Search Results (70592 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-66287 1 Redhat 5 Enterprise Linux, Rhel Aus, Rhel E4s and 2 more 2025-12-18 8.8 High
A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.
CVE-2025-13947 1 Redhat 5 Enterprise Linux, Rhel Aus, Rhel E4s and 2 more 2025-12-18 7.4 High
A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.
CVE-2025-13502 1 Redhat 5 Enterprise Linux, Rhel Aus, Rhel E4s and 2 more 2025-12-18 7.5 High
A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.
CVE-2025-14364 2025-12-18 8.8 High
The Demo Importer Plus plugin for WordPress is vulnerable to unauthorized modification of data, loss of data, and privilege escalation due to a missing capability check on the Ajax::handle_request() function in all versions up to, and including, 2.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger a full site reset, dropping all database tables except users/usermeta and re-running wp_install(), which also assigns the Administrator role to the attacking subscriber account.
CVE-2025-13641 2025-12-18 8.8 High
The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.59.12 via the 'template' shortcode parameter. This is due to insufficient path validation that allows absolute paths to be provided. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, bypassing web server restrictions like .htaccess. Successful exploitation could lead to information disclosure, code execution in the WordPress context, and potential remote code execution if combined with arbitrary file upload capabilities.
CVE-2025-11393 1 Redhat 2 Insights-runtimes, Lightspeed For Runtimes 2025-12-18 8.7 High
A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle. This allows a standard user within the cluster to send unauthorized commands to the management platform, effectively acting with the full permissions of the cluster administrator. This could lead to unauthorized changes to the cluster's configuration or status on the Red Hat platform.
CVE-2025-10622 1 Redhat 4 Satellite, Satellite Capsule, Satellite Maintenance and 1 more 2025-12-18 8 High
A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticated user with edit_settings permissions to achieve arbitrary command execution on the underlying operating system via insufficient server-side validation of command whitelisting.
CVE-2025-14101 1 Gg Soft 1 Paperwork 2025-12-18 7.1 High
Authorization Bypass Through User-Controlled Key vulnerability in GG Soft Software Services Inc. PaperWork allows Exploitation of Trusted Identifiers.This issue affects PaperWork: from 5.2.0.9427 before 6.0.
CVE-2025-68459 2025-12-18 7.2 High
RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. An arbitrary OS command may be executed on the product by an attacker who logs in to the CLI service.
CVE-2025-47387 2025-12-18 7.8 High
Memory Corruption when processing IOCTLs for JPEG data without verification.
CVE-2025-47382 2025-12-18 7.8 High
Memory corruption while loading an invalid firmware in boot loader.
CVE-2025-47350 2025-12-18 7.8 High
Memory corruption while handling concurrent memory mapping and unmapping requests from a user-space application.
CVE-2025-47323 2025-12-18 7.8 High
Memory corruption while routing GPR packets between user and root when handling large data packet.
CVE-2025-47322 2025-12-18 7.8 High
Memory corruption while handling IOCTL calls to set mode.
CVE-2025-47321 2025-12-18 7.8 High
Memory corruption while copying packets received from unix clients.
CVE-2025-47320 2025-12-18 7.8 High
Memory corruption while processing MFC channel configuration during music playback.
CVE-2025-27063 2025-12-18 7.8 High
Memory corruption during video playback when video session open fails with time out error.
CVE-2025-68461 1 Roundcube 1 Webmail 2025-12-18 7.2 High
Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.
CVE-2025-68460 1 Roundcube 1 Webmail 2025-12-18 7.2 High
Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a information disclosure vulnerability in the HTML style sanitizer.
CVE-2025-14727 1 F5 1 Nginx Ingress Controller 2025-12-18 8.3 High
A vulnerability exists in NGINX Ingress Controller's nginx.org/rewrite-target annotation validation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.