Currently trending CVE - Hype Score: 10 - An issue in FoxCMS v.1.2.5 allows a remote attacker to execute arbitrary code via the case display page in the index.html component.
Currently trending CVE - Hype Score: 23 - An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
Currently trending CVE - Hype Score: 11 - A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, ...
Currently trending CVE - Hype Score: 2 - Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
Currently trending CVE - Hype Score: 7 - Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.
Currently trending CVE - Hype Score: 39 - Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server
Currently trending CVE - Hype Score: 20 - This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A ...
Currently trending CVE - Hype Score: 23 - An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests ...
A vulnerability, which was classified as critical, was found in libopensc. This affects an unknown part of the component OpenPGP Driver. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-8443. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability has been found in WellinTech KingView up to 65.30.17249 and classified as critical. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2012-1831. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Qualcomm Eudora up to 6.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Attachment Filename Handler. The manipulation with the input <filename>. leads to path traversal.
This vulnerability is known as CVE-2002-2351. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in WellinTech KingView up to 65.30.17249. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2012-1830. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in libssh up to 0.11.1. Affected by this issue is the function privatekey_from_file. The manipulation leads to uninitialized pointer.
This vulnerability is handled as CVE-2025-4878. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in libssh up to 0.11.1. This affects the function ssh_kdf. The manipulation leads to incorrect calculation.
This vulnerability is uniquely identified as CVE-2025-5372. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Tenable Nessus up to 10.8.4 on Windows. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2025-36630. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in libssh. This affects the function sftp_handle. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2025-5318. It is possible to initiate the attack remotely. There is no exploit available.