Filter and search through 198,985 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-7844 | Exporting a TPM based RSA key larger than 2048 bits from the TPM could overrun a stack buffer if the default `MAX_RSA_KEY_BITS=2048` is used. If your ... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-7783 | ### Summary form-data uses `Math.random()` to select a boundary value for multipart form-encoded data. This can lead to a security issue if an attack... | 0.0 | 0 | Neutral | Yes | Yes |
| CVE-2025-7779 | Local privilege escalation due to insecure XPC service configuration. The following products are affected: Acronis True Image (macOS) before build 423... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7774 | A security issue exists within the 5032 16pt Digital Configurable module’s web server. Intercepted session credentials can be used within a 3-minute t... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7773 | A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7771 | ThrottleStop.sys, a legitimate driver, exposes two IOCTL interfaces that allow arbitrary read and write access to physical memory via the MmMapIoSpace... | 0.0 | 0 | Rising | Yes | No |
| CVE-2025-7770 | Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7769 | Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when the DEVICE_PING command is called, allow... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2025-7768 | Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vu... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7761 | Lepszy BIP is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in index.php form in one of the parameters allows arbitrar... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7746 | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause an unvalidated data... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7742 | An authentication vulnerability exists in the LG Innotek camera model LNV5110R firmware that allows a malicious actor to upload an HTTP POST request t... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7740 | Default credentials vulnerability exists in SuprOS product. If exploited, this could allow an authenticated local attacker to use an admin account cre... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7724 | An unauthenticated OS command injection vulnerability exists in VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2.This issue affects VIGI NVR1104H-4P V1: ... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7723 | A command injection vulnerability exists that can be exploited after authentication in VIGI NVR1104H-4P V1 and VIGI NVR2016H-16MP V2.This issue affect... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7719 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova Smallworld on Windows, Linux allows File Ma... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7709 | An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculat... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-7699 | An improper access control vulnerability was found in the EZ Sync Manager of ADM, which allows authenticated users to copy arbitrary files from the s... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7693 | A security issue exists due to improper handling of malformed CIP Forward Close packets during fuzzing. The controller enters a solid red Fault LED st... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-7676 | DLL hijacking of all PE32 executables when run on Windows for ARM64 CPU architecture. This allows an attacker to execute code, if the attacker can pla... | 0.0 | 0 | Neutral | No | No |