CVE Schwachstellen
CVE-Datenbank angereichert mit CISA KEV und NVD Daten
| CVE ID | CVSS | Schweregrad | KEV | Sichtungen |
|---|---|---|---|---|
| CVE-2025-20139 A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability ... | 7.5 | HIGH | — | 0 |
| CVE-2025-20203 A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a sto... | 4.8 | MEDIUM | — | 0 |
| CVE-2025-3149 A vulnerability was found in itning Student Homework Management System up to 1.2.7. It has been classified as problematic. Affected is an unknown function of the file /shw_war/fileupload of the compon... | 2.4 | LOW | — | 0 |
| CVE-2025-3150 A vulnerability was found in itning Student Homework Management System up to 1.2.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation le... | 4.3 | MEDIUM | — | 0 |
| CVE-2025-3155 A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate... | 7.4 | HIGH | — | 0 |
| CVE-2025-29570 An issue in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v3.2 allows a local attacker to escalate privileges via the function tftp_image_check of a binary named rc. | 7.8 | HIGH | — | 0 |
| CVE-2025-2075 The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. This is due ... | 8.8 | HIGH | — | 0 |
| CVE-2025-2780 The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to,... | 8.8 | HIGH | — | 0 |
| CVE-2025-2797 The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_han... | 5.4 | MEDIUM | — | 0 |
| CVE-2025-2243 A server-side request forgery (SSRF) vulnerability in Bitdefender GravityZone Console allows an attacker to bypass input validation logic using leading characters in DNS requests. Paired with other po... | 7.3 | HIGH | — | 0 |
| CVE-2025-2245 A server-side request forgery (SSRF) vulnerability exists in the Bitdefender GravityZone Update Server when operating in Relay Mode. The HTTP proxy component on port 7074 uses a domain allowlist to re... | 5.3 | MEDIUM | — | 0 |
| CVE-2025-2798 The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This m... | 9.8 | CRITICAL | — | 0 |
| CVE-2025-2258 In NetX Duo component HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very larg... | 7.5 | HIGH | — | 0 |
| CVE-2025-2259 In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by spe... | 7.5 | HIGH | — | 0 |
| CVE-2025-2260 In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause a denial of service by specially crafted packets. The core issue is missing closing of a fil... | 7.5 | HIGH | — | 0 |
| CVE-2025-21425 Memory corruption may occur due top improper access control in HAB process. | 7.3 | HIGH | — | 0 |
| CVE-2024-43058 Memory corruption while processing IOCTL calls. | 7.8 | HIGH | — | 0 |
| CVE-2024-43067 Memory corruption occurs during the copying of read data from the EEPROM because the IO configuration is exposed as shared memory. | 7.8 | HIGH | — | 0 |
| CVE-2024-45556 Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR. | 6.5 | MEDIUM | — | 0 |
| CVE-2024-45557 Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation. | 7.8 | HIGH | — | 0 |
| CVE-2025-21421 Memory corruption while processing escape code in API. | 7.8 | HIGH | — | 0 |
| CVE-2025-21423 Memory corruption occurs when handling client calls to EnableTestMode through an Escape call. | 7.8 | HIGH | — | 0 |
| CVE-2025-21436 Memory corruption may occur while initiating two IOCTL calls simultaneously to create processes from two different threads. | 7.8 | HIGH | — | 0 |
| CVE-2025-21437 Memory corruption while processing memory map or unmap IOCTL operations simultaneously. | 7.8 | HIGH | — | 0 |
| CVE-2025-21440 Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. | 7.8 | HIGH | — | 0 |
| CVE-2025-21441 Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. | 7.8 | HIGH | — | 0 |
| CVE-2025-2807 The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary plugin installations due to a missing capability check in the mvl_setup_wizard_install_plugin()... | 8.8 | HIGH | — | 0 |
| CVE-2025-21442 Memory corruption while transmitting packet mapping information with invalid header payload size. | 7.8 | HIGH | — | 0 |
| CVE-2025-21443 Memory corruption while processing message content in eAVB. | 7.8 | HIGH | — | 0 |
| CVE-2025-21447 Memory corruption may occur while processing device IO control call for session control. | 7.8 | HIGH | — | 0 |
| CVE-2025-32030 Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and... | 7.5 | HIGH | — | 0 |
| CVE-2025-32031 Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and... | 7.5 | HIGH | — | 0 |
| CVE-2025-2808 The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Phone Number parameter in all versions up to, and including, 1.4.63 d... | 5.4 | MEDIUM | — | 0 |
| CVE-2025-3437 The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in the ajax_acti... | 4.3 | MEDIUM | — | 0 |
| CVE-2024-26013 A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through ... | 7.5 | HIGH | — | 0 |
| CVE-2024-46671 An Incorrect User Management vulnerability [CWE-286] in FortiWeb version 7.6.2 and below, version 7.4.6 and below, version 7.2.10 and below, version 7.0.11 and below widgets dashboard may allow an aut... | 6.2 | MEDIUM | — | 0 |
| CVE-2024-50565 A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through ... | 3.1 | LOW | — | 0 |
| CVE-2025-32028 HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a ’save’ function in ’HAXCMSFile.php’. This save funct... | 9.9 | CRITICAL | — | 0 |
| CVE-2025-25212 in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input. | 3.3 | LOW | — | 0 |
| CVE-2025-27443 Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access. | 2.8 | LOW | — | 0 |
| CVE-2025-30670 Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access. | 6.5 | MEDIUM | — | 0 |
| CVE-2025-30671 Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access. | 6.5 | MEDIUM | — | 0 |
| CVE-2025-27205 Adobe Experience Manager Screens versions FP11.3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scr... | 5.4 | MEDIUM | — | 0 |
| CVE-2025-29821 Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally. | 5.5 | MEDIUM | — | 0 |
| CVE-2025-2629 There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW when loading NI Error Reporting. This vulnerability may result in arbitrary code execution. Succes... | 7.3 | HIGH | — | 0 |
| CVE-2025-2630 There is a DLL hijacking vulnerability due to an uncontrolled search path that exists in NI LabVIEW. This vulnerability may result in arbitrary code execution. Successful exploitation requires an at... | 7.3 | HIGH | — | 0 |
| CVE-2025-21601 An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Juniper Networks Junos OS on SRX Series, EX Series, MX2... | 7.5 | HIGH | — | 0 |
| CVE-2025-26901 Missing Authorization vulnerability in Brizy Brizy Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Brizy Pro: from n/a through 2.6.1. | 4.3 | MEDIUM | — | 0 |
| CVE-2025-26902 Cross-Site Request Forgery (CSRF) vulnerability in Brizy Brizy Pro allows Cross Site Request Forgery.This issue affects Brizy Pro: from n/a through 2.6.1. | 4.3 | MEDIUM | — | 0 |
| CVE-2025-32383 MaxKB (Max Knowledge Base) is an open source knowledge base question-answering system based on a large language model and retrieval-augmented generation (RAG). A reverse shell vulnerability exists in ... | 4.3 | MEDIUM | — | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.