Total
79839 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-25112 | 2025-06-04 | N/A | 7.5 HIGH | ||
An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device. | |||||
CVE-2025-30167 | 2025-06-04 | N/A | 7.3 HIGH | ||
Jupyter Core is a package for the core common functionality of Jupyter projects. When using Jupyter Core prior to version 5.8.0 on Windows, the shared `%PROGRAMDATA%` directory is searched for configuration files (`SYSTEM_CONFIG_PATH` and `SYSTEM_JUPYTER_PATH`), which may allow users to create configuration files affecting other users. Only shared Windows systems with multiple users and unprotected `%PROGRAMDATA%` are affected. Users should upgrade to Jupyter Core version 5.8.0 or later to receive a patch. Some other mitigations are available. As administrator, modify the permissions on the `%PROGRAMDATA%` directory so it is not writable by unauthorized users; or as administrator, create the `%PROGRAMDATA%\jupyter` directory with appropriately restrictive permissions; or as user or administrator, set the `%PROGRAMDATA%` environment variable to a directory with appropriately restrictive permissions (e.g. controlled by administrators _or_ the current user). | |||||
CVE-2025-5549 | 2025-06-04 | 7.5 HIGH | 7.3 HIGH | ||
A vulnerability has been found in FreeFloat FTP Server 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component PASV Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-21463 | 2025-06-04 | N/A | 7.5 HIGH | ||
Transient DOS while processing the EHT operation IE in the received beacon frame. | |||||
CVE-2025-5548 | 2025-06-04 | 7.5 HIGH | 7.3 HIGH | ||
A vulnerability, which was classified as critical, was found in FreeFloat FTP Server 1.0. Affected is an unknown function of the component NOOP Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-4392 | 2025-06-04 | N/A | 7.2 HIGH | ||
The Shared Files – Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the plugin’s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file. | |||||
CVE-2024-53020 | 2025-06-04 | N/A | 8.2 HIGH | ||
Information disclosure may occur while decoding the RTP packet with invalid header extension from network. | |||||
CVE-2025-5547 | 2025-06-04 | 7.5 HIGH | 7.3 HIGH | ||
A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. This issue affects some unknown processing of the component CDUP Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5601 | 2025-06-04 | N/A | 7.8 HIGH | ||
Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file | |||||
CVE-2024-13967 | 2025-06-04 | N/A | 8.8 HIGH | ||
This vulnerability allows the successful attacker to gain unauthorized access to a configuration web page delivered by the integrated web Server of EIBPORT. This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8. | |||||
CVE-2025-46355 | 2025-06-04 | N/A | 7.3 HIGH | ||
Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker. | |||||
CVE-2025-27031 | 2025-06-04 | N/A | 7.8 HIGH | ||
memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed. | |||||
CVE-2025-4435 | 2025-06-04 | N/A | 7.5 HIGH | ||
When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped. | |||||
CVE-2024-36486 | 2025-06-04 | N/A | 7.8 HIGH | ||
A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation. | |||||
CVE-2025-36564 | 2025-06-04 | N/A | 7.8 HIGH | ||
Dell Encryption Admin Utilities versions prior to 11.10.2 contain an Improper Link Resolution vulnerability. A local malicious user could potentially exploit this vulnerability, leading to privilege escalation. | |||||
CVE-2024-53026 | 2025-06-04 | N/A | 8.2 HIGH | ||
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call. | |||||
CVE-2024-52561 | 2025-06-04 | N/A | 7.8 HIGH | ||
A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation. | |||||
CVE-2024-53019 | 2025-06-04 | N/A | 8.2 HIGH | ||
Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources. | |||||
CVE-2025-21486 | 2025-06-04 | N/A | 7.8 HIGH | ||
Memory corruption during dynamic process creation call when client is only passing address and length of shell binary. | |||||
CVE-2025-5512 | 2025-06-04 | 7.5 HIGH | 7.3 HIGH | ||
A vulnerability, which was classified as critical, was found in quequnlong shiyi-blog up to 1.2.1. Affected is an unknown function of the file /api/sys/user/verifyPassword/ of the component Administrator Backend. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |