Search Results (103 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-5476 1 Sony 2 Xav-ax8500, Xav-ax8500 Firmware 2025-07-08 8.8 High
Sony XAV-AX8500 Bluetooth Improper Isolation Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected Sony XAV-AX8500 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of ACL-U links. The issue results from the lack of L2CAP channel isolation. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26284.
CVE-2025-25983 1 Macro-video 1 V380 Pro 2025-06-25 3.4 Low
An issue in Macro-video Technologies Co.,Ltd V380 Pro android application 2.1.44 and V380 Pro android application 2.1.64 allows an attacker to obtain sensitive information via the QE code based sharing component.
CVE-2024-35425 2 Lonelycoder, Vmir 2 Vmir, Vmir 2025-06-05 5.5 Medium
vmir e8117 was discovered to contain a segmentation violation via the function_prepare_parse function at /src/vmir_function.c.
CVE-2024-26139 2 Citeum, Opencti-platform 2 Opencti, Opencti 2025-05-22 8.3 High
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. Due to lack of certain security controls on the profile edit functionality, an authenticated attacker with low privileges can gain administrative privileges on the web application.
CVE-2025-24887 1 Citeum 1 Opencti 2025-05-19 6.3 Medium
OpenCTI is an open-source cyber threat intelligence platform. In versions starting from 6.4.8 to before 6.4.10, the allow/deny lists can be bypassed, allowing a user to change attributes that are intended to be unmodifiable by the user. It is possible to toggle the `external` flag on/off and change the own token value for a user. It is also possible to edit attributes that are not in the allow list, such as `otp_qr` and `otp_activated`. If external users exist in the OpenCTI setup and the information about these users identities is sensitive, the above vulnerabilities can be used to enumerate existing user accounts as a standard low privileged user. This issue has been patched in version 6.4.10.
CVE-2022-38115 1 Solarwinds 1 Security Event Manager 2025-04-24 5.3 Medium
Insecure method vulnerability in which allowed HTTP methods are disclosed. E.g., OPTIONS, DELETE, TRACE, and PUT
CVE-2017-6032 1 Schneider-electric 2 Modbus, Modbus Firmware 2025-04-20 N/A
A Violation of Secure Design Principles issue was discovered in Schneider Electric Modicon Modbus Protocol. The Modicon Modbus protocol has a session-related weakness making it susceptible to brute-force attacks.
CVE-2024-33768 1 Sammycage 1 Lunasvg 2025-04-15 9.8 Critical
lunasvg v2.3.9 was discovered to contain a segmentation violation via the component composition_solid_source_over.
CVE-2024-57720 1 Sammycage 1 Lunasvg 2025-04-15 6.5 Medium
lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_blend.
CVE-2024-57721 1 Sammycage 1 Lunasvg 2025-04-15 6.5 Medium
lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_path_add_path.
CVE-2024-57723 1 Sammycage 1 Lunasvg 2025-04-15 6.5 Medium
lunasvg v3.0.0 was discovered to contain a segmentation violation via the component composition_source_over.
CVE-2024-55456 1 Sammycage 1 Lunasvg 2025-04-15 6.5 Medium
lunasvg v3.0.1 was discovered to contain a segmentation violation via the component gray_find_cell
CVE-2023-25015 2 Clockwork Web Project, Rubyonrails 2 Clockwork Web, Rails 2025-03-26 6.5 Medium
Clockwork Web before 0.1.2, when Rails before 5.2 is used, allows CSRF.
CVE-2024-57957 1 Huawei 1 Harmonyos 2025-03-17 6.6 Medium
Vulnerability of improper log information control in the UI framework module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2023-52714 1 Huawei 2 Emui, Harmonyos 2025-03-13 7.5 High
Vulnerability of defects introduced in the design process in the hwnff module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVE-2023-1305 1 Rapid7 2 Insightappsec, Insightcloudsec 2025-02-26 8.1 High
An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
CVE-2023-28676 1 Jenkins 1 Convert To Pipeline 2025-02-25 8.8 High
A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier allows attackers to create a Pipeline based on a Freestyle project, potentially leading to remote code execution (RCE).
CVE-2023-29580 1 Yasm Project 1 Yasm 2025-02-08 5.5 Medium
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c.
CVE-2019-5478 1 Amd 82 Zu11eg, Zu11eg Firmware, Zu15eg and 79 more 2024-11-27 5.5 Medium
A weakness was found in Encrypt Only boot mode in Zynq UltraScale+ devices. This could lead to an adversary being able to modify the control fields of the boot image leading to an incorrect secure boot behavior.
CVE-2023-50327 1 Ibm 1 Powersc 2024-11-21 5.3 Medium
IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which could allow a remote attacker to perform unauthorized file request modification. IBM X-Force ID: 275109.