Total
305772 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-12611 | 1 Dasinfomedia | 1 School Management System | 2025-07-07 | N/A | 5.3 MEDIUM |
The School Management System for Wordpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 93.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |||||
CVE-2025-25929 | 1 Openmrs | 1 Openmrs | 2025-07-07 | N/A | 5.4 MEDIUM |
A reflected cross-site scripting (XSS) vulnerability in the component /legacyui/quickReportServlet of Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the reportType parameter. | |||||
CVE-2025-25680 | 1 Lsc | 2 Ptz Dual Band Camera, Ptz Dual Band Camera Firmware | 2025-07-07 | N/A | 7.7 HIGH |
LSC Smart Connect LSC Indoor PTZ Camera 7.6.32 is contains a RCE vulnerability in the tuya_ipc_direct_connect function of the anyka_ipc process. The vulnerability allows arbitrary code execution through the Wi-Fi configuration process when a specially crafted QR code is presented to the camera. | |||||
CVE-2022-26940 | 1 Microsoft | 3 Remote Desktop Client, Windows 11, Windows Server 2022 | 2025-07-07 | 4.0 MEDIUM | 6.5 MEDIUM |
Remote Desktop Protocol Client Information Disclosure Vulnerability | |||||
CVE-2019-0887 | 1 Microsoft | 10 Remote Desktop Client, Windows 10, Windows 11 21h2 and 7 more | 2025-07-07 | 8.5 HIGH | 8.0 HIGH |
A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an authenticated attacker abuses clipboard redirection, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. | |||||
CVE-2024-49105 | 1 Microsoft | 17 Remote Desktop Client, Windows 10 1507, Windows 10 1607 and 14 more | 2025-07-07 | N/A | 8.4 HIGH |
Remote Desktop Client Remote Code Execution Vulnerability | |||||
CVE-2021-1669 | 1 Microsoft | 5 Remote Desktop, Remote Desktop Client, Windows 10 and 2 more | 2025-07-07 | 6.5 MEDIUM | 8.8 HIGH |
Windows Remote Desktop Security Feature Bypass Vulnerability | |||||
CVE-2022-24503 | 1 Microsoft | 12 Remote Desktop Client, Windows 10, Windows 11 and 9 more | 2025-07-07 | 5.0 MEDIUM | 5.4 MEDIUM |
Remote Desktop Protocol Client Information Disclosure Vulnerability | |||||
CVE-2022-41121 | 1 Microsoft | 12 Powershell, Remote Desktop Client, Windows 10 and 9 more | 2025-07-07 | N/A | 7.8 HIGH |
Windows Graphics Component Elevation of Privilege Vulnerability | |||||
CVE-2021-34535 | 1 Microsoft | 9 Remote Desktop Client, Windows 10, Windows 7 and 6 more | 2025-07-07 | 6.8 MEDIUM | 8.8 HIGH |
Remote Desktop Client Remote Code Execution Vulnerability | |||||
CVE-2024-38131 | 1 Microsoft | 16 Remote Desktop Client, Windows 10 1507, Windows 10 1607 and 13 more | 2025-07-07 | N/A | 8.8 HIGH |
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability | |||||
CVE-2021-38665 | 1 Microsoft | 11 Remote Desktop Client, Windows 10, Windows 11 and 8 more | 2025-07-07 | 4.3 MEDIUM | 7.4 HIGH |
Remote Desktop Protocol Client Information Disclosure Vulnerability | |||||
CVE-2022-22015 | 1 Microsoft | 10 Remote Desktop Client, Windows 10, Windows 11 and 7 more | 2025-07-07 | 4.0 MEDIUM | 6.5 MEDIUM |
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | |||||
CVE-2022-22017 | 1 Microsoft | 3 Remote Desktop Client, Windows 11, Windows Server 2022 | 2025-07-07 | 9.3 HIGH | 8.8 HIGH |
Remote Desktop Client Remote Code Execution Vulnerability | |||||
CVE-2025-6069 | 2025-07-07 | N/A | 4.3 MEDIUM | ||
The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service. | |||||
CVE-2022-23302 | 5 Apache, Broadcom, Netapp and 2 more | 26 Log4j, Brocade Sannav, Snapmanager and 23 more | 2025-07-07 | 6.0 MEDIUM | 8.8 HIGH |
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | |||||
CVE-2024-56810 | 3 Ibm, Linux, Microsoft | 3 Entirex, Linux Kernel, Windows | 2025-07-07 | N/A | 3.3 LOW |
IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. | |||||
CVE-2024-56811 | 3 Ibm, Linux, Microsoft | 3 Entirex, Linux Kernel, Windows | 2025-07-07 | N/A | 3.3 LOW |
IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. | |||||
CVE-2025-25928 | 1 Openmrs | 1 Openmrs | 2025-07-07 | N/A | 8.0 HIGH |
A Cross-Site Request Forgery (CSRF) in the component /admin/users/user.form of Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary operations via a crafted request. In this case, an attacker could elevate a low-privileged account to an administrative role by leveraging the CSRF vulnerability at the /admin/users/user.form endpoint. | |||||
CVE-2024-56812 | 3 Ibm, Linux, Microsoft | 3 Entirex, Linux Kernel, Windows | 2025-07-07 | N/A | 3.3 LOW |
IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. |