"published_time":"2025-10-28T00:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33132","summary":"IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of the size of the data that is being pointed to.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7249336"],"published_time":"2025-10-28T00:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33133","summary":"IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due an out of bounds write.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7249336"],"published_time":"2025-10-28T00:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33126","summary":"IBM DB2 High Performance Unload 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, 5.1, 6.1.0.3, 5.1.0.1, 6.1.0.2, 6.5, 6.5.0.0 IF1, 6.1.0.1, 6.1, and 5.1 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12117,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7249336"],"published_time":"2025-10-28T00:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-57870","summary":"A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 and 11.5 on Windows, Linux and Kubernetes. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary SQL commands via a specific ArcGIS Feature Service operation. Successful exploitation can potentially result in unauthorized access, modification, or deletion of data from the underlying Enterprise Geodatabase.","cvss":10.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":null,"epss":0.00169,"ranking_epss":0.38107,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-feature-services-security-patch"],"published_time":"2025-10-22T15:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36128","summary":"IBM MQ 9.1, 9.2, 9.3, 9.4 LTS and 9.3, 9.4 CD is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.2958,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7244480"],"published_time":"2025-10-16T17:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36002","summary":"IBM Sterling B2B Integrator 6.2.0.0 through 6.2.0.5, and 6.2.1.0 and IBM Sterling File Gateway 6.2.0.0 through 6.2.0.5, and 6.2.1.0 stores user credentials in configuration files which can be read by a local user.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00011,"ranking_epss":0.01265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7248129"],"published_time":"2025-10-16T15:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53951","summary":"An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and  11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to LocalService via sending a crafted request to a local listening port.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08526,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://fortiguard.fortinet.com/psirt/FG-IR-25-628"],"published_time":"2025-10-16T14:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-46752","summary":"A insertion of sensitive information into log file in Fortinet FortiDLP 12.0.0 through 12.0.5, 11.5.1, 11.4.6, 11.4.5 allows attacker to information disclosure via re-using the enrollment code.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.05064,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://fortiguard.fortinet.com/psirt/FG-IR-25-160"],"published_time":"2025-10-16T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53950","summary":"An Exposure of Private Personal Information ('Privacy Violation') vulnerability [CWE-359] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user's email information.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00013,"ranking_epss":0.02278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://fortiguard.fortinet.com/psirt/FG-IR-25-639"],"published_time":"2025-10-16T14:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54268","summary":"Bridge versions 14.1.8, 15.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb25-96.html"],"published_time":"2025-10-15T02:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54278","summary":"Bridge versions 14.1.8, 15.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb25-96.html"],"published_time":"2025-10-15T02:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54269","summary":"Animate versions 23.0.13, 24.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-97.html"],"published_time":"2025-10-15T01:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54270","summary":"Animate versions 23.0.13, 24.0.10 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive memory information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.05916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-97.html"],"published_time":"2025-10-15T01:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54279","summary":"Animate versions 23.0.13, 24.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-97.html"],"published_time":"2025-10-15T01:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61804","summary":"Animate versions 23.0.13, 24.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-97.html"],"published_time":"2025-10-15T01:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54196","summary":"Adobe Connect versions 12.9 and earlier are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An attacker could leverage this vulnerability to redirect users to malicious websites.  Exploitation of this issue requires user interaction in that a victim must click on a crafted link.","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/connect/apsb25-70.html"],"published_time":"2025-10-14T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49552","summary":"Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a high-privileged attacker to execute malicious scripts in a victim's browser. Exploitation of this issue requires user interaction in that a victim must navigate to a crafted web page. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Scope is changed.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00078,"ranking_epss":0.23313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/connect/apsb25-70.html"],"published_time":"2025-10-14T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49553","summary":"Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by an attacker to execute malicious scripts in a victim's browser. Exploitation of this issue requires user interaction in that a victim must navigate to a crafted web page. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Scope is changed.","cvss":9.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.3,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24615,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/connect/apsb25-70.html"],"published_time":"2025-10-14T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61805","summary":"Substance3D - Stager versions 3.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-104.html"],"published_time":"2025-10-14T20:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61806","summary":"Substance3D - Stager versions 3.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-104.html"],"published_time":"2025-10-14T20:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61807","summary":"Substance3D - Stager versions 3.1.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-104.html"],"published_time":"2025-10-14T20:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61799","summary":"Dimension versions 4.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-103.html"],"published_time":"2025-10-14T20:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61800","summary":"Dimension versions 4.1.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-103.html"],"published_time":"2025-10-14T20:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61801","summary":"Dimension versions 4.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-103.html"],"published_time":"2025-10-14T20:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61802","summary":"Substance3D - Stager versions 3.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-104.html"],"published_time":"2025-10-14T20:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61803","summary":"Substance3D - Stager versions 3.1.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-104.html"],"published_time":"2025-10-14T20:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61798","summary":"Dimension versions 4.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-103.html"],"published_time":"2025-10-14T20:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54282","summary":"Adobe Framemaker versions 2020.9, 2022.7 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-101.html"],"published_time":"2025-10-14T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54283","summary":"Illustrator versions 29.7, 28.7.9 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-102.html"],"published_time":"2025-10-14T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54284","summary":"Illustrator versions 29.7, 28.7.9 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-102.html"],"published_time":"2025-10-14T20:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54281","summary":"Adobe Framemaker versions 2020.9, 2022.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-101.html"],"published_time":"2025-10-14T20:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55248","summary":"Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"],"published_time":"2025-10-14T17:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27906","summary":"IBM Content Navigator 3.0.11, 3.0.15, 3.1.0, and 3.2.0 could expose the directory listing of the application upon using an application URL. Application files and folders are visible in the browser to a user; however, the contents of the files cannot be read obtained or modified.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08643,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247854"],"published_time":"2025-10-14T15:16:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-11719","summary":"Starting in Thunderbird 143, the use of the native messaging API by web extensions on Windows could lead to crashes caused by use-after-free memory corruption. This vulnerability was fixed in Firefox 144 and Thunderbird 144.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.19,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://bugzilla.mozilla.org/show_bug.cgi?id=1991950","https://www.mozilla.org/security/advisories/mfsa2025-81/","https://www.mozilla.org/security/advisories/mfsa2025-84/"],"published_time":"2025-10-14T13:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-2138","summary":"IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 \n\ncould allow an authenticated user on the network to delete comments from other users due to client-side enforcement of server-side security.","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247716"],"published_time":"2025-10-12T14:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-2139","summary":"IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to delete reviews from other users due to client-side enforcement of server-side security.","cvss":3.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12647,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247716"],"published_time":"2025-10-12T14:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-2140","summary":"IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user on the network to spoof email identity of the sender due to improper verification of source data.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":8e-05,"ranking_epss":0.00683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247716"],"published_time":"2025-10-12T14:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33096","summary":"IBM Engineering Requirements Management Doors Next 7.0.2, 7.0.3, and 7.1 could allow an authenticated user to cause a denial of service by uploading specially crafted files using uncontrolled recursion.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13674,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247716"],"published_time":"2025-10-12T14:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36171","summary":"IBM Aspera Faspex 5.0.0 through 5.0.13.1 could allow a privileged user to cause a denial of service from improperly validated API input due to excessive resource consumption.","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20139,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247502"],"published_time":"2025-10-09T14:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36225","summary":"IBM Aspera 5.0.0 through 5.0.13.1 \n\ncould disclose sensitive user information from the system to an authenticated user due to an observable discrepancy of returned data.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0003,"ranking_epss":0.08555,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247502"],"published_time":"2025-10-09T14:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-37401","summary":"IBM Aspera Faspex 5.0.0 through 5.0.13.1 uses a cross-domain policy file that includes domains that should not be trusted.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08823,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7247502"],"published_time":"2025-10-09T14:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-61787","summary":"Deno is a JavaScript, TypeScript, and WebAssembly runtime. Versions prior to 2.5.3 and 2.2.15 are vulnerable to Command Line Injection attacks on Windows when batch files are executed. In Windows, ``CreateProcess()`` always implicitly spawns ``cmd.exe`` if a batch file (.bat, .cmd, etc.) is being executed even if the application does not specify it via the command line. This makes Deno vulnerable to a command injection attack on Windows. Versions 2.5.3 and 2.2.15 fix the issue.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31763,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/denoland/deno/commit/8a0990ccd37bafd8768176ca64b906ba2da2d822","https://github.com/denoland/deno/pull/30818","https://github.com/denoland/deno/releases/tag/v2.2.15","https://github.com/denoland/deno/releases/tag/v2.5.3","https://github.com/denoland/deno/security/advisories/GHSA-m2gf-x3f6-8hq3"],"published_time":"2025-10-08T02:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59489","summary":"Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02929,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/","https://unity.com/security#security-updates-and-patches","https://unity.com/security/sept-2025-01"],"published_time":"2025-10-03T14:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23355","summary":"NVIDIA Nsight Graphics for Windows contains a vulnerability in an ngfx component, where an attacker could cause a DLL highjacking attack. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, data tampering, and denial of service.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.0283,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23355","https://nvidia.custhelp.com/app/answers/detail/a_id/5704","https://www.cve.org/CVERecord?id=CVE-2025-23355"],"published_time":"2025-10-01T22:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-34235","summary":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction‑point DLL injection. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.","cvss":9.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":9.5,"epss":0.00452,"ranking_epss":0.63787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm","https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm","https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-lpe-04","https://www.vulncheck.com/advisories/vasion-print-printerlogic-weak-ssl-tls-certificate-validation-rce","https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-lpe-04"],"published_time":"2025-09-29T21:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-34196","summary":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product's network communications. This vulnerability has been identified by the vendor as: V-2022-001 — Configuration File Contains CA & Private Key.