Vulnerabilities (CVE)

Total 309442 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-54130 1 Anysphere 1 Cursor 2025-08-25 N/A 7.5 HIGH
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions less than 1.3.9. If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive editor files, such as the .vscode/settings.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
CVE-2025-54135 1 Anysphere 1 Cursor 2025-08-25 N/A 8.5 HIGH
Cursor is a code editor built for programming with AI. Cursor allows writing in-workspace files with no user approval in versions below 1.3.9, If the file is a dotfile, editing it requires approval but creating a new one doesn't. Hence, if sensitive MCP files, such as the .cursor/mcp.json file don't already exist in the workspace, an attacker can chain a indirect prompt injection vulnerability to hijack the context to write to the settings file and trigger RCE on the victim without user approval. This is fixed in version 1.3.9.
CVE-2025-55482 1 Tenda 2 Ac6, Ac6 Firmware 2025-08-25 N/A 7.5 HIGH
Tenda AC6 V15.03.06.23_multi is vulnerable to Buffer Overflow in the formSetCfm function.
CVE-2025-55498 1 Tenda 2 Ac6, Ac6 Firmware 2025-08-25 N/A 7.5 HIGH
Tenda AC6 V15.03.06.23_multi was discovered to contain a buffer overflow via the time parameter in the fromSetSysTime function.
CVE-2025-27392 1 Siemens 2 Scalance Lpe9403, Scalance Lpe9403 Firmware 2025-08-25 N/A 7.2 HIGH
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0). Affected devices do not properly sanitize user input when creating new VXLAN configurations. This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.
CVE-2025-2092 1 Checkmk 1 Checkmk 2025-08-25 N/A 7.5 HIGH
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p29, <2.2.0p41 and <=2.1.0p49 (EOL) causes remote site authentication secrets to be written to log files accessible to administrators.
CVE-2025-2596 1 Checkmk 1 Checkmk 2025-08-25 N/A 5.3 MEDIUM
Session logout could be overwritten in Checkmk GmbH's Checkmk versions <2.3.0p30, <2.2.0p41, and 2.1.0p49 (EOL)
CVE-2025-1075 1 Checkmk 1 Checkmk 2025-08-25 N/A 7.5 HIGH
Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators.
CVE-2025-25297 1 Humansignal 1 Label Studio 2025-08-25 N/A 8.6 HIGH
Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vulnerability in its endpoint configuration. When creating an S3 storage connection, the application allows users to specify a custom S3 endpoint URL via the s3_endpoint parameter. This endpoint URL is passed directly to the boto3 AWS SDK without proper validation or restrictions on the protocol or destination. The vulnerability allows an attacker to make the application send HTTP requests to arbitrary internal services by specifying them as the S3 endpoint. When the storage sync operation is triggered, the application attempts to make S3 API calls to the specified endpoint, effectively making HTTP requests to the target service and returning the response in error messages. This SSRF vulnerability enables attackers to bypass network segmentation and access internal services that should not be accessible from the external network. The vulnerability is particularly severe because error messages from failed requests contain the full response body, allowing data exfiltration from internal services. Version 1.16.0 contains a patch for the issue.
CVE-2025-25296 1 Humansignal 1 Label Studio 2025-08-25 N/A 6.1 MEDIUM
Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's `/projects/upload-example` endpoint allows injection of arbitrary HTML through a `GET` request with an appropriately crafted `label_config` query parameter. By crafting a specially formatted XML label config with inline task data containing malicious HTML/JavaScript, an attacker can achieve Cross-Site Scripting (XSS). While the application has a Content Security Policy (CSP), it is only set in report-only mode, making it ineffective at preventing script execution. The vulnerability exists because the upload-example endpoint renders user-provided HTML content without proper sanitization on a GET request. This allows attackers to inject and execute arbitrary JavaScript in victims' browsers by getting them to visit a maliciously crafted URL. This is considered vulnerable because it enables attackers to execute JavaScript in victims' contexts, potentially allowing theft of sensitive data, session hijacking, or other malicious actions. Version 1.16.0 contains a patch for the issue.
CVE-2025-58043 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58042 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58041 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58040 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58039 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58038 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58037 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58036 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-58035 2025-08-23 N/A N/A
Rejected reason: Not used
CVE-2025-24469 2025-08-23 N/A N/A
Rejected reason: Not used