CVE-2025-7775
Citrix NetScaler Memory Overflow Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
This curated brief highlights 33 critical vulnerabilities and 64 high-priority updates requiring immediate attention.
Citrix NetScaler Memory Overflow Vulnerability - Active in CISA KEV catalog.
RARLAB WinRAR Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Office Excel Remote Code Execution Vulnerability - Active in CISA KEV catalog.
Microsoft Internet Explorer Resource Management Errors Vulnerability - Active in CISA KEV catalog.
Trend Micro Apex One OS Command Injection Vulnerability - Active in CISA KEV catalog.
Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability - Active in CISA KEV catalog.
Git Link Following Vulnerability - Active in CISA KEV catalog.
Citrix Session Recording Improper Privilege Management Vulnerability - Active in CISA KEV catalog.
Citrix Session Recording Deserialization of Untrusted Data Vulnerability - Active in CISA KEV catalog.
Insecure Permissions vulnerability in sparkshop v.1.1.7 allows a remote attacker to execute arbitrary code via the Common.php component
A heap-based buffer overflow vulnerability exists in the RHS2000 parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted RHS2000 file can lead to ...
A heap-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitr...
A heap-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitr...
A heap-based buffer overflow vulnerability exists in the ISHNE parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted ISHNE ECG annotations file ...
A heap-based buffer overflow vulnerability exists in the Nex parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted .nex file can lead to arbitra...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbit...
phpgurukul Hospital Management System 4.0 is vulnerable to SQL Injection in add-doctor.php via the docname parameter.
phpgurukul Hospital Management System 4.0 is vulnerable to SQL Injection in index.php via the username parameter.
Incorrect access control in the DELT_file.xgi endpoint of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to modify arbitrary settings within the device's XML database, incl...
An integer overflow vulnerability exists in the GDF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted GDF file can lead to arbitrary code ex...
An integer overflow vulnerability exists in the ABF parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted ABF file can lead to arbitrary code ex...
SQL Injection vulnerability in SMM Panel 3.1 allowing remote attackers to gain sensitive information via a crafted HTTP request with action=service_detail.
An issue in System PDV v1.0 allows a remote attacker to obtain sensitive information via the hash parameter in a URL. The application contains an Insecure Direct Object Reference (IDOR) vulnerability,...
The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio...
A path traversal vulnerability in unauthenticated upload functionality allows a malicious actor to upload binaries and scripts to the serverâs configuration and web root directories, achieving remote ...
An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session t...
Incorrect access control in the config.xgi function of D-Link DSL-7740C with firmware DSL7740C.V6.TR069.20211230 allows attackers to download the configuration file via providing a crafted web request...
An issue was discovered in getrebuild/rebuild 4.0.4. The affected source code class is com.rebuild.web.RebuildWebInterceptor, and the affected function is preHandle In the filter code, use CodecUtils....
Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4
The Event List plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3
The Vibes plugin for WordPress is vulnerable to time-based SQL Injection via the âresourceâ parameter in all versions up to, and including, 2
A denial of service vulnerability exists in the JSONReader component of the run-llama/llama_index repository, specifically in version v0
phpgurukul Hospital Management System 4
An out-of-bounds read vulnerability exists in the Nex parsing functionality of The Biosig Project libbiosig 3
Privilege Defined With Unsafe Actions vulnerability in Apache Cassandra
Delta Electronics COMMGR has Stack-based Buffer Overflow vulnerability
Securdenâs Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants
Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation
A memory corruption vulnerability exists in the BMPv3 Image Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the PCX Image Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the BMPv3 Palette Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the PCX Image Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the WebP Image Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the BMPv3 RLE Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the PSD RLE Decoding functionality of the SAIL Image Decoding Library v0
A memory corruption vulnerability exists in the PSD Image Decoding functionality of the SAIL Image Decoding Library v0
FoxCMS 1
Langflow is a tool for building and deploying AI-powered agents and workflows
A flaw has been found in Tenda CH22 1
A security vulnerability has been detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
A flaw has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1
Adminer 4
Agiloft Release 28 downloads critical system packages over an insecure HTTP connection
Delta Electronics COMMGR has Code Injection vulnerability
IBM Cognos Command Center 10
NVIDIA NeMo Curator for all platforms contains a vulnerability where a malicious file created by an attacker could allow code injection
NVIDIA NeMo Framework for all platforms contains a vulnerability in the retrieval services component, where malicious data created by an attacker could cause a code injection
NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP component, where malicious data created by an attacker could cause a code injection issue
NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP component, where malicious data created by an attacker could cause a code injection issue
NVIDIA NeMo Framework for all platforms contains a vulnerability in the export and deploy component, where malicious data created by an attacker could cause a code injection issue
Mahara before 22
An unauthenticated unrestricted file upload vulnerability allows an attacker to upload malicious binaries and scripts to the server
PerfreeBlog v4
PerfreeBlog v4
On affected platforms running Arista EOS, maliciously formed UDP packets with source port 3503 may be accepted by EOS
ImageMagick is free and open-source software used for editing and manipulating digital images
ImageMagick is free and open-source software used for editing and manipulating digital images
IBM Cognos Command Center 10
A security vulnerability has been detected in itsourcecode Apartment Management System 1
A vulnerability was detected in itsourcecode Apartment Management System 1
A flaw has been found in itsourcecode Apartment Management System 1
A vulnerability has been found in itsourcecode Apartment Management System 1
A vulnerability was determined in Campcodes Online Water Billing System 1
A security flaw has been discovered in itsourcecode Online Tour and Travel Management System 1
A weakness has been identified in itsourcecode Online Tour and Travel Management System 1
A vulnerability has been found in 1000projects Online Project Report Submission and Evaluation System 1
A security vulnerability has been detected in itsourcecode Apartment Management System 1
A vulnerability was detected in itsourcecode Apartment Management System 1
A flaw has been found in itsourcecode Apartment Management System 1
A vulnerability has been found in itsourcecode Apartment Management System 1
A vulnerability was found in itsourcecode Apartment Management System 1
A security vulnerability has been detected in SourceCodester Online Bank Management System 1
A flaw has been found in SourceCodester Human Resource Information System 1
A vulnerability has been found in SourceCodester Human Resource Information System 1
A vulnerability was determined in Campcodes Online Water Billing System 1
D-Link DSL-7740C with firmware DSL7740C
D-Link DSL-7740C with firmware DSL7740C
A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password
D-Link DI-8100 16