Export limit exceeded: 341810 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (341810 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2025-57832 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57831 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57830 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57829 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57828 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57827 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57826 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57825 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2025-57824 | 2025-08-21 | N/A | ||
| Not used | ||||
| CVE-2024-27349 | 1 Apache | 2 Hugegraph, Hugegraph-server | 2025-08-21 | 9.1 Critical |
| Authentication Bypass by Spoofing vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0. Users are recommended to upgrade to version 1.3.0, which fixes the issue. | ||||
| CVE-2025-48757 | 2025-08-21 | 9.3 Critical | ||
| An insufficient database Row-Level Security policy in Lovable through 2025-04-15 allows remote unauthenticated attackers to read or write to arbitrary database tables of generated sites. NOTE: this is disputed by the Supplier because each individual customer of the Lovable platform accepts a responsibility over protecting the data of their application. | ||||
| CVE-2024-34449 | 1 B3log | 1 Vditor | 2025-08-21 | 6.1 Medium |
| Vditor 3.10.3 allows XSS via an attribute of an A element. NOTE: the vendor indicates that a user is supposed to mitigate this via sanitize=true. | ||||
| CVE-2024-6184 | 1 Ruijie | 2 Rg-uac, Rg-uac Firmware | 2025-08-21 | 6.3 Medium |
| A vulnerability classified as critical was found in Ruijie RG-UAC 1.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/reboot/reboot_commit.php. The manipulation of the argument servicename leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2024-6186 | 1 Ruijie | 2 Rg-uac, Rg-uac Firmware | 2025-08-21 | 6.3 Medium |
| A vulnerability, which was classified as critical, was found in Ruijie RG-UAC 1.0. This affects an unknown part of the file /view/userAuthentication/SSO/commit.php. The manipulation of the argument ad_log_name leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2024-6187 | 1 Ruijie | 2 Rg-uac, Rg-uac Firmware | 2025-08-21 | 6.3 Medium |
| A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2024-6269 | 1 Ruijie | 2 Rg-uac, Rg-uac Firmware | 2025-08-21 | 4.7 Medium |
| A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
| CVE-2024-3738 | 1 Cym1102 | 1 Nginxwebui | 2025-08-21 | 7.3 High |
| A vulnerability classified as critical has been found in cym1102 nginxWebUI up to 3.9.9. This affects the function handlePath of the file /adminPage/conf/saveCmd. The manipulation of the argument nginxPath leads to improper certificate validation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260577 was assigned to this vulnerability. | ||||
| CVE-2024-3739 | 1 Cym1102 | 1 Nginxwebui | 2025-08-21 | 6.3 Medium |
| A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability. | ||||
| CVE-2024-3740 | 1 Cym1102 | 1 Nginxwebui | 2025-08-21 | 6.3 Medium |
| A vulnerability, which was classified as critical, has been found in cym1102 nginxWebUI up to 3.9.9. This issue affects the function exec of the file /adminPage/conf/reload. The manipulation of the argument nginxExe leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260579. | ||||
| CVE-2024-30953 | 1 Htmly | 1 Htmly | 2025-08-21 | 6.1 Medium |
| A stored cross-site scripting (XSS) vulnerability in Htmly v2.9.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link Name parameter of Menu Editor module. | ||||