195 CVEs tracked today. 23 Critical, 95 High, 61 Medium, 6 Low.
-
CVE-2026-23800
CRITICAL
CVSS 10.0
Modular DS modular-connector has a CVSS 10.0 privilege escalation vulnerability through incorrect privilege assignment, allowing unauthenticated attackers to gain full administrative access to WordPress sites.
Privilege Escalation
-
CVE-2026-23744
CRITICAL
CVSS 9.8
MCPJam Inspector versions 1.4.2 and earlier allow unauthenticated remote code execution through missing authentication in the MCP server debugging platform, with EPSS 17.2% indicating active scanning.
RCE
Authentication Bypass
AI / ML
Inspector
-
CVE-2026-23722
CRITICAL
CVSS 9.1
WeGIA web manager for charitable institutions has a reflected XSS vulnerability prior to version 3.6.2 that enables account takeover through crafted malicious links.
PHP
XSS
Wegia
-
CVE-2026-23523
CRITICAL
CVSS 9.6
Dive, an MCP Host Desktop Application for LLM integration, allows code injection prior to version 0.13.0 through malicious tool responses, enabling attackers to execute arbitrary code on the user's machine.
RCE
Code Injection
AI / ML
Dive
-
CVE-2026-1021
CRITICAL
CVSS 9.8
Gotac Police Statistics Database System allows unauthenticated arbitrary file upload, enabling remote attackers to upload web shells and achieve full server compromise.
Industrial
Police Statistics Database System
-
CVE-2026-1019
CRITICAL
CVSS 9.8
The Police Statistics Database System by Gotac has a missing authentication vulnerability allowing unauthenticated remote access to law enforcement statistical data.
Industrial
Police Statistics Database System
-
CVE-2025-62582
CRITICAL
CVSS 9.8
Delta Electronics DIAView has a missing authentication vulnerability that allows remote attackers to access critical functionality without credentials, potentially compromising SCADA monitoring.
Industrial
Diaview
-
CVE-2025-62581
CRITICAL
CVSS 9.8
Delta Electronics DIAView uses hard-coded cryptographic keys, allowing attackers to forge authentication tokens, decrypt sensitive data, or bypass security controls entirely.
Industrial
Diaview
-
CVE-2025-61937
CRITICAL
CVSS 10.0
A CVSS 10.0 code injection vulnerability allows unauthenticated attackers to achieve remote code execution with OS-level system privileges on the affected product.
RCE
Process Optimization
-
CVE-2025-60021
CRITICAL
CVSS 9.8
Apache bRPC versions before 1.15.0 contain a remote command injection vulnerability in the heap profiler built-in service, allowing attackers to execute arbitrary OS commands.
Apache
Github
Command Injection
Brpc
-
CVE-2025-14894
CRITICAL
CVSS 9.8
Livewire Filemanager for Laravel contains an unrestricted file upload vulnerability allowing unauthenticated attackers to upload and execute arbitrary files on the server.
PHP
Laravel
RCE
Filemanager
-
CVE-2025-14237
CRITICAL
CVSS 9.8
Canon printers contain a buffer overflow in XPS font parsing that allows remote code execution through crafted print jobs with malicious font data.
Buffer Overflow
Lbp236dw Firmware
Mf654cdw Firmware
Lbp633cdw Firmware
Mf452dw Firmware
-
CVE-2025-14236
CRITICAL
CVSS 9.8
Canon Multifunction Printers have a buffer overflow in Address Book attribute tag processing that allows remote attackers to execute code by exploiting the printer's management interface.
Buffer Overflow
Mf1643if Ii Firmware
Mf1643i Ii Firmware
Mf451dw Firmware
Mf1238 Ii Firmware
-
CVE-2025-14235
CRITICAL
CVSS 9.8
Canon printers contain a buffer overflow in XPS font fpgm table processing, enabling remote code execution when processing crafted print jobs with malicious font data.
Buffer Overflow
Mf653cdw Firmware
Mf1643if Ii Firmware
Lbp632cdw Firmware
Mf652cw Firmware
-
CVE-2025-14234
CRITICAL
CVSS 9.8
Canon printers have a buffer overflow in CPCA list processing that allows remote attackers to execute arbitrary code through the printer's network protocol handler.
Buffer Overflow
Mf656cdw Firmware
Mf1643i Ii Firmware
Mf452dw Firmware
Mf652cw Firmware
-
CVE-2025-14233
CRITICAL
CVSS 9.8
Canon printers contain an invalid free vulnerability in CPCA file deletion processing that allows network-based attackers to execute arbitrary code or crash the device.
RCE
Mf452dw Firmware
Mf656cdw Firmware
Mf1238 Ii Firmware
Mf451dw Firmware
-
CVE-2025-14232
CRITICAL
CVSS 9.8
Canon printers have a buffer overflow in XML processing of XPS files that allows network-adjacent attackers to execute arbitrary code by sending crafted print jobs.
