Filtered by vendor
Subscriptions
Total
12191 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-29821 | 2025-04-08 | 5.5 Medium | ||
Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally. | ||||
CVE-2021-26404 | 1 Amd | 46 Epyc 7003, Epyc 7003 Firmware, Epyc 7313 and 43 more | 2025-04-08 | 5.5 Medium |
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure. | ||||
CVE-2025-24074 | 2025-04-08 | 7.8 High | ||
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-24073 | 2025-04-08 | 7.8 High | ||
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-24058 | 2025-04-08 | 7.8 High | ||
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-30294 | 2025-04-08 | 6.5 Medium | ||
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-30293 | 2025-04-08 | 6.8 Medium | ||
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-24446 | 2025-04-08 | 9.1 Critical | ||
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
CVE-2025-26647 | 2025-04-08 | 8.1 High | ||
Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network. | ||||
CVE-2025-27489 | 2025-04-08 | 7.8 High | ||
Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-27737 | 2025-04-08 | 8.6 High | ||
Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally. | ||||
CVE-2025-24060 | 2025-04-08 | 7.8 High | ||
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-30151 | 2025-04-08 | 7.5 High | ||
Shopware is an open commerce platform. It's possible to pass long passwords that leads to Denial Of Service via forms in Storefront forms or Store-API. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17. For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | ||||
CVE-2025-27731 | 2025-04-08 | 7.8 High | ||
Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-29811 | 2025-04-08 | 7.8 High | ||
Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-24062 | 2025-04-08 | 7.8 High | ||
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-3413 | 2025-04-08 | 6.3 Medium | ||
A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2020-1350 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2025-04-08 | 10 Critical |
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'. | ||||
CVE-2024-26712 | 3 Debian, Linux, Redhat | 3 Debian Linux, Linux Kernel, Enterprise Linux | 2025-04-08 | 4.4 Medium |
In the Linux kernel, the following vulnerability has been resolved: powerpc/kasan: Fix addr error caused by page alignment In kasan_init_region, when k_start is not page aligned, at the begin of for loop, k_cur = k_start & PAGE_MASK is less than k_start, and then `va = block + k_cur - k_start` is less than block, the addr va is invalid, because the memory address space from va to block is not alloced by memblock_alloc, which will not be reserved by memblock_reserve later, it will be used by other places. As a result, memory overwriting occurs. for example: int __init __weak kasan_init_region(void *start, size_t size) { [...] /* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */ block = memblock_alloc(k_end - k_start, PAGE_SIZE); [...] for (k_cur = k_start & PAGE_MASK; k_cur < k_end; k_cur += PAGE_SIZE) { /* at the begin of for loop * block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400) * va(dcd96c00) is less than block(dcd97000), va is invalid */ void *va = block + k_cur - k_start; [...] } [...] } Therefore, page alignment is performed on k_start before memblock_alloc() to ensure the validity of the VA address. | ||||
CVE-2023-52617 | 2 Debian, Linux | 2 Debian Linux, Linux Kernel | 2025-04-08 | 4.4 Medium |
In the Linux kernel, the following vulnerability has been resolved: PCI: switchtec: Fix stdev_release() crash after surprise hot remove A PCI device hot removal may occur while stdev->cdev is held open. The call to stdev_release() then happens during close or exit, at a point way past switchtec_pci_remove(). Otherwise the last ref would vanish with the trailing put_device(), just before return. At that later point in time, the devm cleanup has already removed the stdev->mmio_mrpc mapping. Also, the stdev->pdev reference was not a counted one. Therefore, in DMA mode, the iowrite32() in stdev_release() will cause a fatal page fault, and the subsequent dma_free_coherent(), if reached, would pass a stale &stdev->pdev->dev pointer. Fix by moving MRPC DMA shutdown into switchtec_pci_remove(), after stdev_kill(). Counting the stdev->pdev ref is now optional, but may prevent future accidents. Reproducible via the script at https://lore.kernel.org/r/20231113212150.96410-1-dns@arista.com |