Total
286780 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-24201 | 2 Apple, Redhat | 10 Ipados, Iphone Os, Macos and 7 more | 2025-03-20 | 7.1 High |
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.). | ||||
CVE-2025-24200 | 1 Apple | 2 Ipados, Iphone Os | 2025-03-20 | 6.1 Medium |
An authorization issue was addressed with improved state management. This issue is fixed in iPadOS 17.7.5, iOS 18.3.1 and iPadOS 18.3.1. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. | ||||
CVE-2025-0254 | 2025-03-20 | 5.9 Medium | ||
HCL Digital Experience components Ring API and dxclient may be vulnerable to man-in-the-middle (MitM) attacks prior to 9.5 CF226. An attacker could intercept and potentially alter communication between two parties. | ||||
CVE-2025-0185 | 2025-03-20 | N/A | ||
A vulnerability in the Dify Tools' Vanna module of the langgenius/dify repository allows for a Pandas Query Injection in the latest version. The vulnerability occurs in the function `vn.get_training_plan_generic(df_information_schema)`, which does not properly sanitize user inputs before executing queries using the Pandas library. This can potentially lead to Remote Code Execution (RCE) if exploited. | ||||
CVE-2024-8524 | 2025-03-20 | N/A | ||
A directory traversal vulnerability exists in modelscope/agentscope version 0.0.4. An attacker can exploit this vulnerability to read any local JSON file by sending a crafted POST request to the /read-examples endpoint. | ||||
CVE-2024-8501 | 2025-03-20 | N/A | ||
An arbitrary file download vulnerability exists in the rpc_agent_client component of modelscope/agentscope version v0.0.4. This vulnerability allows any user to download any file from the rpc_agent's host by exploiting the download_file method. This can lead to unauthorized access to sensitive information, including configuration files, credentials, and potentially system files, which may facilitate further exploitation such as privilege escalation or lateral movement within the network. | ||||
CVE-2024-7765 | 2025-03-20 | N/A | ||
In h2oai/h2o-3 version 3.46.0.2, a vulnerability exists where uploading and repeatedly parsing a large GZIP file can cause a denial of service. The server becomes unresponsive due to memory exhaustion and a large number of concurrent slow-running jobs. This issue arises from the improper handling of highly compressed data, leading to significant data amplification. | ||||
CVE-2024-6838 | 2025-03-20 | N/A | ||
In mlflow/mlflow version v2.13.2, a vulnerability exists that allows the creation or renaming of an experiment with a large number of integers in its name due to the lack of a limit on the experiment name. This can cause the MLflow UI panel to become unresponsive, leading to a potential denial of service. Additionally, there is no character limit in the `artifact_location` parameter while creating the experiment. | ||||
CVE-2024-57604 | 2025-03-20 | 9.8 Critical | ||
An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the token component. | ||||
CVE-2024-57021 | 1 Totolink | 2 X5000r, X5000r Firmware | 2025-03-20 | 8.8 High |
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "eHour" parameter in setWiFiScheduleCfg. | ||||
CVE-2024-53537 | 2025-03-20 | 9.1 Critical | ||
An issue in OpenPanel v0.3.4 to v0.2.1 allows attackers to execute a directory traversal in File Actions of File Manager. | ||||
CVE-2024-49749 | 2025-03-20 | 8.8 High | ||
In DGifSlurp of dgif_lib.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-47898 | 2025-03-20 | 7.8 High | ||
Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions. | ||||
CVE-2024-46974 | 2025-03-20 | 7.8 High | ||
Software installed and run as a non-privileged user may conduct improper read/write operations on imported/exported DMA buffers. | ||||
CVE-2024-44756 | 1 Erp | 1 Management Software | 2025-03-20 | 9.8 Critical |
NUS-M9 ERP Management Software v3.0.0 was discovered to contain a SQL injection vulnerability via the usercode parameter at /UserWH/checkLogin. | ||||
CVE-2024-44181 | 1 Apple | 1 Macos | 2025-03-20 | 5.5 Medium |
An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to read sensitive location information. | ||||
CVE-2024-40804 | 1 Apple | 1 Macos | 2025-03-20 | 5.5 Medium |
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. A malicious application may be able to access private information. | ||||
CVE-2024-3174 | 1 Google | 1 Chrome | 2025-03-20 | 8.8 High |
Inappropriate implementation in V8 in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2024-38970 | 1 Vaethink | 1 Vaethink | 2025-03-20 | 4.9 Medium |
vaeThink 1.0.2 is vulnerable to Information Disclosure via the system backend,access management administrator function. | ||||
CVE-2024-32912 | 1 Google | 1 Android | 2025-03-20 | 5.5 Medium |
there is a possible persistent Denial of Service due to test/debugging code left in a production build. This could lead to local denial of service of impaired use of the device with no additional execution privileges needed. User interaction is not needed for exploitation. |