Buffer Overflow
Mf455dw Firmware
Mf653cdw Firmware
Lbp237dw Firmware
Mf452dw Firmware
-
CVE-2025-14231
CRITICAL
CVSS 9.8
Canon Small Office Multifunction Printers and Laser Printers are vulnerable to a buffer overflow in WSD print job processing that allows remote attackers to execute arbitrary code or cause denial of service.
Buffer Overflow
Lbp236dw Firmware
Lbp1238 Ii Firmware
Mf1643i Ii Firmware
Mf656cdw Firmware
-
CVE-2021-47812
CRITICAL
CVSS 9.8
GravCMS 1.10.7 allows unauthenticated remote attackers to write arbitrary YAML configuration files, leading to full server compromise through admin account creation or code execution.
PHP
Grav
-
CVE-2021-47811
CRITICAL
CVSS 9.1
Grocery Crud 1.6.4 has a SQL injection vulnerability in the order_by parameter, allowing remote attackers to read, modify, or delete database contents through crafted sort requests.
SQLi
Grocery Crud
-
CVE-2021-47798
CRITICAL
CVSS 9.8
NoteBurner 2.35 contains a buffer overflow in the license code input field that enables local attackers to crash the application or potentially execute arbitrary code by supplying an oversized activation key.
Buffer Overflow
Denial Of Service
-
CVE-2021-47796
CRITICAL
CVSS 9.8
Denver SHC-150 Smart WiFi Camera has hardcoded telnet credentials on port 23, providing unauthenticated root shell access. PoC available.
Linux
-
CVE-2021-47785
CRITICAL
CVSS 9.8
Ether MP3 CD Burner 1.3.8 has buffer overflow in registration enabling bind shell on port 3110 via SEH overwrite. PoC available.
Dns
RCE
Buffer Overflow
Ether Mp3 Cd Burner
-
CVE-2026-23742
HIGH
CVSS 8.8
Skipper versions before 0.23.0 allow authenticated users with Ingress resource creation privileges to execute arbitrary Lua scripts that read sensitive filesystem data and secrets accessible to the Skipper process. The vulnerability stems from the default -lua-sources=inline configuration enabling untrusted users to create inline Lua filters. Public exploit code exists for this high-severity vulnerability affecting Kubernetes environments running vulnerable Skipper versions.
Kubernetes
Skipper
Suse
-
CVE-2026-23723
HIGH
CVSS 7.2
SQL injection in WeGIA's Atendido_ocorrenciaControle endpoint allows authenticated attackers to manipulate the id_memorando parameter and extract entire databases, exposing sensitive personal information and potentially reading arbitrary files on misconfigured systems. Public exploit code exists for this vulnerability affecting WeGIA versions prior to 3.6.2. A patch is available in version 3.6.2 and should be deployed immediately to affected charitable institution management systems.
SQLi
Wegia
-
CVE-2026-23535
HIGH
CVSS 8.0
The wlc Weblate command-line client prior to version 1.17.2 is vulnerable to arbitrary file write attacks through path traversal when downloading multi-translations from a malicious or compromised server. An authenticated attacker can exploit this vulnerability by crafting a specially designed server response to write files to arbitrary locations on the victim's system, potentially compromising system integrity. This vulnerability affects wlc versions before 1.17.2 and is fixed in the patched version.
Path Traversal
Wlc
-
CVE-2026-23529
HIGH
CVSS 7.7
Arbitrary file read vulnerability in Kafka Connect BigQuery Connector prior to version 2.11.0 allows authenticated attackers to read sensitive files by injecting malicious credential configurations through improperly validated credential_source parameters. An attacker with connector configuration privileges can exploit this to access arbitrary files on the system or perform server-side request forgery attacks against internal endpoints. No patch is currently available for affected Apache Kafka deployments.
Apache
SSRF
-
CVE-2026-23490
HIGH
CVSS 7.5
pyasn1 is a generic ASN.1 library for Python. versions up to 0.6.2 is affected by allocation of resources without limits or throttling (CVSS 7.5).
Python
Denial Of Service
Debian Linux
Pyasn1
Redhat
-
CVE-2026-22865
HIGH
CVSS 7.4
Gradle versions before 9.3.0 fail to properly handle certain exceptions during dependency resolution, allowing attackers who control a repository to serve malicious artifacts by disrupting legitimate repository services. When transient errors occur, Gradle incorrectly continues to the next configured repository instead of disabling the failing source, enabling attackers to intercept and redirect dependency resolution to attacker-controlled repositories. This vulnerability affects Java builds using vulnerable Gradle versions and requires network-level control over a repository to exploit.
Java
Gradle
Suse
-
CVE-2026-22816
HIGH
CVSS 7.4
Gradle before version 9.3.0 fails to treat certain dependency resolution exceptions as fatal errors, allowing builds to continue using alternate repositories when encountering unresolvable hostnames. An attacker could exploit this by registering a domain matching a typo or lapsed registration to intercept and supply malicious dependencies to affected builds. This affects Java projects using vulnerable Gradle versions with multiple configured repositories.
