Search Results (328883 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-1546 2025-08-28 7.3 High
A vulnerability has been found in BDCOM Behavior Management and Auditing System up to 20250210 and classified as critical. Affected by this vulnerability is the function log_operate_clear of the file /webui/modules/log/operate.mds. The manipulation of the argument start_code leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-55912 2 Ibm, Linux 2 Concert, Linux Kernel 2025-08-28 5.9 Medium
IBM Concert Software 1.0.0 through 1.0.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVE-2024-55909 2 Ibm, Linux 2 Concert, Linux Kernel 2025-08-28 6.5 Medium
IBM Concert Software 1.0.0 through 1.0.5 could allow an authenticated user to cause a denial of service due to the expansion of archive files without controlling resource consumption.
CVE-2025-1838 1 Ibm 1 Cloud Pak For Business Automation 2025-08-28 6.5 Medium
IBM Cloud Pak for Business Automation 24.0.0 and 24.0.1 through 24.0.1 IF001 Authoring allows an authenticated user to bypass client-side data validation in an authoring user interface which could cause a denial of service.
CVE-2025-1495 1 Ibm 2 Business Automation Workflow, Cloud Pak For Business Automation 2025-08-28 4.3 Medium
IBM Business Automation Workflow 24.0.0 and 24.0.1 through 24.0.1 IF001 Center may leak sensitive information due to missing authorization validation.
CVE-2024-41753 1 Ibm 1 Cloud Pak For Business Automation 2025-08-28 6.1 Medium
IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 IF004 and 24.0.1 through 24.0.1 IF001 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2025-1493 1 Ibm 1 Db2 2025-08-28 5.3 Medium
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 12.1.0 through 12.1.1 could allow an authenticated user to cause a denial of service due to concurrent execution of shared resources.
CVE-2024-23137 1 Autodesk 12 Advance Steel, Autocad, Autocad Advance Steel and 9 more 2025-08-28 7.8 High
A maliciously crafted STP or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process.
CVE-2024-52510 1 Nextcloud 1 Desktop 2025-08-28 4.2 Medium
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later.
CVE-2025-1331 2 Ibm, Linux 2 Cics Tx, Linux Kernel 2025-08-28 7.8 High
IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to the use of unsafe use of the gets function.
CVE-2025-1330 2 Ibm, Linux 2 Cics Tx, Linux Kernel 2025-08-28 7.8 High
IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1  could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyname function.
CVE-2025-1329 2 Ibm, Linux 2 Cics Tx, Linux Kernel 2025-08-28 7.8 High
IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyaddr function.
CVE-2025-3632 1 Ibm 2 4769 Developers Toolkit, Common Cryptographic Architecture 2025-08-28 7.5 High
IBM 4769 Developers Toolkit 7.0.0 through 7.5.52 could allow a remote attacker to cause a denial of service in the Hardware Security Module (HSM) due to improper memory allocation of an excessive size.
CVE-2025-2900 2 Ibm, Redhat 2 Semeru Runtime, Enterprise Linux 2025-08-28 7.5 High
IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation.
CVE-2025-1138 1 Ibm 2 Infosphere Information Server, Infosphere Information Server On Cloud 2025-08-28 4.3 Medium
IBM InfoSphere Information Server 11.7 could disclose sensitive information to an authenticated user that could aid in further attacks against the system through a directory listing.
CVE-2025-25029 1 Ibm 1 Security Guardium 2025-08-28 4.9 Medium
IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input.
CVE-2025-25026 1 Ibm 1 Security Guardium 2025-08-28 4.3 Medium
IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check.
CVE-2025-9432 1 Mtons 1 Mblog 2025-08-28 4.3 Medium
A vulnerability has been found in mtons mblog up to 3.5.0. The affected element is an unknown function of the file /admin/post/list of the component Admin Panel. Such manipulation of the argument Title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-9431 1 Mtons 1 Mblog 2025-08-28 4.3 Medium
A flaw has been found in mtons mblog up to 3.5.0. Impacted is an unknown function of the file /search. This manipulation of the argument kw causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used.
CVE-2022-4536 1 Youtag 1 Two-factor Authentication 2025-08-28 5.3 Medium
The IP Vault – WP Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.