Total
277447 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-11736 | 1 Redhat | 3 Build Keycloak, Jboss Enterprise Application Platform, Jbosseapxp | 2025-01-15 | 4.9 Medium |
A vulnerability was found in Keycloak. Admin users may have to access sensitive server environment variables and system properties through user-configurable URLs. When configuring backchannel logout URLs or admin URLs, admin users can include placeholders like ${env.VARNAME} or ${PROPNAME}. The server replaces these placeholders with the actual values of environment variables or system properties during URL processing. | ||||
CVE-2024-11734 | 1 Redhat | 3 Build Keycloak, Jboss Enterprise Application Platform, Jbosseapxp | 2025-01-15 | 6.5 Medium |
A denial of service vulnerability was found in Keycloak that could allow an administrative user with the right to change realm settings to disrupt the service. This action is done by modifying any of the security headers and inserting newlines, which causes the Keycloak server to write to a request that has already been terminated, leading to the failure of said request. | ||||
CVE-2024-50312 | 1 Redhat | 2 Openshift, Openshift Container Platform | 2025-01-15 | 5.3 Medium |
A vulnerability was found in GraphQL due to improper access controls on the GraphQL introspection query. This flaw allows unauthorized users to retrieve a comprehensive list of available queries and mutations. Exposure to this flaw increases the attack surface, as it can facilitate the discovery of flaws or errors specific to the application's GraphQL implementation. | ||||
CVE-2025-23061 | 2025-01-15 | 9 Critical | ||
Mongoose before 8.9.5 can improperly use a nested $where filter with a populate() match, leading to search injection. NOTE: this issue exists because of an incomplete fix for CVE-2024-53900. | ||||
CVE-2025-22394 | 2025-01-15 | 6.7 Medium | ||
Dell Display Manager, versions prior to 2.3.2.18, contain a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to code execution and possibly privilege escalation. | ||||
CVE-2025-21101 | 2025-01-15 | 6.6 Medium | ||
Dell Display Manager, versions prior to 2.3.2.20, contain a race condition vulnerability. A local malicious user could potentially exploit this vulnerability during installation, leading to arbitrary folder or file deletion. | ||||
CVE-2025-23013 | 2025-01-15 | N/A | ||
In Yubico pam-u2f before 1.3.1, local privilege escalation can sometimes occur. This product implements a Pluggable Authentication Module (PAM) that can be deployed to support authentication using a YubiKey or other FIDO compliant authenticators on macOS or Linux. This software package has an issue that allows for an authentication bypass in some configurations. An attacker would require the ability to access the system as an unprivileged user. Depending on the configuration, the attacker may also need to know the user's password. | ||||
CVE-2024-54982 | 2025-01-15 | 9.8 Critical | ||
An issue in Quectel BC25 with firmware version BC25PAR01A06 allows attackers to bypass authentication via a crafted NAS message. NOTE: Quectel disputes this because the issue is in the chipset supply chain and is not localized to one or more Quectel products. | ||||
CVE-2024-13334 | 2025-01-15 | 6.1 Medium | ||
The Car Demon plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_condition' parameter in all versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | ||||
CVE-2024-55591 | 1 Fortinet | 1 Fortios | 2025-01-15 | 9.6 Critical |
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module. | ||||
CVE-2025-21335 | 2025-01-15 | 7.8 High | ||
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability | ||||
CVE-2025-21334 | 2025-01-15 | 7.8 High | ||
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability | ||||
CVE-2025-21333 | 2025-01-15 | 7.8 High | ||
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability | ||||
CVE-2025-0343 | 2025-01-15 | N/A | ||
Swift ASN.1 can be caused to crash when parsing certain BER/DER constructions. This crash is caused by a confusion in the ASN.1 library itself which assumes that certain objects can only be provided in either constructed or primitive forms, and will trigger a preconditionFailure if that constraint isn't met. Importantly, these constraints are actually required to be true in DER, but that correctness wasn't enforced on the early node parser side so it was incorrect to rely on it later on in decoding, which is what the library did. These crashes can be triggered when parsing any DER/BER format object. There is no memory-safety issue here: the crash is a graceful one from the Swift runtime. The impact of this is that it can be used as a denial-of-service vector when parsing BER/DER data from unknown sources, e.g. when parsing TLS certificates. | ||||
CVE-2025-21187 | 2025-01-15 | 7.8 High | ||
Microsoft Power Automate Remote Code Execution Vulnerability | ||||
CVE-2025-21354 | 2025-01-15 | 8.4 High | ||
Microsoft Excel Remote Code Execution Vulnerability | ||||
CVE-2025-21362 | 2025-01-15 | 8.4 High | ||
Microsoft Excel Remote Code Execution Vulnerability | ||||
CVE-2025-21245 | 2025-01-15 | 8.8 High | ||
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21409 | 2025-01-15 | 8.8 High | ||
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21223 | 2025-01-15 | 8.8 High | ||
Windows Telephony Service Remote Code Execution Vulnerability |