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":9.3,"epss":0.00089,"ranking_epss":0.25217,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm","https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm","https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-hardcoded-private-key","https://www.vulncheck.com/advisories/vasion-print-printerlogic-hardcoded-printerlogic-ca-private-key-and-hardcoded-password"],"published_time":"2025-09-29T19:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-41244","summary":"VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00592,"ranking_epss":0.6929,"kev":true,"propose_action":"Broadcom VMware Aria Operations and VMware Tools contain a privilege defined with unsafe actions vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.","ransomware_campaign":"Unknown","references":["http://support.broadcom.com/group/ecx/support-content-view/-/support-content/Security%20Advisories/VMSA-2025-0015--VMware-Aria-Operations-and-VMware-Tools-updates-address-multiple-vulnerabilities--CVE-2025-41244-CVE-2025-41245--CVE-2025-41246-/36149","http://www.openwall.com/lists/oss-security/2025/09/29/10","https://lists.debian.org/debian-lts-announce/2025/10/msg00000.html","https://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244/","https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36149","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-41244"],"published_time":"2025-09-29T17:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10501","summary":"Use after free in WebRTC in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00141,"ranking_epss":0.34256,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html","https://issues.chromium.org/issues/440737137"],"published_time":"2025-09-24T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10502","summary":"Heap buffer overflow in ANGLE in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via malicious network traffic. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html","https://issues.chromium.org/issues/438038775"],"published_time":"2025-09-24T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10585","summary":"Type confusion in V8 in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.007,"ranking_epss":0.72038,"kev":true,"propose_action":"Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html","https://issues.chromium.org/issues/445380761","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-10585"],"published_time":"2025-09-24T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10890","summary":"Side-channel information leakage in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.00053,"ranking_epss":0.16641,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/430336833"],"published_time":"2025-09-24T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10891","summary":"Integer overflow in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.29729,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/443765373"],"published_time":"2025-09-24T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10892","summary":"Integer overflow in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00112,"ranking_epss":0.29729,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_23.html","https://issues.chromium.org/issues/444048019"],"published_time":"2025-09-24T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10500","summary":"Use after free in Dawn in Google Chrome prior to 140.0.7339.185 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35983,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html","https://issues.chromium.org/issues/435875050"],"published_time":"2025-09-24T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23338","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm where a user may cause an out-of-bounds write by running nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to denial of service.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23338","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23338","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2169"],"published_time":"2025-09-24T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23339","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in cuobjdump where an attacker may cause a stack-based buffer overflow by getting the user to run cuobjdump on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running \ncuobjdump.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04238,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23339","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23339","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2155"],"published_time":"2025-09-24T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23340","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the nvdisasm binary where a user may cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability may lead to a partial denial of service.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23340","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23340","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2172"],"published_time":"2025-09-24T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23346","summary":"NVIDIA CUDA Toolkit contains a vulnerability in cuobjdump, where an unprivileged user can cause a NULL pointer dereference.  A successful exploit of this vulnerability may lead to a limited denial of service.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.0598,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23346","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23346"],"published_time":"2025-09-24T14:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23271","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the nvdisasm binary where a user may cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability may lead to a partial denial of service.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00026,"ranking_epss":0.07138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23271","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23271","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2191"],"published_time":"2025-09-24T14:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23273","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvJPEG where a local authenticated user may cause a divide by zero error by submitting a specially crafted JPEG file. A successful exploit of this vulnerability may lead to denial of service.","cvss":2.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.5,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23273","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23273"],"published_time":"2025-09-24T14:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23275","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvJPEG where a local authenticated user may cause a GPU out-of-bounds write by providing certain image dimensions.  A successful exploit of this vulnerability may lead to denial of service and information disclosure.","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23275","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23275"],"published_time":"2025-09-24T14:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23308","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in nvdisasm where an attacker may cause a heap-based buffer overflow by getting the user to run nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to arbitrary code execution at the privilege level of the user running nvdisasm.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02922,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23308","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23308","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2204"],"published_time":"2025-09-24T14:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23248","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the nvdisasm binary where a user may cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability may lead to a partial denial of service.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00022,"ranking_epss":0.0598,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23248","https://nvidia.custhelp.com/app/answers/detail/a_id/5661","https://www.cve.org/CVERecord?id=CVE-2025-23248"],"published_time":"2025-09-24T14:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54081","summary":"Sunshine is a self-hosted game stream host for Moonlight. Prior to version 2025.923.33222, the Windows service SunshineService is installed with an unquoted executable path. If Sunshine is installed in a directory whose name includes a space, the Service Control Manager (SCM) interprets the path incrementally and may execute a malicious binary placed earlier in the search string. This issue has been patched in version 2025.923.33222.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02451,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/LizardByte/Sunshine/commit/f22b00d6981f756d3531fba0028723d4a5065824","https://github.com/LizardByte/Sunshine/releases/tag/v2025.923.33222","https://github.com/LizardByte/Sunshine/security/advisories/GHSA-6p7j-5v8v-w45h","https://github.com/LizardByte/Sunshine/security/advisories/GHSA-6p7j-5v8v-w45h"],"published_time":"2025-09-23T19:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-34195","summary":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using an unquoted path under \"C:\\Program Files (x86)\\Printer Properties Pro\\Printer Installer\". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints. This vulnerability has been identified by the vendor as: V-2022-006 — Driver Upload Security.","cvss":8.6,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":8.6,"epss":0.00962,"ranking_epss":0.76557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm","https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm","https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-rce-01","https://www.vulncheck.com/advisories/vasion-print-printerlogic-unquoted-path-during-driver-installation"],"published_time":"2025-09-19T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-34193","summary":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 include Windows client components (PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, PrinterInstallerClientLauncher.exe) that lack modern compile-time and runtime exploit mitigations and rely on outdated runtimes. These binaries are built as 32-bit, without Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control Flow Guard (CFG), or stack-protection, and they incorporate legacy technologies (Pascal/Delphi and Python 2) which are no longer commonly maintained. Several of these processes run with elevated privileges (NT AUTHORITY\\SYSTEM for PrinterInstallerClient.exe and PrinterInstallerClientLauncher.exe), and the client automatically downloads and installs printer drivers. The absence of modern memory safety mitigations and the use of unmaintained runtimes substantially increase the risk that memory-corruption or other exploit primitives — for example from crafted driver content or maliciously crafted inputs — can be turned into remote or local code execution and privilege escalation to SYSTEM. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.","cvss":7.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":7.1,"epss":0.00254,"ranking_epss":0.48764,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm","https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm","https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-insecure-programs","https://www.vulncheck.com/advisories/vasion-print-printerlogic-insecure-windows-components-lack-modern-memory-protections-and-use-outdated-runtimes"],"published_time":"2025-09-19T19:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-34194","summary":"Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\\SYSTEM inside a directory under the control of the local user (C:\\Users\\%USER%\\AppData\\Local\\Temp\\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.","cvss":8.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.5,"epss":0.00064,"ranking_epss":0.19809,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm","https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm","https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-lpe-02","https://www.vulncheck.com/advisories/vasion-print-printerlogic-lpe-via-insecure-temporary-file-handling"],"published_time":"2025-09-19T19:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23316","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause a remote code execution by manipulating the model name parameter in the model control APIs. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, and data tampering.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00331,"ranking_epss":0.5609,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5691"],"published_time":"2025-09-17T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23328","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an out-of-bounds write through a specially crafted input. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29868,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5691"],"published_time":"2025-09-17T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23329","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause memory corruption by identifying and accessing the shared memory region used by the Python backend. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5691"],"published_time":"2025-09-17T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23336","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause a denial of service by loading a misconfigured model. A successful exploit of this vulnerability might lead to denial of service.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00065,"ranking_epss":0.20228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5691"],"published_time":"2025-09-17T22:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54262","summary":"Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html"],"published_time":"2025-09-16T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54237","summary":"Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html"],"published_time":"2025-09-16T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10200","summary":"Use after free in Serviceworker in Google Chrome on Desktop prior to 140.0.7339.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25155,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_9.html","https://issues.chromium.org/issues/440454442"],"published_time":"2025-09-10T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10226","summary":"Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":9.3,"epss":0.00636,"ranking_epss":0.70495,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories","https://www.postgresql.org/docs/release"],"published_time":"2025-09-10T13:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10227","summary":"Missing Encryption of Sensitive Data (CWE-311) in the Object Archive component in AxxonSoft Axxon One (C-Werk)  before 2.0.8 on Windows and Linux allows a local attacker with access to exported storage or stolen physical drives to extract sensitive archive data in plaintext via lack of encryption at rest.","cvss":5.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":5.1,"epss":7e-05,"ranking_epss":0.0063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories"],"published_time":"2025-09-10T13:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10221","summary":"Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet / C-WerkNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords.","cvss":6.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":6.7,"epss":0.00015,"ranking_epss":0.03206,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories"],"published_time":"2025-09-10T13:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54240","summary":"After Effects versions 25.3, 24.6.7 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure, potentially disclosing sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-86.html"],"published_time":"2025-09-09T21:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54241","summary":"After Effects versions 25.3, 24.6.7 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure, potentially disclosing sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-86.html"],"published_time":"2025-09-09T21:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54239","summary":"After Effects versions 25.3, 24.6.7 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure, potentially disclosing sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06751,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-86.html"],"published_time":"2025-09-09T21:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43491","summary":"A vulnerability in the Poly Lens Desktop application running on the Windows platform might allow modifications to the filesystem, which might lead to SYSTEM level privileges being granted.","cvss":7.