Search Results (72449 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-50345 1 Linux 1 Linux Kernel 2025-09-29 7.0 High
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-36193 1 Ibm 1 Transformation Advisor 2025-09-29 8.4 High
IBM Transformation Advisor 2.0.1 through 4.3.1 incorrectly assigns privileges to security critical files which could allow a local root escalation inside a container running the IBM Transformation Advisor Operator Catalog image.
CVE-2025-9935 1 Totolink 2 N600r, N600r Firmware 2025-09-29 7.3 High
A vulnerability was determined in TOTOLINK N600R 4.3.0cu.7866_B20220506. This vulnerability affects the function sub_4159F8 of the file /web_cste/cgi-bin/cstecgi.cgi. Executing manipulation can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
CVE-2025-9938 2 D-link, Dlink 3 Di-8400, Di-8400, Di-8400 Firmware 2025-09-29 8.8 High
A weakness has been identified in D-Link DI-8400 16.07.26A1. The affected element is the function yyxz_dlink_asp of the file /yyxz.asp. This manipulation of the argument ID causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
CVE-2025-10034 2 D-link, Dlink 3 Dir-825, Dir-825, Dir-825 Firmware 2025-09-29 8.8 High
A vulnerability was found in D-Link DIR-825 1.08.01. This impacts the function get_ping6_app_stat of the file ping6_response.cg of the component httpd. Performing manipulation of the argument ping6_ipaddr results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-55998 1 Mezereon 1 Smart Search And Filter 2025-09-29 8.1 High
A cross-site scripting (XSS) vulnerability in Smart Search & Filter Shopify and BigCommerce apps allows a remote attacker to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into several filter parameter
CVE-2024-45084 2 Ibm, Microsoft 3 Cognos Controller, Controller, Windows 2025-09-29 8 High
IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 could allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents.
CVE-2024-45075 2 Ibm, Softwareag 2 Webmethods Integration, Webmethods 2025-09-29 8.8 High
IBM webMethods Integration 10.15 could allow an authenticated user to create scheduler tasks that would allow them to escalate their privileges to administrator due to missing authentication.
CVE-2024-57606 1 Guojusoft 1 Jeecgboot 2025-09-29 7.5 High
SQL injection vulnerability in Beijing Guoju Information Technology Co., Ltd JeecgBoot v.3.7.2 allows a remote attacker to obtain sensitive information via the getTotalData component.
CVE-2024-42512 1 Opcfoundation 1 Ua .net Standard Stack 2025-09-29 8.6 High
Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when the deprecated Basic128Rsa15 security policy is enabled.
CVE-2024-11142 1 Proticaret 1 Proticaret 2025-09-29 8.8 High
Cross-Site Request Forgery (CSRF) vulnerability in Gosoft Software Proticaret E-Commerce allows Cross Site Request Forgery.This issue affects Proticaret E-Commerce: before v6.0 NOTE: According to the vendor, fixing process is still ongoing for v4.05.
CVE-2024-41140 1 Zohocorp 1 Manageengine Applications Manager 2025-09-29 8.1 High
Zohocorp ManageEngine Applications Manager versions 174000 and prior are vulnerable to the incorrect authorization in the update user function.
CVE-2024-34997 1 Joblib Project 1 Joblib 2025-09-29 7.5 High
joblib v1.4.2 was discovered to contain a deserialization vulnerability via the component joblib.numpy_pickle::NumpyArrayWrapper().read_array(). NOTE: this is disputed by the supplier because NumpyArrayWrapper is only used during caching of trusted content.
CVE-2024-51229 1 Pb-cms Project 1 Pb-cms 2025-09-29 8.8 High
Cross Site Scripting vulnerability in LinZhaoguan pb-cms v.2.0 allows a remote attacker to execute arbitrary code via the theme management function.
CVE-2024-48827 2 Sbond, Sbondco 2 Watcharr, Watcharr 2025-09-29 8.8 High
An issue in sbondCo Watcharr v.1.43.0 allows a remote attacker to execute arbitrary code and escalate privileges via the Change Password function.
CVE-2024-7847 1 Rockwellautomation 5 Rslogix 5, Rslogix 500, Rslogix Micro Developer and 2 more 2025-09-29 7.7 High
VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.
CVE-2025-59814 1 Zenitel 2 Icx500, Icx510 2025-09-29 8.8 High
This vulnerability allows malicious actors to gain unauthorized access to the Zenitel ICX500 and ICX510 Gateway Billing Admin endpoint, enabling them to read the entire contents of the Billing Admin database.
CVE-2024-51179 1 Open5gs 1 Open5gs 2025-09-29 7.5 High
An issue in Open 5GS v.2.7.1 allows a remote attacker to cause a denial of service via the Network Function Virtualizations (NFVs) such as the User Plane Function (UPF) and the Session Management Function (SMF), The Packet Data Unit (PDU) session establishment process.
CVE-2025-59815 1 Zenitel 2 Icx500, Icx510 2025-09-29 8.4 High
This vulnerability allows malicious actors to execute arbitrary commands on the underlying system of the Zenitel ICX500 and ICX510 Gateway, granting shell access. Exploitation can compromise the device’s availability, confidentiality, and integrity.
CVE-2025-59817 1 Zenitel 1 Tcis-3+ 2025-09-29 8.4 High
This vulnerability allows attackers to execute arbitrary commands on the underlying system. Because the web portal runs with root privileges, successful exploitation grants full control over the device, potentially compromising its availability, confidentiality, and integrity.