Search

Search Results (309985 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-10290 2025-09-16 N/A
Opening links via the contextual menu in Focus iOS for certain URL schemes would fail to load but would not refresh the toolbar correctly, allowing attackers to spoof websites if users were coerced into opening a link explicitly through a long-press This vulnerability affects Focus for iOS < 143.0.
CVE-2025-10535 2025-09-16 N/A
This vulnerability affects Firefox < 143.
CVE-2025-10534 2025-09-16 N/A
This vulnerability affects Firefox < 143.
CVE-2025-10531 2025-09-16 N/A
This vulnerability affects Firefox < 143.
CVE-2025-10530 2025-09-16 N/A
This vulnerability affects Firefox < 143.
CVE-2025-10537 2025-09-16 N/A
Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
CVE-2025-10536 2025-09-16 N/A
This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
CVE-2025-10532 2025-09-16 N/A
This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
CVE-2025-10529 2025-09-16 N/A
This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
CVE-2025-10528 2025-09-16 N/A
This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
CVE-2025-10527 2025-09-16 N/A
This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
CVE-2025-10533 2025-09-16 N/A
This vulnerability affects Firefox < 143, Firefox ESR < 115.28, and Firefox ESR < 140.3.
CVE-2025-55118 2025-09-16 8.9 High
Memory corruptions can be remotely triggered in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
CVE-2025-55117 2025-09-16 5.3 Medium
A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured. The issue occurs in the following cases: * Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n"; * Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
CVE-2025-55116 2025-09-16 8.8 High
A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions.
CVE-2025-55115 2025-09-16 8.8 High
A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.
CVE-2025-55114 2025-09-16 5.3 Medium
The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the Control-M/Agent to vulnerabilities in the SSL/TLS implementation under certain non-default conditions (e.g. CVE-2025-55117 or CVE-2025-55118) or potentially to resource exhaustion.
CVE-2025-55113 2025-09-16 9 Critical
If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.
CVE-2025-55112 2025-09-16 7.4 High
Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.
CVE-2025-10546 2025-09-16 N/A
This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system.