Search

Search Results (308088 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-9817 1 Wireshark 1 Wireshark 2025-09-04 7.8 High
SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service
CVE-2025-5310 2025-09-04 9.8 Critical
Dover Fueling Solutions ProGauge MagLink LX Consoles expose an undocumented and unauthenticated target communication framework (TCF) interface on a specific port. Files can be created, deleted, or modified, potentially leading to remote code execution.
CVE-2025-58694 2025-09-04 N/A
Not used
CVE-2025-58695 2025-09-04 N/A
Not used
CVE-2025-58696 2025-09-04 N/A
Not used
CVE-2025-58697 2025-09-04 N/A
Not used
CVE-2025-58698 2025-09-04 N/A
Not used
CVE-2025-58699 2025-09-04 N/A
Not used
CVE-2025-58700 2025-09-04 N/A
Not used
CVE-2025-58701 2025-09-04 N/A
Not used
CVE-2025-52709 2 Wordpress, Wpeverest 2 Wordpress, Everest Forms 2025-09-04 9.8 Critical
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-39550 1 Juniper 4 Junos, Mx240, Mx480 and 1 more 2025-09-04 6.5 Medium
A Missing Release of Memory after Effective Lifetime vulnerability in the rtlogd process of Juniper Networks Junos OS on MX Series with SPC3 allows an unauthenticated, adjacent attacker to trigger internal events cause ( which can be done by repeated port flaps) to cause a slow memory leak, ultimately leading to a Denial of Service (DoS). Memory can only be recovered by manually restarting rtlogd process.  The memory usage can be monitored using the below command.     user@host> show system processes extensive | match rtlog  This issue affects Junos OS on MX Series with SPC3 line card:  * from 21.2R3 before 21.2R3-S8,  * from 21.4R2 before 21.4R3-S6,  * from 22.1 before 22.1R3-S5,  * from 22.2 before 22.2R3-S3,  * from 22.3 before 22.3R3-S2,  * from 22.4 before 22.4R3-S1,  * from 23.2 before 23.2R2,  * from 23.4 before 23.4R2.
CVE-2025-43772 2025-09-04 N/A
Kaleo Forms Admin in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 27, and older unsupported versions does not restrict the saving of request parameters in the portlet session, which allows remote attackers to consume system memory leading to denial-of-service (DoS) conditions via crafted HTTP request.
CVE-2023-50224 1 Tp-link 2 Tl-wr841n, Tl-wr841n Firmware 2025-09-04 N/A
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.
CVE-2025-9377 2025-09-04 N/A
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).
CVE-2021-44457 2025-09-04 N/A
This is unused.
CVE-2021-43351 2025-09-04 N/A
This is unused.
CVE-2021-41860 2025-09-04 N/A
This is unused.
CVE-2021-41859 2025-09-04 N/A
This is unused.
CVE-2021-41858 2025-09-04 N/A
This is unused.