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":7.3,"epss":0.0003,"ranking_epss":0.08517,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.hp.com/us-en/document/ish_12979589-12979615-16/hpsbpy04048"],"published_time":"2025-09-09T21:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54255","summary":"Acrobat Reader versions 24.001.30254, 20.005.30774, 25.001.20672 and earlier are affected by a Violation of Secure Design Principles vulnerability that could result in a security feature bypass impacting integrity. An attacker does not have to be authenticated. Exploitation of this issue does not require user interaction, and scope is unchanged.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00056,"ranking_epss":0.1741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-85.html"],"published_time":"2025-09-09T20:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54257","summary":"Acrobat Reader versions 24.001.30254, 20.005.30774, 25.001.20672 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file, and scope is unchanged.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12232,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-85.html","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2222"],"published_time":"2025-09-09T20:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54242","summary":"Premiere Pro versions 25.3, 24.6.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file, and scope is unchanged.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12232,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/premiere_pro/apsb25-87.html"],"published_time":"2025-09-09T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54256","summary":"Dreamweaver Desktop versions 21.5 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must click on a malicious link, and scope is changed.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb25-91.html"],"published_time":"2025-09-09T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10199","summary":"A local privilege escalation vulnerability exists in Sunshine for Windows (version v2025.122.141614 and likely prior versions) due to an unquoted service path.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00019,"ranking_epss":0.04779,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/LizardByte/Sunshine/security/advisories/GHSA-r3rw-mx4q-7vfp","https://www.kb.cert.org/vuls/id/974249"],"published_time":"2025-09-09T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-10198","summary":"Sunshine for Windows, version v2025.122.141614, contains a DLL search-order hijacking vulnerability, allowing attackers to insert a malicious DLL in user-writeable PATH directories.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00014,"ranking_epss":0.02667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/LizardByte/Sunshine/commit/9db11a906167bd962e57896223d7b9718058aeb2","https://github.com/LizardByte/Sunshine/pull/3971","https://www.kb.cert.org/vuls/id/974249"],"published_time":"2025-09-09T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9326","summary":"Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26784.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-866/"],"published_time":"2025-09-02T21:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9327","summary":"Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26774.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08223,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-865/"],"published_time":"2025-09-02T21:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9328","summary":"Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26773.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-864/"],"published_time":"2025-09-02T21:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9329","summary":"Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26772.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-863/"],"published_time":"2025-09-02T21:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9330","summary":"Foxit PDF Reader Update Service Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PDF Reader. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Foxit Reader Update Service. The product loads a library from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-25709.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.02885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-870/"],"published_time":"2025-09-02T21:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9323","summary":"Foxit PDF Reader JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-27101.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08223,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-869/"],"published_time":"2025-09-02T21:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9324","summary":"Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26802.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08223,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-868/"],"published_time":"2025-09-02T21:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9325","summary":"Foxit PDF Reader PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26785.","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08223,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.foxit.com/support/security-bulletins.html","https://www.zerodayinitiative.com/advisories/ZDI-25-867/"],"published_time":"2025-09-02T21:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32098","summary":"An issue was discovered in Samsung Magician 6.3 through 8.3 on Windows. An attacker can achieve Elevation of Privileges to SYSTEM by exploiting insecure file delete operations during the update process.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://semiconductor.samsung.com/support/quality-support/product-security-updates/","https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-32098/"],"published_time":"2025-09-02T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9478","summary":"Use after free in ANGLE in Google Chrome prior to 139.0.7258.154 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.37046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_26.html","https://issues.chromium.org/issues/437825940"],"published_time":"2025-08-26T19:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23315","summary":"NVIDIA NeMo Framework for all platforms contains a vulnerability in the export and deploy component, where malicious data created by an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.11172,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23315","https://nvidia.custhelp.com/app/answers/detail/a_id/5689","https://www.cve.org/CVERecord?id=CVE-2025-23315"],"published_time":"2025-08-26T19:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52450","summary":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salesforce Tableau Server on Windows, Linux (abdoc api - create-data-source-from-file-upload modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22796,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005132575&type=1"],"published_time":"2025-08-22T21:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52451","summary":"Improper Input Validation vulnerability in Salesforce Tableau Server on Windows, Linux (tabdoc api - create-data-source-from-file-upload modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06997,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005132575&type=1"],"published_time":"2025-08-22T21:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26497","summary":"Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Editor modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00057,"ranking_epss":0.17859,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005132575&type=1"],"published_time":"2025-08-22T21:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4609","summary":"Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07616,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html","https://issues.chromium.org/issues/412578726"],"published_time":"2025-08-22T21:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-9132","summary":"Out of bounds write in V8 in Google Chrome prior to 139.0.7258.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34525,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_19.html","https://issues.chromium.org/issues/436181695"],"published_time":"2025-08-20T01:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36047","summary":"IBM WebSphere Application Server Liberty 18.0.0.2 through 25.0.0.8 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28566,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7242086","https://www.kb.cert.org/vuls/id/767506"],"published_time":"2025-08-14T16:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33142","summary":"IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for TLS connections.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.07998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7242172"],"published_time":"2025-08-14T16:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23303","summary":"NVIDIA NeMo Framework for all platforms contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01789,"ranking_epss":0.82782,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23303","https://nvidia.custhelp.com/app/answers/detail/a_id/5686","https://www.cve.org/CVERecord?id=CVE-2025-23303"],"published_time":"2025-08-13T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23304","summary":"NVIDIA NeMo library for all platforms contains a vulnerability in the model loading component, where an attacker could cause code injection by loading .nemo files with maliciously crafted metadata. A successful exploit of this vulnerability may lead to remote code execution and data tampering.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00372,"ranking_epss":0.59021,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23304","https://nvidia.custhelp.com/app/answers/detail/a_id/5686","https://www.cve.org/CVERecord?id=CVE-2025-23304"],"published_time":"2025-08-13T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8901","summary":"Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00087,"ranking_epss":0.24942,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/435139154"],"published_time":"2025-08-13T03:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8882","summary":"Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0018,"ranking_epss":0.39683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/435623339"],"published_time":"2025-08-13T03:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8881","summary":"Inappropriate implementation in File Picker in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/433800617"],"published_time":"2025-08-13T03:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8880","summary":"Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00136,"ranking_epss":0.3335,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/433533359"],"published_time":"2025-08-13T03:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8879","summary":"Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00121,"ranking_epss":0.3116,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html","https://issues.chromium.org/issues/432035817"],"published_time":"2025-08-13T03:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54233","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-83.html"],"published_time":"2025-08-12T23:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54238","summary":"Dimension versions 4.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-84.html"],"published_time":"2025-08-12T23:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54229","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-83.html"],"published_time":"2025-08-12T23:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54230","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-83.html"],"published_time":"2025-08-12T23:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54231","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-83.html"],"published_time":"2025-08-12T23:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54232","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-83.html"],"published_time":"2025-08-12T23:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54222","summary":"Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html"],"published_time":"2025-08-12T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54228","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54221","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54223","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54224","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54225","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54226","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54227","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54215","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54216","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54217","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54218","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54219","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54220","summary":"InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-80.html"],"published_time":"2025-08-12T21:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54209","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54210","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54211","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54212","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54213","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54214","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07771,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54206","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54207","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54208","summary":"InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-79.html"],"published_time":"2025-08-12T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49561","summary":"Animate versions 23.0.12, 24.0.9 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12446,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-73.html"],"published_time":"2025-08-12T21:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49562","summary":"Animate versions 23.0.12, 24.0.9 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-73.html"],"published_time":"2025-08-12T21:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49570","summary":"Photoshop Desktop versions 25.12.3, 26.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/photoshop/apsb25-75.html"],"published_time":"2025-08-12T21:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49564","summary":"Illustrator versions 28.7.8, 29.6.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-74.html"],"published_time":"2025-08-12T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49567","summary":"Illustrator versions 28.7.8, 29.6.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05747,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-74.html"],"published_time":"2025-08-12T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49568","summary":"Illustrator versions 28.7.8, 29.6.1 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-74.html"],"published_time":"2025-08-12T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49563","summary":"Illustrator versions 28.7.8, 29.6.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-74.html"],"published_time":"2025-08-12T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8088","summary":"A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček\n     from ESET.","cvss":8.4,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":8.4,"epss":0.09559,"ranking_epss":0.9287,"kev":true,"propose_action":"RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.","ransomware_campaign":"Unknown","references":["https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5","https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/","https://support.dtsearch.com/faq/dts0245.htm","https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day","https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-8088","https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088"],"published_time":"2025-08-08T12:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55077","summary":"Tyler Technologies ERP Pro 9 SaaS allows an authenticated user to escape the application and execute limited operating system commands within the remote Microsoft Windows environment with the privileges of the authenticated user. Tyler Technologies deployed hardened remote Windows environment settings to all ERP Pro 9 SaaS customer environments as of 2025-08-01.","cvss":5.