Top Notable Enterprise Remote Vulnerabilities

31-10-2025
A concise overview for IS leaders, emphasizing actively exploited vulnerabilities, their significance, and the critical need for remediation.
Currently Trending Enterprise Remote Vulnerabilities
Trending CVEs
Vulnerability
Notables
CVE-2025-10932
Vulnerability
Progress MOVEit Uncontrolled Resource Consumption
Notables
Potential Risk of Exploitation
CVE-2025-10680
Vulnerability
OpenVPN Script Injection on Linux/MacOS
Notables
Potential Risk of Exploitation
CVE-2025-36386
Vulnerability
IBM Maximo Application Suite Authentication Bypass
Notables
Potential Risk of Exploitation
CVE-2025-55752
Vulnerability
Apache Tomcat Relative Path Traversal
Notables
Proof of Concept Available, Actively Exploited
CVE-2025-55754
Vulnerability
Apache Tomcat ANSI Escape Hijack
Notables
Potential Risk of Exploitation
CVE-2025-61795
Vulnerability
Apache Tomcat Multipart Upload Crash
Notables
Potential Risk of Exploitation
CVE-2025-40778
Vulnerability
BIND 9 Cache Poisoning
Notables
Limited Public Information Available
CVE-2025-62525
Vulnerability
OpenWrt ubusd Heap Overflow
Notables
Limited Public Information Available
CVE-2025-62526
Vulnerability
OpenWrt ltq-ptm Kernal Memory Exposure
Notables
Limited Public Information Available
CVE-2025-62168
Vulnerability
Squid Information Disclosure in Error Handling
Notables
Limited Public Information Available
CVE-2025-62725
Vulnerability
Docker Compose Path Traversal
Notables
Potential Risk of Exploitation
CVE-2025-62712
Vulnerability
JumpServer Token Exposure
Notables
Potential Risk of Exploitation
CVE-2025-11705
Vulnerability
Anti-malware WordPress Plugin Arbitrary File Read
Notables
Limited Public Information Available
CVE-2025-46423
Vulnerability
Dell Unity Command Injection
Notables
Limited Public Information Available
CVE-2025-22131
Vulnerability
PhpSpreadsheet Cross-Site Scripting
Notables
Limited Public Information Available
CVE-2025-60506
Vulnerability
Moodle PDF Annotator plugin stored cross-site scripting
Notables
Limited Public Information Available
CVE-2025-61922
Vulnerability
PrestaShop Checkout module Missing Validation Leads to Account Takeover
Notables
Potential Risk of Exploitation
CVE-2025-58428
Vulnerability
Veeder-Root TLS4B Command Injection
Notables
Limited Public Information Available
CVE-2025-2905
Vulnerability
WSO2 API Manager XXE
Notables
Potential Risk of Exploitation
CVE-2025-11621
Vulnerability
Hashicorp AWS Auth Bypass
Notables
Potential Risk of Exploitation