Page 210 of 54472 results (0.176 seconds)

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

19 Sep 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/dd43f8f90206054e7da7593de0a334fb2cd0ea88 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

19 Sep 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/5cf909c553e9efed573811de4b3f5172898d5515 •

CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0

19 Sep 2025 — Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/da5e7c87827e8caa6a1eeec6d95dcf74ab592a01 •

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

19 Sep 2025 — Found by Linux Verification Center (linuxtesting.org) with SVACE Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. • https://git.kernel.org/stable/c/41d3f256c6a5e41eb32b87168399c0facd512dc0 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

19 Sep 2025 — Grafana is an open-source platform for monitoring and observability. Grafana-Zabbix is a plugin for Grafana allowing to visualize monitoring data from Zabbix and create dashboards for analyzing metrics and realtime monitoring. Versions 5.2.1 and below contained a ReDoS vulnerability via user-supplied regex query which could causes CPU usage to max out. This vulnerability is fixed in version 6.0.0. Grafana is an open-source platform for monitoring and observability. • https://github.com/grafana/grafana-zabbix/releases/tag/v6.0.0 • CWE-20: Improper Input Validation •

CVSS: 7.7EPSS: 0%CPEs: 2EXPL: 1

19 Sep 2025 — An issue was discovered in Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01 allowing attackers to cause a denial of service via the funcname, funcpara1, funcpara2 parameters to the formSetCfm function (uri path: SetCfm). • https://github.com/faqiadegege/IoTVuln/blob/main/tendaAc6_formSetCfm_funcname_overflow/detail.md • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

19 Sep 2025 — (Chromium security severity: High) Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. • https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

19 Sep 2025 — (Chromium security severity: High) Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. • https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

19 Sep 2025 — (Chromium security severity: High) Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. • https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop_17.html • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.7EPSS: 0%CPEs: -EXPL: 0

18 Sep 2025 — Cognex In-Sight Explorer and In-Sight Camera Firmware expose a telnet-based service on port 23 in order to allow management operations on the device such as firmware upgrades and device reboot requiring an authentication. A wrong management of login failures of the service allows a denial-of-service attack, leaving the telnet service into an unreachable state. • https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-06 • CWE-307: Improper Restriction of Excessive Authentication Attempts •