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":5.3,"epss":0.00054,"ranking_epss":0.16805,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-219-01.json","https://www.cve.org/CVERecord?id=CVE-2025-55077"],"published_time":"2025-08-07T19:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8576","summary":"Use after free in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00214,"ranking_epss":0.4394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/414760982"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8577","summary":"Inappropriate implementation in Picture In Picture in Google Chrome prior to 139.0.7258.66 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.17972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/384050903"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8578","summary":"Use after free in Cast in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00214,"ranking_epss":0.4394,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/423387026"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8579","summary":"Inappropriate implementation in Picture In Picture in Google Chrome prior to 139.0.7258.66 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.17972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/407791462"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8580","summary":"Inappropriate implementation in Filesystems in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.17972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/411544197"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8581","summary":"Inappropriate implementation in Extensions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00046,"ranking_epss":0.13902,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/416942878"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8582","summary":"Insufficient validation of untrusted input in Core in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20686,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/40089450"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8583","summary":"Inappropriate implementation in Permissions in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.15196,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html","https://issues.chromium.org/issues/373794472"],"published_time":"2025-08-07T02:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23333","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by manipulating shared memory data. A successful exploit of this vulnerability might lead to information disclosure.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.18134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23333","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23333"],"published_time":"2025-08-06T13:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23334","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by sending a request. A successful exploit of this vulnerability might lead to information disclosure.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19569,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23334","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23334"],"published_time":"2025-08-06T13:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23335","summary":"NVIDIA Triton Inference Server for Windows and Linux and the Tensor RT backend contain a vulnerability where an attacker could cause an underflow by a specific model configuration and a specific input. A successful exploit of this vulnerability might lead to denial of service.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.1976,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23335","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23335"],"published_time":"2025-08-06T13:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23323","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overflow or wraparound, leading to a segmentation fault, by providing an invalid request. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23323","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23323"],"published_time":"2025-08-06T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23324","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overflow or wraparound, leading to a segmentation fault,  by providing an invalid request. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23324","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23324"],"published_time":"2025-08-06T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23325","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause uncontrolled recursion through a specially crafted input. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14854,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23325","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23325"],"published_time":"2025-08-06T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23326","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through a specially crafted input. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37731,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23326","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23326"],"published_time":"2025-08-06T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23327","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through specially crafted inputs. A successful exploit of this vulnerability might lead to denial of service and data tampering.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.22055,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23327","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23327"],"published_time":"2025-08-06T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23331","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a memory allocation with excessive size value, leading to a segmentation fault, by providing an invalid request. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37731,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23331","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23331"],"published_time":"2025-08-06T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23311","summary":"NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially crafted HTTP requests. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, or data tampering.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01119,"ranking_epss":0.78264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23311","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23311"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23317","summary":"NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shell by sending a specially crafted HTTP request. A successful exploit of this vulnerability might lead to remote code execution, denial of service, data tampering, or information disclosure.","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.03326,"ranking_epss":0.87301,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23317","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23317"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23318","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, data tampering, and information disclosure.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23318","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23318"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23319","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write by sending a request. A successful exploit of this vulnerability might lead to remote code execution, denial of service, data tampering, or information disclosure.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00935,"ranking_epss":0.76201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23319","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23319"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23320","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause the shared memory limit to be exceeded by sending a very large request. A successful exploit of this vulnerability might lead to information disclosure.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23320","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23320"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23321","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a divide by zero issue by issuing an invalid request. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31804,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23321","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23321"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23322","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where multiple requests could cause a double free when a stream is cancelled before it is processed. A successful exploit of this vulnerability might lead to denial of service.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37731,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23322","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23322"],"published_time":"2025-08-06T13:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23310","summary":"NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer overflow by specially crafted inputs. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, and data tampering.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00658,"ranking_epss":0.71101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvd.nist.gov/vuln/detail/CVE-2025-23310","https://nvidia.custhelp.com/app/answers/detail/a_id/5687","https://www.cve.org/CVERecord?id=CVE-2025-23310"],"published_time":"2025-08-06T13:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8292","summary":"Use after free in Media Stream in Google Chrome prior to 138.0.7204.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31739,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_29.html","https://issues.chromium.org/issues/426054987"],"published_time":"2025-07-30T02:17:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-7361","summary":"A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected.","cvss":8.5,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.5,"epss":0.00029,"ranking_epss":0.08039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/code-injection-vulnerability-in-ni-labview-using-cin-nodes.html"],"published_time":"2025-07-29T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4056","summary":"A flaw was found in GLib. A denial of service on Windows platforms may occur if an application attempts to spawn a program using long command lines.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://access.redhat.com/security/cve/CVE-2025-4056","https://bugzilla.redhat.com/show_bug.cgi?id=2362826","https://gitlab.gnome.org/GNOME/glib/-/issues/3668"],"published_time":"2025-07-28T13:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52453","summary":"Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Data Source modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52454","summary":"Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Amazon S3 Connector modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.2,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52455","summary":"Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (EPS Server modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.18798,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52446","summary":"Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (tab-doc api modules) allows Interface Manipulation (data access to the production database cluster).This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00028,"ranking_epss":0.07817,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52447","summary":"Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (set-initial-sql tabdoc command modules) allows Interface Manipulation (data access to the production database cluster). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52448","summary":"Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (validate-initial-sql api modules) allows Interface Manipulation (data access to the production database cluster). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0006,"ranking_epss":0.18715,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52449","summary":"Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08122,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52452","summary":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salesforce Tableau Server on Windows, Linux (tabdoc api - duplicate-data-source modules) allows Absolute Path Traversal. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.","cvss":8.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.5,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30853,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://help.salesforce.com/s/articleView?id=005105043&type=1"],"published_time":"2025-07-25T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8011","summary":"Type Confusion in V8 in Google Chrome prior to 138.0.7204.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00082,"ranking_epss":0.23998,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_22.html","https://issues.chromium.org/issues/430572435"],"published_time":"2025-07-22T22:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-8010","summary":"Type Confusion in V8 in Google Chrome prior to 138.0.7204.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00093,"ranking_epss":0.26067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_22.html","https://issues.chromium.org/issues/430344952"],"published_time":"2025-07-22T22:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54313","summary":"eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.10494,"ranking_epss":0.93272,"kev":true,"propose_action":"Prettier eslint-config-prettier contains an embedded malicious code vulnerability. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.","ransomware_campaign":"Unknown","references":["https://github.com/prettier/eslint-config-prettier/issues/339","https://news.ycombinator.com/item?id=44608811","https://news.ycombinator.com/item?id=44609732","https://socket.dev/blog/npm-phishing-campaign-leads-to-prettier-tooling-packages-compromise","https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/","https://www.npmjs.com/package/eslint-config-prettier?activeTab=versions","https://www.stepsecurity.io/blog/supply-chain-security-alert-eslint-config-prettier-package-shows-signs-of-compromise","https://github.com/community-scripts/ProxmoxVE/discussions/6115","https://www.endorlabs.com/learn/cve-2025-54313-eslint-config-prettier-compromise----high-severity-but-windows-only","https://www.bleepingcomputer.com/news/security/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-54313"],"published_time":"2025-07-19T17:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33014","summary":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7240065"],"published_time":"2025-07-18T19:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53378","summary":"A missing authentication vulnerability in Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an unauthenticated attacker to remotely take control of the agent on affected installations.\r\n\r\nAlso note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00122,"ranking_epss":0.31306,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019936"],"published_time":"2025-07-10T19:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-52521","summary":"Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0007,"ranking_epss":0.21588,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpcenter.trendmicro.com/en-us/article/tmka-18876","https://www.zerodayinitiative.com/advisories/ZDI-25-585/"],"published_time":"2025-07-10T19:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43394","summary":"Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via \nmod_rewrite or apache expressions that pass unvalidated request input.\n\nThis issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.\n\nNote:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. \n\nThe server offers limited protection against administrators directing the server to open UNC paths.