Search

Search Results (324290 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-45493 1 Netgear 1 Ex8000 2025-12-23 6.5 Medium
Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the iface parameter in the action_bandwidth function.
CVE-2025-68556 2 Villatheme, Wordpress 2 Happy, Wordpress 2025-12-23 5.3 Medium
Missing Authorization vulnerability in VillaTheme HAPPY allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HAPPY: from n/a through 1.0.9.
CVE-2025-67109 1 Eclipse 1 Cyclonedds 2025-12-23 10 Critical
Improper verification of the time certificate in Eclipse Cyclone DDS before v0.10.5 allows attackers to bypass certificate checks and execute commands with System privileges.
CVE-2025-29228 1 Linksys 1 E5600 2025-12-23 9.8 Critical
Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClone function via the mc.ip parameter.
CVE-2023-52210 2 Tychesoftwares, Wordpress 2 Product Delivery Date For Woocommerce Lite, Wordpress 2025-12-23 5.3 Medium
Vulnerability in Tyche softwares Product Delivery Date for WooCommerce – Lite.This issue affects Product Delivery Date for WooCommerce – Lite: from n/a through 2.7.0.
CVE-2024-9684 1 Freyrscada 1 Iec-60879-5-104 Server Simulator 2025-12-23 7.5 High
FreyrSCADA/IEC-60870-5-104 server v21.06.008 allows remote attackers to cause a denial of service by sending specific message sequences.
CVE-2025-68551 1 Wordpress 1 Wordpress 2025-12-23 6.5 Medium
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vikas Ratudi VPSUForm allows Retrieve Embedded Sensitive Data.This issue affects VPSUForm: from n/a through 3.2.24.
CVE-2025-33223 1 Nvidia 1 Isaac Launchable 2025-12-23 9.8 Critical
NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause an execution with unnecessary privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, information disclosure and data tampering.
CVE-2025-65865 1 Eprosima 1 Fast Dds 2025-12-23 7.5 High
An integer overflow in eProsima Fast-DDS v3.3 allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2025-29229 1 Linksys 1 E5600 2025-12-23 9.8 Critical
linksys E5600 V1.1.0.26 is vulnerable to command injection in the function ddnsStatus.
CVE-2025-66845 1 Techstore 1 Techstore 2025-12-23 6.1 Medium
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in TechStore version 1.0. The user_name endpoint reflects the id query parameter directly into the HTML response without output encoding or sanitization, allowing execution of arbitrary JavaScript code in a victim’s browser.
CVE-2025-68557 1 Wordpress 1 Wordpress 2025-12-23 4.3 Medium
Missing Authorization vulnerability in Vikas Ratudi Chakra test allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chakra test: from n/a through 1.0.1.
CVE-2025-58712 1 Redhat 2 Amq Broker, Rhosemc 2025-12-23 5.2 Medium
A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVE-2025-7738 1 Redhat 2 Ansible Automation Platform, Ansible Automation Platform Developer 2025-12-23 4.4 Medium
A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text exposure of sensitive credentials increases the risk of accidental leaks or misuse.
CVE-2025-8067 1 Redhat 7 Enterprise Linux, Rhel Aus, Rhel E4s and 4 more 2025-12-23 8.5 High
A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.
CVE-2025-47325 1 Qualcomm 89 Csr8811, Csr8811 Firmware, Ipq8070 and 86 more 2025-12-23 6.5 Medium
Information disclosure while processing system calls with invalid parameters.
CVE-2025-47350 1 Qualcomm 37 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 34 more 2025-12-23 7.8 High
Memory corruption while handling concurrent memory mapping and unmapping requests from a user-space application.
CVE-2025-47372 1 Qualcomm 47 Qam8255p, Qam8255p Firmware, Qam8620p and 44 more 2025-12-23 9 Critical
Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
CVE-2024-23789 2 Sharp, Sharp Corporation 5 Jh-rv11, Jh-rv11 Firmware, Jh-rvb1 and 2 more 2025-12-23 8.8 High
Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command on the affected product.
CVE-2025-59479 1 Inaba 2 Ib-mct001, Ib-mct001 Firmware 2025-12-23 6.1 Medium
CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper restriction of rendered UI layers or frames. If a user clicks on content on a malicious web page while logged into the product, unintended operations may be performed on the product.