Search Results (10274 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-21470 1 Qualcomm 66 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 63 more 2025-08-11 7.8 High
Memory corruption while processing image encoding, when configuration is NULL in IOCTL parameter.
CVE-2024-49842 1 Qualcomm 358 Aqt1000, Aqt1000 Firmware, Ar8035 and 355 more 2025-08-11 7.8 High
Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.
CVE-2023-33070 1 Qualcomm 204 Apq5053-aa, Apq5053-aa Firmware, Aqt1000 and 201 more 2025-08-11 7.1 High
Transient DOS in Automotive OS due to improper authentication to the secure IO calls.
CVE-2024-38426 1 Qualcomm 328 205, 205 Firmware, 215 and 325 more 2025-08-11 5.4 Medium
While processing the authentication message in UE, improper authentication may lead to information disclosure.
CVE-2024-43051 1 Qualcomm 488 Aqt1000, Aqt1000 Firmware, Ar8031 and 485 more 2025-08-11 5.5 Medium
Information disclosure while deriving keys for a session for any Widevine use case.
CVE-2025-21450 1 Qualcomm 217 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 214 more 2025-08-11 9.1 Critical
Cryptographic issue occurs due to use of insecure connection method while downloading.
CVE-2023-28556 1 Qualcomm 452 315 5g Iot Modem, 315 5g Iot Modem Firmware, 9205 Lte Modem and 449 more 2025-08-11 7.1 High
Cryptographic issue in HLOS during key management.
CVE-2025-21469 1 Qualcomm 40 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 37 more 2025-08-11 7.8 High
Memory corruption while processing image encoding, when input buffer length is 0 in IOCTL call.
CVE-2023-43551 1 Qualcomm 482 205 Mobile, 205 Mobile Firmware, 215 Mobile and 479 more 2025-08-11 9.1 Critical
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
CVE-2025-0549 1 Gitlab 1 Gitlab 2025-08-08 6.8 Medium
An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.3 prior to 17.9.8, from 17.10 prior to 17.10.6, and from 17.11 prior to 17.11.2. A security vulnerability allows attackers to bypass Device OAuth flow protections, enabling authorization form submission through minimal user interaction.
CVE-2024-43234 1 Xtendify 1 Woffice 2025-08-08 9.8 Critical
Authentication Bypass Using an Alternate Path or Channel vulnerability in WofficeIO Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.
CVE-2025-8504 2 Anisha, Code-projects 2 Kitchen Treasure, Kitchen Treasure 2025-08-08 6.3 Medium
A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-6248 1 Wyze 2 Cam V3, Cam V3 Firmware 2025-08-08 N/A
Wyze Cam v3 Cloud Infrastructure Improper Authentication Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Wyze Cam v3 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the run_action_batch endpoint of the cloud infrastructure. The issue results from the use of the device's MAC address as a sole credential for authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22393.
CVE-2024-1039 1 Gesslergmbh 2 Web-master, Web-master Firmware 2025-08-07 9.8 Critical
Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.
CVE-2021-34753 1 Cisco 1 Firepower Threat Defense Software 2025-08-07 5.8 Medium
A vulnerability in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic. This vulnerability is due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit this vulnerability by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should trigger and drop for the ENIP packet.
CVE-2025-44657 1 Linksys 2 Ea6350, Ea6350 Firmware 2025-08-07 3.9 Low
In Linksys EA6350 V2.1.2, the chroot_local_user option is enabled in the dynamically generated vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
CVE-2024-38273 2 Fedoraproject, Moodle 2 Fedora, Moodle 2025-08-07 5.4 Medium
Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.
CVE-2023-44410 2 D-link, Dlink 2 D-view, D-view 8 2025-08-07 N/A
D-Link D-View showUsers Improper Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability. The specific flaw exists within the showUsers method. The issue results from the lack of proper authorization before accessing a privileged endpoint. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. . Was ZDI-CAN-19535.
CVE-2023-32168 2 D-link, Dlink 2 D-view, D-view 8 2025-08-07 N/A
D-Link D-View showUser Improper Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability. The specific flaw exists within the showUser method. The issue results from the lack of proper authorization before accessing a privileged endpoint. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. . Was ZDI-CAN-19534.
CVE-2025-46391 2025-08-06 6.5 Medium
CWE-284: Improper Access Control