Java
Gradle
Suse
-
CVE-2026-22782
HIGH
CVSS 7.5
RustFS versions 1.0.0-alpha.1 through 1.0.0-alpha.79 expose the shared HMAC secret in server logs when processing invalidly signed RPC requests, allowing attackers with log access to obtain authentication credentials and forge RPC calls. The vulnerability stems from improper error handling in the HTTP authentication module that logs sensitive cryptographic material. Public exploit code exists for this high-severity flaw, which is remediated in version 1.0.0-alpha.80.
Information Disclosure
Rustfs
-
CVE-2026-21625
HIGH
CVSS 8.8
Arbitrary file upload in Joomla's Easy Discuss component allows authenticated attackers to bypass file validation by spoofing extensions, since the component relies solely on extension checks without verifying MIME types. An attacker with user privileges can upload malicious files to achieve remote code execution on affected systems. No patch is currently available.
Joomla
Easydiscuss
-
CVE-2026-21223
HIGH
CVSS 7.1
Chromium-based Microsoft Edge contains a privilege management flaw that enables local authenticated users to circumvent security controls through improper access restrictions. An authorized attacker can exploit this vulnerability to gain unauthorized capabilities on the affected system, though the specific security feature being bypassed is not detailed. No patch is currently available for this high-severity issue.
Microsoft
Edge Chromium
Chrome
-
CVE-2026-20960
HIGH
CVSS 8.0
Insufficient authorization controls in Microsoft Power Apps enable authenticated attackers to achieve remote code execution through network access. An attacker with valid credentials can bypass permission checks to execute arbitrary code within the affected environment. No patch is currently available for this vulnerability.
Microsoft
Power Apps
-
CVE-2026-20759
HIGH
CVSS 8.8
Authenticated command injection in TOA Corporation TRIFORA 3 series network cameras allows low-privilege monitoring users to execute arbitrary OS commands on affected devices. The vulnerability requires valid credentials but no user interaction, making it exploitable by insiders or accounts obtained through credential compromise. No patch is currently available for this high-severity flaw affecting network infrastructure.
Command Injection
-
CVE-2026-1023
HIGH
CVSS 7.5
Gotac's Statistics Database System lacks authentication controls on query functionality, enabling unauthenticated remote attackers to directly access and retrieve sensitive database contents. With a CVSS score of 7.5, this vulnerability poses a significant confidentiality risk to organizations running affected versions, and no patch is currently available.
Industrial
Statistics Database System
-
CVE-2026-1022
HIGH
CVSS 7.5
Gotac's Statistics Database System is vulnerable to unauthenticated path traversal attacks that enable remote attackers to read arbitrary files from affected systems without authentication. The vulnerability affects industrial and statistics database deployments, allowing an attacker to download sensitive system files and potentially obtain confidential data. No patch is currently available for this high-severity vulnerability.
Industrial
Path Traversal
Statistics Database System
-
CVE-2026-1018
HIGH
CVSS 7.5
Gotac's Police Statistics Database System is vulnerable to unauthenticated arbitrary file read attacks via absolute path traversal, enabling remote attackers to download sensitive system files without authentication. The vulnerability carries high severity (CVSS 7.5) with broad network accessibility and no user interaction required. No patch is currently available, leaving affected deployments at risk until remediation is released.
Industrial
Path Traversal
Police Statistics Database System
-
CVE-2026-0975
HIGH
CVSS 7.8
Delta Electronics DIAView has Command Injection vulnerability. [CVSS 7.8 HIGH]
Industrial
Command Injection
Diaview
-
CVE-2026-0695
HIGH
CVSS 8.7
Stored cross-site scripting in ConnectWise PSA versions before 2026.1 allows authenticated users to inject malicious scripts into Time Entry notes that execute in other users' browsers when viewed in the audit trail. An attacker with legitimate access could leverage this to steal session tokens, perform unauthorized actions, or compromise other users within the PSA system. No patch is currently available.
XSS
Professional Service Automation
-
CVE-2026-0616
HIGH
CVSS 7.5
TheLibrarian's web_fetch tool can expose the Adminer interface, enabling unauthenticated remote attackers to obtain credentials for the internal backend system. This high-severity vulnerability affects AI/ML deployments and TheLibrarian installations, with no patch currently available. An attacker with network access could leverage the exposed interface to gain unauthorized administrative access to the backend infrastructure.
Information Disclosure
AI / ML
The Librarian
-
CVE-2026-0615
HIGH
CVSS 7.3
The Librarian's web_fetch tool can access the supervisord status page, exposing information about running backend processes to unauthenticated remote attackers. This information disclosure vulnerability (CVSS 7.3) affects AI/ML deployments and could enable attackers to map internal service architecture and identify targets for further exploitation. No patch is currently available for this vulnerability.