\nWindows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15976,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://httpd.apache.org/security/vulnerabilities_24.html","http://www.openwall.com/lists/oss-security/2025/07/10/2","http://www.openwall.com/lists/oss-security/2025/07/10/5","https://lists.debian.org/debian-lts-announce/2025/08/msg00009.html"],"published_time":"2025-07-10T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-1112","summary":"IBM OpenPages with Watson 8.3 and 9.0 could allow an authenticated user to obtain sensitive information that should only be available to privileged users.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.13046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239151"],"published_time":"2025-07-09T15:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47131","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47132","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47133","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47125","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47126","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47127","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47128","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47129","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47130","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47099","summary":"InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-59.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47119","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47120","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47121","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47122","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47123","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47124","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-66.html"],"published_time":"2025-07-08T23:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47097","summary":"InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-59.html"],"published_time":"2025-07-08T23:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47098","summary":"InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-59.html"],"published_time":"2025-07-08T23:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49531","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49532","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49524","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49525","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49526","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49527","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49528","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49529","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49530","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43591","summary":"InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-60.html"],"published_time":"2025-07-08T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43592","summary":"InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-60.html"],"published_time":"2025-07-08T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43594","summary":"InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-60.html"],"published_time":"2025-07-08T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47103","summary":"InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-60.html"],"published_time":"2025-07-08T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47134","summary":"InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-60.html"],"published_time":"2025-07-08T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47136","summary":"InDesign Desktop versions 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-60.html"],"published_time":"2025-07-08T22:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27165","summary":"Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html"],"published_time":"2025-07-08T22:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30313","summary":"Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-65.html"],"published_time":"2025-07-08T22:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27369","summary":"IBM OpenPages with Watson 8.3 and 9.0 \n\n\n\n\n\n\n\nis vulnerable to information disclosure of sensitive information due to a weaker than expected security for certain REST end points used for the administration of OpenPages. An authenticated user is able to obtain certain information about system configuration and internal state which is only intended for administrators of the system.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00056,"ranking_epss":0.17477,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239155"],"published_time":"2025-07-08T19:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27367","summary":"IBM OpenPages with Watson 8.3 and 9.0 \n\n\n\n\n\nis vulnerable to improper input validation due to bypassing of client-side validation for the data types and requiredness of fields for GRC Objects when an authenticated user sends a specially crafted payload to the server allowing for data to be saved without storing the required fields.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239155"],"published_time":"2025-07-08T19:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49784","summary":"IBM OpenPages with Watson 8.3 and 9.0 \n\ncould provide weaker than expected security in storage of encrypted data with AES encryption and CBC mode. If an authenticated remote attacker with access to the database or a local attacker with access to server files could extract the encrypted data values they could exploit this weaker algorithm to use additional cryptographic methods to possibly extract the encrypted data.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00017,"ranking_epss":0.04195,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239145"],"published_time":"2025-07-08T19:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49783","summary":"IBM OpenPages with Watson 8.3 and 9.0 \n\n\n\ncould provide weaker than expected security in storage of encrypted data. If an authenticated remote attacker with access to the database or a local attacker with access to server files could extract the encrypted data, they could exploit this vulnerability to use additional cryptographic methods to possibly extract the encrypted data.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00046,"ranking_epss":0.14049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239145"],"published_time":"2025-07-08T19:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43039","summary":"IBM OpenPages with Watson 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7238923"],"published_time":"2025-07-08T19:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47135","summary":"Dimension versions 4.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-63.html"],"published_time":"2025-07-08T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30312","summary":"Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.12936,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-63.html"],"published_time":"2025-07-08T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43587","summary":"After Effects versions 25.2, 24.6.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-49.html"],"published_time":"2025-07-08T17:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47109","summary":"After Effects versions 25.2, 24.6.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-49.html"],"published_time":"2025-07-08T17:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43580","summary":"Audition versions 25.2, 24.6.3 and earlier are affected by an Access of Memory Location After End of Buffer vulnerability that could result in application denial-of-service. An attacker could leverage this vulnerability to crash the application or disrupt its functionality. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/audition/apsb25-56.html"],"published_time":"2025-07-08T17:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-2793","summary":"IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.6, 6.2.0.0 through 6.2.0.4, IBM Sterling File Gateway \n\n6.0.0.0 through 6.1.2.6, and 6.2.0.0 through 6.2.0.4\n\n\n\nis vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10541,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239092"],"published_time":"2025-07-08T15:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-2827","summary":"IBM Sterling File Gateway \n\n6.0.0.0 through 6.1.2.6, and 6.2.0.0 through 6.2.0.4\n\n\n\n\n\ncould disclose sensitive installation directory information to an authenticated user that could be used in further attacks against the system.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00056,"ranking_epss":0.17477,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239094"],"published_time":"2025-07-08T15:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3630","summary":"IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.6, 6.2.0.0 through 6.2.0.4, IBM Sterling File Gateway \n\n6.0.0.0 through 6.1.2.6, and 6.2.0.0 through 6.2.0.4\n\nis vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":6.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00036,"ranking_epss":0.10541,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7239095"],"published_time":"2025-07-08T15:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36630","summary":"In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06242,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2025-13"],"published_time":"2025-07-02T00:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-6554","summary":"Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00937,"ranking_epss":0.76241,"kev":true,"propose_action":"Google Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html","https://issues.chromium.org/issues/427663123","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-6554"],"published_time":"2025-06-30T22:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24915","summary":"Credentials are not cleared from memory after being used. A user with Administrator permissions can execute memory dump for SmartConsole process and fetch them.","cvss":6.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.1,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.11906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.checkpoint.com/results/sk/sk183545"],"published_time":"2025-06-29T12:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-52928","summary":"Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website.","cvss":9.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.6,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26739,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://arc.net/security/bulletins#windows-site-settings-bypass-cve-2024-52928","https://thebrowser.company"],"published_time":"2025-06-26T17:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36038","summary":"IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects.","cvss":9.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00372,"ranking_epss":0.5901,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237967"],"published_time":"2025-06-25T21:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-0966","summary":"IBM InfoSphere Information Server 11.7 vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7236613"],"published_time":"2025-06-25T03:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-6557","summary":"Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.24526,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html","https://issues.chromium.org/issues/406631048"],"published_time":"2025-06-24T20:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3221","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow a remote attacker to cause a denial of service due to insufficient validation of incoming request resources.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00434,"ranking_epss":0.62885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7235496"],"published_time":"2025-06-21T13:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3629","summary":"IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 \n\ncould allow an authenticated user to delete another user's comments due to improper ownership management.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00139,"ranking_epss":0.33987,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7235496"],"published_time":"2025-06-21T13:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-6218","summary":"RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.06169,"ranking_epss":0.90858,"kev":true,"propose_action":"RARLAB WinRAR contains a path traversal vulnerability allowing an attacker to execute code in the context of the current user.","ransomware_campaign":"Unknown","references":["https://www.win-rar.com/singlenewsview.html?&tx_ttnews%5Btt_news%5D=276&cHash=388885bd3908a40726f535c026f94eb6","https://www.zerodayinitiative.com/advisories/ZDI-25-409/","https://foresiet.com/blog/apt-c-08-winrar-directory-traversal-exploit/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-6218","https://www.secpod.com/blog/archive-terror-dissecting-the-winrar-cve-2025-6218-exploit-apt-c-08s-stealth-move/"],"published_time":"2025-06-21T01:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-24916","summary":"Untrusted DLLs in the installer's directory may be loaded and executed, leading to potentially arbitrary code execution with the installer's privileges (admin).","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00113,"ranking_epss":0.29849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.checkpoint.com/results/sk/sk183342"],"published_time":"2025-06-19T14:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-54172","summary":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.21905,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237059"],"published_time":"2025-06-18T17:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-1348","summary":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 could allow a local user to obtain sensitive information from a user’s web browser cache due to not using a suitable caching policy.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20584,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237068"],"published_time":"2025-06-18T17:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-1349","summary":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 \n\nis vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00131,"ranking_epss":0.32538,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237109"],"published_time":"2025-06-18T17:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36048","summary":"IBM webMethods Integration Server 10.5, 10.7, 10.11, and 10.15 could allow a privileged user to escalate their privileges when handling external entities due to execution with unnecessary privileges.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00511,"ranking_epss":0.66485,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237144"],"published_time":"2025-06-18T16:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36049","summary":"IBM webMethods Integration Server 10.5, 10.7, 10.11, and 10.15 \n\nis vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to execute arbitrary commands.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0028,"ranking_epss":0.51423,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237146"],"published_time":"2025-06-18T16:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-54183","summary":"IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.0011,"ranking_epss":0.29397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7237060"],"published_time":"2025-06-18T16:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49213","summary":"An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49212 but is in a different method.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.06303,"ranking_epss":0.90981,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-370/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49214","summary":"An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03902,"ranking_epss":0.88295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-371/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49215","summary":"A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. \r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00162,"ranking_epss":0.37069,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-372/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49216","summary":"An authentication bypass vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to access key methods as an admin user and modify product configurations on affected installations.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00287,"ranking_epss":0.52246,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-373/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49217","summary":"An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49213 but is in a different method.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03578,"ranking_epss":0.87752,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-374/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49218","summary":"A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15389,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-375/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49384","summary":"Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28176,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpcenter.trendmicro.com/en-us/article/TMKA-11112"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49385","summary":"Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.38967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpcenter.trendmicro.com/en-us/article/TMKA-18461","https://www.zerodayinitiative.com/advisories/ZDI-25-380/"],"published_time":"2025-06-17T21:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49211","summary":"A SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. \r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15389,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-368/"],"published_time":"2025-06-17T21:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49212","summary":"An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.06303,"ranking_epss":0.90981,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019928","https://www.zerodayinitiative.com/advisories/ZDI-25-369/"],"published_time":"2025-06-17T21:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30640","summary":"A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.38967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019344","https://www.zerodayinitiative.com/advisories/ZDI-25-239/"],"published_time":"2025-06-17T21:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30641","summary":"A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.002,"ranking_epss":0.42108,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019344","https://www.zerodayinitiative.com/advisories/ZDI-25-240/"],"published_time":"2025-06-17T21:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30642","summary":"A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.33038,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019344","https://www.zerodayinitiative.com/advisories/ZDI-25-241/"],"published_time":"2025-06-17T21:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30678","summary":"A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (on-premise) modTMSM component could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00212,"ranking_epss":0.43777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019355","https://www.zerodayinitiative.com/advisories/ZDI-25-236/"],"published_time":"2025-06-17T20:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30679","summary":"A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (on-premise) modOSCE component could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00212,"ranking_epss":0.43777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019355","https://www.zerodayinitiative.com/advisories/ZDI-25-237/"],"published_time":"2025-06-17T20:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30680","summary":"A Server-side Request Forgery (SSRF) vulnerability in Trend Micro Apex Central (SaaS) could allow an attacker to manipulate certain parameters leading to information disclosure on affected installations.  \r\n\r\nPlease note: this vulnerability only affects the SaaS instance of Apex Central - customers that automatically apply Trend Micro's monthly maintenance releases to the SaaS instance do not have to take any further action.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00267,"ranking_epss":0.50188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019355","https://www.zerodayinitiative.com/advisories/ZDI-25-238/"],"published_time":"2025-06-17T20:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49487","summary":"An uncontrolled search path vulnerability in the Trend Micro Worry-Free Business Security Services (WFBSS) agent could have allowed an attacker with physical access to a machine to execute arbitrary code on affected installations.\r\n\r\nAn attacker must have had physical access to the target system in order to exploit this vulnerability due to need to access a certain hardware component.\r\n\r\nAlso note: this vulnerability only affected the SaaS client version of WFBSS only, meaning the on-premise version of Worry-Free Business Security was not affected, and this issue was addressed in a previous WFBSS monthly maintenance update. Therefore no other customer action is required to mitigate if the WFBSS agents are on the regular SaaS maintenance deployment schedule and this disclosure is for informational purposes only.","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00173,"ranking_epss":0.3874,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019936","https://www.zerodayinitiative.com/advisories/ZDI-25-360/"],"published_time":"2025-06-17T19:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49154","summary":"An insecure access control vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security could allow a local attacker to overwrite key memory-mapped files which could then have severe consequences for the security and stability of affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.","cvss":8.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.7,"cvss_v4":null,"epss":0.0005,"ranking_epss":0.15277,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019917","https://success.trendmicro.com/en-US/solution/KA-0019936"],"published_time":"2025-06-17T19:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49220","summary":"An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.09916,"ranking_epss":0.93025,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019926","https://www.zerodayinitiative.com/advisories/ZDI-25-367/"],"published_time":"2025-06-17T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47865","summary":"A Local File Inclusion vulnerability in a Trend Micro Apex Central widget below version 8.0.6955 could allow an attacker to gain remote code execution on affected installations.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01904,"ranking_epss":0.83285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019355","https://www.zerodayinitiative.com/advisories/ZDI-25-295/"],"published_time":"2025-06-17T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47866","summary":"An unrestricted file upload vulnerability in a Trend Micro Apex Central widget below version 8.0.6955 could allow an attacker to upload arbitrary files on affected installations.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00317,"ranking_epss":0.54794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019355","https://www.zerodayinitiative.com/advisories/ZDI-25-296/"],"published_time":"2025-06-17T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47867","summary":"A Local File Inclusion vulnerability in a Trend Micro Apex Central widget in versions below 8.0.6955 could allow an attacker to include arbitrary files to execute as PHP code and lead to remote code execution on affected installations.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01809,"ranking_epss":0.82865,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019355","https://www.zerodayinitiative.com/advisories/ZDI-25-297/"],"published_time":"2025-06-17T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49219","summary":"An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.09214,"ranking_epss":0.92723,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://success.trendmicro.com/en-US/solution/KA-0019926","https://www.zerodayinitiative.com/advisories/ZDI-25-366/"],"published_time":"2025-06-17T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-0320","summary":"Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Secure Access Client for Windows","cvss":8.6,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":8.6,"epss":0.00072,"ranking_epss":0.2194,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694724"],"published_time":"2025-06-17T14:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36632","summary":"In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00063,"ranking_epss":0.19449,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2025-11"],"published_time":"2025-06-16T14:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36633","summary":"In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2025-11"],"published_time":"2025-06-13T15:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-36631","summary":"In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00066,"ranking_epss":0.20366,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2025-11"],"published_time":"2025-06-13T15:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30399","summary":"Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00251,"ranking_epss":0.48537,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399"],"published_time":"2025-06-13T02:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4613","summary":"Path traversal in Google Web Designer's template handling versions prior to 16.3.0.0407 on Windows allows attacker to achieve remote code execution by tricking users into downloading a malicious ad template","cvss":7.1,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":7.1,"epss":0.0025,"ranking_epss":0.48266,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://balintmagyar.com/articles/google-web-designer-path-traversal-client-side-rce-cve-2025-4613"],"published_time":"2025-06-12T09:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-0913","summary":"os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.11975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://go.dev/cl/672396","https://go.dev/issue/73702","https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A","https://pkg.go.dev/vuln/GO-2025-3750"],"published_time":"2025-06-11T18:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43578","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00182,"ranking_epss":0.39959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2159"],"published_time":"2025-06-10T19:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43579","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an Information Exposure vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to gain unauthorized access to sensitive information. Exploitation of this issue does not require user interaction.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.005,"ranking_epss":0.66028,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47107","summary":"InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-41.html"],"published_time":"2025-06-10T19:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47111","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47112","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00182,"ranking_epss":0.39959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43550","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43573","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43574","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43575","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43576","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2170"],"published_time":"2025-06-10T19:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43577","summary":"Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-57.html"],"published_time":"2025-06-10T19:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30327","summary":"InCopy versions 20.2, 19.5.3 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/incopy/apsb25-41.html"],"published_time":"2025-06-10T19:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47106","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39279,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47105","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00182,"ranking_epss":0.39959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47104","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00182,"ranking_epss":0.39959,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43593","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43590","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43589","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43558","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:23:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30321","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:21:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30317","summary":"InDesign Desktop versions ID20.2, ID19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-53.html"],"published_time":"2025-06-10T17:21:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-5480","summary":"Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1.  An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18564,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.action1.com/blog/acknowledging-zdi-can-26767-high-severity-vulnerability-in-action1-agent/","https://www.zerodayinitiative.com/advisories/ZDI-25-323/"],"published_time":"2025-06-06T19:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-20259","summary":"Multiple vulnerabilities in the update process of Cisco ThousandEyes Endpoint Agent for Windows could allow an authenticated, local attacker to delete arbitrary files on an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are in the local file system. An attacker could exploit these vulnerabilities by using a symbolic link to perform an agent upgrade that redirects the delete operation of any protected file. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28611,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-te-endagent-filewrt-zNcDqNRJ"],"published_time":"2025-06-04T17:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-20298","summary":"In Universal Forwarder for Windows versions below 9.4.2, 9.3.4, 9.2.6, and 9.1.9, a new installation of or an upgrade to an affected version can result in incorrect permissions assignment in the Universal Forwarder for Windows Installation directory (by default, C:\\Program Files\\SplunkUniversalForwarder). This lets non-administrator users on the machine access the directory and all its contents.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00171,"ranking_epss":0.38304,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://advisory.splunk.com/advisories/SVD-2025-0602"],"published_time":"2025-06-02T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23247","summary":"NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to check the length of a buffer could allow a user to cause the tool to crash or execute arbitrary code by passing in a malformed ELF file. A successful exploit of this vulnerability might lead to arbitrary code execution.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.2198,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5643","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2151"],"published_time":"2025-05-27T17:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-5180","summary":"A vulnerability, which was classified as critical, has been found in Wondershare Filmora 14.5.16. Affected by this issue is some unknown functionality in the library CRYPTBASE.dll of the file NFWCHK.exe of the component Installer. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","cvss":7.3,"cvss_version":4.0,"cvss_v2":6.0,"cvss_v3":7.0,"cvss_v4":7.3,"epss":0.00069,"ranking_epss":0.21206,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80","https://vuldb.com/?ctiid.310268","https://vuldb.com/?id.310268","https://vuldb.com/?submit.580226","https://gist.github.com/shellkraft/aa66561e984e83052bd080f195a3ec80"],"published_time":"2025-05-26T10:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24917","summary":"In Tenable Network Monitor versions prior to 6.5.1 on a Windows host, it was found that a non-administrative user could stage files in a local directory to run arbitrary code with SYSTEM privileges, potentially leading to local privilege escalation.