Export limit exceeded: 351268 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 351268 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 44111 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (44111 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-30265 1 Qnap 2 Qts, Quts Hero 2025-09-22 6.5 Medium
A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following versions: QTS 5.2.5.3145 build 20250526 and later QuTS hero h5.2.5.3138 build 20250519 and later
CVE-2024-45801 2 Cure53, Redhat 8 Dompurify, Acm, Ansible Automation Platform and 5 more 2025-09-22 7.3 High
DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. It has been discovered that malicious HTML using special nesting techniques can bypass the depth checking added to DOMPurify in recent releases. It was also possible to use Prototype Pollution to weaken the depth check. This renders dompurify unable to avoid cross site scripting (XSS) attacks. This issue has been addressed in versions 2.5.4 and 3.1.3 of DOMPurify. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2025-59457 2 Jetbrains, Microsoft 2 Teamcity, Windows 2025-09-22 7.7 High
In JetBrains TeamCity before 2025.07.2 missing Git URL validation allowed credential leakage on Windows
CVE-2025-1692 1 Mongodb 1 Mongosh 2025-09-22 6.3 Medium
The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user’s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9
CVE-2025-1693 1 Mongodb 1 Mongosh 2025-09-22 3.9 Low
The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions. The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker. This issue affects mongosh versions prior to 2.3.9
CVE-2025-48007 1 Hallowelt 1 Bluespice 2025-09-22 6.4 Medium
Improper Encoding or Escaping of Output vulnerability in Hallo Welt! GmbH BlueSpice (Extension:BlueSpiceAvatars) allows Cross-Site Scripting (XSS). This issue affects BlueSpice: from 5 through 5.1.1.
CVE-2025-46703 1 Hallowelt 1 Bluespice 2025-09-22 6.4 Medium
Improper Encoding or Escaping of Output vulnerability in Hallo Welt! GmbH BlueSpice (Extension:AtMentions) allows Cross-Site Scripting (XSS). This issue affects BlueSpice: from 5 through 5.1.1.
CVE-2025-57880 1 Hallowelt 1 Bluespice 2025-09-22 5.4 Medium
Improper Encoding or Escaping of Output vulnerability in Hallo Welt! GmbH BlueSpice (Extension:BlueSpiceWhoIsOnline) allows Cross-Site Scripting (XSS). This issue affects BlueSpice: from 5 through 5.1.1.
CVE-2024-33258 1 Jerryscript 1 Jerryscript 2025-09-22 7.1 High
Jerryscript commit ff9ff8f was discovered to contain a segmentation violation via the component vm_loop at jerry-core/vm/vm.c.
CVE-2025-22482 1 Qnap 1 Qsync Central 2025-09-20 8.1 High
A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.6 ( 2025/03/20 ) and later
CVE-2025-9523 1 Tenda 2 Ac1206, Ac1206 Firmware 2025-09-20 9.8 Critical
A vulnerability was detected in Tenda AC1206 15.03.06.23. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.
CVE-2025-51535 2 Austrian Archaeological Institute, Craws 2 Openatlas, Openatlas 2025-09-20 9.1 Critical
Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a SQL injection vulnerability.
CVE-2025-54617 1 Huawei 1 Harmonyos 2025-09-20 6.8 Medium
Stack-based buffer overflow vulnerability in the dms_fwk module. Impact: Successful exploitation of this vulnerability can cause RCE.
CVE-2025-54628 1 Huawei 2 Emui, Harmonyos 2025-09-20 5.3 Medium
Vulnerability of incomplete verification information in the communication module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-54630 1 Huawei 1 Harmonyos 2025-09-20 6.8 Medium
:Vulnerability of insufficient data length verification in the DFA module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-54632 1 Huawei 2 Emui, Harmonyos 2025-09-20 6.8 Medium
Vulnerability of insufficient data length verification in the HVB module. Impact: Successful exploitation of this vulnerability may affect service integrity.
CVE-2025-54643 1 Huawei 2 Emui, Harmonyos 2025-09-20 6.6 Medium
Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-54644 1 Huawei 2 Emui, Harmonyos 2025-09-20 6.6 Medium
Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2025-54650 1 Huawei 1 Harmonyos 2025-09-20 4.2 Medium
Improper array index verification vulnerability in the audio codec module. Impact: Successful exploitation of this vulnerability may affect the audio decoding function.
CVE-2025-58749 1 Bytecodealliance 1 Webassembly Micro Runtime 2025-09-20 5.3 Medium
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. In WAMR versions prior to 2.4.2, when running in LLVM-JIT mode, the runtime cannot exit normally when executing WebAssembly programs containing a memory.fill instruction where the first operand (memory address pointer) is greater than or equal to 2147483648 bytes (2GiB). This causes the runtime to hang in release builds or crash in debug builds due to accessing an invalid pointer. The issue does not occur in FAST-JIT mode or other runtime tools. This has been fixed in version 2.4.2.