Export limit exceeded: 341081 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (341081 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-49007 1 Rack 1 Rack 2025-10-10 5.3 Medium
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.
CVE-2025-0739 1 Thesamur 1 Embedai 2025-10-10 8.6 High
An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to show subscription's information of others users by changing the "SUSCBRIPTION_ID" param of the endpoint "/demos/embedai/subscriptions/show/<SUSCBRIPTION_ID>".
CVE-2025-0740 1 Thesamur 1 Embedai 2025-10-10 8.6 High
An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain chat messages belonging to other users by changing the “CHAT_ID” of the endpoint "/embedai/chats/load_messages?chat_id=<CHAT_ID>".
CVE-2025-0741 1 Thesamur 1 Embedai 2025-10-10 5.8 Medium
An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to write messages into other users chat by changing the parameter "chat_id" of the POST request "/embedai/chats/send_message".
CVE-2024-37829 1 Getoutline 1 Outline 2025-10-10 8.8 High
An issue in Outline <= v0.76.1 allows attackers to execute a session hijacking attack via user interaction with a crafted magic sign-in link.
CVE-2025-2859 1 Arteche 2 Satech Bcu, Satech Bcu Firmware 2025-10-10 9.8 Critical
An attacker with network access, could capture traffic and obtain user cookies, allowing the attacker to steal the active user session and make changes to the device via web, depending on the privileges obtained by the user.
CVE-2025-2860 1 Arteche 2 Satech Bcu, Satech Bcu Firmware 2025-10-10 5.3 Medium
SaTECH BCU in its firmware version 2.1.3, allows an authenticated attacker to access information about the credentials that users have within the web (.xml file). In order to exploit this vulnerability, the attacker must know the path, regardless of the user's privileges on the website.
CVE-2025-2861 1 Arteche 2 Satech Bcu, Satech Bcu Firmware 2025-10-10 7.5 High
SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately.
CVE-2025-2863 1 Arteche 2 Satech Bcu, Satech Bcu Firmware 2025-10-10 7.8 High
Cross-site request forgery (CSRF) vulnerability in the web application of saTECH BCU firmware version 2.1.3, which could allow an unauthenticated local attacker to exploit active administrator sessions and perform malicious actions. The malicious actions that can be executed by the attacker depend on the logged-in user, and may include rebooting the device or modifying roles and permissions.
CVE-2024-6676 1 Witmy 1 My-springsecurity-plus 2025-10-10 6.3 Medium
A vulnerability has been found in witmy my-springsecurity-plus up to 2024-07-03 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/user. The manipulation of the argument params.dataScope leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-271111.
CVE-2025-60959 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 8.2 High
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to gain sensitive information.
CVE-2025-60956 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 8 High
Cross Site Request Forgery (CSRF) vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.
CVE-2025-60957 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 9.9 Critical
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.
CVE-2025-31952 1 Hcltech 1 Dryice Iautomate 2025-10-10 7.1 High
HCL iAutomate is affected by an insufficient session expiration. This allows tokens to remain valid indefinitely unless manually revoked, increasing the risk of unauthorized access.
CVE-2025-60958 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 7.3 High
Cross Site Scripting (XSS) vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to gain sensitive information.
CVE-2024-39316 1 Rack 1 Rack 2025-10-10 6.5 Medium
Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.5, Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). The fix for CVE-2024-26146 was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. Users of versions on the 3.1 branch should upgrade to version 3.1.5 to receive the fix.
CVE-2025-60960 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 8.2 High
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.
CVE-2025-60961 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 6.1 Medium
Cross Site Scripting (XSS) vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to gain sensitive information, and possibly other unspecified impacts.
CVE-2025-31953 1 Hcltech 1 Dryice Iautomate 2025-10-10 7.1 High
HCL iAutomate includes hardcoded credentials which may result in potential exposure of confidential data if intercepted or accessed by unauthorized parties.
CVE-2025-60962 2 Endrun, Endruntechnologies 3 Sonoma D12 Network Time Server, Sonoma D12, Sonoma D12 Firmware 2025-10-10 8.2 High
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to gain sensitive information, and possibly other unspecified impacts.