Search Results (327491 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-50472 2 Davegamble, Redhat 3 Cjson, Satellite, Satellite Capsule 2025-07-22 7.5 High
cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_SetValuestring at cJSON.c.
CVE-2019-11835 2 Davegamble, Oracle 2 Cjson, Timesten In-memory Database 2025-07-22 9.8 Critical
cJSON before 1.7.11 allows out-of-bounds access, related to multiline comments.
CVE-2025-24474 1 Fortinet 4 Fortianalyzer, Fortianalyzer Cloud, Fortimanager and 1 more 2025-07-22 2.6 Low
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiManager Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiAnalyzer 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; and FortiAnalyzer Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an authenticated attacker with high privilege to extract database information via crafted requests.
CVE-2024-20338 2 Cisco, Linux 2 Secure Client, Linux Kernel 2025-07-22 7.3 High
A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
CVE-2024-20391 2 Cisco, Microsoft 2 Secure Client, Windows 2025-07-22 6.8 Medium
A vulnerability in the Network Access Manager (NAM) module of Cisco Secure Client could allow an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM. This vulnerability is due to a lack of authentication on a specific function. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges on an affected device.
CVE-2024-20337 4 Apple, Cisco, Linux and 1 more 4 Macos, Secure Client, Linux Kernel and 1 more 2025-07-22 8.2 High
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
CVE-2025-24471 1 Fortinet 2 Fortios, Fortisase 2025-07-22 6 Medium
AnĀ Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate.
CVE-2025-25250 1 Fortinet 2 Fortios, Fortisase 2025-07-22 3.9 Low
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS version 7.6.0, version 7.4.7 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions SSL-VPN web-mode may allow an authenticated user to access full SSL-VPN settings via crafted URL.
CVE-2022-47213 1 Microsoft 1 365 Apps 2025-07-22 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2022-47212 1 Microsoft 1 365 Apps 2025-07-22 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2022-47211 1 Microsoft 1 365 Apps 2025-07-22 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2022-44713 1 Microsoft 4 Office, Office 2019, Office Long Term Servicing Channel and 1 more 2025-07-22 7.5 High
Microsoft Outlook for Mac Spoofing Vulnerability
CVE-2022-44710 1 Microsoft 2 Windows 11, Windows 11 22h2 2025-07-22 7.8 High
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2022-44699 1 Microsoft 1 Azure Network Watcher Agent 2025-07-22 5.5 Medium
Azure Network Watcher Agent Security Feature Bypass Vulnerability
CVE-2022-44689 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2019 and 2 more 2025-07-22 7.8 High
Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
CVE-2022-44687 1 Microsoft 3 Raw Image Extension, Windows 10, Windows 11 2025-07-22 7.8 High
Raw Image Extension Remote Code Execution Vulnerability
CVE-2022-44671 1 Microsoft 11 Windows 10, Windows 10 1809, Windows 10 20h2 and 8 more 2025-07-22 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2022-44670 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-07-22 8.1 High
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
CVE-2022-44669 1 Microsoft 11 Windows 10, Windows 10 1809, Windows 10 20h2 and 8 more 2025-07-22 7 High
Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2022-41121 1 Microsoft 24 Powershell, Remote Desktop Client, Windows 10 and 21 more 2025-07-22 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability