Total
82112 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-27062 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption while handling client exceptions, allowing unauthorized channel access. | |||||
CVE-2025-21458 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption when IOCTL interface is called to map and unmap buffers simultaneously. | |||||
CVE-2025-54622 | 2025-08-06 | N/A | 8.3 HIGH | ||
Binding authentication bypass vulnerability in the devicemanager module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | |||||
CVE-2025-21455 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption while submitting blob data to kernel space though IOCTL. | |||||
CVE-2025-21452 | 2025-08-06 | N/A | 7.5 HIGH | ||
Transient DOS while processing a random-access response (RAR) with an invalid PDU length on LTE network. | |||||
CVE-2025-3320 | 2025-08-06 | N/A | 8.1 HIGH | ||
IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. A remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash. | |||||
CVE-2025-47324 | 2025-08-06 | N/A | 7.5 HIGH | ||
Information disclosure while accessing and modifying the PIB file of a remote device via powerline. | |||||
CVE-2025-45766 | 2025-08-06 | N/A | 7.0 HIGH | ||
poco v1.14.1-release was discovered to contain weak encryption. | |||||
CVE-2025-27071 | 2025-08-06 | N/A | 7.3 HIGH | ||
Memory corruption while processing specific files in Powerline Communication Firmware. | |||||
CVE-2025-21477 | 2025-08-06 | N/A | 7.5 HIGH | ||
Transient DOS while processing CCCH data when NW sends data with invalid length. | |||||
CVE-2025-27067 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption while processing DDI call with invalid buffer. | |||||
CVE-2025-54652 | 2025-08-06 | N/A | 8.4 HIGH | ||
Path traversal vulnerability in the virtualization base module. Successful exploitation of this vulnerability may affect the confidentiality of the virtualization module. | |||||
CVE-2025-21461 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption when programming registers through virtual CDM. | |||||
CVE-2025-7036 | 2025-08-06 | N/A | 7.5 HIGH | ||
The CleverReach® WP plugin for WordPress is vulnerable to time-based SQL Injection via the ‘title’ parameter in all versions up to, and including, 1.5.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | |||||
CVE-2025-8420 | 2025-08-06 | N/A | 8.1 HIGH | ||
The Request a Quote Form plugin for WordPress is vulnerable to Remote Code Execution in version less than, or equal to, 2.5.2 via the emd_form_builder_lite_pagenum function. This is due to the plugin not properly validating user input before using it as a function name. This makes it possible for unauthenticated attackers to execute code on the server, however, parameters can not be passed to the functions called. | |||||
CVE-2025-54653 | 2025-08-06 | N/A | 8.4 HIGH | ||
Path traversal vulnerability in the virtualization file module. Successful exploitation of this vulnerability may affect the confidentiality of the virtualization file module. | |||||
CVE-2025-21456 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption while processing IOCTL command when multiple threads are called to map/unmap buffer concurrently. | |||||
CVE-2025-21474 | 2025-08-06 | N/A | 7.8 HIGH | ||
Memory corruption while processing commands from A2dp sink command queue. | |||||
CVE-2025-54607 | 2025-08-06 | N/A | 7.7 HIGH | ||
Authentication management vulnerability in the ArkWeb module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | |||||
CVE-2025-38747 | 2025-08-06 | N/A | 7.8 HIGH | ||
Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contain a Creation of Temporary File With Insecure Permissions vulnerability. A local authenticated attacker could potentially exploit this vulnerability, leading to Elevation of Privileges. |