Information Disclosure
AI / ML
The Librarian
-
CVE-2026-0613
HIGH
CVSS 7.5
The Librarian's web_fetch tool can be exploited via SSRF to perform unauthorized GET requests against internal IP addresses and cloud services within the Hertzner environment, allowing attackers to conduct port scanning and reconnaissance of the infrastructure. This unauthenticated network-based attack requires no user interaction and could expose sensitive internal services and their configurations. While the vendor has released patches, exploitation remains possible on unpatched instances.
SSRF
AI / ML
The Librarian
-
CVE-2026-0612
HIGH
CVSS 7.5
The Librarian's web_fetch tool permits attackers to retrieve arbitrary external content and proxy requests through the application's infrastructure without authentication, resulting in information disclosure. This network-accessible vulnerability affects all versions of The Librarian AI/ML product and has high severity due to its ease of exploitation and potential for infrastructure abuse. A vendor patch is currently unavailable.
Information Disclosure
AI / ML
The Librarian
-
CVE-2025-71020
HIGH
CVSS 7.5
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the security parameter of the sub_4C408 function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. [CVSS 7.5 HIGH]
Stack Overflow
Denial Of Service
Ax1806 Firmware
Tenda
-
CVE-2025-70746
HIGH
CVSS 7.5
Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in the timeZone parameter of the fromSetSysTime function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. [CVSS 7.5 HIGH]
Stack Overflow
Denial Of Service
Ax1806 Firmware
Tenda
-
CVE-2025-68924
HIGH
CVSS 7.5
Umbraco Forms versions up to 8.13.16 is affected by inclusion of functionality from untrusted control sphere (CVSS 7.5).
RCE
Umbraco Forms
-
CVE-2025-68921
HIGH
CVSS 7.8
SteelSeries Nahimic 3 1.10.7 allows Directory traversal. [CVSS 7.8 HIGH]
Path Traversal
Nahimic
-
CVE-2025-68675
HIGH
CVSS 7.5
In Apache Airflow versions before 3.1.6, and 2.11.1 the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed.
Users are recommended to upgrade to 3.1.6 or later for Airflow 3, and 2.11.1 or la...
Apache
Airflow
-
CVE-2025-68438
HIGH
CVSS 7.5
In Apache Airflow versions before 3.1.6, when rendered template fields in a Dag exceed [core] max_templated_field_length, sensitive values could be exposed in cleartext in the Rendered Templates UI. [CVSS 7.5 HIGH]
Apache
Airflow
-
CVE-2025-65118
HIGH
CVSS 8.8
The vulnerability, if exploited, could allow an authenticated miscreant
(OS Standard User) to trick Process Optimization services into loading
arbitrary code and escalate privileges to OS System, potentially
resulting in complete compromise of the Model Application Server. [CVSS 8.8 HIGH]
Privilege Escalation
RCE
Process Optimization
-
CVE-2025-65117
HIGH
CVSS 7.4
The vulnerability, if exploited, could allow an authenticated miscreant
(Process Optimization Designer User) to embed OLE objects into graphics,
and escalate their privileges to the identity of a victim user who
subsequently interacts with the graphical elements. [CVSS 7.4 HIGH]
Privilege Escalation
Process Optimization
-
CVE-2025-64769
HIGH
CVSS 7.1
The Process Optimization application suite leverages connection
channels/protocols that by-default are not encrypted and could become
subject to hijacking or data leakage in certain man-in-the-middle or
passive inspection scenarios. [CVSS 7.1 HIGH]
Information Disclosure
Process Optimization
-
CVE-2025-64729
HIGH
CVSS 8.1
The vulnerability, if exploited, could allow an authenticated miscreant
(OS Standard User) to tamper with Process Optimization project files,
embed code, and escalate their privileges to the identity of a victim
user who subsequently interacts with the project files. [CVSS 8.1 HIGH]
Authentication Bypass
Process Optimization
-
CVE-2025-64691
HIGH
CVSS 8.8
The vulnerability, if exploited, could allow an authenticated miscreant
(OS standard user) to tamper with TCL Macro scripts and escalate
privileges to OS system, potentially resulting in complete compromise of
the model application server. [CVSS 8.8 HIGH]
RCE
Code Injection
Process Optimization
-
CVE-2025-62291
HIGH
CVSS 8.1
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow. [CVSS 8.1 HIGH]
Buffer Overflow
Heap Overflow
Integer Overflow
Redhat
Suse
-
CVE-2025-61943
HIGH
CVSS 8.4
The vulnerability, if exploited, could allow an authenticated miscreant
(Process Optimization Standard User) to tamper with queries in Captive
Historian and achieve code execution under SQL Server administrative
privileges, potentially resulting in complete compromise of the SQL
Server. [CVSS 8.4 HIGH]
Mssql
Process Optimization
-
CVE-2025-59870
HIGH
CVSS 7.4
HCL MyXalytics is affected by improper management of a static JWT signing secret in the web application, where the secret lacks rotation , introducing a security risk [CVSS 7.4 HIGH]
Information Disclosure
Myxalytics
-
CVE-2025-48647
HIGH
CVSS 7.8
In cpm_fwtp_msg_handler of cpm/google/lib/tracepoint/cpm_fwtp_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. [CVSS 7.8 HIGH]
Privilege Escalation
Android
Google
-
CVE-2025-31510
HIGH
CVSS 7.2
In the portal in LemonLDAP::NG before 2.21.0, cross-site scripting (XSS) allows remote attackers to inject arbitrary web script or HTML (into the login page) via the tab parameter, for Choice authentication. [CVSS 7.2 HIGH]
Ldap
XSS
-
CVE-2025-24528
HIGH
CVSS 7.1
In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash. [CVSS 7.1 HIGH]
Integer Overflow
Denial Of Service
Redhat
Suse
-
CVE-2025-15032
HIGH
CVSS 7.4
blank indicator in custom-sized new windows in Dia versions up to 1.9.0 is affected by improper restriction of rendered ui layers or frames (CVSS 7.4).
