Search Results (104 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-9524 1 Axis 1 Axis Os 2025-11-14 4.3 Medium
The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.
CVE-2025-8108 1 Axis 1 Axis Os 2025-11-12 6.7 Medium
An ACAP configuration file has improper permissions and lacks input validation, which could potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE-2025-4645 1 Axis 1 Axis Os 2025-11-12 6.7 Medium
An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE-2025-6298 1 Axis 1 Axis Os 2025-11-12 6.7 Medium
ACAP applications can gain elevated privileges due to improper input validation, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE-2025-58729 1 Microsoft 22 Windows, Windows 10, Windows 10 1507 and 19 more 2025-11-07 6.5 Medium
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
CVE-2024-5696 3 Debian, Mozilla, Redhat 8 Debian Linux, Firefox, Thunderbird and 5 more 2025-11-06 8.6 High
By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.
CVE-2025-59278 1 Microsoft 19 Windows, Windows 10, Windows 10 1507 and 16 more 2025-11-04 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-59275 1 Microsoft 19 Windows, Windows 10, Windows 10 1507 and 16 more 2025-11-04 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-59277 1 Microsoft 19 Windows, Windows 10, Windows 10 1507 and 16 more 2025-11-04 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-59259 1 Microsoft 19 Windows, Windows 10, Windows 10 1507 and 16 more 2025-11-04 6.5 Medium
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
CVE-2025-59257 1 Microsoft 8 Windows, Windows 11, Windows 11 24h2 and 5 more 2025-11-04 6.5 Medium
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
CVE-2025-55701 1 Microsoft 20 Windows, Windows 10, Windows 10 1507 and 17 more 2025-11-04 7.8 High
Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally.
CVE-2023-4522 1 Gitlab 1 Gitlab 2025-11-04 4.3 Medium
An issue has been discovered in GitLab affecting all versions before 16.2.0. Committing directories containing LF character results in 500 errors when viewing the commit.
CVE-2024-39614 2 Djangoproject, Redhat 6 Django, Ansible Automation Platform, Openstack and 3 more 2025-11-04 7.5 High
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters.
CVE-2024-38875 2 Djangoproject, Redhat 5 Django, Ansible Automation Platform, Openstack and 2 more 2025-11-04 7.5 High
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.
CVE-2024-31948 1 Frrouting 1 Frrouting 2025-11-04 6.5 Medium
In FRRouting (FRR) through 9.1, an attacker using a malformed Prefix SID attribute in a BGP UPDATE packet can cause the bgpd daemon to crash.
CVE-2024-11168 2 Python Software Foundation, Redhat 2 Cpython, Enterprise Linux 2025-11-03 3.7 Low
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
CVE-2024-5594 1 Openvpn 1 Openvpn 2025-11-03 9.1 Critical
OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
CVE-2024-4879 1 Servicenow 1 Servicenow 2025-11-03 9.8 Critical
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
CVE-2025-58084 1 Mattermost 2 Mattermost, Mattermost Desktop 2025-10-29 3.5 Low
Mattermost Desktop App versions <= 5.13.0 fail to validate URLs external to the configured Mattermost servers, allowing an attacker on a server the user has configured to crash the user's application by sending the user a malformed URL.