The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.
Legal Disclaimer:
Here is where you can read the NVD legal disclaimer.
-
CVE-2025-62399 - Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks.
Published: October 23, 2025; 8:15:32 AM -0400 -
CVE-2025-62400 - Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information.
Published: October 23, 2025; 8:15:32 AM -0400V3.1: 6.5 MEDIUM
-
CVE-2025-62401 - An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment.
Published: October 23, 2025; 8:15:32 AM -0400V3.1: 4.3 MEDIUM
-
CVE-2025-38014 - In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper The idxd_cleanup() helper cleans up perfmon, interrupts, internals and so on. Refactor remove call with the idxd... read CVE-2025-38014
Published: June 18, 2025; 6:15:32 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2025-38016 - In the Linux kernel, the following vulnerability has been resolved: HID: bpf: abort dispatch if device destroyed The current HID bpf implementation assumes no output report/request will go through it after hid_bpf_destroy_device() has been calle... read CVE-2025-38016
Published: June 18, 2025; 6:15:33 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2025-38017 - In the Linux kernel, the following vulnerability has been resolved: fs/eventpoll: fix endless busy loop after timeout has expired After commit 0a65bc27bd64 ("eventpoll: Set epoll timeout if it's in the future"), the following program would immed... read CVE-2025-38017
Published: June 18, 2025; 6:15:33 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2025-38019 - In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices The driver only offloads neighbors that are constructed on top of net devices registered by it or their ... read CVE-2025-38019
Published: June 18, 2025; 6:15:33 AM -0400V3.1: 7.8 HIGH
-
CVE-2025-38021 - In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check of pipe_ctx->plane_state for update_dchubp_dpp Similar to commit 6a057072ddd1 ("drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn2... read CVE-2025-38021
Published: June 18, 2025; 6:15:33 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2022-49955 - In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: Fix RTAS MSR[HV] handling for Cell The semi-recent changes to MSR handling when entering RTAS (firmware) cause crashes on IBM Cell machines. An example trace: k... read CVE-2022-49955
Published: June 18, 2025; 7:15:22 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2022-49954 - In the Linux kernel, the following vulnerability has been resolved: Input: iforce - wake up after clearing IFORCE_XMIT_RUNNING flag syzbot is reporting hung task at __input_unregister_device() [1], for iforce_close() waiting at wait_event_interr... read CVE-2022-49954
Published: June 18, 2025; 7:15:22 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2022-49953 - In the Linux kernel, the following vulnerability has been resolved: iio: light: cm3605: Fix an error handling path in cm3605_probe() The commit in Fixes also introduced a new error handling path which should goto the existing error handling path... read CVE-2022-49953
Published: June 18, 2025; 7:15:22 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2022-49952 - In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix memory corruption on probe Add the missing sanity check on the probed-session count to avoid corrupting memory beyond the fixed-size slab-allocated session ar... read CVE-2022-49952
Published: June 18, 2025; 7:15:22 AM -0400V3.1: 7.8 HIGH
-
CVE-2022-49951 - In the Linux kernel, the following vulnerability has been resolved: firmware_loader: Fix use-after-free during unregister In the following code within firmware_upload_unregister(), the call to device_unregister() could result in the dev_release ... read CVE-2022-49951
Published: June 18, 2025; 7:15:22 AM -0400V3.1: 7.8 HIGH
-
CVE-2022-49950 - In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix memory corruption on open The probe session-duplication overflow check incremented the session count also when there were no more available sessions so that m... read CVE-2022-49950
Published: June 18, 2025; 7:15:22 AM -0400V3.1: 7.8 HIGH
-
CVE-2022-49949 - In the Linux kernel, the following vulnerability has been resolved: firmware_loader: Fix memory leak in firmware upload In the case of firmware-upload, an instance of struct fw_upload is allocated in firmware_upload_register(). This data needs t... read CVE-2022-49949
Published: June 18, 2025; 7:15:21 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2025-40843 - CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. CodeChecker versions up to 6.26.1 contain a buffer overflow vulnerability in the internal ldlogger library, which is execut... read CVE-2025-40843
Published: October 28, 2025; 3:15:41 PM -0400V3.1: 7.8 HIGH
-
CVE-2025-63293 - FairSketch Rise Ultimate Project Manager & CRM 3.9.4 is vulnerable to Insecure Permissions. A remote authenticated user can append comments or upload attachments to tickets for which they lack view or edit authorization, due to missing authorizati... read CVE-2025-63293
Published: November 03, 2025; 4:19:38 PM -0500 -
CVE-2025-58469 - A cross-site request forgery (CSRF) vulnerability has been reported to affect QuLog Center. The remote attackers can then exploit the vulnerability to gain privileges or hijack user identities. We have already fixed the vulnerability in the follo... read CVE-2025-58469
Published: November 07, 2025; 11:15:41 AM -0500V3.1: 8.8 HIGH
-
CVE-2025-12915 - A vulnerability was found in 70mai X200 up to 20251019. This issue affects some unknown processing of the component Init Script Handler. The manipulation results in file inclusion. The attack requires a local approach. A high complexity level is a... read CVE-2025-12915
Published: November 08, 2025; 6:15:48 PM -0500 -
CVE-2025-64446 - A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrat... read CVE-2025-64446
Published: November 14, 2025; 11:15:58 AM -0500