Page 6 of 44993 results (0.016 seconds)

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

08 Apr 2025 — Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.6EPSS: 0%CPEs: 26EXPL: 0

08 Apr 2025 — Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686 • CWE-591: Sensitive Data Storage in Improperly Locked Memory •

CVSS: 7.6EPSS: 0%CPEs: 26EXPL: 0

08 Apr 2025 — Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

08 Apr 2025 — Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26666 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.1EPSS: 0%CPEs: 26EXPL: 0

08 Apr 2025 — Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663 • CWE-416: Use After Free •

CVSS: 8.3EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2025 — Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated attacker to upload arbitrary files and execute arbitrary commands on the underlying host operating system. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a ’save’ function in ’HAXCMSFile.php’. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks ’.php’, ’.sh’, ’.js’, and ’.css’ files. The existing logic causes the system to "fail open" rather than "fail closed." • https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.0EPSS: 0%CPEs: 4EXPL: 0

08 Apr 2025 — A vulnerability in the file creation process on the command line interface of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to perform remote code execution (RCE). Successful exploitation could allow an attacker to execute arbitrary operating system commands on the underlying operating system leading to potential system compromise. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04844en_us&docLocale=en_US • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. If exploited a threat actor can disclose information and execute arbitrary code on the system. • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. If exploited a threat actor can disclose infor... • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html • CWE-125: Out-of-bounds Read •