Search Results (67377 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-10880 1 Dingtian-tech 2 Dt-r002, Dt-r002 Firmware 2025-09-29 7.5 High
All versions of Dingtian DT-R002 are vulnerable to an Insufficiently Protected Credentials vulnerability that could allow an attacker to extract the proprietary "Dingtian Binary" protocol password by sending an unauthenticated GET request.
CVE-2024-27532 1 Bytecodealliance 1 Webassembly Micro Runtime 2025-09-29 7.5 High
wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) 06df58f is vulnerable to NULL Pointer Dereference in function `block_type_get_result_types.
CVE-2024-42121 1 Linux 1 Linux Kernel 2025-09-29 7.8 High
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check index msg_id before read or write [WHAT] msg_id is used as an array index and it cannot be a negative value, and therefore cannot be equal to MOD_HDCP_MESSAGE_ID_INVALID (-1). [HOW] Check whether msg_id is valid before reading and setting. This fixes 4 OVERRUN issues reported by Coverity.
CVE-2023-48029 1 Corebos 1 Corebos 2025-09-29 8.0 High
Corebos 8.0 and below is vulnerable to CSV Injection. An attacker with low privileges can inject a malicious command into a table. This vulnerability is exploited when an administrator visits the user management section, exports the data to a CSV file, and then opens it, leading to the execution of the malicious payload on the administrator's computer.
CVE-2023-47489 1 Combodo 1 Itop 2025-09-29 7.8 High
CSV injection in export as csv in Combodo iTop v.3.1.0-2-11973 allows a local attacker to execute arbitrary code via a crafted script to the export-v2.php and ajax.render.php components.
CVE-2024-41255 2 Filestash, Mickaelkerjean 2 Filestash, Filestash 2025-09-29 7.5 High
filestash v0.4 is configured to skip TLS certificate verification when using the FTPS protocol, possibly allowing attackers to execute a man-in-the-middle attack via the Init function of index.go.
CVE-2025-48868 1 Horilla 1 Horilla 2025-09-29 7.2 High
Horilla is a free and open source Human Resource Management System (HRMS). An authenticated Remote Code Execution (RCE) vulnerability exists in Horilla 1.3.0 due to the unsafe use of Python’s eval() function on a user-controlled query parameter in the project_bulk_archive view. This allows privileged users (e.g., administrators) to execute arbitrary system commands on the server. While having Django’s DEBUG=True makes exploitation visibly easier by returning command output in the HTTP response, this is not required. The vulnerability can still be exploited in DEBUG=False mode by using blind payloads such as a reverse shell, leading to full remote code execution. This issue has been patched in version 1.3.1.
CVE-2025-48869 1 Horilla 1 Horilla 2025-09-29 7.5 High
Horilla is a free and open source Human Resource Management System (HRMS). Unauthenticated users can access uploaded resume files in Horilla 1.3.0 by directly guessing or predicting file URLs. These files are stored in a publicly accessible directory, allowing attackers to retrieve sensitive candidate information without authentication. At time of publication there is no known patch.
CVE-2025-53376 1 Dokploy 1 Dokploy 2025-09-29 8.8 High
Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated, low-privileged user can run arbitrary OS commands on the Dokploy host. The tRPC procedure docker.getContainersByAppNameMatch interpolates the attacker-supplied appName value into a Docker CLI call without sanitisation, enabling command injection under the Dokploy service account. This vulnerability is fixed in 0.23.7.
CVE-2024-47175 3 Debian, Openprinting, Redhat 8 Debian Linux, Libppd, Enterprise Linux and 5 more 2025-09-29 8.6 High
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
CVE-2024-47076 2 Openprinting, Redhat 7 Libcupsfilters, Enterprise Linux, Rhel Aus and 4 more 2025-09-29 8.6 High
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
CVE-2024-24910 2 Checkpoint, Microsoft 3 Identity Agent, Zonealarm Extreme Security, Windows 2025-09-29 7.3 High
A local attacker can erscalate privileges on affected Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.
CVE-2025-9642 1 Gitlab 1 Gitlab 2025-09-29 8.7 High
An issue has been discovered in GitLab CE/EE affecting all versions from 14.10 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1 that could allow an attacker to inject malicious content that may lead to account takeover.
CVE-2025-10858 1 Gitlab 1 Gitlab 2025-09-29 7.5 High
An issue was discovered in GitLab CE/EE affecting all versions before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1 that allows unauthenticated users to cause a Denial of Service (DoS) condition while uploading specifically crafted large JSON files.
CVE-2024-40509 1 Openpetra 1 Openpetra 2025-09-29 7.3 High
Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMFinDev.asmx function.
CVE-2024-9132 1 Arista 1 Ng Firewall 2025-09-29 8.1 High
The administrator is able to configure an insecure captive portal script
CVE-2024-9131 1 Arista 1 Ng Firewall 2025-09-29 7.2 High
A user with administrator privileges can perform command injection
CVE-2024-47520 1 Arista 1 Ng Firewall 2025-09-29 7.6 High
A user with advanced report application access rights can perform actions for which they are not authorized
CVE-2024-47519 1 Arista 1 Ng Firewall 2025-09-29 8.3 High
Backup uploads to ETM subject to man-in-the-middle interception
CVE-2024-9188 1 Arista 1 Ng Firewall 2025-09-29 8.8 High
Specially constructed queries cause cross platform scripting leaking administrator tokens