Search Results (331639 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-7760 1 Aimstack 1 Aim 2025-07-21 9.6 Critical
aimhubio/aim version 3.22.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the tracking server. The vulnerability is due to overly permissive CORS settings, allowing cross-origin requests from all origins. This enables CSRF attacks on all endpoints of the tracking server, which can be chained with other existing vulnerabilities such as remote code execution, denial of service, and arbitrary file read/write.
CVE-2025-21445 1 Qualcomm 55 Qam8255p, Qam8255p Firmware, Qam8295p and 52 more 2025-07-21 7.8 High
Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host.
CVE-2025-21444 1 Qualcomm 54 Qam8255p, Qam8255p Firmware, Qam8295p and 51 more 2025-07-21 7.8 High
Memory corruption while copying the result to the transmission queue in EMAC.
CVE-2025-21426 1 Qualcomm 21 Fastconnect 7800, Fastconnect 7800 Firmware, Snapdragon and 18 more 2025-07-21 6.6 Medium
Memory corruption while processing camera TPG write request.
CVE-2025-27051 2 Microsoft, Qualcomm 21 Windows, Fastconnect 6900, Fastconnect 6900 Firmware and 18 more 2025-07-21 7.8 High
Memory corruption while processing command message in WLAN Host.
CVE-2025-27044 1 Qualcomm 17 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 14 more 2025-07-21 7.8 High
Memory corruption while executing timestamp video decode command with large input values.
CVE-2025-27058 1 Qualcomm 17 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 14 more 2025-07-21 7.8 High
Memory corruption while processing packet data with exceedingly large packet.
CVE-2025-27056 1 Qualcomm 51 Fastconnect 7800, Fastconnect 7800 Firmware, Qmp1000 and 48 more 2025-07-21 7.8 High
Memory corruption during sub-system restart while processing clean-up to free up resources.
CVE-2025-1121 1 Google 1 Chrome Os 2025-07-21 6.8 Medium
Privilege escalation in Installer and Recovery image handling in Google ChromeOS version 15786.48.2 on device allows an attacker with physical access to gain root code execution and potentially unenroll enterprise-managed devices via a specially crafted recovery image.
CVE-2024-32861 1 Johnsoncontrols 1 Software House C-cure 9000 2025-07-21 7.8 High
Under certain circumstances the impacted Software House C•CURE 9000 installer will utilize unnecessarily wide permissions.
CVE-2025-0591 1 Omron 1 Cx-programmer 2025-07-21 7.8 High
Out-of-bounds Read vulnerability (CWE-125) was found in CX-Programmer. Attackers may be able to read sensitive information or cause an application crash by abusing this vulnerability.
CVE-2025-0638 1 Nlnetlabs 1 Routinator 2025-07-21 7.5 High
The initial code parsing the manifest did not check the content of the file names yet later code assumed that it was checked and panicked when encountering illegal characters, resulting in a crash of Routinator.
CVE-2025-1022 1 Spatie 1 Browsershot 2025-07-21 8.2 High
Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content.
CVE-2025-23020 1 Ptrd 1 Kwik 2025-07-21 5.3 Medium
An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs).
CVE-2025-23217 1 Mitmproxy 1 Mitmproxy 2025-07-21 N/A
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmweb 11.1.1 and below, a malicious client can use mitmweb's proxy server (bound to `*:8080` by default) to access mitmweb's internal API (bound to `127.0.0.1:8081` by default). In other words, while the cannot access the API directly, they can access the API through the proxy. An attacker may be able to escalate this SSRF-style access to remote code execution. The mitmproxy and mitmdump tools are unaffected. Only mitmweb is affected. This vulnerability has been fixed in mitmproxy 11.1.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2025-25471 1 Ffmpeg 1 Ffmpeg 2025-07-21 4.3 Medium
FFmpeg git master before commit fd1772 was discovered to contain a NULL pointer dereference via the component libavformat/mov.c.
CVE-2025-26125 1 Iobit 1 Malware Fighter 2025-07-21 7.3 High
An exposed ioctl in the IMFForceDelete driver of IObit Malware Fighter v12.1.0 allows attackers to arbitrarily delete files and escalate privileges.
CVE-2025-27218 1 Sitecore 2 Experience Manager, Experience Platform 2025-07-21 5.3 Medium
Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
CVE-2025-30076 1 Koha 1 Koha 2025-07-21 7.7 High
Koha before 24.11.02 allows admins to execute arbitrary commands via shell metacharacters in the tools/scheduler.pl report parameter.
CVE-2025-30236 1 Securenvoy 1 Securaccess 2025-07-21 8.6 High
Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 allows authentication through only a six-digit TOTP code (skipping a password check) if an HTTP POST request contains a SESSION parameter.