170 CVEs tracked today. 10 Critical, 60 High, 89 Medium, 10 Low.
-
CVE-2025-28413
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the SysDictTypeController component. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28412
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the /editSave method in SysNoticeController. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28411
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method in /tool/gen/editSave. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28410
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the cancelAuthUserAll method does not properly validate whether the requesting user has administrative privileges. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28408
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the selectDeptTree method of the /selectDeptTree/{deptId} endpoint does not properly validate the deptId parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28406
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobLogId parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28405
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the changeStatus method. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28402
CRITICAL
CVSS 9.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobId parameter. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-20654
CRITICAL
CVSS 9.8
In wlan service, there is a possible out of bounds write due to an incorrect bounds check. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Software Development Kit
Mt7622
-
CVE-2025-3248
CRITICAL
CVSS 9.8
Langflow before 1.3.0 allows unauthenticated remote code injection through the /api/v1/validate/code endpoint, enabling attackers to execute arbitrary Python code on the server without authentication.
Authentication Bypass
Langflow
-
CVE-2025-32409
HIGH
CVSS 8.1
Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
RCE
Path Traversal
-
CVE-2025-32034
HIGH
CVSS 7.5
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-32033
HIGH
CVSS 7.5
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
-
CVE-2025-32032
HIGH
CVSS 7.5
The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-32031
HIGH
CVSS 7.5
Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Allocation of Resources Without Limits vulnerability could allow attackers to exhaust system resources through uncontrolled allocation.
Denial Of Service
Apollo Gateway
-
CVE-2025-32030
HIGH
CVSS 7.5
Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Allocation of Resources Without Limits vulnerability could allow attackers to exhaust system resources through uncontrolled allocation.
Denial Of Service
Apollo Gateway
-
CVE-2025-31496
HIGH
CVSS 7.5
apollo-compiler is a query-based compiler for the GraphQL query language. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-31175
HIGH
CVSS 8.4
Deserialization mismatch vulnerability in the DSoftBus module Impact: Successful exploitation of this vulnerability may affect service integrity. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Deserialization
Emui
Harmonyos
-
CVE-2025-31173
HIGH
CVSS 8.8
Memory write permission bypass vulnerability in the kernel futex module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated high severity (CVSS 8.8), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-31172
HIGH
CVSS 7.8
Memory write permission bypass vulnerability in the kernel futex module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-31170
HIGH
CVSS 8.4
Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Emui
Harmonyos
-
CVE-2025-30473
HIGH
CVSS 8.8
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow Common SQL Provider. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity.
Apache
SQLi
Airflow Common Sql Provider
-
CVE-2025-30195
HIGH
CVSS 7.5
An attacker can publish a zone containing specific Resource Record Sets. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Suse
-
CVE-2025-29769
HIGH
CVSS 8.5
libvips is a demand-driven, horizontally threaded image processing library. Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. Public exploit code available.
Buffer Overflow
Heap Overflow
Libvips
Debian Linux
-
CVE-2025-28409
HIGH
CVSS 8.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28407
HIGH
CVSS 8.8
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the edit method of the /edit/{dictId} endpoint does not properly validate whether the requesting user has permission to. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-28403
HIGH
CVSS 7.2
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method does not properly validate whether the requesting user has administrative privileges before allowing. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Ruoyi
-
CVE-2025-21448
HIGH
CVSS 7.5