Windows
macOS
-
CVE-2025-14844
HIGH
CVSS 8.2
Restrict Content versions up to 3.2.16 is affected by authorization bypass through user-controlled key (CVSS 8.2).
WordPress
Restrict Content
PHP
-
CVE-2025-14510
HIGH
CVSS 8.1
Incorrect Implementation of Authentication Algorithm vulnerability in ABB ABB Ability OPTIMAX.This issue affects ABB Ability OPTIMAX: 6.1, 6.2, from 6.3.0 before 6.3.1-251120, from 6.4.0 before 6.4.1-251120. [CVSS 8.1 HIGH]
Information Disclosure
-
CVE-2025-12957
HIGH
CVSS 8.8
All-in-One Video Gallery (WordPress plugin) versions up to 4.5.7. is affected by unrestricted upload of file with dangerous type (CVSS 8.8).
WordPress
RCE
PHP
-
CVE-2025-12007
HIGH
CVSS 8.4
There is a vulnerability in the Supermicro BMC firmware validation logic at Supermicro MBD-X13SEM-F . An attacker can update the system firmware with a specially crafted image. [CVSS 8.4 HIGH]
Information Disclosure
-
CVE-2025-12006
HIGH
CVSS 7.2
There is a vulnerability in the Supermicro BMC firmware validation logic at Supermicro MBD-X12STW-F . An attacker can update the system firmware with a specially crafted image. [CVSS 7.2 HIGH]
Information Disclosure
-
CVE-2024-44238
HIGH
CVSS 7.8
The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. [CVSS 7.8 HIGH]
Apple
Buffer Overflow
-
CVE-2021-47847
HIGH
CVSS 7.8
its binary path configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2021-47845
HIGH
CVSS 7.8
its Windows service configurations contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Windows
-
CVE-2021-47842
HIGH
CVSS 7.2
StudyMD 0.3.2 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into markdown files. [CVSS 7.2 HIGH]
RCE
XSS
-
CVE-2021-47840
HIGH
CVSS 7.2
Moeditor 0.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. [CVSS 7.2 HIGH]
RCE
XSS
-
CVE-2021-47839
HIGH
CVSS 7.2
Marky 0.0.1 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into markdown files. Attackers can upload crafted markdown files with embedded JavaScript payloads that execute when the file is opened, potentially enabling remote code execution. [CVSS 7.2 HIGH]
RCE
XSS
Redhat
-
CVE-2021-47838
HIGH
CVSS 7.2
Markright 1.0 contains a persistent cross-site scripting vulnerability that allows attackers to embed malicious payloads in markdown files. [CVSS 7.2 HIGH]
RCE
XSS
-
CVE-2021-47837
HIGH
CVSS 7.2
Markdownify 1.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. Attackers can upload crafted markdown files with embedded scripts that execute when the file is opened, potentially enabling remote code execution. [CVSS 7.2 HIGH]
RCE
XSS
-
CVE-2021-47835
HIGH
CVSS 7.2
Freeter 1.2.1 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads in custom widget titles and files. [CVSS 7.2 HIGH]
RCE
XSS
-
CVE-2021-47833
HIGH
CVSS 7.8
its WifiHotSpotService.exe contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Code Injection
-
CVE-2021-47831
HIGH
CVSS 7.5
Sandboxie 5.49.7 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the container folder input field. Attackers can paste a large buffer of repeated characters into the Sandbox container folder setting to trigger an application crash. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2021-47829
HIGH
CVSS 7.8
its service configuration contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Code Injection
-
CVE-2021-47828
HIGH
CVSS 7.8
BOOTP Turbo 2.0.0.1253 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to execute arbitrary code with elevated LocalSystem privileges during system startup or reboot. [CVSS 7.8 HIGH]
Windows
-
CVE-2021-47827
HIGH
CVSS 7.5
mashREPL tool contains a vulnerability that allows attackers to crash the application by pasting malformed input (CVSS 7.5).
