Search

Search Results (314818 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-37134 1 Hpe 1 Arubaos 2025-10-21 7.2 High
An authenticated command injection vulnerability exists in the CLI binary of an AOS-8 Controller/Mobility Conductor operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
CVE-2025-37140 1 Hpe 1 Arubaos 2025-10-21 4.9 Medium
Arbitrary file download vulnerabilities exist in the CLI binary of AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.
CVE-2025-8430 1 Centreon 1 Centreon 2025-10-21 6.8 Medium
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
CVE-2025-11548 1 Ibi 1 Webfocus Business Intelligence 2025-10-21 N/A
A remote, unauthenticated privilege escalation in ibi WebFOCUS allows an attacker to gain administrative access to the application which may lead to unauthenticated Remote Code Execution
CVE-2025-23356 1 Nvidia 1 Isaac Lab 2025-10-21 8.4 High
NVIDIA Isaac Lab contains a vulnerability in SB3 configuration parsing. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
CVE-2025-37144 1 Hpe 1 Arubaos 2025-10-21 4.9 Medium
Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.
CVE-2025-59232 1 Microsoft 14 365, 365 Apps, Access and 11 more 2025-10-21 7.1 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2025-33177 1 Nvidia 4 Jetson Linux, Jetson Tk1, Jetson Tx1 and 1 more 2025-10-21 5.5 Medium
NVIDIA Jetson Linux and IGX OS contain a vulnerability in NvMap, where improper tracking of memory allocations could allow a local attacker to cause memory overallocation. A successful exploitation of this vulnerability might lead to denial of service.
CVE-2025-33182 1 Nvidia 6 Jetson Agx Xavier, Jetson Linux, Jetson Tk1 and 3 more 2025-10-21 7.6 High
NVIDIA Jetson Linux contains a vulnerability in UEFI, where improper authentication may allow a privileged user to cause corruption of the Linux Device Tree. A successful exploitation of this vulnerability might lead to data tampering, denial of service.
CVE-2025-59229 1 Microsoft 4 365, 365 Apps, Office and 1 more 2025-10-21 5.5 Medium
Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.
CVE-2025-59289 1 Microsoft 7 Windows, Windows 10, Windows 11 and 4 more 2025-10-21 7 High
Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.
CVE-2025-59497 2 Linux, Microsoft 2 Linux, Defender For Endpoint 2025-10-21 7 High
Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally.
CVE-2025-59278 1 Microsoft 10 Windows, Windows 10, Windows 11 and 7 more 2025-10-21 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-59275 1 Microsoft 9 Windows, Windows 10, Windows 11 and 6 more 2025-10-21 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-61806 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2025-10-21 7.8 High
Substance3D - Stager versions 3.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-59238 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-10-21 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-37145 1 Hpe 1 Arubaos 2025-10-21 4.9 Medium
Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.
CVE-2025-11736 2 Angeljudesuarez, Itsourcecode 2 Online Examination System, Online Examination System 2025-10-21 7.3 High
A flaw has been found in itsourcecode Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /index.php. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
CVE-2025-8459 1 Centreon 1 Centreon 2025-10-21 7.7 High
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Monitoring recurrent downtime scheduler modules) allows Stored XSS.This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.
CVE-2025-61805 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2025-10-21 7.8 High
Substance3D - Stager versions 3.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.