Filtered by vendor
Subscriptions
Total
314237 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-59260 | 2025-10-14 | 5.5 Medium | ||
Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally. | ||||
CVE-2025-59261 | 2025-10-14 | 7 High | ||
Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-59275 | 2025-10-14 | 7.8 High | ||
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-59285 | 2025-10-14 | 7 High | ||
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-59287 | 2025-10-14 | 9.8 Critical | ||
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-59292 | 2025-10-14 | 8.2 High | ||
External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-59494 | 2025-10-14 | 7.8 High | ||
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-59502 | 2025-10-14 | 7.5 High | ||
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. | ||||
CVE-2025-8459 | 2025-10-14 | 7.7 High | ||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Monitoring recurrent downtime scheduler modules) allows Stored XSS.This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28. | ||||
CVE-2025-55248 | 2025-10-14 | 4.8 Medium | ||
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network. | ||||
CVE-2025-55695 | 2025-10-14 | 5.5 Medium | ||
Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally. | ||||
CVE-2025-11516 | 2 Code-projects, Fabian | 2 Online Complaint Site, Online Complaint Site | 2025-10-14 | 6.3 Medium |
A weakness has been identified in code-projects Online Complaint Site 1.0. Impacted is an unknown function of the file /cms/users/complaint-details.php. Executing manipulation of the argument cid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. | ||||
CVE-2025-11354 | 2 Code-projects, Fabian | 2 Simple Online Hotel Reservation System, Online Hotel Reservation System | 2025-10-14 | 6.3 Medium |
A flaw has been found in code-projects Online Hotel Reservation System 1.0. Affected is an unknown function of the file /admin/addslideexec.php. Executing manipulation of the argument image can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. | ||||
CVE-2025-9826 | 1 M-files | 2 Hubshare, M-files | 2025-10-14 | 5.4 Medium |
Stored cross-site scripting vulnerability in M-Files Hubshare before version 25.8 allows authenticated attackers to cause script execution for other users. | ||||
CVE-2025-58177 | 1 N8n | 1 N8n | 2025-10-14 | 5.4 Medium |
n8n is an open source workflow automation platform. From 1.24.0 to before 1.107.0, there is a stored cross-site scripting (XSS) vulnerability in @n8n/n8n-nodes-langchain.chatTrigger. An authorized user can configure the LangChain Chat Trigger node with malicious JavaScript in the initialMessages field and enable public access so that the payload is executed in the browser of any user who visits the resulting public chat URL. This can be used for phishing or to steal cookies or other sensitive data from users accessing the public chat link. The issue is fixed in version 1.107.0. Updating to 1.107.0 or later is recommended. As a workaround, the affected chatTrigger node can be disabled. No other workarounds are known. | ||||
CVE-2025-10471 | 2 Zkea, Zkeacms | 2 Zkeacms, Zkeacms | 2025-10-14 | 6.3 Medium |
A vulnerability was detected in ZKEACMS 4.3. Impacted is the function Proxy of the file src/ZKEACMS/Controllers/MediaController.cs. Performing manipulation of the argument url results in server-side request forgery. It is possible to initiate the attack remotely. The exploit is now public and may be used. | ||||
CVE-2025-11346 | 1 Ilias | 1 Ilias | 2025-10-14 | 6.3 Medium |
A vulnerability has been found in ILIAS up to 8.23/9.13/10.1. This affects the function unserialize of the component Base64 Decoding Handler. Such manipulation of the argument f_settings leads to deserialization. It is possible to launch the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 is able to mitigate this issue. It is advisable to upgrade the affected component. | ||||
CVE-2025-56448 | 1 Positron | 2 Px360bt, Px360bt Firmware | 2025-10-14 | 6.8 Medium |
The Positron PX360BT SW REV 8 car alarm system is vulnerable to a replay attack due to a failure in implementing rolling code security. The alarm system does not properly rotate or invalidate used codes, allowing repeated reuse of captured transmissions. This exposes users to significant security risks, including vehicle theft and loss of trust in the alarm's anti-cloning claims. | ||||
CVE-2025-10389 | 1 Crmeb | 1 Crmeb | 2025-10-14 | 5.4 Medium |
A security flaw has been discovered in CRMEB up to 5.6.1. Impacted is the function Save of the file app/services/system/admin/SystemAdminServices.php of the component Administrator Password Handler. Performing manipulation of the argument ID results in improper authorization. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-5194 | 1 Arris | 2 Vap2500, Vap2500 Firmware | 2025-10-14 | 4.7 Medium |
A vulnerability was found in Arris VAP2500 08.50. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assoc_table.php. The manipulation of the argument id leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265831. |