π¨ CVE-2025-27062
Memory corruption while handling client exceptions, allowing unauthorized channel access.
π@cveNotify
Memory corruption while handling client exceptions, allowing unauthorized channel access.
π@cveNotify
π¨ CVE-2025-21488
Information disclosure while decoding this RTP packet headers received by UE from the network when the padding bit is set.
π@cveNotify
Information disclosure while decoding this RTP packet headers received by UE from the network when the padding bit is set.
π@cveNotify
π¨ CVE-2025-27032
memory corruption while loading a PIL authenticated VM, when authenticated VM image is loaded without maintaining cache coherency.
π@cveNotify
memory corruption while loading a PIL authenticated VM, when authenticated VM image is loaded without maintaining cache coherency.
π@cveNotify
π¨ CVE-2025-33187
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, denial of service, or escalation of privileges.
π@cveNotify
NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, denial of service, or escalation of privileges.
π@cveNotify
π¨ CVE-2025-33188
NVIDIA DGX Spark GB10 contains a vulnerability in hardware resources where an attacker could tamper with hardware controls. A successful exploit of this vulnerability might lead to information disclosure, data tampering, or denial of service.
π@cveNotify
NVIDIA DGX Spark GB10 contains a vulnerability in hardware resources where an attacker could tamper with hardware controls. A successful exploit of this vulnerability might lead to information disclosure, data tampering, or denial of service.
π@cveNotify
π¨ CVE-2023-30802
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to a source code disclosure vulnerability. A remote and unauthenticated attacker can obtain PHP source code by sending an HTTP request with an invalid Content-Length field.
π@cveNotify
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to a source code disclosure vulnerability. A remote and unauthenticated attacker can obtain PHP source code by sending an HTTP request with an invalid Content-Length field.
π@cveNotify
π¨ CVE-2023-30803
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can bypass authentication and access administrative functionality by sending HTTP requests using a crafted Y-forwarded-for header.
π@cveNotify
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can bypass authentication and access administrative functionality by sending HTTP requests using a crafted Y-forwarded-for header.
π@cveNotify
π¨ CVE-2023-30804
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authenticated file disclosure vulnerability. A remote and authenticated attacker can read arbitrary system files using the svpn_html/loadfile.php endpoint. This issue is exploitable by a remote and unauthenticated attacker when paired with CVE-2023-30803.
π@cveNotify
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authenticated file disclosure vulnerability. A remote and authenticated attacker can read arbitrary system files using the svpn_html/loadfile.php endpoint. This issue is exploitable by a remote and unauthenticated attacker when paired with CVE-2023-30803.
π@cveNotify
π¨ CVE-2023-30805
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.
π@cveNotify
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.
π@cveNotify
π¨ CVE-2024-21908
TinyMCE versions before 5.9.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser.
π@cveNotify
TinyMCE versions before 5.9.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser.
π@cveNotify
GitHub
CVE-2024-21908 - GitHub Advisory Database
Cross-site scripting vulnerability in TinyMCE
π¨ CVE-2024-21910
TinyMCE versions before 5.10.0 are affected by a cross-site scripting vulnerability. A remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser.
π@cveNotify
TinyMCE versions before 5.10.0 are affected by a cross-site scripting vulnerability. A remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser.
π@cveNotify
GitHub
CVE-2024-21910 - GitHub Advisory Database
Cross-site scripting vulnerability in TinyMCE plugins
π¨ CVE-2024-53021
Information disclosure may occur while processing goodbye RTCP packet from network.
π@cveNotify
Information disclosure may occur while processing goodbye RTCP packet from network.
π@cveNotify
π¨ CVE-2024-53026
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.
π@cveNotify
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.
π@cveNotify
π¨ CVE-2025-21463
Transient DOS while processing the EHT operation IE in the received beacon frame.
π@cveNotify
Transient DOS while processing the EHT operation IE in the received beacon frame.
π@cveNotify
π¨ CVE-2025-21464
Information disclosure while reading data from an image using specified offset and size parameters.
π@cveNotify
Information disclosure while reading data from an image using specified offset and size parameters.
π@cveNotify
π¨ CVE-2025-21465
Information disclosure while processing the hash segment in an MBN file.
π@cveNotify
Information disclosure while processing the hash segment in an MBN file.
π@cveNotify
π¨ CVE-2025-21487
Information disclosure while decoding RTP packet received by UE from the network, when payload length mentioned is greater than the available buffer length.
π@cveNotify
Information disclosure while decoding RTP packet received by UE from the network, when payload length mentioned is greater than the available buffer length.
π@cveNotify
π¨ CVE-2025-47318
Transient DOS while parsing the EPTM test control message to get the test pattern.
π@cveNotify
Transient DOS while parsing the EPTM test control message to get the test pattern.
π@cveNotify
π¨ CVE-2025-56423
An issue in Austrian Academy of Sciences (AW) Austrian Archaeological Institute OpenAtlas v.8.12.0 allows a remote attacker to obtain sensitive information via the login error messages
π@cveNotify
An issue in Austrian Academy of Sciences (AW) Austrian Archaeological Institute OpenAtlas v.8.12.0 allows a remote attacker to obtain sensitive information via the login error messages
π@cveNotify
Sec4You-Pentest
OpenAtlas:Schwachstelle User Enumeration CVE-2025-56423
In OpenAtlas < v8.12.0 ist es durch eine Benutzer-Enumeration Schwachstelle mΓΆglich registrierte Benutzer zu evaluieren
π¨ CVE-2025-60914
Incorrect access control in Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to access sensitive information via sending a crafted GET request to the /display_logo endpoint.
π@cveNotify
Incorrect access control in Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to access sensitive information via sending a crafted GET request to the /display_logo endpoint.
π@cveNotify
Sec4You-Pentest
OpenAtlas:Schwachstelle IDOR display_logo CVE-2025-60914
In OpenAtlas <= v8.12.0 am Endpunkt /display_logo/ liefert Dateien aus dem Upload-βLogo-Verzeichnis ohne erforderliche Autorisierung aus - IDOR