Search

Search Results (318393 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-43457 1 Apple 6 Ios, Ipados, Iphone Os and 3 more 2025-11-15 6.5 Medium
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected Safari crash.
CVE-2025-43432 1 Apple 10 Ios, Ipad Os, Ipados and 7 more 2025-11-15 4.3 Medium
A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-64446 1 Fortinet 1 Fortiweb 2025-11-15 9.1 Critical
A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
CVE-2025-36250 1 Ibm 2 Aix, Vios 2025-11-15 10 Critical
IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to execute arbitrary commands due to improper process controls.  This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56346.
CVE-2025-36096 1 Ibm 2 Aix, Vios 2025-11-15 9 Critical
IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 stores NIM private keys used in NIM environments in an insecure way which is susceptible to unauthorized access by an attacker using man in the middle techniques.
CVE-2025-36251 1 Ibm 2 Aix, Vios 2025-11-15 9.6 Critical
IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 nimsh service SSL/TLS implementations could allow a remote attacker to execute arbitrary commands due to improper process controls. This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56347.
CVE-2024-7017 1 Google 1 Chrome 2025-11-15 7.5 High
Inappropriate implementation in DevTools in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CVE-2024-9126 2 Apple, Google 2 Ios, Chrome 2025-11-15 7.5 High
Use after free in Internals in Google Chrome on iOS prior to 127.0.6533.88 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a series of curated UI gestures. (Chromium security severity: Medium)
CVE-2025-3416 1 Redhat 5 Directory Server, Enterprise Linux, Openshift and 2 more 2025-11-15 3.7 Low
A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.
CVE-2025-65072 2025-11-15 N/A
Not used
CVE-2025-65071 2025-11-15 N/A
Not used
CVE-2025-65070 2025-11-15 N/A
Not used
CVE-2025-65069 2025-11-15 N/A
Not used
CVE-2025-65068 2025-11-15 N/A
Not used
CVE-2025-65067 2025-11-15 N/A
Not used
CVE-2025-65066 2025-11-15 N/A
Not used
CVE-2025-65065 2025-11-15 N/A
Not used
CVE-2025-65064 2025-11-15 N/A
Not used
CVE-2025-12182 2025-11-15 4.3 Medium
The Qi Blocks plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the `resize_image_callback()` function in all versions up to, and including, 1.4.3. This is due to the plugin not properly verifying that a user has permission to resize a specific attachment. This makes it possible for authenticated attackers, with Contributor-level access and above, to resize arbitrary media library images belonging to other users, which can result in unintended file writes, disk consumption, and server resource abuse through processing of large images.
CVE-2025-54236 1 Adobe 3 Commerce, Commerce B2b, Magento 2025-11-15 9.1 Critical
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by an Improper Input Validation vulnerability. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue does not require user interaction.