Denial Of Service
-
CVE-2021-47826
HIGH
CVSS 7.8
NTI IScheduleSvc service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2021-47825
HIGH
CVSS 7.8
Acer Updater Service 1.2.3500.0 contains an unquoted service path vulnerability that allows local users to execute code with elevated system privileges. [CVSS 7.8 HIGH]
Code Injection
-
CVE-2021-47824
HIGH
CVSS 7.5
iDailyDiary 4.30 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the preferences tab name field. Attackers can paste a 2,000,000 character buffer into the default diary tab name to trigger an application crash. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2021-47823
HIGH
CVSS 7.8
Acer ePowerSvc 6.0.3008.0 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges. [CVSS 7.8 HIGH]
Code Injection
-
CVE-2021-47822
HIGH
CVSS 7.8
its binary path configuration contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Information Disclosure
-
CVE-2021-47821
HIGH
CVSS 7.5
RarmaRadio 2.72.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing network configuration fields with large character buffers. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2021-47818
HIGH
CVSS 7.5
DupTerminator 1.4.5639.37199 contains a denial of service vulnerability that allows attackers to crash the application by inputting a long character string in the Excluded text box. Attackers can generate a payload of 8000 repeated characters to trigger the application to stop working on Windows 10. [CVSS 7.5 HIGH]
Windows
Denial Of Service
-
CVE-2021-47816
HIGH
CVSS 8.8
Thecus N4800Eco NAS Server Control Panel contains a command injection vulnerability that allows authenticated attackers to execute arbitrary system commands through user management endpoints. [CVSS 8.8 HIGH]
Command Injection
-
CVE-2021-47815
HIGH
CVSS 7.5
Nsauditor 3.2.3 contains a denial of service vulnerability in the registration code input field that allows attackers to crash the application. Attackers can paste a large buffer of 256 repeated characters into the 'Key' field to trigger an application crash. [CVSS 7.5 HIGH]
Denial Of Service
Nsauditor
-
CVE-2021-47814
HIGH
CVSS 7.5
NBMonitor 1.6.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the registration code input field. Attackers can paste a 256-character buffer into the registration key field to trigger an application crash and potential system instability. [CVSS 7.5 HIGH]
Denial Of Service
Nbmonitor
-
CVE-2021-47813
HIGH
CVSS 7.5
Backup Key Recovery 2.2.7 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the registration code input field. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2021-47810
HIGH
CVSS 7.8
Wibukey versions up to 6.51 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
Wibukey
-
CVE-2021-47809
HIGH
CVSS 7.8
Disk Sorter versions up to 13.6.12 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Disk Sorter
-
CVE-2021-47807
HIGH
CVSS 7.8
Sync Breeze versions up to 13.6.18 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Sync Breeze
-
CVE-2021-47806
HIGH
CVSS 7.8
Dup Scout versions up to 13.5.28 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Dup Scout
-
CVE-2021-47805
HIGH
CVSS 7.8
Disksavvy versions up to 13.6.14 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Disksavvy
-
CVE-2021-47804
HIGH
CVSS 7.8
Wise Care 365 5.6.7.568 contains an unquoted service path vulnerability in the WiseBootAssistant service running with LocalSystem privileges. [CVSS 7.8 HIGH]
Information Disclosure
-
CVE-2021-47803
HIGH
CVSS 7.8
Apple Mobile Device Service contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
-
CVE-2021-47801
HIGH
CVSS 8.2
Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests. [CVSS 8.2 HIGH]
SQLi
-
CVE-2021-47797
HIGH
CVSS 7.5
Leawo Prof. Media 11.0.0.1 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized payload in the activation keycode field. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2021-47794
HIGH
CVSS 8.8
ZesleCP 3.1.9 contains an authenticated remote code execution vulnerability that allows attackers to create malicious FTP accounts with shell injection payloads. [CVSS 8.8 HIGH]
RCE
Zeslecp
-
CVE-2021-47793
HIGH
CVSS 7.5
Telegram Desktop versions up to 2.9.2 is affected by allocation of resources without limits or throttling (CVSS 7.5).
Denial Of Service
Telegram Desktop
-
CVE-2021-47792
HIGH
CVSS 7.8
Remote Mouse versions up to 3.008 contains a vulnerability that allows attackers to execute arbitrary code with elevated system privileges (CVSS 7.8).
RCE
Remote Mouse
-
CVE-2021-47791
HIGH
CVSS 7.5
Smartftp versions up to 10.0.2909.0 is affected by allocation of resources without limits or throttling (CVSS 7.5).
