Search

Search Results (311595 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59475 1 Jenkins 1 Jenkins 2025-09-25 4.3 Medium
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not perform a permission check for the authenticated user profile dropdown menu, allowing attackers without Overall/Read permission to obtain limited information about the Jenkins configuration by listing available options in this menu (e.g., whether Credentials Plugin is installed).
CVE-2025-7675 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-09-25 7.8 High
A maliciously crafted 3DM file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CVE-2025-46152 2025-09-25 N/A
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.
CVE-2025-53862 1 Redhat 1 Ansible Automation Platform 2025-09-25 3.5 Low
A flaw was found in Ansible. Three API endpoints are accessible and return verbose, unauthenticated responses. This flaw allows a malicious user to access data that may contain important information.
CVE-2025-5043 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-09-25 7.8 High
A maliciously crafted 3DM file, when linked or imported into certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVE-2025-59476 1 Jenkins 1 Jenkins 2025-09-25 5.3 Medium
Jenkins 2.527 and earlier, LTS 2.516.2 and earlier does not restrict or transform the characters that can be inserted from user-specified content in log messages, allowing attackers able to control log message contents to insert line break characters, followed by forged log messages that may mislead administrators reviewing log output.
CVE-2025-5038 1 Autodesk 17 3ds Max, Advance Steel, Autocad and 14 more 2025-09-25 7.8 High
A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-29157 2025-09-25 N/A
An issue in petstore v.1.0.7 allows a remote attacker to execute arbitrary code via accessing a non-existent endpoint/cart, the server returns a 404-error page exposing sensitive information including the Servlet name (default) and server version
CVE-2025-34227 2025-09-25 N/A
Nagios XI < 2026R1 is vulnerable to an authenticated command injection vulnerability within the MongoDB Database, MySQL Query, MySQL Server, Postgres Server, and Postgres Query wizards. It is possible to inject shell characters into arguments provided to the service and execute arbitrary system commands on the underlying host as the `nagios` user.
CVE-2025-10953 2025-09-25 8.8 High
A security vulnerability has been detected in UTT 1200GW and 1250GW up to 3.0.0-170831/3.2.2-200710. This vulnerability affects unknown code of the file /goform/formApMail. The manipulation of the argument senderEmail leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-53861 1 Redhat 1 Ansible Automation Platform 2025-09-25 3.1 Low
A flaw was found in Ansible. Sensitive cookies without security flags over non-encrypted channels can lead to Man-in-the-Middle (MitM) and Cross-site scripting (XSS) attacks allowing attackers to read transmitted data.
CVE-2025-47328 1 Qualcomm 135 Fastconnect 7800, Fastconnect 7800 Firmware, Immersive Home 3210 Platform and 132 more 2025-09-25 7.5 High
Transient DOS while processing power control requests with invalid antenna or stream values.
CVE-2025-47326 1 Qualcomm 241 Ar8035, Ar8035 Firmware, Csr8811 and 238 more 2025-09-25 7.5 High
Transient DOS while handling command data during power control processing.
CVE-2025-1274 1 Autodesk 11 Advance Steel, Autocad, Autocad Architecture and 8 more 2025-09-25 7.8 High
A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
CVE-2025-47327 1 Qualcomm 83 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 80 more 2025-09-25 7.8 High
Memory corruption while encoding the image data.
CVE-2025-47329 2 Google, Qualcomm 78 Android, Fastconnect 7800, Fastconnect 7800 Firmware and 75 more 2025-09-25 7.8 High
Memory corruption while handling invalid inputs in application info setup.
CVE-2025-46153 2025-09-25 N/A
PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.
CVE-2025-10962 2025-09-25 6.3 Medium
A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-5048 1 Autodesk 10 Advance Steel, Autocad, Autocad Architecture and 7 more 2025-09-25 7.8 High
A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-57348 2025-09-25 N/A
The node-cube package (prior to version 5.0.0) contains a vulnerability in its handling of prototype chain initialization, which could allow an attacker to inject properties into the prototype of built-in objects. This issue, categorized under CWE-1321, arises from improper validation of user-supplied input in the package's resource initialization process. Successful exploitation may lead to denial of service or arbitrary code execution in affected environments. The vulnerability affects versions up to and including 5.0.0-beta.19, and no official fix has been released to date.