Search Results (338740 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-31479 2 Arubanetworks, Hp 3 Arubaos, Instant, Instantos 2025-06-24 5.3 Medium
Unauthenticated Denial of Service (DoS) vulnerabilities exist in the Central Communications service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
CVE-2024-31477 2 Arubanetworks, Hp 3 Arubaos, Instant, Instantos 2025-06-24 7.2 High
Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
CVE-2024-31476 2 Arubanetworks, Hp 3 Arubaos, Instant, Instantos 2025-06-24 7.2 High
Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
CVE-2024-31475 2 Arubanetworks, Hp 3 Arubaos, Instant, Instantos 2025-06-24 8.2 High
There is an arbitrary file deletion vulnerability in the Central Communications service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point.
CVE-2024-31474 2 Arubanetworks, Hp 3 Arubaos, Instant, Instantos 2025-06-24 8.2 High
There is an arbitrary file deletion vulnerability in the CLI service accessed by PAPI (Aruba's Access Point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point
CVE-2024-31473 2 Arubanetworks, Hp 3 Arubaos, Instant, Instantos 2025-06-24 9.8 Critical
There is a command injection vulnerability in the underlying deauthentication service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
CVE-2025-3642 1 Moodle 1 Moodle 2025-06-24 8.8 High
A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled.
CVE-2025-3641 1 Moodle 1 Moodle 2025-06-24 8.8 High
A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled.
CVE-2025-3640 1 Moodle 1 Moodle 2025-06-24 4.3 Medium
A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access.
CVE-2025-3637 1 Moodle 1 Moodle 2025-06-24 3.1 Low
A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.
CVE-2025-3636 1 Moodle 1 Moodle 2025-06-24 4.3 Medium
A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks.
CVE-2025-3635 1 Moodle 1 Moodle 2025-06-24 3.5 Low
A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks.
CVE-2024-37903 1 Joinmastodon 1 Mastodon 2025-06-24 8.2 High
Mastodon is a self-hosted, federated microblogging platform. Starting in version 2.6.0 and prior to versions 4.1.18 and 4.2.10, by crafting specific activities, an attacker can extend the audience of a post they do not own to other Mastodon users on a target server, thus gaining access to the contents of a post not intended for them. Versions 4.1.18 and 4.2.10 contain a patch for this issue.
CVE-2025-27157 1 Joinmastodon 1 Mastodon 2025-06-24 5.3 Medium
Mastodon is a self-hosted, federated microblogging platform. Starting in version 4.2.0 and prior to versions 4.2.16 and 4.3.4, the rate limits are missing on `/auth/setup`. Without those rate limits, an attacker can craft requests that will send an email to an arbitrary addresses. Versions 4.2.16 and 4.3.4 fix the issue.
CVE-2025-3647 1 Moodle 1 Moodle 2025-06-24 4.3 Medium
A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve.
CVE-2025-27399 1 Joinmastodon 1 Mastodon 2025-06-24 5.3 Medium
Mastodon is a self-hosted, federated microblogging platform. In versions prior to 4.1.23, 4.2.16, and 4.3.4, when the visibility for domain blocks/reasons is set to "users" (localized English string: "To logged-in users"), users that are not yet approved can view the block reasons. Instance admins that do not want their domain blocks to be public are impacted. Versions 4.1.23, 4.2.16, and 4.3.4 fix the issue.
CVE-2025-3645 1 Moodle 1 Moodle 2025-06-24 4.3 Medium
A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses.
CVE-2025-3644 1 Moodle 1 Moodle 2025-06-24 4.3 Medium
A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify.
CVE-2025-3643 1 Moodle 1 Moodle 2025-06-24 5.4 Medium
A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk.
CVE-2025-6126 1 Phpgurukul 1 Rail Pass Management System 2025-06-24 4.3 Medium
A vulnerability was found in PHPGurukul Rail Pass Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /contact.php. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.