Vulnerabilities (CVE)

Total 304758 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-24852 1 Qualcomm 542 315 5g Iot Modem, 315 5g Iot Modem Firmware, 9205 Lte Modem and 539 more 2025-08-11 N/A 7.8 HIGH
Memory Corruption in Core due to secure memory access by user while loading modem image.
CVE-2023-33118 1 Qualcomm 271 Ar8035, Ar8035 Firmware, Csra6620 and 268 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while processing Listen Sound Model client payload buffer when there is a request for Listen Sound session get parameter from ST HAL.
CVE-2023-33111 1 Qualcomm 172 Ar8035, Ar8035 Firmware, C-v2x 9150 and 169 more 2025-08-11 N/A 5.5 MEDIUM
Information disclosure when VI calibration state set by ADSP is greater than MAX_FBSP_STATE in the response payload to AFE calibration command.
CVE-2024-33054 1 Qualcomm 66 Fastconnect 6700, Fastconnect 6700 Firmware, Fastconnect 6900 and 63 more 2025-08-11 N/A 7.8 HIGH
Memory corruption during the handshake between the Primary Virtual Machine and Trusted Virtual Machine.
CVE-2024-43057 1 Qualcomm 306 Ar8035, Ar8035 Firmware, C-v2x 9150 and 303 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while processing command in Glink linux.
CVE-2023-33079 1 Qualcomm 288 Apq5053-aa, Apq5053-aa Firmware, Ar8035 and 285 more 2025-08-11 N/A 7.8 HIGH
Memory corruption in Audio while running invalid audio recording from ADSP.
CVE-2025-21422 1 Qualcomm 442 Aqt1000, Aqt1000 Firmware, Ar8035 and 439 more 2025-08-11 N/A 7.8 HIGH
Cryptographic issue while processing crypto API calls, missing checks may lead to corrupted key usage or IV reuses.
CVE-2024-49841 1 Qualcomm 346 Aqt1000, Aqt1000 Firmware, Ar8035 and 343 more 2025-08-11 N/A 7.8 HIGH
Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.
CVE-2023-33114 1 Qualcomm 224 315 5g Iot Modem, 315 5g Iot Modem Firmware, Aqt1000 and 221 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while running NPU, when NETWORK_UNLOAD and (NETWORK_UNLOAD or NETWORK_EXECUTE_V2) commands are submitted at the same time.
CVE-2025-21453 1 Qualcomm 532 205 Mobile, 205 Mobile Firmware, 215 Mobile and 529 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
CVE-2023-33092 1 Qualcomm 190 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 187 more 2025-08-11 N/A 7.8 HIGH
Memory corruption while processing pin reply in Bluetooth, when pin code received from APP layer is greater than expected size.
CVE-2024-47384 1 Wpcompress 1 Wp Compress 2025-08-11 N/A 6.1 MEDIUM
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Compress WP Compress – Image Optimizer [All-In-One] allows Reflected XSS.This issue affects WP Compress – Image Optimizer [All-In-One]: from n/a through 6.20.13.
CVE-2025-21601 1 Juniper 1 Junos 2025-08-11 N/A N/A
An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an unauthenticated, network-based attacker, sending genuine traffic targeted to the device to cause the CPU to climb until the device becomes unresponsive. Continuous receipt of these packets will create a sustained Denial of Service (DoS) condition. This issue affects Junos OS:  * All versions before 21.4R3-S9, * from 22.2 before 22.2R3-S5, * from 22.4 before 22.4R3-S4, * from 23.2 before 23.2R2-S3, * from 23.4 before 23.4R2-S3, * from 24.2 before 24.2R1-S1, 24.2R2. An indicator of compromise is to review the CPU % of the httpd process in the CLI: e.g.   show system processes extensive | match httpd  PID nobody       52   0   20M    191M select   2   0:01   80.00% httpd{httpd} <<<<< the percentage of httpd usage if high may be an indicator
CVE-2025-2539 1 File Away Project 1 File Away 2025-08-11 N/A 7.5 HIGH
The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.
CVE-2025-40600 1 Sonicwall 23 Nsa 2700, Nsa 3700, Nsa 4700 and 20 more 2025-08-11 N/A N/A
Use of Externally-Controlled Format String vulnerability in the SonicOS SSL VPN interface allows a remote unauthenticated attacker to cause service disruption.
CVE-2025-2512 1 File Away Project 1 File Away 2025-08-11 N/A 9.8 CRITICAL
The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2025-26530 1 Moodle 1 Moodle 2025-08-11 N/A 6.1 MEDIUM
The question bank filter required additional sanitizing to prevent a reflected XSS risk.
CVE-2025-53606 1 Apache 1 Seata 2025-08-11 N/A N/A
Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): 2.4.0. Users are recommended to upgrade to version 2.5.0, which fixes the issue.
CVE-2025-24938 1 Nokia 1 Wavesuite Noc 2025-08-11 N/A N/A
The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.
CVE-2025-24937 1 Nokia 1 Wavesuite Noc 2025-08-11 N/A N/A
File contents could be read from the local file system by an attacker. Additionally, malicious code could be inserted in the file, leading to a full compromise of the web application and the container it is running on. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. The web application allows arbitrary files to be included in a file that was downloadable and executable by the web server.