Transient DOS may occur while parsing SSID in action frames. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Qcn9070 Firmware
Qcn9072 Firmware
Qcn9074 Firmware
Qcn9100 Firmware
-
CVE-2025-21447
HIGH
CVSS 7.8
Memory corruption may occur while processing device IO control call for session control. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Sc8380xp Firmware
Wcd9380 Firmware
-
CVE-2025-21443
HIGH
CVSS 7.8
Memory corruption while processing message content in eAVB. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
Qam8650p Firmware
-
CVE-2025-21442
HIGH
CVSS 7.8
Memory corruption while transmitting packet mapping information with invalid header payload size. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
Qam8650p Firmware
-
CVE-2025-21441
HIGH
CVSS 7.8
Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Fastconnect 7800 Firmware
Qca1062 Firmware
Qca1064 Firmware
-
CVE-2025-21440
HIGH
CVSS 7.8
Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
-
CVE-2025-21439
HIGH
CVSS 7.8
Memory corruption may occur while reading board data via IOCTL call when the WLAN driver copies the content to the provided output buffer. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Fastconnect 6700 Firmware
Fastconnect 6900 Firmware
Qca6595au Firmware
-
CVE-2025-21438
HIGH
CVSS 7.8
Memory corruption while IOCTL call is invoked from user-space to read board data. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6900 Firmware
-
CVE-2025-21437
HIGH
CVSS 7.8
Memory corruption while processing memory map or unmap IOCTL operations simultaneously. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Buffer Overflow
Qam8255p Firmware
Qam8295p Firmware
-
CVE-2025-21436
HIGH
CVSS 7.8
Memory corruption may occur while initiating two IOCTL calls simultaneously to create processes from two different threads. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Buffer Overflow
Fastconnect 7800 Firmware
Qmp1000 Firmware
-
CVE-2025-21435
HIGH
CVSS 7.5
Transient DOS may occur while parsing extended IE in beacon. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Ar8035 Firmware
Csr8811 Firmware
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
-
CVE-2025-21434
HIGH
CVSS 7.5
Transient DOS may occur while parsing EHT operation IE or EHT capability IE. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Qcs8300 Firmware
Qcs8550 Firmware
Qcs9100 Firmware
Qfw7114 Firmware
-
CVE-2025-21430
HIGH
CVSS 7.5
Transient DOS while connecting STA to AP and initiating ADD TS request from AP to establish TSpec session. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
315 5g Iot Modem Firmware
Apq8017 Firmware
Apq8064au Firmware
Aqt1000 Firmware
-
CVE-2025-21429
HIGH
CVSS 7.5
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Sa9000p Firmware
Sd626 Firmware
Sd660 Firmware
Sd670 Firmware
-
CVE-2025-21428
HIGH
CVSS 7.5
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Snapdragon 439 Mobile Platform Firmware
Snapdragon 625 Mobile Platform Firmware
Snapdragon 626 Mobile Platform Firmware
Snapdragon 632 Mobile Platform Firmware
-
CVE-2025-21425
HIGH
CVSS 7.3
Memory corruption may occur due top improper access control in HAB process. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Authentication Bypass
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
-
CVE-2025-21423
HIGH
CVSS 7.8
Memory corruption occurs when handling client calls to EnableTestMode through an Escape call. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
-
CVE-2025-21421
HIGH
CVSS 7.8
Memory corruption while processing escape code in API. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Aqt1000 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
-
CVE-2025-20664
HIGH
CVSS 7.5
In wlan AP driver, there is a possible information disclosure due to an uncaught exception. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Software Development Kit
Mt7915
Mt7916
Mt7981
-
CVE-2025-20663
HIGH
CVSS 7.5
In wlan AP driver, there is a possible information disclosure due to an uncaught exception. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Software Development Kit
Mt7915
Mt7916
Mt7981
-
CVE-2025-3426
HIGH
CVSS 7.2
We observed that Intellispace Portal binaries doesn’t have any protection mechanisms to prevent reverse engineering. Rated high severity (CVSS 7.2), this vulnerability is no authentication required. No vendor patch available.
Authentication Bypass
-
CVE-2025-3425
HIGH
CVSS 7.3
The IntelliSpace portal application utilizes .NET Remoting for its functionality. Rated high severity (CVSS 7.3), this vulnerability is no authentication required. No vendor patch available.
RCE
Deserialization
-
CVE-2025-3424
HIGH
CVSS 7.7
The IntelliSpace portal application utilizes .NET Remoting for its functionality. Rated high severity (CVSS 7.7), this vulnerability is no authentication required. No vendor patch available.
