Export limit exceeded: 338009 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (338009 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-2005 2 Etoilewebdesign, Wordpress 2 Front End Users, Wordpress 2025-08-12 9.8 Critical
The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2024-12410 2 Etoilewebdesign, Wordpress 2 Front End Users, Wordpress 2025-08-12 4.9 Medium
The Front End Users plugin for WordPress is vulnerable to SQL Injection via the 'UserSearchField' parameter in all versions up to, and including, 3.2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVE-2024-13518 1 Simplepress 1 Simplepress 2025-08-12 4.3 Medium
The Simple:Press Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.10.11. This is due to missing or incorrect nonce validation on the 'sp_save_edited_post' function. This makes it possible for unauthenticated attackers to modify a forum post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2024-1023 1 Redhat 20 A Mq Clients, Amq Broker, Amq Streams and 17 more 2025-08-12 6.5 Medium
A vulnerability in the Eclipse Vert.x toolkit results in a memory leak due to using Netty FastThreadLocal data structures. Specifically, when the Vert.x HTTP client establishes connections to different hosts, triggering the memory leak. The leak can be accelerated with intimate runtime knowledge, allowing an attacker to exploit this vulnerability. For instance, a server accepting arbitrary internet addresses could serve as an attack vector by connecting to these addresses, thereby accelerating the memory leak.
CVE-2025-1459 1 Siteorigin 1 Page Builder 2025-08-12 6.4 Medium
The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Embedded Video(PB) widget in all versions up to, and including, 2.31.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2024-13526 1 Metagauss 1 Eventprime 2025-08-12 4.3 Medium
The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the export_submittion_attendees function in all versions up to, and including, 4.0.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download list of attendees for any event.
CVE-2024-12409 1 Simplepress 1 Simplepress 2025-08-12 6.1 Medium
The Simple:Press Forum plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 6.10.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CVE-2023-38114 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-08-12 N/A
Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21085.
CVE-2025-23333 3 Linux, Microsoft, Nvidia 3 Linux Kernel, Windows, Triton Inference Server 2025-08-12 5.9 Medium
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by manipulating shared memory data. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2025-23334 3 Linux, Microsoft, Nvidia 3 Linux Kernel, Windows, Triton Inference Server 2025-08-12 5.9 Medium
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by sending a request. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2025-23335 3 Linux, Microsoft, Nvidia 3 Linux Kernel, Windows, Triton Inference Server 2025-08-12 4.4 Medium
NVIDIA Triton Inference Server for Windows and Linux and the Tensor RT backend contain a vulnerability where an attacker could cause an underflow by a specific model configuration and a specific input. A successful exploit of this vulnerability might lead to denial of service.
CVE-2025-24298 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 8.4 High
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
CVE-2025-24844 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 3.3 Low
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
CVE-2025-24925 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 3.3 Low
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory.
CVE-2025-25212 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 3.3 Low
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input.
CVE-2025-25278 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 8.4 High
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition.
CVE-2024-13403 1 Wpforms 1 Wpforms 2025-08-12 6.4 Medium
The WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘fieldHTML’ parameter in all versions up to, and including, 1.9.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2025-26690 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 3.3 Low
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference.
CVE-2025-27128 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 8.4 High
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free.
CVE-2025-27536 2 Openatom, Openharmony 2 Openharmony, Openharmony 2025-08-12 3.3 Low
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion.