Total
32389 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-23265 | 1 Microsoft | 1 Defender For Iot | 2025-07-08 | 7.2 High |
| Microsoft Defender for IoT Remote Code Execution Vulnerability | ||||
| CVE-2022-21990 | 1 Microsoft | 10 Windows 10, Windows 11, Windows 7 and 7 more | 2025-07-08 | 8.8 High |
| Remote Desktop Client Remote Code Execution Vulnerability | ||||
| CVE-2022-21977 | 1 Microsoft | 9 Windows 10, Windows 11, Windows 8.1 and 6 more | 2025-07-08 | 3.3 Low |
| Media Foundation Information Disclosure Vulnerability | ||||
| CVE-2025-21194 | 1 Microsoft | 54 Surface Go 2 1901, Surface Go 2 1901 Firmware, Surface Go 2 1926 and 51 more | 2025-07-08 | 7.1 High |
| Microsoft Surface Security Feature Bypass Vulnerability | ||||
| CVE-2025-20197 | 1 Cisco | 1 Ios Xe | 2025-07-08 | 6.7 Medium |
| A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions. Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15. | ||||
| CVE-2025-20199 | 1 Cisco | 1 Ios Xe | 2025-07-08 | 4.6 Medium |
| A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker with privilege level 15 to elevate privileges to root on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation when processing specific configuration commands. An attacker could exploit this vulnerability by including crafted input in specific configuration commands. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system of an affected device. The security impact rating (SIR) of this advisory has been raised to High because an attacker could gain access to the underlying operating system of the affected device and perform potentially undetected actions. Note: The attacker must have privileges to enter configuration mode on the affected device. This is usually referred to as privilege level 15. | ||||
| CVE-2025-40575 | 1 Siemens | 2 Scalance Lpe9403, Scalance Lpe9403 Firmware | 2025-07-08 | 4.3 Medium |
| A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly validate incoming Profinet packets. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted malicious packet, which leads to a crash of the dcpd process. | ||||
| CVE-2023-29352 | 1 Microsoft | 8 Remote Desktop Client, Windows 10 1809, Windows 10 21h2 and 5 more | 2025-07-07 | 6.5 Medium |
| Windows Remote Desktop Security Feature Bypass Vulnerability | ||||
| CVE-2022-22015 | 1 Microsoft | 10 Remote Desktop Client, Windows 10, Windows 11 and 7 more | 2025-07-07 | 6.5 Medium |
| Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | ||||
| CVE-2024-49105 | 1 Microsoft | 17 Remote Desktop Client, Windows 10 1507, Windows 10 1607 and 14 more | 2025-07-07 | 8.4 High |
| Remote Desktop Client Remote Code Execution Vulnerability | ||||
| CVE-2021-1669 | 1 Microsoft | 14 Remote Desktop, Remote Desktop Client, Windows 10 and 11 more | 2025-07-07 | 8.8 High |
| Windows Remote Desktop Security Feature Bypass Vulnerability | ||||
| CVE-2021-34535 | 1 Microsoft | 17 Remote Desktop Client, Windows 10, Windows 10 1507 and 14 more | 2025-07-07 | 8.8 High |
| Remote Desktop Client Remote Code Execution Vulnerability | ||||
| CVE-2022-22017 | 1 Microsoft | 3 Remote Desktop Client, Windows 11, Windows Server 2022 | 2025-07-07 | 8.8 High |
| Remote Desktop Client Remote Code Execution Vulnerability | ||||
| CVE-2021-38665 | 1 Microsoft | 21 Remote Desktop, Remote Desktop Client, Windows 10 and 18 more | 2025-07-07 | 7.4 High |
| Remote Desktop Protocol Client Information Disclosure Vulnerability | ||||
| CVE-2022-26940 | 1 Microsoft | 3 Remote Desktop Client, Windows 11, Windows Server 2022 | 2025-07-07 | 6.5 Medium |
| Remote Desktop Protocol Client Information Disclosure Vulnerability | ||||
| CVE-2024-52871 | 1 Flagsmith | 1 Flagsmith | 2025-07-07 | 7.5 High |
| In Flagsmith before 2.134.1, it is possible to bypass the ALLOW_REGISTRATION_WITHOUT_INVITE setting. | ||||
| CVE-2024-52872 | 1 Flagsmith | 1 Flagsmith | 2025-07-07 | 7.5 High |
| In Flagsmith before 2.134.1, the get_document endpoint is not correctly protected by permissions. | ||||
| CVE-2024-48270 | 1 Misstt123 | 1 Oasys | 2025-07-07 | 7.5 High |
| An issue in the component /logins of oasys v1.1 allows attackers to access sensitive information via a burst attack. | ||||
| CVE-2024-1569 | 1 Lollms | 1 Lollms-webui | 2025-07-07 | 7.5 High |
| parisneo/lollms-webui is vulnerable to a denial of service (DoS) attack due to uncontrolled resource consumption. Attackers can exploit the `/open_code_in_vs_code` and similar endpoints without authentication by sending repeated HTTP POST requests, leading to the opening of Visual Studio Code or the default folder opener (e.g., File Explorer, xdg-open) multiple times. This can render the host machine unusable by exhausting system resources. The vulnerability is present in the latest version of the software. | ||||
| CVE-2024-20319 | 1 Cisco | 1 Ios Xr | 2025-07-07 | 4.3 Medium |
| A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device. This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests. | ||||