Search Results (328883 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-43452 1 Apple 3 Ios, Ipados, Iphone Os 2025-11-05 4.6 Medium
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 26.1 and iPadOS 26.1. Keyboard suggestions may display sensitive information on the lock screen.
CVE-2025-43350 1 Apple 3 Ios, Ipados, Iphone Os 2025-11-05 2.4 Low
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.1 and iPadOS 26.1. An attacker may be able to view restricted content from the lock screen.
CVE-2024-23494 1 Deltaww 1 Diaenergie 2025-11-05 8.8 High
SQL injection vulnerability exists in GetDIAE_unListParameters.
CVE-2024-28891 1 Deltaww 1 Diaenergie 2025-11-05 8.8 High
SQL injection vulnerability exists in the script Handler_CFG.ashx.
CVE-2024-23975 1 Deltaww 1 Diaenergie 2025-11-05 8.8 High
SQL injection vulnerability exists in GetDIAE_slogListParameters.
CVE-2024-25567 1 Deltaww 1 Diaenergie 2025-11-05 8.1 High
Path traversal attack is possible and write outside of the intended directory and may access sensitive information. If a file name is specified that already exists on the file system, then the original file will be overwritten.
CVE-2024-28040 1 Deltaww 1 Diaenergie 2025-11-05 8.8 High
SQL injection vulnerability exists in GetDIAE_astListParameters.
CVE-2024-28045 1 Deltaww 1 Diaenergie 2025-11-05 4.6 Medium
Improper neutralization of input within the affected product could lead to cross-site scripting.
CVE-2024-28171 1 Deltaww 1 Diaenergie 2025-11-05 8.1 High
It is possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten.
CVE-2025-36093 1 Ibm 1 Cloud Pak For Business Automation 2025-11-05 4.8 Medium
IBM Cloud Pak For Business Automation 25.0.0, 24.0.1, and 24.0.0 could allow an attacker to access unauthorized content or perform unauthorized actions using man in the middle techniques due to improper access controls.
CVE-2025-37766 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-37767 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-37768 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-37769 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm/smu11: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE. (cherry picked from commit da7dc714a8f8e1c9fc33c57cd63583779a3bef71)
CVE-2025-37770 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-37771 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Prevent division by zero The user can set any speed value. If speed is greater than UINT_MAX/8, division by zero is possible. Found by Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-36092 1 Ibm 1 Cloud Pak For Business Automation 2025-11-05 6.5 Medium
IBM Cloud Pak For Business Automation 25.0.0, 24.0.1, and 24.0.0 could allow an authenticated user to cause a denial of service due to the improper validation of input length.
CVE-2025-34501 1 Shuffle Master 1 Deck Mate 2 2025-11-05 N/A
Deck Mate 2 is distributed with static, hard-coded credentials for the root shell and web user interface, while multiple management services (SSH, HTTP, Telnet, SMB, X11) are enabled by default. If an attacker can reach these interfaces - most often through local or near-local access such as connecting to the USB or Ethernet ports beneath the table - the built-in credentials permit administrative login and full control of the system. Once authenticated, an attacker can access firmware utilities, modify controller software, and establish persistent compromise. Remote attack paths via network, cellular, or telemetry links may exist in specific configurations but generally require additional capabilities or operator error. The vendor reports that USB access has been disabled in current firmware builds.
CVE-2025-36091 1 Ibm 1 Cloud Pak For Business Automation 2025-11-05 4.3 Medium
IBM Cloud Pak For Business Automation 25.0.0, 24.0.1, and 24.0.0 could allow an authenticated user to cause dashboards to become inaccessible to legitimate users due to invalid ownership assignment.
CVE-2025-12324 2 Tablepress, Wordpress 2 Tablepress, Wordpress 2025-11-05 6.4 Medium
The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `table` shortcode attributes in all versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.