Denial Of Service
Smartftp
-
CVE-2021-47790
HIGH
CVSS 7.8
Active Webcam versions up to 11.5 contains a vulnerability that allows attackers to execute arbitrary code with elevated system privileges (CVSS 7.8).
RCE
Active Webcam
-
CVE-2021-47789
HIGH
CVSS 7.5
Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash. [CVSS 7.5 HIGH]
Linux
Denial Of Service
Yms 3029 Firmware
-
CVE-2021-47788
HIGH
CVSS 8.8
Websitebaker versions up to 2.13.0 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).
RCE
Websitebaker
-
CVE-2021-47787
HIGH
CVSS 7.8
TotalAV 5.15.69 contains an unquoted service path vulnerability in multiple system services running with LocalSystem privileges. Attackers can place malicious executables in specific unquoted path segments to potentially gain SYSTEM-level access by exploiting the service path configuration. [CVSS 7.8 HIGH]
Information Disclosure
Totalav
-
CVE-2021-47786
HIGH
CVSS 7.5
Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver. [CVSS 7.5 HIGH]
Linux
Denial Of Service
M725 Lit Firmware
M801p Rgb Firmware
Bm 4091 Firmware
-
CVE-2021-47782
HIGH
CVSS 8.2
Odine Solutions GateKeeper 1.0 contains a SQL injection vulnerability in the trafficCycle API endpoint that allows remote attackers to inject malicious database queries. [CVSS 8.2 HIGH]
PostgreSQL
SQLi
-
CVE-2021-47780
HIGH
CVSS 7.8
Macro Expert versions up to 4.7 contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated system privileges (CVSS 7.8).
RCE
Macro Expert
-
CVE-2021-47756
HIGH
CVSS 8.4
Laravel Valet versions 1.1.4 to 2.0.3 contain a local privilege escalation vulnerability that allows users to modify the valet command with root privileges. Attackers can edit the symlinked valet command to execute arbitrary code with root permissions without additional authentication. [CVSS 8.4 HIGH]
Laravel
Privilege Escalation
-
CVE-2020-36930
HIGH
CVSS 7.8
Sysgauge versions up to 7.9.18 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
Sysgauge
-
CVE-2020-36929
HIGH
CVSS 7.8
Brprint Auditor versions up to 3.0.7 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Brprint Auditor
-
CVE-2020-36928
HIGH
CVSS 7.8
Brother BRAgent 1.38 contains an unquoted service path vulnerability in the WBA_Agent_Client service running with LocalSystem privileges. Attackers can exploit the unquoted path in C:\Program Files (x86)\Brother\BRAgent\ to inject and execute malicious code with elevated system permissions. [CVSS 7.8 HIGH]
Code Injection
Bragent
-
CVE-2020-36927
HIGH
CVSS 7.8
Diskpulse versions up to 13.6.14 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Diskpulse
-
CVE-2020-36926
HIGH
CVSS 7.5
SmarterTrack 7922 contains an information disclosure vulnerability in the Chat Management search form that reveals agent identification details. [CVSS 7.5 HIGH]
Information Disclosure
Smartertrack
-
CVE-2026-23769
MEDIUM
CVSS 6.1
lucy-xss-filter before commit e5826c0 contains a cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript in users' browsers through improper input sanitization caused by misconfigured default filter rules. The vulnerability requires user interaction to trigger and affects the confidentiality and integrity of web applications relying on this filter. A patch is available to address the misconfigured rule set.
XSS
Lucy Xss Filter
-
CVE-2026-23768
MEDIUM
CVSS 6.1
Lucy XSS Filter with ObjectSecurityListener or EmbedSecurityListener enabled is vulnerable to server-side request forgery (SSRF) via malformed embed or object tags lacking file extensions in src attributes, allowing remote attackers to trigger arbitrary HEAD requests to internal or external URLs. Public exploit code exists for this vulnerability, and no patch is currently available.
SSRF
XSS
Lucy Xss Filter
-
CVE-2026-23745
MEDIUM
CVSS 6.1
node-tar versions 7.5.2 and earlier fail to properly sanitize link paths in tar archives when the default secure mode is enabled, allowing attackers to extract files outside the intended directory through malicious hardlinks and symlinks. Public exploit code exists for this vulnerability, which affects Node.js applications and related products including D-Link and Tar utilities. An attacker can overwrite arbitrary files or conduct symlink poisoning attacks on affected systems.
D-Link
Node.js
Tar
Redhat
Suse
-
CVE-2026-23731
MEDIUM
CVSS 4.3
WeGIA prior to version 3.6.2 lacks framing protection headers (X-Frame-Options and Content-Security-Policy), allowing attackers to perform clickjacking attacks by embedding the application within malicious web pages to trick users into unintended actions. Public exploit code exists for this vulnerability, affecting charitable institutions using vulnerable versions of the web manager.