Path Traversal
-
CVE-2025-3346
HIGH
CVSS 8.7
A vulnerability was found in Tenda AC7 15.03.06.44. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Tenda
Buffer Overflow
Ac7 Firmware
-
CVE-2025-3328
HIGH
CVSS 8.7
A vulnerability was found in Tenda AC1206 15.03.06.23. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Tenda
Buffer Overflow
Ac1206 Firmware
-
CVE-2025-0942
HIGH
CVSS 8.6
The DB chooser functionality in Jalios JPlatform 10 SP6 before 10.0.6 improperly neutralizes special elements used in an SQL command allows for unauthenticated users to trigger SQL Injection.0.6 and. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
-
CVE-2024-58127
HIGH
CVSS 8.4
Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Emui
Harmonyos
-
CVE-2024-58126
HIGH
CVSS 8.4
Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Emui
Harmonyos
-
CVE-2024-58125
HIGH
CVSS 8.4
Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Emui
Harmonyos
-
CVE-2024-58124
HIGH
CVSS 8.4
Access control vulnerability in the security verification module Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Emui
Harmonyos
-
CVE-2024-58112
HIGH
CVSS 7.5
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2024-58111
HIGH
CVSS 7.5
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2024-58107
HIGH
CVSS 7.5
Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2024-45557
HIGH
CVSS 7.8
Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Ar8035 Firmware
Fastconnect 6700 Firmware
Fastconnect 6900 Firmware
-
CVE-2024-45552
HIGH
CVSS 8.2
Information disclosure may occur during a video call if a device resets due to a non-conforming RTCP packet that doesn`t adhere to RFC standards. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Apq8064au Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
-
CVE-2024-45549
HIGH
CVSS 7.7
Information disclosure while creating MQ channels. Rated high severity (CVSS 7.7), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Sm8550p Firmware
Sm8635 Firmware
Sm8635p Firmware
Sm8650q Firmware
-
CVE-2024-43067
HIGH
CVSS 7.8
Memory corruption occurs during the copying of read data from the EEPROM because the IO configuration is exposed as shared memory. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Qca6391 Firmware
Qca6426 Firmware
Qca6436 Firmware
Qca6574au Firmware
-
CVE-2024-43066
HIGH
CVSS 7.8
Memory corruption while handling file descriptor during listener registration/de-registration. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Buffer Overflow
Csrb31024 Firmware
Fastconnect 6200 Firmware
-
CVE-2024-43065
HIGH
CVSS 7.1
Cryptographic issues while generating an asymmetric key pair for RKP use cases. Rated high severity (CVSS 7.1), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Fastconnect 7800 Firmware
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
-
CVE-2024-43058
HIGH
CVSS 7.8
Memory corruption while processing IOCTL calls. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Buffer Overflow
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Snapdragon 8 Gen 1 Mobile Platform Firmware
Wcd9380 Firmware
-
CVE-2024-33058
HIGH
CVSS 7.5
Memory corruption while assigning memory from the source DDR memory(HLOS) to ADSP. Rated high severity (CVSS 7.5). No vendor patch available.
Buffer Overflow
Aqt1000 Firmware
Ar8035 Firmware
Fastconnect 6200 Firmware
Fastconnect 6700 Firmware
-
CVE-2024-11859
HIGH
CVSS 8.4
DLL Search Order Hijacking vulnerability potentially allowed an attacker with administrator privileges to load a malicious dynamic-link library and execute its code. Rated high severity (CVSS 8.4), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2024-11071
HIGH
CVSS 7.7
Permissive Cross-domain Policy with Untrusted Domains vulnerability in local API server of DestinyECM solution(versions described below) which is developed and maintained by Cyberdigm may allow. Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
CSRF
-
CVE-2025-32029
MEDIUM
CVSS 6.9
ts-asn1-der is a collection of utility classes to encode ASN.1 data following DER rule. Rated medium severity (CVSS 6.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-32014
MEDIUM
CVSS 6.9
estree-util-value-to-estree converts a JavaScript value to an ESTree expression. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Prototype Pollution
Information Disclosure
-
CVE-2025-31476
MEDIUM
CVSS 4.8
tarteaucitron.js is a compliant and accessible cookie banner. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.
Information Disclosure
XSS
Tarteaucitronjs
Tacjs
-
CVE-2025-31475
MEDIUM
CVSS 5.5
tarteaucitron.js is a compliant and accessible cookie banner. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity. This Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) vulnerability could allow attackers to modify object prototypes to inject properties affecting application logic.
Prototype Pollution
RCE
Tarteaucitronjs
-
CVE-2025-31174
MEDIUM
CVSS 6.8
Path traversal vulnerability in the DFS module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Path Traversal
Harmonyos
-
CVE-2025-31171
MEDIUM
CVSS 6.8
File read permission bypass vulnerability in the kernel file system module Impact: Successful exploitation of this vulnerability may affect service confidentiality. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Harmonyos
-
CVE-2025-31138
MEDIUM
CVSS 5.5
tarteaucitron.js is a compliant and accessible cookie banner. Rated medium severity (CVSS 5.5), this vulnerability is remotely exploitable, low attack complexity.
