NA - CVE-2025-5687 - A vulnerability in Mozilla VPN on macOS allows...
A vulnerability in Mozilla VPN on macOS allows privilege escalation from a normal user to root. *This bug only affects Mozilla VPN on macOS. Other operating systems are unaffected.* This...
NA - CVE-2025-5986 - A crafted HTML email using mailbox:/// links...
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is...
Medium - CVE-2025-5144 - The The Events Calendar plugin for WordPress is...
The The Events Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-date-*’ parameters in all versions up to, and including, 6.13.2 due to insufficient input...
NA - CVE-2025-40914 - Perl CryptX before version 0.087 contains a...
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow...
Medium - CVE-2025-4605 - A maliciously crafted .usdc file, when loaded...
A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a...
NA - CVE-2025-4922 - Nomad Community and Nomad Enterprise (“Nomad”)...
Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in...
Medium - CVE-2025-0163 - IBM Security Verify Access Appliance and Docker...
IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts.
Medium - CVE-2025-3473 - IBM Security Guardium 12.1 could allow a local...
IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program.