Total
300532 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-53493 | 2025-07-03 | 6.5 Medium | ||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MintyDocs Extension allows Stored XSS.This issue affects Mediawiki - MintyDocs Extension: from 1.43.X before 1.43.2. | ||||
CVE-2025-53492 | 2025-07-03 | 3.7 Low | ||
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MintyDocs Extension allows Stored XSS.This issue affects Mediawiki - MintyDocs Extension: from 1.43.X before 1.43.2. | ||||
CVE-2025-52969 | 2025-07-03 | N/A | ||
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | ||||
CVE-2025-1992 | 1 Ibm | 1 Db2 | 2025-07-03 | 5.3 Medium |
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 could allow an authenticated user in federation environment, to cause a denial of service due to insufficient release of allocated memory after usage. | ||||
CVE-2024-29849 | 1 Veeam | 2 Backup Enterprise Manager, Veeam Backup \& Replication | 2025-07-03 | N/A |
Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface. | ||||
CVE-2024-29850 | 1 Veeam | 2 Backup Enterprise Manager, Veeam Backup \& Replication | 2025-07-03 | N/A |
Veeam Backup Enterprise Manager allows account takeover via NTLM relay. | ||||
CVE-2025-6192 | 1 Google | 1 Chrome | 2025-07-03 | 8.8 High |
Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2025-6191 | 1 Google | 1 Chrome | 2025-07-03 | 8.8 High |
Integer overflow in V8 in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2024-29851 | 1 Veeam | 2 Backup Enterprise Manager, Veeam Backup \& Replication | 2025-07-03 | N/A |
Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account. | ||||
CVE-2025-6436 | 1 Mozilla | 1 Firefox | 2025-07-03 | 8.1 High |
Memory safety bugs present in Firefox 139 and Thunderbird 139. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 140. | ||||
CVE-2025-6435 | 1 Mozilla | 1 Firefox | 2025-07-03 | 8.1 High |
If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140. | ||||
CVE-2024-48992 | 1 Needrestart Project | 1 Needrestart | 2025-07-03 | 7.8 High |
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable. | ||||
CVE-2024-48991 | 1 Needrestart Project | 1 Needrestart | 2025-07-03 | 7.8 High |
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by winning a race condition and tricking needrestart into running their own, fake Python interpreter (instead of the system's real Python interpreter). The initial security fix (6ce6136) introduced a regression which was subsequently resolved (42af5d3). | ||||
CVE-2024-48990 | 1 Needrestart Project | 1 Needrestart | 2025-07-03 | 7.8 High |
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. | ||||
CVE-2024-11003 | 1 Needrestart Project | 1 Needrestart | 2025-07-03 | 7.8 High |
Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps. | ||||
CVE-2025-6434 | 1 Mozilla | 1 Firefox | 2025-07-03 | 4.3 Medium |
The exception page for the HTTPS-Only feature, displayed when a website is opened via HTTP, lacked an anti-clickjacking delay, potentially allowing an attacker to trick a user into granting an exception and loading a webpage over HTTP. This vulnerability affects Firefox < 140. | ||||
CVE-2025-6433 | 1 Mozilla | 1 Firefox | 2025-07-03 | 9.8 Critical |
If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires "a secure transport established without errors". This vulnerability affects Firefox < 140. | ||||
CVE-2025-6432 | 1 Mozilla | 1 Firefox | 2025-07-03 | 8.6 High |
When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140. | ||||
CVE-2025-6431 | 2 Google, Mozilla | 2 Android, Firefox | 2025-07-03 | 6.5 Medium |
When a link can be opened in an external application, Firefox for Android will, by default, prompt the user before doing so. An attacker could have bypassed this prompt, potentially exposing the user to security vulnerabilities or privacy leaks in external applications. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 140. | ||||
CVE-2024-30154 | 1 Hcltech | 1 Hcl Sx | 2025-07-03 | 5.3 Medium |
HCL SX is vulnerable to cross-site request forgery vulnerability which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. |