XSS
Tarteaucitronjs
-
CVE-2025-30373
MEDIUM
CVSS 6.5
Graylog is a free and open log management platform. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
Authentication Bypass
Graylog
-
CVE-2025-29594
MEDIUM
CVSS 6.1
A vulnerability exists in the errorpage.php file of the CS2-WeaponPaints-Website v2.1.7 where user-controlled input is not adequately validated before being processed. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
PHP
XSS
-
CVE-2025-29482
MEDIUM
CVSS 6.2
Buffer Overflow vulnerability in libheif 1.19.7 allows a local attacker to execute arbitrary code via the SAO (Sample Adaptive Offset) processing of libde265. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
RCE
Libheif
Suse
-
CVE-2025-29481
MEDIUM
CVSS 6.2
Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker to execute arbitrary code via the bpf_object__init_prog` function of libbpf. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
RCE
Libbpf
Redhat
Suse
-
CVE-2025-29480
MEDIUM
CVSS 5.5
Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker to cause a denial of service via the OGRSpatialReference::Release function. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Denial Of Service
Gdal
Redhat
Suse
-
CVE-2025-29478
MEDIUM
CVSS 5.5
An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the cfl_list_size in cfl_list.h:165. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.
Denial Of Service
Fluent Bit
-
CVE-2025-28401
MEDIUM
CVSS 6.7
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the menuId parameter. Rated medium severity (CVSS 6.7), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.
Privilege Escalation
Ruoyi
-
CVE-2025-28400
MEDIUM
CVSS 6.7
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the postID parameter in the edit method. Rated medium severity (CVSS 6.7), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.
Privilege Escalation
Ruoyi
-
CVE-2025-22851
MEDIUM
CVSS 6.5
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.
Integer Overflow
RCE
Openharmony
-
CVE-2025-21431
MEDIUM
CVSS 5.5
Information disclosure may be there when a guest VM is connected. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Qam8255p Firmware
Qam8295p Firmware
Qam8620p Firmware
Qam8650p Firmware
-
CVE-2025-20662
MEDIUM
CVSS 6.7
In PlayReady TA, there is a possible out of bounds read due to a missing bounds check. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Privilege Escalation
Android
Mt9972
-
CVE-2025-20661
MEDIUM
CVSS 6.7
In PlayReady TA, there is a possible out of bounds read due to a missing bounds check. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Privilege Escalation
Android
Mt9972
-
CVE-2025-20660
MEDIUM
CVSS 6.7
In PlayReady TA, there is a possible out of bounds read due to a missing bounds check. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Privilege Escalation
Android
Google
-
CVE-2025-20659
MEDIUM
CVSS 6.5
In Modem, there is a possible system crash due to improper input validation. Rated medium severity (CVSS 6.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Denial Of Service
Mt2735 Firmware
Mt2737 Firmware
-
CVE-2025-20658
MEDIUM
CVSS 6.0
In DA, there is a possible permission bypass due to a logic error. Rated medium severity (CVSS 6.0), this vulnerability is no authentication required. No vendor patch available.
