CVE-2025-2775
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
This curated brief highlights 10 critical vulnerabilities and 36 high-priority updates requiring immediate attention.
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability - Active in CISA KEV catalog.
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability - Active in CISA KEV catalog.
Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Active in CISA KEV catalog.
CrushFTP Unprotected Alternate Channel Vulnerability - Active in CISA KEV catalog.
PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability - Active in CISA KEV catalog.
Cisco Identity Services Engine Injection Vulnerability - Active in CISA KEV catalog.
Cisco Identity Services Engine Injection Vulnerability - Active in CISA KEV catalog.
D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability - Active in CISA KEV catalog.
D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability - Active in CISA KEV catalog.
D-Link DNR-322L Download of Code Without Integrity Check Vulnerability - Active in CISA KEV catalog.
In Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the atta...
Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): 2.4.0. Users are recommended to upgrade to version 2.5.0, which fixes the ...
If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to rej...
A vulnerability was found in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. It has been classified as critical. This affects an unknown part of the component SSH Service. The manipulation ...
jwe is a Ruby implementation of the RFC 7516 JSON Web Encryption (JWE) standard. In versions 1.1.0 and below, authentication tags of encrypted JWEs can be brute forced, which may result in loss of con...
An integer overflow vulnerability in the loading of ExecuTorch models can cause smaller-than-expected memory regions to be allocated, potentially resulting in code execution or other undesirable effec...
A vulnerability was found in Belkin F9K1009 and F9K1010 2.00.04/2.00.09 and classified as critical. Affected by this issue is some unknown functionality of the component Web Interface. The manipulatio...
By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and ...
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP2 (9.8.2.12) could allow an unauthenticated attacker to conduct a path traversal attack due to insuffic...
Burk Technology ARC Solo's password change mechanism can be utilized without proper authentication procedures, allowing an attacker to take over the device. A password change request can be sent dir...
Use after free in Extensions in Google Chrome prior to 139
Use after free in Cast in Google Chrome prior to 139
The Eventin plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4
Tyler Technologies ERP Pro 9 SaaS allows an authenticated user to escape the application and execute limited operating system commands within the remote Microsoft Windows environment with the privileges of the authenticated user
The /users endpoint in Statamic Core before 2
Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
In Xerox FreeFlow Core version 8
Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune
EDK2 contains a vulnerability in BIOS where an attacker may cause âProtection Mechanism Failureâ by local access
The installer for SAN Host Utilities for Windows versions prior to 8
Authentication Bypass Using an Alternate Path or Channel vulnerability in WPExperts Post SMTP allows Authentication Bypass
skops is a Python library which helps users share and ship their scikit-learn based models
The affected product allows firmware updates to be downloaded from EG4's website, transferred via USB dongles, or installed through EG4's Monitoring Center (remote, cloud-connected interface) or via a serial connection, and can install these files without integrity checks
A TLS vulnerability exists in the phone application used to manage a connected device
Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createClassArms
Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createSessionTerm
Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createStudents
Student Attendance Management System v1 was discovered to contain a SQL injection vulnerability via the emailAddress parameter at createClassTeacher
Student Attendance Management System v1 was discovered to contain a SQL injection vulnerability via the username parameter at index
Hospital Management System v4 was discovered to contain multiple SQL injection vulnerabilities in func3
Hospital Management System v4 was discovered to contain a SQL injection vulnerability via the doctor_contact parameter in doctorsearch
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application
A cross-site scripting (XSS) vulnerability in the PdfViewer component of Agenzia Impresa Eccobook 2
MiR software versions prior to version 3
A vulnerability in the Suite Applications Services component of Mitel MiCollab 10
In GStreamer through 1
The affected product does not limit the number of attempts for inputting the correct PIN for a registered product, which may allow an attacker to gain unauthorized access using brute-force methods if they possess a valid device serial number
GPMAW 14, a bioinformatics software, has a critical vulnerability related to insecure file permissions in its installation directory
On multiple products of SEIKO EPSON and FUJIFILM Corporation, the initial administrator password is easy to guess from the information available via SNMP
LinkJoin through 882f196 mishandles lacks type checking in password reset
LinkJoin through 882f196 mishandles token ownership in password reset
IBM i 7
OpenMetadata <=1
OpenMetadata <=1
Cancelling a query (e