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00034,"ranking_epss":0.09619,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2025-10"],"published_time":"2025-05-23T16:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24916","summary":"When installing Tenable Network Monitor to a non-default location on a Windows host, Tenable Network Monitor versions prior to 6.5.1 did not enforce secure permissions for sub-directories. This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00023,"ranking_epss":0.06278,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.tenable.com/security/tns-2025-10"],"published_time":"2025-05-23T16:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3941","summary":"Improper Handling of Windows ::DATA Alternate Data Stream vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00379,"ranking_epss":0.59427,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://www.honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3942","summary":"Improper Output Neutralization for Logs vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45888,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.honeywell.com/us/en/product-security#security-notices","https://www.tridium.com/us/en/product-security"],"published_time":"2025-05-22T13:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3943","summary":"Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":4.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00422,"ranking_epss":0.62122,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3944","summary":"Incorrect Permission Assignment for Critical Resource vulnerability in Tridium Niagara Framework on QNX, Tridium Niagara Enterprise Security on QNX allows File Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00335,"ranking_epss":0.56459,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://www.honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3936","summary":"Incorrect Permission Assignment for Critical Resource vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00172,"ranking_epss":0.38635,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://www.honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3937","summary":"Use of Password Hash With Insufficient Computational Effort vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":7.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.7,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://www.honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3938","summary":"Missing Cryptographic Step vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00173,"ranking_epss":0.38741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://www.honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3939","summary":"Observable Response Discrepancy vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.5187,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3940","summary":"Improper Use of Validation Framework vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00348,"ranking_epss":0.57381,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.niagara-community.com/category/tech_bull","https://honeywell.com/us/en/product-security#security-notices"],"published_time":"2025-05-22T13:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-25539","summary":"Local File Inclusion vulnerability in Vasco v3.14and before allows a remote attacker to obtain sensitive information via help menu.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00209,"ranking_epss":0.43291,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://drive.google.com/drive/folders/1Va0QP5TtsRprk-pXL3bUfCwTSjYbqnLK?usp=sharing","https://gist.github.com/sornram9254/15eb12579b7acda8ba021217366960bd"],"published_time":"2025-05-21T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33104","summary":"IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.31588,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7233438"],"published_time":"2025-05-14T19:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26646","summary":"External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00236,"ranking_epss":0.46561,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646"],"published_time":"2025-05-13T22:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43571","summary":"Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html"],"published_time":"2025-05-13T21:16:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43572","summary":"Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-45.html"],"published_time":"2025-05-13T21:16:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43568","summary":"Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html"],"published_time":"2025-05-13T21:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43569","summary":"Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html"],"published_time":"2025-05-13T21:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43570","summary":"Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html"],"published_time":"2025-05-13T21:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43551","summary":"Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html"],"published_time":"2025-05-13T21:16:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43548","summary":"Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dimension/apsb25-45.html"],"published_time":"2025-05-13T21:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43549","summary":"Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html"],"published_time":"2025-05-13T21:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4660","summary":"A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent. \n\n\n\nThis does not impact Linux or OSX Secure Connector.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":8.7,"epss":0.01516,"ranking_epss":0.81266,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://forescout.my.site.com/support/s/article/"],"published_time":"2025-05-13T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43545","summary":"Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb25-44.html"],"published_time":"2025-05-13T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43546","summary":"Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb25-44.html"],"published_time":"2025-05-13T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43547","summary":"Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb25-44.html"],"published_time":"2025-05-13T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43555","summary":"Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-42.html"],"published_time":"2025-05-13T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43556","summary":"Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-42.html"],"published_time":"2025-05-13T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-43557","summary":"Animate versions 24.0.8, 23.0.11 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-42.html"],"published_time":"2025-05-13T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30329","summary":"Animate versions 24.0.8, 23.0.11 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-42.html"],"published_time":"2025-05-13T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30330","summary":"Illustrator versions 29.3, 28.7.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-43.html"],"published_time":"2025-05-13T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30324","summary":"Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/photoshop/apsb25-40.html"],"published_time":"2025-05-13T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30325","summary":"Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/photoshop/apsb25-40.html"],"published_time":"2025-05-13T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30328","summary":"Animate versions 24.0.8, 23.0.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-42.html"],"published_time":"2025-05-13T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30310","summary":"Dreamweaver Desktop versions 21.4 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/dreamweaver/apsb25-35.html"],"published_time":"2025-05-13T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30318","summary":"InDesign Desktop versions ID19.5.2, ID20.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-37.html"],"published_time":"2025-05-13T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30319","summary":"InDesign Desktop versions ID19.5.2, ID20.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-37.html"],"published_time":"2025-05-13T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30320","summary":"InDesign Desktop versions ID19.5.2, ID20.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-37.html"],"published_time":"2025-05-13T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-35471","summary":"conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. By writing a specially crafted openssl.cnf file in OPENSSLDIR, a non-privileged local user can execute arbitrary code with the privileges of the user or process loading openssl-feedstock DLLs. Miniforge before 24.5.0 is also affected.","cvss":7.0,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":7.0,"epss":0.00052,"ranking_epss":0.161,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/conda-forge/openssl-feedstock/commit/066e83c5226bafe90a9c0575b077ce30cd5f5921","https://github.com/conda-forge/openssl-feedstock/issues/201"],"published_time":"2025-05-13T02:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4540","summary":"A vulnerability was found in MTSoftware C-Lodop 6.6.1.1 on Windows. It has been rated as critical. This issue affects some unknown processing of the component CLodopPrintService. The manipulation leads to unquoted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 6.6.13 is able to address this issue. It is recommended to upgrade the affected component.","cvss":7.3,"cvss_version":4.0,"cvss_v2":6.0,"cvss_v3":7.0,"cvss_v4":7.3,"epss":0.00074,"ranking_epss":0.22325,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://0nightsedge0.github.io/2025/05/14/CVE-2025-4540-C-Lodop/","https://vuldb.com/?ctiid.308285","https://vuldb.com/?id.308285","https://vuldb.com/?submit.566789","https://vuldb.com/?submit.566789"],"published_time":"2025-05-11T16:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4525","summary":"A vulnerability, which was classified as critical, has been found in Discord 1.0.9188 on Windows. Affected by this issue is some unknown functionality in the library WINSTA.dll. The manipulation leads to uncontrolled search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","cvss":7.3,"cvss_version":4.0,"cvss_v2":6.0,"cvss_v3":7.0,"cvss_v4":7.3,"epss":0.0007,"ranking_epss":0.2141,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://gist.github.com/shellkraft/ac4be6a3953e2889a7bf54aea2db88c2","https://vuldb.com/?ctiid.308270","https://vuldb.com/?id.308270","https://vuldb.com/?submit.562788","https://gist.github.com/shellkraft/ac4be6a3953e2889a7bf54aea2db88c2"],"published_time":"2025-05-10T23:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-1992","summary":"IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 could allow an authenticated user in federation environment, to cause a denial of service due to insufficient release of allocated memory after usage.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36544,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7232515","https://security.netapp.com/advisory/ntap-20250516-0002/"],"published_time":"2025-05-05T17:18:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-52903","summary":"IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00133,"ranking_epss":0.32941,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7232336"],"published_time":"2025-05-01T23:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-4178","summary":"A vulnerability was found in xiaowei1118 java_server up to 11a5bac8f4ba1c17e4bc1b27cad6d24868500e3a on Windows and classified as critical. This issue affects some unknown processing of the file /src/main/java/com/changyu/foryou/controller/FoodController.java of the component File Upload API. The manipulation leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.","cvss":5.3,"cvss_version":4.0,"cvss_v2":5.5,"cvss_v3":5.4,"cvss_v4":5.3,"epss":0.00158,"ranking_epss":0.36643,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md","https://vuldb.com/?ctiid.306797","https://vuldb.com/?id.306797","https://vuldb.com/?submit.561794","https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250418-02.md"],"published_time":"2025-05-01T22:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-46619","summary":"A security issue has been discovered in Couchbase Server before 7.6.4 and fixed in v.7.6.4 and v.7.2.7 for Windows that could allow unauthorized access to sensitive files. Depending on the level of privileges, this vulnerability may grant access to files such as /etc/passwd or /etc/shadow.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00487,"ranking_epss":0.65493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.couchbase.com/server/current/release-notes/relnotes.html","https://forums.couchbase.com/tags/security","https://www.couchbase.com/alerts/"],"published_time":"2025-04-30T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3928","summary":"Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: \"Webservers can be compromised through bad actors creating and executing webshells.\" Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28.","cvss":8.7,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":8.7,"epss":0.16157,"ranking_epss":0.94812,"kev":true,"propose_action":"Commvault Web Server contains an unspecified vulnerability that allows a remote, authenticated attacker to create and execute webshells.","ransomware_campaign":"Unknown","references":["https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-3928","https://www.cisa.gov/news-events/alerts/2025/05/22/advisory-update-cyber-threat-activity-targeting-commvaults-saas-cloud-application-metallic","https://www.commvault.com/blogs/customer-security-update","https://www.commvault.com/blogs/notice-security-advisory-update","https://www.commvault.com/blogs/security-advisory-march-7-2025","https://www.bleepingcomputer.com/news/security/commvault-says-recent-breach-didnt-impact-customer-backup-data/","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-3928"],"published_time":"2025-04-25T16:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-25045","summary":"IBM InfoSphere Information 11.7 Server authenticated user to obtain sensitive information when a detailed technical error message is returned in a request.  This information could be used in further attacks against the system.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00172,"ranking_epss":0.38524,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7231332"],"published_time":"2025-04-23T23:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-22351","summary":"IBM InfoSphere Information 11.7 Server does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35229,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7229921"],"published_time":"2025-04-23T23:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-34028","summary":"The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP.\n\n\n\n\n\nThis issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.","cvss":9.3,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":10.0,"cvss_v4":9.3,"epss":0.62578,"ranking_epss":0.98377,"kev":true,"propose_action":"Commvault Command Center contains a path traversal vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code.","ransomware_campaign":"Unknown","references":["https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html","https://github.com/watchtowrlabs/watchTowr-vs-Commvault-PreAuth-RCE-CVE-2025-34028","https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/","https://www.vulncheck.com/advisories/commvault-command-center-innovation-release-unauthenticated-install-package-path-traversal","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-34028"],"published_time":"2025-04-22T17:16:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27907","summary":"IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.","cvss":4.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.1,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.3648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7231514"],"published_time":"2025-04-22T17:16:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23249","summary":"NVIDIA NeMo Framework contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.01422,"ranking_epss":0.80628,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5641"],"published_time":"2025-04-22T16:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23250","summary":"NVIDIA NeMo Framework contains a vulnerability where an attacker could cause an improper limitation of a pathname to a restricted directory by an arbitrary file write. A successful exploit of this vulnerability might lead to code execution and data tampering.