Export limit exceeded: 25158 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (25158 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-26478 1 Statping-ng 1 Statping-ng 2026-02-26 5.3 Medium
An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the /api/users endpoint.
CVE-2024-26479 1 Statping-ng 1 Statping-ng 2026-02-26 5.3 Medium
An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the Command execution function.
CVE-2025-15284 1 Qs Project 1 Qs 2026-02-26 3.7 Low
Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. Summary The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations. Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays larger than parameterLimit regardless of arrayLimit, because each a[]=valueconsumes one parameter slot. The severity has been reduced accordingly. Details The arrayLimit option only checked limits for indexed notation (a[0]=1&a[1]=2) but did not enforce it for bracket notation (a[]=1&a[]=2). Vulnerable code (lib/parse.js:159-162): if (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check } Working code (lib/parse.js:175): else if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; } The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays. PoC const qs = require('qs'); const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 }); console.log(result.a.length); // Output: 6 (should be max 5) Note on parameterLimit interaction: The original advisory's "DoS demonstration" claimed a length of 10,000, but parameterLimit (default: 1000) caps parsing to 1,000 parameters. With default options, the actual output is 1,000, not 10,000. Impact Consistency bug in arrayLimit enforcement. With default parameterLimit, the practical DoS risk is negligible since parameterLimit already caps the total number of parsed parameters (and thus array elements from bracket notation). The risk increases only when parameterLimit is explicitly set to a very high value.
CVE-2024-53011 1 Qualcomm 166 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 163 more 2026-02-26 7.9 High
Information disclosure may occur due to improper permission and access controls to Video Analytics engine.
CVE-2024-53012 2026-02-26 7.8 High
Memory corruption may occur due to improper input validation in clock device.
CVE-2024-53022 1 Qualcomm 46 Qam8255p, Qam8255p Firmware, Qam8295p and 43 more 2026-02-26 7.8 High
Memory corruption may occur during communication between primary and guest VM.
CVE-2024-53029 2026-02-26 7.8 High
Memory corruption while reading a value from a buffer controlled by the Guest Virtual Machine.
CVE-2024-53030 1 Qualcomm 88 Msm8996au, Msm8996au Firmware, Qam8255p and 85 more 2026-02-26 7.8 High
Memory corruption while processing input message passed from FE driver.
CVE-2024-53031 1 Qualcomm 52 Qam8255p, Qam8255p Firmware, Qam8295p and 49 more 2026-02-26 7.8 High
Memory corruption while reading a type value from a buffer controlled by the Guest Virtual Machine.
CVE-2023-40723 1 Fortinet 1 Fortisiem 2026-02-26 7.7 High
An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
CVE-2025-21234 1 Microsoft 14 Windows 10 21h2, Windows 10 21h2, Windows 10 22h2 and 11 more 2026-02-26 7.8 High
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-21235 1 Microsoft 14 Windows 10 21h2, Windows 10 21h2, Windows 10 22h2 and 11 more 2026-02-26 7.8 High
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-21344 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-02-26 7.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2025-29814 1 Microsoft 1 Partner Center 2026-02-26 9.3 Critical
Improper authorization in Microsoft Partner Center allows an authorized attacker to elevate privileges over a network.
CVE-2024-43095 1 Google 1 Android 2026-02-26 7.8 High
In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2025-30391 1 Microsoft 1 Dynamics 365 Customer Service 2026-02-26 8.1 High
Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.
CVE-2025-14963 1 Trellix 2 Endpoint Hx Agent (xagent), Endpoint Security 2026-02-26 7.8 High
A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.
CVE-2025-3068 1 Google 1 Chrome 2026-02-26 8.8 High
Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-45577 1 Qualcomm 20 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 17 more 2026-02-26 7.8 High
Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information.
CVE-2024-45579 1 Qualcomm 20 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 17 more 2026-02-26 7.8 High
Memory corruption may occur when invoking IOCTL calls from userspace to the camera kernel driver to dump request information, due to a missing memory requirement check.