Search

Search Results (325094 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-66823 2025-12-30 N/A
An HTML Injection vulnerability in TrueConf server 5.5.2.10813 in the conference description field allows an attacker to inject arbitrary HTML in the Create/Edit conference functionality. The payload will be triggered when the victim opens the Conference Info page ([conference url]/info).
CVE-2025-66587 1 Azeotech 1 Daqfactory 2025-12-30 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-66584 1 Azeotech 1 Daqfactory 2025-12-30 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-50343 2025-12-30 N/A
An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.
CVE-2025-15353 2025-12-30 7.3 High
A vulnerability was detected in itsourcecode Society Management System 1.0. Impacted is the function edit_admin_query of the file /admin/edit_admin_query.php. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
CVE-2019-25242 1 Iwt 2 Facesentry Access Control System, Facesentry Access Control System Firmware 2025-12-30 4.3 Medium
FaceSentry Access Control System 6.4.8 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to change administrator passwords, add new admin users, or open access control doors by tricking authenticated users into loading a specially crafted webpage.
CVE-2019-25241 1 Iwt 2 Facesentry Access Control System, Facesentry Access Control System Firmware 2025-12-30 7.5 High
FaceSentry Access Control System 6.4.8 contains a critical authentication vulnerability with hard-coded SSH credentials for the wwwuser account. Attackers can leverage the insecure sudoers configuration to escalate privileges and gain root access by executing sudo commands without authentication.
CVE-2025-14860 1 Mozilla 1 Firefox 2025-12-30 9.8 Critical
Use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 146.0.1.
CVE-2025-14861 1 Mozilla 1 Firefox 2025-12-30 8.8 High
Memory safety bugs present in Firefox 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 146.0.1.
CVE-2025-63757 1 Ffmpeg 1 Ffmpeg 2025-12-30 7.5 High
Integer overflow vulnerability in the yuv2ya16_X_c_template function in libswscale/output.c in FFmpeg 8.0.
CVE-2025-63386 2 Dify, Langgenius 2 Dify, Dify 2025-12-30 9.1 Critical
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests.
CVE-2025-63388 2 Dify, Langgenius 2 Dify, Dify 2025-12-30 9.1 Critical
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/system-features endpoint. The endpoint implements an overly permissive CORS policy that reflects arbitrary Origin headers and sets Access-Control-Allow-Credentials: true, allowing any external domain to make authenticated cross-origin requests.
CVE-2025-66585 1 Azeotech 1 Daqfactory 2025-12-30 N/A
In AzeoTech DAQFactory release 20.7 (Build 2555), a Use After Free vulnerability can be exploited to cause memory corruption while parsing specially crafted .ctl files. This could allow an attacker to execute code in the context of the current process.
CVE-2025-63389 1 Ollama 1 Ollama 2025-12-30 9.8 Critical
A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.
CVE-2025-63390 1 Mintplexlabs 1 Anythingllm 2025-12-30 5.3 Medium
An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel, agentProvider), system prompts (openAiPrompt), operational parameters (temperature, history length, similarity thresholds), vector search settings, chat modes, and timestamps.
CVE-2025-66586 1 Azeotech 1 Daqfactory 2025-12-30 N/A
In AzeoTech DAQFactory release 20.7 (Build 2555), an Access of Resource Using Incompatible Type vulnerability can be exploited to cause memory corruption while parsing specially crafted .ctl files. This could allow an attacker to execute code in the context of the current process.
CVE-2025-63391 2 Open-webui, Openwebui 2 Open-webui, Open Webui 2025-12-30 7.5 High
An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
CVE-2025-66590 1 Azeotech 1 Daqfactory 2025-12-30 N/A
In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Write vulnerability can be exploited by an attacker to cause the program to write data past the end of an allocated memory buffer. This can lead to arbitrary code execution or a system crash.
CVE-2025-66589 1 Azeotech 1 Daqfactory 2025-12-30 N/A
In AzeoTech DAQFactory release 20.7 (Build 2555), an Out-of-bounds Read vulnerability can be exploited by an attacker to cause the program to read data past the end of an allocated buffer. This could allow an attacker to disclose information or cause a system crash.
CVE-2025-68469 1 Imagemagick 1 Imagemagick 2025-12-30 3.3 Low
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.1-14, ImageMagick crashes when processing a crafted TIFF file. Version 7.1.1-14 fixes the issue.