Total
306776 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-2180 | 1 Paloaltonetworks | 1 Checkov | 2025-08-14 | N/A |
An unsafe deserialization vulnerability in Palo Alto Networks Checkov by Prisma® Cloud allows an authenticated user to execute arbitrary code as a non administrative user by scanning a malicious terraform file when using Checkov in Prisma® Cloud. This issue impacts Checkov 3.0 versions earlier than Checkov 3.2.415. | ||||
CVE-2025-6021 | 1 Redhat | 11 Discovery, Enterprise Linux, Insights Proxy and 8 more | 2025-08-14 | 7.5 High |
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | ||||
CVE-2025-4275 | 2025-08-14 | 7.8 High | ||
A vulnerability in the digital signature verification process does not properly validate variable attributes which allows an attacker to bypass signature verification by creating a non-authenticated NVRAM variable. An attacker may to execute arbitrary signed UEFI code and bypass Secure Boot. | ||||
CVE-2025-4421 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 8.2 High |
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home | ||||
CVE-2025-4422 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 8.2 High |
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home | ||||
CVE-2025-4423 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 8.2 High |
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home | ||||
CVE-2025-4424 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 6 Medium |
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home | ||||
CVE-2025-4425 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 8.2 High |
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home | ||||
CVE-2025-4426 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 6 Medium |
The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability. https://support.lenovo.com/us/en/product_security/home | ||||
CVE-2025-4277 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 7.5 High |
Tcg2Smm has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level. | ||||
CVE-2025-4276 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 7.5 High |
UsbCoreDxe has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level. | ||||
CVE-2025-4410 | 1 Insyde | 1 Insydeh2o | 2025-08-14 | 7.5 High |
A buffer overflow vulnerability exists in the module SetupUtility. An attacker with local privileged access can exploit this vulnerability by executeing arbitrary code. | ||||
CVE-2025-21086 | 2 Intel, Linux | 2 Ethernet 700 Series Software, Linux Kernel | 2025-08-14 | 7.5 High |
Improper input validation in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable escalation of privilege. | ||||
CVE-2025-20074 | 1 Intel | 1 Connectivity Performance Suite | 2025-08-14 | 7.8 High |
Time-of-check Time-of-use race condition for some Intel(R) Connectivity Performance Suite software installers before version 40.24.11210 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2025-49457 | 1 Zoom | 2 Zoom, Zoom Client | 2025-08-14 | 9.6 Critical |
Untrusted search path in certain Zoom Clients for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access | ||||
CVE-2025-20048 | 1 Intel | 1 Trace Analyzer And Collector | 2025-08-14 | 6.7 Medium |
Uncontrolled search path for the Intel(R) Trace Analyzer and Collector software all verions may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2025-30027 | 1 Axis | 1 Axis Os | 2025-08-14 | 6.7 Medium |
An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application. | ||||
CVE-2025-3892 | 1 Axis | 1 Axis Os | 2025-08-14 | 6.7 Medium |
ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application. | ||||
CVE-2025-20099 | 1 Intel | 1 Rapid Storage Technology | 2025-08-14 | 6.7 Medium |
Improper access control for some Intel(R) Rapid Storage Technology installation software may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2025-54187 | 1 Adobe | 1 Substance 3d Painter | 2025-08-14 | 7.8 High |
Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |