Medium Severity Vulnerabilities

128.7K CVEs classified as medium severity

MEDIUM
Total CVEs
128.7K
Vulnerabilities
Avg CVSS
6.5
Medium
Max CVSS
6.5
Highest
Min CVSS
6.5
Lowest

Browse by Severity

Medium Severity CVEs

Page 362 of 5362
CVSS:6.5(Medium)

ZKsync Era is a layer 2 rollup that uses zero-knowledge proofs to scale Ethereum. There is possible invalid stack access due to the addresses used to access the stack not properly being converted to c...

CVSS:6.5(Medium)

In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQu...

CVSS:6.5(Medium)

NATO NCI ANET 3.4.1 mishandles report ownership. A user can create a report and, despite the restrictions imposed by the UI, change the author of that report to an arbitrary user (without their consen...

CVSS:6.5(Medium)

Unitronics Vision PLC – CWE-676: Use of Potentially Dangerous Function may allow security feature bypass

CVSS:6.5(Medium)

Transient DOS while processing the CU information from RNR IE.

CVSS:6.5(Medium)

Transient DOS while parsing BTM ML IE when per STA profile is not included.

CVSS:6.5(Medium)

Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severi...

CVSS:6.5(Medium)

Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium securit...

CVSS:6.5(Medium)

The Lightning Network Daemon (lnd) - is a complete implementation of a Lightning Network node. A parsing vulnerability in lnd's onion processing logic and lead to a DoS vector due to excessive memory ...

CWE-202024
CVSS:6.5(Medium)

CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Staff Info module via the searvalu parameter.

CWE-892024
CVSS:6.5(Medium)

IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd CLI does not validate server name during registration and unregistration operations which could expose sensitive information to an ...

CVSS:6.5(Medium)

IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 stores potentially sensitive information in log files under certain situations that could be read by an authenticated user. IBM X-Fo...

CVSS:6.5(Medium)

IBM Aspera Shares 1.9.0 through 1.10.0 PL6 does not properly rate limit the frequency that an authenticated user can send emails, which could result in email flooding or a denial of service.

CVSS:6.5(Medium)

IBM Aspera Shares 1.0 through 1.10.0 PL3 does not invalidate session after a password reset which could allow an authenticated user to impersonate another user on the system.

CVSS:6.5(Medium)

When browsing private tabs, some data related to location history or webpage thumbnails could be persisted incorrectly within the sandboxed app bundle after app termination This vulnerability affects ...

CVSS:6.5(Medium)

Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potential...

CVSS:6.5(Medium)

An insufficient entropy vulnerability caused by the improper use of a randomness function with low entropy for web authentication tokens generation exists in the Zyxel GS1900-10HP firmware version V2....

CVSS:6.5(Medium)

Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

CVSS:6.5(Medium)

Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

CVSS:6.5(Medium)

Windows Mark of the Web Security Feature Bypass Vulnerability

CVSS:6.5(Medium)

An authenticated attacker can bypass Server-Side Request Forgery (SSRF) protection in Microsoft Copilot Studio to leak sensitive information over a network.

CVSS:6.5(Medium)

Improper access control in Imagine Cup allows an authorized attacker to elevate privileges over a network.