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00407,"ranking_epss":0.61199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5641"],"published_time":"2025-04-22T16:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23251","summary":"NVIDIA NeMo Framework contains a vulnerability where a user could cause an improper control of generation of code by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering.","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.00488,"ranking_epss":0.65522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5641"],"published_time":"2025-04-22T16:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49808","summary":"IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 could allow an authenticated user to spoof the identity of another user due to improper authorization which could allow the user to bypass access restrictions.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00132,"ranking_epss":0.32756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7231180"],"published_time":"2025-04-18T11:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-45651","summary":"IBM Sterling Connect:Direct Web Services 6.1.0, 6.2.0, and 6.3.0 \n\ndoes not invalidate session after a browser closure which could allow an authenticated user to impersonate another user on the system.","cvss":6.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.3,"cvss_v4":null,"epss":0.00132,"ranking_epss":0.32756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7231178"],"published_time":"2025-04-18T11:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-3619","summary":"Heap buffer overflow in Codecs in Google Chrome on Windows prior to 135.0.7049.95 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00121,"ranking_epss":0.31088,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_15.html","https://issues.chromium.org/issues/409619251"],"published_time":"2025-04-16T21:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-43851","summary":"IBM Aspera Console 3.4.0 through 3.4.4\n\nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.35048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7169766"],"published_time":"2025-04-14T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-43852","summary":"IBM Aspera Console 3.4.0 through 3.4.4 could disclose sensitive information in HTTP headers that could be used in further attacks against the system.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00244,"ranking_epss":0.47787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7169766"],"published_time":"2025-04-14T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-27272","summary":"IBM Aspera Console 3.4.0 through 3.4.4 allows passwords to be reused when a new user logs into the system.","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00175,"ranking_epss":0.38989,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7169766"],"published_time":"2025-04-14T21:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-43847","summary":"IBM Aspera Console 3.4.0 through 3.4.4 \n\nis vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7169766"],"published_time":"2025-04-14T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-43850","summary":"IBM Aspera Console 3.4.0 through 3.4.4\n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00297,"ranking_epss":0.53182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7169766"],"published_time":"2025-04-14T21:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-42007","summary":"IBM Sterling Control Center 6.2.1, 6.3.1, and 6.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.0011,"ranking_epss":0.29361,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7230560"],"published_time":"2025-04-10T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-43035","summary":"IBM Sterling Control Center 6.2.1, 6.3.1, and 6.4.0 allows web pages to be stored locally which can be read by another user on the system.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.18081,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7230561"],"published_time":"2025-04-10T14:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-0539","summary":"In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself.","cvss":5.9,"cvss_version":4.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":5.9,"epss":0.0014,"ranking_epss":0.3424,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://advisories.octopus.com/post/2025/sa2025-06"],"published_time":"2025-04-10T06:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30299","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30300","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30301","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30302","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30303","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30304","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30295","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30296","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30297","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30298","summary":"Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30151,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/framemaker/apsb25-33.html"],"published_time":"2025-04-08T19:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27204","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27195","summary":"Media Encoder versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/media-encoder/apsb25-24.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27196","summary":"Premiere Pro versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/premiere_pro/apsb25-28.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27198","summary":"Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.58431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/photoshop/apsb25-30.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27199","summary":"Animate versions 24.0.7, 23.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-31.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27200","summary":"Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00153,"ranking_epss":0.35978,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-31.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27201","summary":"Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-31.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27202","summary":"Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/animate/apsb25-31.html"],"published_time":"2025-04-08T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27184","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27185","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00101,"ranking_epss":0.27767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27186","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27187","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27193","summary":"Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/bridge/apsb25-25.html"],"published_time":"2025-04-08T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27194","summary":"Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/media-encoder/apsb25-24.html"],"published_time":"2025-04-08T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27182","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27183","summary":"After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00115,"ranking_epss":0.30164,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/after_effects/apsb25-23.html"],"published_time":"2025-04-08T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-1095","summary":"IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). The vulnerability allows any interactively logged in users on the target computer to run commands with full privileges in the context of NT AUTHORITY\\SYSTEM. This allows for a low privileged attacker to escalate their privileges. This vulnerability is due to an incomplete fix for CVE-2024-25029.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11763,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7230335"],"published_time":"2025-04-08T16:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-4877","summary":"OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00234,"ranking_epss":0.46304,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://community.openvpn.net/openvpn/wiki/CVE-2024-4877","https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"],"published_time":"2025-04-03T16:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-56341","summary":"IBM Content Navigator 3.0.11, 3.0.15, and 3.1.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.0011,"ranking_epss":0.29397,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7229839"],"published_time":"2025-04-02T15:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-25051","summary":"IBM Jazz Reporting Service 7.0.2 and 7.0.3 does not invalidate session after logout which could allow an authenticated privileged user to impersonate another user on the system.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.37008,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7229760"],"published_time":"2025-04-02T15:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27556","summary":"An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.views.LoginView, django.contrib.auth.views.LogoutView, and django.views.i18n.set_language are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.","cvss":5.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.8,"cvss_v4":null,"epss":0.00169,"ranking_epss":0.38091,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://docs.djangoproject.com/en/dev/releases/security/","https://groups.google.com/g/django-announce","https://www.djangoproject.com/weblog/2025/apr/02/security-releases/","http://www.openwall.com/lists/oss-security/2025/04/02/2"],"published_time":"2025-04-02T13:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-55895","summary":"IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser.  This information could be used in further attacks against the system.","cvss":2.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":2.7,"cvss_v4":null,"epss":0.00172,"ranking_epss":0.38618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7185450"],"published_time":"2025-03-29T13:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-7577","summary":"IBM InfoSphere Information Server 11.7 could disclose sensitive user credentials from log files during new installation of the product.","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00181,"ranking_epss":0.39748,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7185020"],"published_time":"2025-03-29T00:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43186","summary":"IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information that is stored locally under certain conditions.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00117,"ranking_epss":0.30584,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7184980"],"published_time":"2025-03-29T00:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-51477","summary":"IBM InfoSphere Information Server 11.7 \n\ncould allow an authenticated to obtain sensitive username information due to an observable response discrepancy.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00194,"ranking_epss":0.41323,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7185058"],"published_time":"2025-03-29T00:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-2783","summary":"Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)","cvss":8.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.3,"cvss_v4":null,"epss":0.39478,"ranking_epss":0.9731,"kev":true,"propose_action":"Google Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.","ransomware_campaign":"Unknown","references":["https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html","https://issues.chromium.org/issues/405143032","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2783"],"published_time":"2025-03-26T16:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-39163","summary":"IBM Cognos Controller 11.0.0 through 11.1.0 is vulnerable to a Client-Side Desync (CSD) attack where an attacker could exploit a desynchronized browser connection that could lead to further cross-site scripting (XSS) attacks.","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7192746"],"published_time":"2025-03-26T14:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-8196","summary":"In mintplex-labs/anything-llm v1.5.11 desktop version for Windows, the application opens server port 3001 on 0.0.0.0 with no authentication by default. This vulnerability allows an attacker to gain full backend access, enabling them to perform actions such as deleting all data from the workspace.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00196,"ranking_epss":0.41535,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://github.com/mintplex-labs/anything-llm/commit/9bfe477f10b188bfe3508ac29105df80d4522ece","https://huntr.com/bounties/dbde1c71-7aa5-46f6-847a-d89793cf97a9"],"published_time":"2025-03-20T10:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-51459","summary":"IBM InfoSphere Information Server 11.7 could allow a local user to execute privileged commands due to the improper handling of permissions.","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.00015,"ranking_epss":0.03145,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://www.ibm.com/support/pages/node/7185056"],"published_time":"2025-03-19T19:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-23360","summary":"NVIDIA Nemo Framework contains a vulnerability where a user could cause a relative path traversal issue by arbitrary file write. A successful exploit of this vulnerability may lead to code execution and data tampering.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00157,"ranking_epss":0.36559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://nvidia.custhelp.com/app/answers/detail/a_id/5623"],"published_time":"2025-03-11T20:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27177","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27178","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27179","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27169","summary":"Illustrator versions 29.2.1, 28.7.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-17.html"],"published_time":"2025-03-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27170","summary":"Illustrator versions 29.2.1, 28.7.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/illustrator/apsb25-17.html"],"published_time":"2025-03-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27171","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27174","summary":"Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00043,"ranking_epss":0.13003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-14.html"],"published_time":"2025-03-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27175","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27176","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27162","summary":"Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-14.html"],"published_time":"2025-03-11T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27163","summary":"Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0009,"ranking_epss":0.25532,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-14.html","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2134"],"published_time":"2025-03-11T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27164","summary":"Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00083,"ranking_epss":0.24319,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/acrobat/apsb25-14.html","https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2136"],"published_time":"2025-03-11T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27166","summary":"InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00042,"ranking_epss":0.12671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://helpx.adobe.com/security/products/indesign/apsb25-19.html"],"published_time":"2025-03-11T18:15:34","vendor":null,"product":null,"version":null}]}