Memory Corruption
Buffer Overflow
Privilege Escalation
Android
Mt2718
-
CVE-2025-20657
MEDIUM
CVSS 6.7
In vdec, there is a possible permission bypass due to improper input validation. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Privilege Escalation
Android
Google
-
CVE-2025-20656
MEDIUM
CVSS 6.8
In DA, there is a possible out of bounds write due to a missing bounds check. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Privilege Escalation
Yocto
Rdk B
-
CVE-2025-20655
MEDIUM
CVSS 5.3
In keymaster, there is a possible out of bounds read due to a missing bounds check. Rated medium severity (CVSS 5.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Android
Mt9972
Google
-
CVE-2025-3388
MEDIUM
CVSS 5.3
A vulnerability classified as problematic was found in hailey888 oa_system up to 2025.01.01. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Java
Oa System
-
CVE-2025-3387
MEDIUM
CVSS 5.1
A vulnerability classified as problematic has been found in renrenio renren-security up to 5.4.0. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Renren Security
-
CVE-2025-3386
MEDIUM
CVSS 4.8
A vulnerability was found in LinZhaoguan pb-cms 2.0. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Pb Cms
-
CVE-2025-3385
MEDIUM
CVSS 4.8
A vulnerability was found in LinZhaoguan pb-cms 2.0. Rated medium severity (CVSS 4.8), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Pb Cms
-
CVE-2025-3384
MEDIUM
CVSS 6.9
A vulnerability was found in 1000 Projects Human Resource Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Human Resource Management System
-
CVE-2025-3383
MEDIUM
CVSS 6.9
A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0 and classified as critical.php. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Web Based Pharmacy Product Management System
-
CVE-2025-3382
MEDIUM
CVSS 5.3
A vulnerability has been found in joey-zhou xiaozhi-esp32-server-java up to a14fe8115842ee42ab5c7a51706b8a85db5200b7 and classified as critical. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
SQLi
Java
-
CVE-2025-3381
MEDIUM
CVSS 5.3
A vulnerability, which was classified as critical, was found in zhangyanbo2007 youkefu 4.2.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
Path Traversal
File Upload
Java
Youkefu
-
CVE-2025-3380
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3379
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3378
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3377
MEDIUM
CVSS 6.9
A vulnerability was found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3376
MEDIUM
CVSS 6.9
A vulnerability was found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3375
MEDIUM
CVSS 6.9
A vulnerability was found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3374
MEDIUM
CVSS 6.9
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3373
MEDIUM
CVSS 6.9
A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3372
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3371
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3370
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in PHPGurukul Men Salon Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Men Salon Management System
-
CVE-2025-3369
MEDIUM
CVSS 5.3
A vulnerability was found in xxyopen Novel-Plus 5.1.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Novel Plus
D-Link
-
CVE-2025-3359
MEDIUM
CVSS 6.2
A flaw was found in GNUPlot. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Redhat
Suse
-
CVE-2025-3353
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Men Salon Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Men Salon Management System
-
CVE-2025-3352
MEDIUM
CVSS 6.9
A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
PHP
SQLi
Old Age Home Management System
-
CVE-2025-3351
MEDIUM
CVSS 6.9
A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
PHP
SQLi
Old Age Home Management System
-
CVE-2025-3350
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Old Age Home Management System
-
CVE-2025-3349
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Ftp Server
-
CVE-2025-3348
MEDIUM
CVSS 5.3
A vulnerability classified as critical was found in code-projects Patient Record Management System 1.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Patient Record Management System
-
CVE-2025-3347
MEDIUM
CVSS 5.3
A vulnerability classified as critical has been found in code-projects Patient Record Management System 1.0. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Patient Record Management System
-
CVE-2025-3345
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3344
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3343
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0 and classified as critical.php. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3342
MEDIUM
CVSS 6.9
A vulnerability has been found in codeprojects Online Restaurant Management System 1.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3341
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3340
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3339
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3338
MEDIUM
CVSS 6.9
A vulnerability classified as critical has been found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3337
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3336
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3335
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3334
MEDIUM
CVSS 6.9
A vulnerability was found in codeprojects Online Restaurant Management System 1.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3333
MEDIUM
CVSS 6.9
A vulnerability has been found in codeprojects Online Restaurant Management System 1.0 and classified as critical. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3332
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3331
MEDIUM
CVSS 6.9
A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0.php. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3330
MEDIUM
CVSS 6.9
A vulnerability classified as critical was found in codeprojects Online Restaurant Management System 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
SQLi
Online Restaurant Management System
-
CVE-2025-3327
MEDIUM
CVSS 5.1
A vulnerability was found in iteaj iboot 物联网网关 1.1.3 and classified as problematic. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
File Upload
Iboot
-
CVE-2025-3326
MEDIUM
CVSS 5.1
A vulnerability has been found in iteaj iboot 物联网网关 1.1.3 and classified as problematic. Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
File Upload
Iboot
-
CVE-2025-2251
MEDIUM
CVSS 6.2
A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. Rated medium severity (CVSS 6.2), this vulnerability is remotely exploitable. No vendor patch available.
RCE
Deserialization
Redhat
-
CVE-2025-0050
MEDIUM
CVSS 5.9
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU. Rated medium severity (CVSS 5.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
5th Gen Gpu Architecture Userspace Driver
Bifrost Gpu Userspace Driver
Valhall Gpu Userspace Driver
-
CVE-2024-58116
MEDIUM
CVSS 4.0
Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stack Overflow
Harmonyos
-
CVE-2024-58115
MEDIUM
CVSS 4.0
Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Stack Overflow
Harmonyos
-
CVE-2024-58113
MEDIUM
CVSS 5.3
Vulnerability of improper resource management in the memory management module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Harmonyos
-
CVE-2024-58110
MEDIUM
CVSS 4.6
Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2024-58109
MEDIUM
CVSS 4.6
Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2024-58108
MEDIUM
CVSS 4.6
Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2024-58106
MEDIUM
CVSS 4.6
Buffer overflow vulnerability in the codec module Impact: Successful exploitation of this vulnerability may affect availability. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Harmonyos
-
CVE-2024-49848
MEDIUM
CVSS 6.7
Memory corruption while processing multiple IOCTL calls from HLOS to DSP. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Buffer Overflow
Qam8255p Firmware
Qam8295p Firmware
-
CVE-2024-46494
MEDIUM
CVSS 5.4
A cross-site scripting (XSS) vulnerability in Typecho v1.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into Name parameter under a comment for an. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
XSS
Typecho
-
CVE-2024-45556
MEDIUM
CVSS 6.5
Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR. Rated medium severity (CVSS 6.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
Immersive Home 3210 Platform Firmware
Immersive Home 326 Platform Firmware
-
CVE-2024-45551
MEDIUM
CVSS 6.2
Cryptographic issue occurs during PIN/password verification using Gatekeeper, where RPMB writes can be dropped on verification failure, potentially leading to a user throttling bypass. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Fastconnect 6700 Firmware
Fastconnect 6800 Firmware
Fastconnect 6900 Firmware
Fastconnect 7800 Firmware
-
CVE-2024-45544
MEDIUM
CVSS 6.6
Memory corruption while processing IOCTL calls to add route entry in the HW. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Buffer Overflow
C V2x 9150 Firmware
Fastconnect 6800 Firmware
-
CVE-2024-45543
MEDIUM
CVSS 6.6
Memory corruption while accessing MSM channel map and mixer functions. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
C V2x 9150 Firmware
Fastconnect 6200 Firmware
Fastconnect 6800 Firmware
-
CVE-2024-45540
MEDIUM
CVSS 6.6
Memory corruption while invoking IOCTL map buffer request from userspace. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Buffer Overflow
C V2x 9150 Firmware
Fastconnect 6200 Firmware
-
CVE-2024-43046
MEDIUM
CVSS 5.5
There may be information disclosure during memory re-allocation in TZ Secure OS. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Csr8811 Firmware
Csra6620 Firmware
Csra6640 Firmware
Fastconnect 6200 Firmware
-
CVE-2024-38797
MEDIUM
CVSS 4.6
EDK2 contains a vulnerability in the HashPeImageByType(). Rated medium severity (CVSS 4.6), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Redhat
Suse
-
CVE-2025-29479
None
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.
Information Disclosure
-
CVE-2025-29087
LOW
CVSS 3.2
In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. Rated low severity (CVSS 3.2), this vulnerability is no authentication required. No vendor patch available.
Integer Overflow
Buffer Overflow
Sqlite
-
CVE-2025-27686
LOW
CVSS 2.7
Dell Unisphere for PowerMax, version(s) prior to 10.2.0.9 and PowerMax version(s) prior to PowerMax 9.2.4.15, contain an Improper Neutralization of Special Elements used in an LDAP Query ('LDAP. Rated low severity (CVSS 2.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Dell
Code Injection
Ldap
Unisphere For Powermax
-
CVE-2025-27534
LOW
CVSS 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Openharmony
-
CVE-2025-25057
LOW
CVSS 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Openharmony
-
CVE-2025-24304
LOW
CVSS 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Openharmony
-
CVE-2025-22842
LOW
CVSS 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Openharmony
-
CVE-2025-22452
LOW
CVSS 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Openharmony
-
CVE-2025-20102
LOW
CVSS 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Openharmony
-
CVE-2025-3360
LOW
CVSS 3.7
A flaw was found in GLib. Rated low severity (CVSS 3.7), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Integer Overflow
Buffer Overflow
-
CVE-2025-3329
LOW
CVSS 2.3
A vulnerability classified as problematic has been found in Consumer Comanda Mobile up to 14.9.3.2/15.0.0.8. Rated low severity (CVSS 2.3), this vulnerability is no authentication required. Public exploit code available and no vendor patch available.
Information Disclosure
Comanda Mobile