Search Results (342739 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2019-11001 1 Reolink 10 C1 Pro, C1 Pro Firmware, C2 Pro and 7 more 2025-11-06 7.2 High
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
CVE-2019-11510 1 Ivanti 1 Connect Secure 2025-11-06 10.0 Critical
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
CVE-2019-11539 2 Ivanti, Pulsesecure 3 Connect Secure, Policy Secure, Pulse Policy Secure 2025-11-06 7.2 High
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
CVE-2019-11634 1 Citrix 2 Receiver, Workspace 2025-11-06 9.8 Critical
Citrix Workspace App before 1904 for Windows has Incorrect Access Control.
CVE-2019-12989 1 Citrix 2 Netscaler Sd-wan, Sd-wan 2025-11-06 9.8 Critical
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection.
CVE-2019-12991 1 Citrix 2 Netscaler Sd-wan, Sd-wan 2025-11-06 8.8 High
Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 5 of 6).
CVE-2019-13272 6 Canonical, Debian, Fedoraproject and 3 more 25 Ubuntu Linux, Debian Linux, Fedora and 22 more 2025-11-06 7.8 High
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
CVE-2019-15107 1 Webmin 1 Webmin 2025-11-06 9.8 Critical
An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
CVE-2025-41673 3 Helmholz, Mb Connect Line, Mbconnectline 4 Rex 100, Mbnet.mini, Mbnet.mini and 1 more 2025-11-06 7.2 High
A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.
CVE-2025-41674 1 Mbconnectline 2 Mbnet.mini, Mbnet.mini Firmware 2025-11-06 7.2 High
A high privileged remote attacker can execute arbitrary system commands via POST requests in the diagnostic action due to improper neutralization of special elements used in an OS command.
CVE-2025-41675 3 Helmholz, Mb Connect Line, Mbconnectline 4 Rex 100, Mbnet.mini, Mbnet.mini and 1 more 2025-11-06 7.2 High
A high privileged remote attacker can execute arbitrary system commands via GET requests in the cloud server communication script due to improper neutralization of special elements used in an OS command.
CVE-2025-41676 3 Helmholz, Mb Connect Line, Mbconnectline 4 Rex 100, Mbnet.mini, Mbnet.mini and 1 more 2025-11-06 4.9 Medium
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-sms action in fast succession.
CVE-2025-41677 3 Helmholz, Mb Connect Line, Mbconnectline 4 Rex 100, Mbnet.mini, Mbnet.mini and 1 more 2025-11-06 4.9 Medium
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.
CVE-2025-41678 1 Mbconnectline 2 Mbnet.mini, Mbnet.mini Firmware 2025-11-06 6.5 Medium
A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.
CVE-2025-41679 3 Helmholz, Mb Connect Line, Mbconnectline 4 Rex 100, Mbnet.mini, Mbnet.mini and 1 more 2025-11-06 5.3 Medium
An unauthenticated remote attacker could exploit a buffer overflow vulnerability in the device causing a denial of service that affects only the network initializing wizard (Conftool) service.
CVE-2025-41681 1 Mbconnectline 2 Mbnet.mini, Mbnet.mini Firmware 2025-11-06 4.8 Medium
A high privileged remote attacker can gain persistent XSS via POST requests due to improper neutralization of special elements used to create dynamic content.
CVE-2025-53964 1 Goldendict 1 Goldendict 2025-11-06 9.6 Critical
GoldenDict 1.5.0 and 1.5.1 has an exposed dangerous method that allows reading and modifying files when a user adds a crafted dictionary and then searches for any term included in that dictionary.
CVE-2024-40763 1 Sonicwall 11 Sma100 Firmware, Sma 200, Sma 200 Firmware and 8 more 2025-11-06 7.5 High
Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.
CVE-2025-40599 1 Sonicwall 6 Sma 210, Sma 210 Firmware, Sma 410 and 3 more 2025-11-06 9.1 Critical
An authenticated arbitrary file upload vulnerability exists in the SMA 100 series web management interface. A remote attacker with administrative privileges can exploit this flaw to upload arbitrary files to the system, potentially leading to remote code execution.
CVE-2025-44823 1 Nagios 1 Log Server 2025-11-06 9.9 Critical
Nagios Log Server before 2024R1.3.2 allows authenticated users to retrieve cleartext administrative API keys via a /nagioslogserver/index.php/api/system/get_users call. This is GL:NLS#475.