Advanced Search
Search and filter through 720 vulnerabilities
Use our powerful search engine to find specific vulnerabilities by CVE ID, description keywords, severity level, or exploit availability. Filter results by date range, CVSS score, affected products, and more. Our advanced search capabilities help security professionals quickly identify vulnerabilities that matter to their organization.
Search Results
Showing 21 - 40 of 720 results
None
The S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the storeFile() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with Editor-level access and …
UNKNOWN
thread-amount is a tool that gets the amount of threads in the current process. Prior to version 0.2.2, there are resource leaks when querying thread counts on Windows and Apple platforms. In Windows platforms, the thread_amount function calls CreateToolhelp32Snapshot but fails to close the returned HANDLE using CloseHandle. Repeated calls …
None
Black Duck SCA versions prior to 2025.10.0 had user role permissions configured in an overly broad manner. Users with the scoped Project Manager user role with the Global User Read access permission enabled access to certain Project Administrator functionalities which should have be inaccessible. Exploitation does not grant full system …
None
In RNP version 0.18.0 a refactoring regression causes the symmetric session key used for Public-Key Encrypted Session Key (PKESK) packets to be left uninitialized except for zeroing, resulting in it always being an all-zero byte array. Any data encrypted using public-key encryption in this release can be decrypted trivially by …
UNKNOWN
With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.
None
IBM Concert Software 1.0.0 through 2.0.0 could allow a remote attacker to hijack the clicking action of the victim.
None
Improper input validation within AMD uprof can allow a local attacker to overwrite MSR registers, potentially resulting in crash or denial of service.
None
Improper resource release in the call termination process in AWS Wickr before version 6.62.13 on Windows, macOS and Linux may allow a call participant to continue receiving audio input from another user after they close their call window. This issue occurs under certain conditions, which require the affected user to …
UNKNOWN
Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application.
HIGH
No description available
Microsoft Windows 10 Version 1809 (10.0.17763.0)
Microsoft Windows Server 2019 (10.0.17763.0)
Microsoft Windows Server 2019 (Server Core installation) (10.0.17763.0)
Microsoft Windows Server 2022 (10.0.20348.0)
Microsoft Windows 10 Version 21H2 (10.0.19044.0)
Microsoft Windows 11 version 22H2 (10.0.22621.0)
Microsoft Windows 10 Version 22H2 (10.0.19045.0)
Microsoft Windows Server 2025 (Server Core installation) (10.0.26100.0)
Microsoft Windows 11 version 22H3 (10.0.22631.0)
Microsoft Windows 11 Version 23H2 (10.0.22631.0)
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) (10.0.25398.0)
Microsoft Windows 11 Version 24H2 (10.0.26100.0)
Microsoft Windows Server 2025 (10.0.26100.0)
MEDIUM
No description available
Microsoft Microsoft Configuration Manager (1.0.0)
Microsoft Microsoft Configuration Manager 2409 (1.0.0)
HIGH
No description available
Microsoft Microsoft Defender for Endpoint for Linux (101.0.0)
HIGH
No description available
Microsoft Windows 11 Version 25H2 (10.0.26200.0)
Microsoft Windows 10 Version 1809 (10.0.17763.0)
Microsoft Windows Server 2019 (10.0.17763.0)
Microsoft Windows Server 2019 (Server Core installation) (10.0.17763.0)
Microsoft Windows Server 2022 (10.0.20348.0)
Microsoft Windows 10 Version 21H2 (10.0.19044.0)
Microsoft Windows 11 version 22H2 (10.0.22621.0)
Microsoft Windows 10 Version 22H2 (10.0.19045.0)
Microsoft Windows Server 2025 (Server Core installation) (10.0.26100.0)
Microsoft Windows 11 version 22H3 (10.0.22631.0)
Microsoft Windows 11 Version 23H2 (10.0.22631.0)
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) (10.0.25398.0)
Microsoft Windows 11 Version 24H2 (10.0.26100.0)
Microsoft Windows Server 2025 (10.0.26100.0)
Microsoft Windows 10 Version 1507 (10.0.10240.0)
Microsoft Windows 10 Version 1607 (10.0.14393.0)
Microsoft Windows Server 2016 (10.0.14393.0)
Microsoft Windows Server 2016 (Server Core installation) (10.0.14393.0)
Microsoft Windows Server 2008 Service Pack 2 (6.0.6003.0)
Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) (6.0.6003.0)
Microsoft Windows Server 2008 R2 Service Pack 1 (6.1.7601.0)
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) (6.1.7601.0)
Microsoft Windows Server 2012 (6.2.9200.0)
Microsoft Windows Server 2012 (Server Core installation) (6.2.9200.0)
Microsoft Windows Server 2012 R2 (6.3.9600.0)
Microsoft Windows Server 2012 R2 (Server Core installation) (6.3.9600.0)
LOW
No description available
Microsoft Windows 10 Version 1809 (10.0.17763.0)
Microsoft Windows Server 2019 (10.0.17763.0)
Microsoft Windows Server 2019 (Server Core installation) (10.0.17763.0)
Microsoft Windows Server 2022 (10.0.20348.0)
Microsoft Windows 10 Version 21H2 (10.0.19044.0)
Microsoft Windows 11 version 22H2 (10.0.22621.0)
Microsoft Windows 10 Version 22H2 (10.0.19045.0)
Microsoft Windows Server 2025 (Server Core installation) (10.0.26100.0)
Microsoft Windows 11 Version 25H2 (10.0.26200.0)
Microsoft Windows 11 version 22H3 (10.0.22631.0)
Microsoft Windows 11 Version 23H2 (10.0.22631.0)
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) (10.0.25398.0)
Microsoft Windows 11 Version 24H2 (10.0.26100.0)
Microsoft Windows Server 2025 (10.0.26100.0)
Microsoft Windows 10 Version 1507 (10.0.10240.0)
Microsoft Windows 10 Version 1607 (10.0.14393.0)
Microsoft Windows Server 2016 (10.0.14393.0)
Microsoft Windows Server 2016 (Server Core installation) (10.0.14393.0)