Search Results (344010 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-36901 1 Medivision 3 Digital Signage, Medivision Digital Signage, Medivision Digital Signage Firmware 2025-12-30 8.8 High
UBICOD Medivision Digital Signage 1.5.1 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without proper request validation. Attackers can craft a malicious web page that submits a form to the /query/user/itSet endpoint to add a new admin user with elevated privileges.
CVE-2025-55703 1 Sunbirddcim 1 Power Iq 2025-12-30 2.5 Low
An error-based SQL injection vulnerability exists in the Sunbird Power IQ 9.2.0 API. The vulnerability is due to an outdated API endpoint that applied arrays without proper input validation. This can allow attackers to manipulate SQL queries. This has been addressed in Power IQ version 9.2.1, where the API call code was updated to ensure safe handling of input values.
CVE-2024-43461 1 Microsoft 25 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 22 more 2025-12-30 8.8 High
Windows MSHTML Platform Spoofing Vulnerability
CVE-2014-6278 1 Gnu 1 Bash 2025-12-30 8.8 High
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
CVE-2019-25243 1 Iwt 2 Facesentry Access Control System, Facesentry Access Control System Firmware 2025-12-30 8.8 High
FaceSentry 6.4.8 contains an authenticated remote command injection vulnerability in pingTest.php and tcpPortTest.php scripts. Attackers can exploit unsanitized input parameters to inject and execute arbitrary shell commands with root privileges by manipulating the 'strInIP' and 'strInPort' parameters.
CVE-2025-66587 1 Azeotech 1 Daqfactory 2025-12-30 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-66584 1 Azeotech 1 Daqfactory 2025-12-30 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-14860 1 Mozilla 1 Firefox 2025-12-30 9.8 Critical
Use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 146.0.1.
CVE-2025-63757 1 Ffmpeg 1 Ffmpeg 2025-12-30 7.5 High
Integer overflow vulnerability in the yuv2ya16_X_c_template function in libswscale/output.c in FFmpeg 8.0.
CVE-2025-68469 1 Imagemagick 1 Imagemagick 2025-12-30 3.3 Low
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.1-14, ImageMagick crashes when processing a crafted TIFF file. Version 7.1.1-14 fixes the issue.
CVE-2025-59949 1 Freshrss 1 Freshrss 2025-12-30 5.3 Medium
FreshRSS is a free, self-hostable RSS aggregator. Versions prior to 1.27.1 have a logout cross-site request forgery vulnerability that can lead to denial of service via <track src>. Version 1.27.1 patches the issue.
CVE-2025-14709 2 Sgwbox, Shiguangwu 3 N3, N3 Firmware, Sgwbox N3 2025-12-30 9.8 Critical
A security vulnerability has been detected in Shiguangwu sgwbox N3 2.0.25. Affected by this issue is some unknown functionality of the file /usr/sbin/http_eshell_server of the component WIRELESSCFGGET Interface. The manipulation of the argument params leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-44475 1 Add Shortcodes Actions And Filters Project 1 Add Shortcodes Actions And Filters 2025-12-30 5.4 Medium
Cross-Site Request Forgery (CSRF) vulnerability in Michael Simpson Add Shortcodes Actions And Filters plugin <= 2.0.9 versions.
CVE-2025-65754 1 Algernon Project 1 Algernon 2025-12-30 6.1 Medium
Cross Site Scripting vulnerability in Algernon v1.17.4 allows attackers to execute arbitrary code via injecting a crafted payload into a filename.
CVE-2024-24130 1 Mail2world 1 Mail2world Webmail 2025-12-30 6.1 Medium
Mail2World v12 Business Control Center was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Usr parameter at resellercenter/login.asp.
CVE-2023-40263 1 Unify 1 Openscape Voice Trace Manager 2025-12-30 8.8 High
An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows authenticated command injection via ftp.
CVE-2023-40264 1 Unify 1 Openscape Voice Trace Manager 2025-12-30 4.3 Medium
An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows authenticated path traversal in the user interface.
CVE-2023-40262 1 Unify 1 Openscape Voice Trace Manager 2025-12-30 6.1 Medium
An issue was discovered in Atos Unify OpenScape Voice Trace Manager V8 before V8 R0.9.11. It allows unauthenticated Stored Cross-Site Scripting (XSS) in the administration component via Access Request.
CVE-2025-65825 1 Meatmeet 3 Meatmeet, Meatmeet Pro Wifi \& Bluetooth Meat Thermometer, Meatmeet Pro Wifi \& Bluetooth Meat Thermometer Firmware 2025-12-30 4.6 Medium
The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device, connect over UART, and retrieve the firmware dump for analysis. Within the NVS partition they may discover the credentials of the current and previous Wi-Fi networks. This information could be used to gain unauthorized access to the victim's Wi-Fi network.
CVE-2025-65826 1 Meatmeet 2 Meatmeet, Meatmeet Pro 2025-12-30 9.8 Critical
The mobile application was found to contain stored credentials for the network it was developed on. If an attacker retrieved this, and found the physical location of the Wi-Fi network, they could gain unauthorized access to the Wi-Fi network of the vendor. Additionally, if an attacker were located in close physical proximity to the device when it was first set up, they may be able to force the device to auto-connect to an attacker-controlled access point by setting the SSID and password to the same as which was found in the firmware file.