Filtered by CWE-20
Total 12559 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-8708 1 Antabot 1 White-jotter 2025-08-12 5 Medium
A vulnerability was found in Antabot White-Jotter 0.22. It has been declared as critical. This vulnerability affects the function CookieRememberMeManager of the file ShiroConfiguration.java of the component com.gm.wj.config.ShiroConfiguration. The manipulation with the input EVANNIGHTLY_WAOU leads to deserialization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CVE-2024-52903 4 Ibm, Linux, Microsoft and 1 more 4 Db2, Linux Kernel, Windows and 1 more 2025-08-12 5.3 Medium
IBM Db2 for Linux, UNIX and Windows 12.1.0 and 12.1.1 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query.
CVE-2025-8573 1 Concretecms 1 Concrete Cms 2025-08-11 N/A
Concrete CMS versions 9 through 9.4.2 are vulnerable to Stored XSS from Home Folder on Members Dashboard page.  Version 8 was not affected. A rogue admin could set up a malicious folder containing XSS to which users could be directed upon login. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.0 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Thanks sealldev  (Noah Cooper) for reporting via HackerOne.
CVE-2025-54642 1 Huawei 2 Emui, Harmonyos 2025-08-11 6.7 Medium
Issue of buffer overflow caused by insufficient data verification in the kernel gyroscope module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-54641 1 Huawei 2 Emui, Harmonyos 2025-08-11 6.7 Medium
Issue of buffer overflow caused by insufficient data verification in the kernel acceleration module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-54636 1 Huawei 2 Emui, Harmonyos 2025-08-11 4.4 Medium
Issue of buffer overflow caused by insufficient data verification in the kernel drop detection module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2023-21671 1 Qualcomm 48 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 45 more 2025-08-11 9.3 Critical
Memory Corruption in Core during syscall for Sectools Fuse comparison feature.
CVE-2024-49844 1 Qualcomm 362 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 359 more 2025-08-11 7.8 High
Memory corruption while triggering commands in the PlayReady Trusted application.
CVE-2023-21631 1 Qualcomm 320 205, 205 Firmware, 215 and 317 more 2025-08-11 7.5 High
Weak Configuration due to improper input validation in Modem while processing LTE security mode command message received from network.
CVE-2023-33057 1 Qualcomm 202 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 199 more 2025-08-11 7.5 High
Transient DOS in Multi-Mode Call Processor while processing UE policy container.
CVE-2023-28578 1 Qualcomm 680 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 677 more 2025-08-11 9.3 Critical
Memory corruption in Core Services while executing the command for removing a single event listener.
CVE-2023-33042 1 Qualcomm 148 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 145 more 2025-08-11 7.5 High
Transient DOS in Modem after RRC Setup message is received.
CVE-2023-33099 1 Qualcomm 208 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 205 more 2025-08-11 7.5 High
Transient DOS while processing SMS container of non-standard size received in DL NAS transport in NR.
CVE-2023-33104 1 Qualcomm 204 315 5g Iot Modem, 315 5g Iot Modem Firmware, Ar8035 and 201 more 2025-08-11 7.5 High
Transient DOS while processing PDU Release command with a parameter PDU ID out of range.
CVE-2024-21453 1 Qualcomm 26 C-v2x 9150, C-v2x 9150 Firmware, Qcs410 and 23 more 2025-08-11 7.5 High
Transient DOS while decoding message of size that exceeds the available system memory.
CVE-2024-33065 1 Qualcomm 81 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 78 more 2025-08-11 8.4 High
Memory corruption while taking snapshot when an offset variable is set by camera driver.
CVE-2025-8582 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2025-08-11 4.3 Medium
Insufficient validation of untrusted input in Core in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
CVE-2025-6444 1 Servicestack 1 Servicestack 2025-08-08 5.9 Medium
ServiceStack GetErrorResponse Improper Input Validation NTLM Relay Vulnerability. This vulnerability allows remote attackers to relay NTLM credentials on affected installations of ServiceStack. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the implementation of the GetErrorResponse method. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to relay NTLM credentials in the context of the current user. Was ZDI-CAN-25834.
CVE-2021-44228 13 Apache, Apple, Bentley and 10 more 178 Log4j, Xcode, Synchro and 175 more 2025-08-08 10 Critical
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CVE-2025-20184 1 Cisco 14 Asyncos, Secure Email Gateway C195, Secure Email Gateway C395 and 11 more 2025-08-08 6.5 Medium
A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials. This vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges.