CVE & Vulnerability RSS Feed
857 subscribers
71.7K links
Real-time CVE notification channel provided by cvefeed.io !
Download Telegram
🚨 CVE-2025-64696

πŸ“’ Source: None

πŸ’£ CVSS Score: 3.3 (LOW)

πŸ“‘ Remotely Exploitable: False

Android App "Brother iPrint&Scan" versions 6.13.7 and earlier improperly uses an external cache directory. If exploited, application-specific files may be accessed from other malicious applications.

πŸ“… Published Date: 2025-12-09 10:20:26.725733+00:00

https://cvefeed.io/vuln/detail/CVE-2025-64696
🚨 CVE-2025-59030

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.5 (HIGH)

πŸ“‘ Remotely Exploitable: True

An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP.

πŸ“… Published Date: 2025-12-09 10:20:26.724562+00:00

https://cvefeed.io/vuln/detail/CVE-2025-59030
🚨 CVE-2025-59029

πŸ“’ Source: None

πŸ’£ CVSS Score: 5.3 (MEDIUM)

πŸ“‘ Remotely Exploitable: True

An attacker can trigger an assertion failure by requesting crafted DNS records, waiting for them to be inserted into the records cache, then send a query with qtype set to ANY.

πŸ“… Published Date: 2025-12-09 10:20:26.725006+00:00

https://cvefeed.io/vuln/detail/CVE-2025-59029
🚨 CVE-2025-41752

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.726269+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41752
🚨 CVE-2025-41751

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.729640+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41751
🚨 CVE-2025-41750

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.725219+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41750
🚨 CVE-2025-41749

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in port_util.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.725839+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41749
🚨 CVE-2025-41748

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.730752+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41748
🚨 CVE-2025-41747

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.731266+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41747
🚨 CVE-2025-41746

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.731036+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41746
🚨 CVE-2025-41745

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.730054+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41745
🚨 CVE-2025-41697

πŸ“’ Source: None

πŸ’£ CVSS Score: 6.8 (MEDIUM)

πŸ“‘ Remotely Exploitable: False

An attacker can use an undocumented UART port on the PCB as a side-channel to get root access e.g. with the credentials obtained from CVE-2025-41692.

πŸ“… Published Date: 2025-12-09 10:20:26.729595+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41697
🚨 CVE-2025-41696

πŸ“’ Source: None

πŸ’£ CVSS Score: 4.6 (MEDIUM)

πŸ“‘ Remotely Exploitable: False

An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.

πŸ“… Published Date: 2025-12-09 10:20:26.725367+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41696
🚨 CVE-2025-41695

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.1 (HIGH)

πŸ“‘ Remotely Exploitable: True

An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.

πŸ“… Published Date: 2025-12-09 10:20:26.726257+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41695
🚨 CVE-2025-41694

πŸ“’ Source: None

πŸ’£ CVSS Score: 6.5 (MEDIUM)

πŸ“‘ Remotely Exploitable: True

A low privileged remote attacker can run the webshell with an empty command containing whitespace. The server will then block until it receives more data, resulting in a DoS condition of the websserver.

πŸ“… Published Date: 2025-12-09 10:20:26.736708+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41694
🚨 CVE-2025-41693

πŸ“’ Source: None

πŸ’£ CVSS Score: 4.3 (MEDIUM)

πŸ“‘ Remotely Exploitable: True

A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.

πŸ“… Published Date: 2025-12-09 10:20:26.729854+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41693
🚨 CVE-2025-41692

πŸ“’ Source: None

πŸ’£ CVSS Score: 6.8 (MEDIUM)

πŸ“‘ Remotely Exploitable: True

A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.

πŸ“… Published Date: 2025-12-09 10:20:26.730486+00:00

https://cvefeed.io/vuln/detail/CVE-2025-41692
🚨 CVE-2025-40820

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.5 (HIGH)

πŸ“‘ Remotely Exploitable: True

Affected products do not properly enforce TCP sequence number validation in specific scenarios but accept values within a broad range. This could allow an unauthenticated remote attacker e.g. to interfere with connection setup, potentially leading to a denial of service. The attack succeeds only if an attacker can inject IP packets with spoofed addresses at precisely timed moments, and it affects only TCP-based services.

πŸ“… Published Date: 2025-12-09 12:29:56.684453+00:00

https://cvefeed.io/vuln/detail/CVE-2025-40820
🚨 CVE-2025-6924

πŸ“’ Source: None

πŸ’£ CVSS Score: 5.4 (MEDIUM)

πŸ“‘ Remotely Exploitable: True

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TalentSoft Software e-BAP Automation allows Reflected XSS.This issue affects e-BAP Automation: before 42957.

πŸ“… Published Date: 2025-12-09 14:20:15.725928+00:00

https://cvefeed.io/vuln/detail/CVE-2025-6924
🚨 CVE-2025-12807

πŸ“’ Source: None

πŸ’£ CVSS Score: 0.0 (NA)

πŸ“‘ Remotely Exploitable: False

A security issue was discovered in DataMosaix Private Cloud, allowing users with low privilege to perform sensitive database operations through exposed API endpoints.

πŸ“… Published Date: 2025-12-09 14:20:15.724656+00:00

https://cvefeed.io/vuln/detail/CVE-2025-12807
🚨 CVE-2025-12705

πŸ“’ Source: None

πŸ’£ CVSS Score: 7.2 (HIGH)

πŸ“‘ Remotely Exploitable: True

The Social Reviews & Recommendations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in the 'trim_text' function in all versions up to, and including, 2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.5.

πŸ“… Published Date: 2025-12-09 14:20:15.723789+00:00

https://cvefeed.io/vuln/detail/CVE-2025-12705