Export limit exceeded: 16184 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 329673 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 329673 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (329673 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-43527 1 Qualcomm 108 Fastconnect 6800, Fastconnect 6800 Firmware, Fastconnect 6900 and 105 more 2025-08-11 6.8 Medium
Information disclosure while parsing dts header atom in Video.
CVE-2023-43531 1 Qualcomm 256 Ar8035, Ar8035 Firmware, Fastconnect 6200 and 253 more 2025-08-11 8.4 High
Memory corruption while verifying the serialized header when the key pairs are generated.
CVE-2024-47384 1 Wpcompress 1 Wp Compress 2025-08-11 7.1 High
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Compress WP Compress – Image Optimizer [All-In-One] allows Reflected XSS.This issue affects WP Compress – Image Optimizer [All-In-One]: from n/a through 6.20.13.
CVE-2025-21601 1 Juniper 1 Junos 2025-08-11 7.5 High
An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an unauthenticated, network-based attacker, sending genuine traffic targeted to the device to cause the CPU to climb until the device becomes unresponsive. Continuous receipt of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Junos OS:  * All versions before 21.4R3-S9, * from 22.2 before 22.2R3-S5, * from 22.4 before 22.4R3-S4, * from 23.2 before 23.2R2-S3, * from 23.4 before 23.4R2-S3, * from 24.2 before 24.2R1-S1, 24.2R2. An indicator of compromise is to review the CPU % of the httpd process in the CLI: e.g.   show system processes extensive | match httpd  PID nobody       52   0   20M    191M select   2   0:01   80.00% httpd{httpd} <<<<< the percentage of httpd usage if high may be an indicator
CVE-2025-2539 1 File Away Project 1 File Away 2025-08-11 7.5 High
The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.
CVE-2025-40600 1 Sonicwall 23 Nsa 2700, Nsa 3700, Nsa 4700 and 20 more 2025-08-11 9.8 Critical
Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption.
CVE-2025-2512 1 File Away Project 1 File Away 2025-08-11 9.8 Critical
The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2025-26530 1 Moodle 1 Moodle 2025-08-11 8.3 High
The question bank filter required additional sanitizing to prevent a reflected XSS risk.
CVE-2025-24936 1 Nokia 1 Wavesuite Noc 2025-08-11 9 Critical
The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. An attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver.
CVE-2025-24937 1 Nokia 1 Wavesuite Noc 2025-08-11 9 Critical
File contents could be read from the local file system by an attacker. Additionally, malicious code could be inserted in the file, leading to a full compromise of the web application and the container it is running on. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. The web application allows arbitrary files to be included in a file that was downloadable and executable by the web server.
CVE-2025-24938 1 Nokia 1 Wavesuite Noc 2025-08-11 8.4 High
The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.
CVE-2023-41532 1 Kishan0725 1 Hospital Management System 2025-08-11 8.8 High
Hospital Management System v4 was discovered to contain a SQL injection vulnerability via the doctor_contact parameter in doctorsearch.php.
CVE-2023-41529 1 Kishan0725 1 Hospital Management System 2025-08-11 6.1 Medium
Hospital Management System v4 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities in func2.php via the fname and lname parameters.
CVE-2023-41527 1 Kishan0725 1 Hospital Management System 2025-08-11 9.8 Critical
Hospital Management System v4 was discovered to contain a SQL injection vulnerability via the password2 parameter in func.php.
CVE-2023-40992 1 Kishan0725 1 Hospital Management System 2025-08-11 6.5 Medium
Hospital Management System 4 is vulnerable to a SQL injection in /Hospital-Management-System-master/func.php via the password2 parameter.
CVE-2024-4445 1 Wpcompress 1 Wp Compress 2025-08-11 6.5 Medium
The WP Compress – Image Optimizer [All-In-One] plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the several functions in versions up to, and including, 6.20.01. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to edit plugin settings, including storing cross-site scripting, in multisite environments.
CVE-2024-37119 1 Uncannyowl 1 Uncanny Automator 2025-08-11 5.3 Medium
Missing Authorization vulnerability in Uncanny Owl Uncanny Automator Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator Pro: from n/a through 5.3.0.0.
CVE-2024-37470 2 Wofficeio, Xtendify 2 Woffice Core, Woffice 2025-08-11 8.2 High
Missing Authorization vulnerability in WofficeIO Woffice Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woffice Core: from n/a through 5.4.8.
CVE-2024-20351 1 Cisco 1 Firepower Threat Defense Software 2025-08-11 8.6 High
A vulnerability in the TCP/IP traffic handling function of the Snort Detection Engine of Cisco Firepower Threat Defense (FTD) Software and Cisco FirePOWER Services could allow an unauthenticated, remote attacker to cause legitimate network traffic to be dropped, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of TCP/IP network traffic. An attacker could exploit this vulnerability by sending a large amount of TCP/IP network traffic through the affected device. A successful exploit could allow the attacker to cause the Cisco FTD device to drop network traffic, resulting in a DoS condition. The affected device must be rebooted to resolve the DoS condition.
CVE-2023-25613 1 Apache 1 Kerby Ldap Backend 2025-08-11 9.8 Critical
An LDAP Injection vulnerability exists in the LdapIdentityBackend of Apache Kerby before 2.0.3.