Export limit exceeded: 42196 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (42196 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-60660 1 Tenda 2 Ac18, Ac18 Firmware 2025-10-07 7.5 High
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the mac parameter in the fromAdvSetMacMtuWan function.
CVE-2025-60662 1 Tenda 2 Ac18, Ac18 Firmware 2025-10-07 7.5 High
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanSpeed parameter in the fromAdvSetMacMtuWan function.
CVE-2025-60663 1 Tenda 2 Ac18, Ac18 Firmware 2025-10-07 7.5 High
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the wanMTU parameter in the fromAdvSetMacMtuWan function.
CVE-2025-60661 1 Tenda 2 Ac18, Ac18 Firmware 2025-10-07 5.3 Medium
Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the cloneType parameter in the fromAdvSetMacMtuWan function.
CVE-2025-23012 1 Fedorarepository 1 Fcrepo 2025-10-07 7.5 High
Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials and privileges to read read local files by manipulating datastreams. Fedora Repository 3.8.1 was released on 2015-06-11 and is no longer maintained. Migrate to a currently supported version (6.5.1 as of 2025-01-23).
CVE-2024-41026 1 Linux 1 Linux Kernel 2025-10-07 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length No check is done on the size of the data to be transmiited. This causes a kernel panic when this size exceeds the sg_miter's length. Limit the number of transmitted bytes to sgm->length.
CVE-2025-27253 2025-10-07 6.1 Medium
A CWE-15 "External Control of System or Configuration Setting" in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that establishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network.
CVE-2025-61587 1 Weblate 1 Weblate 2025-10-07 6.1 Medium
Weblate is a web based localization tool. An open redirect exists in versions 5.13.2 and below via the redir parameter on .within.website when Weblate is configured with Anubis and REDIRECT_DOMAINS is not set. An attacker can craft a URL on the legitimate domain that redirects a victim to an attacker-controlled site. The redirect can also be used to initiate drive-by downloads (redirecting to a URL that serves a malicious file), increasing the risk to end users. This issue is fixed in version 5.13.3.
CVE-2025-61691 1 Keyence 1 Vt Studio 2025-10-07 7.8 High
VT STUDIO versions 8.53 and prior contain an out-of-bounds read vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.
CVE-2025-2574 1 Xpdf 1 Xpdf 2025-10-06 N/A
Out-of-bounds array write in Xpdf 4.05 and earlier, due to incorrect integer overflow checking in the PostScript function interpreter code.
CVE-2025-11279 1 Axosoft 1 Scrum And Bug Tracking 2025-10-06 5.5 Medium
A vulnerability was detected in Axosoft Scrum and Bug Tracking 22.1.1.11545. This issue affects some unknown processing of the component Add Work Item Page. The manipulation of the argument Title results in csv injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-45552 1 Qualcomm 292 Apq8064au, Apq8064au Firmware, Fastconnect 6200 and 289 more 2025-10-06 8.2 High
Information disclosure may occur during a video call if a device resets due to a non-conforming RTCP packet that doesn`t adhere to RFC standards.
CVE-2024-45551 1 Qualcomm 484 Aqt1000, Aqt1000 Firmware, Ar8035 and 481 more 2025-10-06 6.2 Medium
Cryptographic issue occurs during PIN/password verification using Gatekeeper, where RPMB writes can be dropped on verification failure, potentially leading to a user throttling bypass.
CVE-2025-21448 1 Qualcomm 538 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 535 more 2025-10-06 7.5 High
Transient DOS may occur while parsing SSID in action frames.
CVE-2025-21435 1 Qualcomm 298 Ar8035, Ar8035 Firmware, Csr8811 and 295 more 2025-10-06 7.5 High
Transient DOS may occur while parsing extended IE in beacon.
CVE-2025-21434 1 Qualcomm 244 Ar8035, Ar8035 Firmware, Fastconnect 6700 and 241 more 2025-10-06 7.5 High
Transient DOS may occur while parsing EHT operation IE or EHT capability IE.
CVE-2025-21430 1 Qualcomm 450 315 5g Iot Modem, 315 5g Iot Modem Firmware, Apq8017 and 447 more 2025-10-06 7.5 High
Transient DOS while connecting STA to AP and initiating ADD TS request from AP to establish TSpec session.
CVE-2025-9303 1 Totolink 2 A720r, A720r Firmware 2025-10-06 8.8 High
A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
CVE-2025-9385 2 Appneta, Broadcom 2 Tcpreplay, Tcpreplay 2025-10-06 5.3 Medium
A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fix this issue. It is advisable to upgrade the affected component.
CVE-2025-9386 2 Appneta, Broadcom 2 Tcpreplay, Tcpreplay 2025-10-06 5.3 Medium
A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.2-beta3 is sufficient to resolve this issue. You should upgrade the affected component.