Search Results (2164 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-11193 1 Lenovo 2 Tablet, Yoga 2025-11-10 5.5 Medium
A potential vulnerability was reported in some Lenovo Tablets that could allow a local authenticated user or application to gain access to sensitive device specific information.
CVE-2023-5215 1 Redhat 3 Advanced Virtualization, Enterprise Linux, Libnbd 2025-11-08 5.3 Medium
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
CVE-2025-46366 1 Dell 1 Cloudlink 2025-11-07 6.7 Medium
Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user may exploit and gain parallel privilege escalation or access to the database to obtain confidential information.
CVE-2022-29825 1 Mitsubishielectric 1 Gx Works3 2025-11-07 5.6 Medium
Use of Hard-coded Password vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C, and MT Works2 versions from 1.100E to 1.200J allows an unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.
CVE-2025-12676 1 Wordpress 1 Wordpress 2025-11-06 5.3 Medium
The KiotViet Sync plugin for WordPress is vulnerable to authorizarion bypass in all versions up to, and including, 1.8.5. This is due to the plugin using a hardcoded password for authentication in the QueryControllerAdmin::authenticated function. This makes it possible for unauthenticated attackers to create and sync products.
CVE-2025-33003 1 Ibm 1 Infosphere Information Server 2025-11-05 7.8 High
IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow a non-root user to gain higher privileges/capabilities within the scope of a container due to execution with unnecessary privileges.
CVE-2025-37773 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-11-05 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: virtiofs: add filesystem context source name check In certain scenarios, for example, during fuzz testing, the source name may be NULL, which could lead to a kernel panic. Therefore, an extra check for the source name should be added.
CVE-2014-5414 1 Beckhoff 2 Embedded Pc Images, Twincat 2025-11-05 9.1 Critical
Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.
CVE-2025-54090 1 Apache 1 Http Server 2025-11-04 6.3 Medium
A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true". Users are recommended to upgrade to version 2.4.65, which fixes the issue.
CVE-2025-53677 1 Jenkins 1 Xooa 2025-11-04 5.3 Medium
Jenkins Xooa Plugin 0.0.7 and earlier does not mask the Xooa Deployment Token on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2025-53675 1 Jenkins 1 Warrior Framework 2025-11-04 6.5 Medium
Jenkins Warrior Framework Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53674 1 Jenkins 1 Sensedia Api Platform Tools 2025-11-04 5.3 Medium
Jenkins Sensedia Api Platform tools Plugin 1.0 does not mask the Sensedia API Manager integration token on the global configuration form, increasing the potential for attackers to observe and capture it.
CVE-2025-53671 1 Jenkins 1 Nouvola Divecloud 2025-11-04 6.5 Medium
Jenkins Nouvola DiveCloud Plugin 1.08 and earlier does not mask DiveCloud API Keys and Credentials Encryption Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53669 1 Jenkins 1 Vaddy 2025-11-04 4.3 Medium
Jenkins VAddy Plugin 1.2.8 and earlier does not mask Vaddy API Auth Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53665 1 Jenkins 1 Apica Loadtest 2025-11-04 4.3 Medium
Jenkins Apica Loadtest Plugin 1.10 and earlier does not mask Apica Loadtest LTP authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53664 1 Jenkins 1 Apica Loadtest 2025-11-04 6.5 Medium
Jenkins Apica Loadtest Plugin 1.10 and earlier stores Apica Loadtest LTP authentication tokens unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53662 1 Jenkins 1 Ifttt Build Notifier 2025-11-04 6.5 Medium
Jenkins IFTTT Build Notifier Plugin 1.2 and earlier stores IFTTT Maker Channel Keys unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53660 1 Jenkins 1 Qmetry Test Management 2025-11-04 4.3 Medium
Jenkins QMetry Test Management Plugin 1.13 and earlier does not mask Qmetry Automation API Keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
CVE-2025-53656 1 Jenkins 1 Readyapi Functional Testing 2025-11-04 6.5 Medium
Jenkins ReadyAPI Functional Testing Plugin 1.11 and earlier stores SLM License Access Keys, client secrets, and passwords unencrypted in job config.xml files on the Jenkins controller, where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
CVE-2025-53655 1 Jenkins 1 Statistics Gatherer 2025-11-04 5.3 Medium
Jenkins Statistics Gatherer Plugin 2.0.3 and earlier does not mask the AWS Secret Key on the global configuration form, increasing the potential for attackers to observe and capture it.