XSS
Wegia
-
CVE-2026-23730
MEDIUM
CVSS 6.1
WeGIA charitable institution management software versions prior to 3.6.2 contain an open redirect vulnerability in the control.php endpoint that fails to validate the nextPage parameter, allowing unauthenticated attackers to redirect users to arbitrary external sites for phishing and credential theft. Public exploit code exists for this vulnerability. The flaw is resolved in version 3.6.2 and later.
PHP
Open Redirect
Wegia
-
CVE-2026-23729
MEDIUM
CVSS 6.1
WeGIA charitable institution management software versions prior to 3.6.2 contain an open redirect vulnerability in the control.php endpoint that fails to validate the nextPage parameter, allowing attackers to redirect authenticated users to malicious external sites. Public exploit code exists for this vulnerability, which can be leveraged for phishing, credential harvesting, and malware distribution attacks while maintaining the appearance of a trusted WeGIA domain. The vulnerability is resolved in WeGIA 3.6.2 and later versions.
PHP
Open Redirect
Wegia
-
CVE-2026-23728
MEDIUM
CVSS 6.1
WeGIA versions prior to 3.6.2 contain an open redirect vulnerability in the control.php endpoint that fails to properly validate the nextPage parameter, allowing attackers to redirect authenticated users to malicious external sites. Public exploit code exists for this vulnerability, enabling attackers to conduct phishing campaigns and credential harvesting attacks while leveraging the trust associated with the legitimate WeGIA domain. Update to version 3.6.2 or later to remediate this issue.
PHP
Open Redirect
Wegia
-
CVE-2026-23727
MEDIUM
CVSS 6.1
WeGIA versions prior to 3.6.2 contain an open redirect vulnerability in the control.php endpoint that fails to validate the nextPage parameter, allowing unauthenticated attackers to redirect users to arbitrary external websites. Public exploit code exists for this vulnerability, which can be leveraged for phishing, credential harvesting, and malware distribution attacks that abuse the trusted WeGIA domain. The vulnerability is resolved in version 3.6.2.
PHP
Open Redirect
Wegia
-
CVE-2026-23726
MEDIUM
CVSS 6.1
WeGIA prior to version 3.6.2 contains an open redirect vulnerability in the control.php endpoint that fails to validate the nextPage parameter, allowing attackers to craft malicious links redirecting users to arbitrary external sites for phishing and credential theft. Public exploit code exists for this vulnerability, which affects all users who click attacker-controlled links within the application. The vulnerability is resolved in version 3.6.2.
PHP
Open Redirect
Wegia
-
CVE-2026-23725
MEDIUM
CVSS 5.4
Stored XSS in WeGIA before version 3.6.2 allows authenticated users to inject malicious scripts into adopter information fields that execute in the browsers of all visitors to the affected pages. Public exploit code exists for this vulnerability, which impacts the html/pet/adotantes/cadastro_adotante.php and informacao_adotantes.php endpoints. Organizations should upgrade to version 3.6.2 or later to mitigate the risk of persistent JavaScript injection attacks.
PHP
XSS
Wegia
-
CVE-2026-23724
MEDIUM
CVSS 4.3
Stored XSS in WeGIA's attendance incident form allows authenticated attackers to inject malicious scripts through unsanitized dropdown fields, affecting versions prior to 3.6.2. An attacker with login credentials can craft payloads that execute in other users' browsers when they view the affected page. Public exploit code exists for this vulnerability, and a patch is available in version 3.6.2 and later.
PHP
XSS
Wegia
-
CVE-2026-23645
MEDIUM
CVSS 6.1
SiYuan prior to version 3.5.4-dev2 fails to sanitize SVG file uploads, allowing authenticated attackers to embed malicious JavaScript that executes when other users view the files. Public exploit code exists for this stored XSS vulnerability, which can compromise user sessions and access sensitive knowledge management data. The vulnerability affects self-hosted instances where users can upload SVG content from untrusted sources.
XSS
Siyuan
Suse
-
CVE-2026-23643
MEDIUM
CVSS 5.4
CakePHP versions prior to 5.2.12 and 5.3.1 contain a stored cross-site scripting vulnerability in the PaginatorHelper::limitControl() method that allows unauthenticated attackers to inject malicious scripts through query string parameters. An attacker can exploit this to steal session cookies, perform unauthorized actions, or redirect users to malicious sites. The vulnerability requires user interaction to trigger but affects all installations using the vulnerable PaginatorHelper component.
Redhat
Cakephp
-
CVE-2026-23528
MEDIUM
CVSS 6.1
Dask distributed is a distributed task scheduler for Dask. [CVSS 6.1 MEDIUM]
Linux
Python
AI / ML
Dask
-
CVE-2026-22876
MEDIUM
CVSS 6.5
TOA Corporation TRIFORA 3 series network cameras contain a path traversal vulnerability that allows authenticated users with monitoring privileges or higher to read arbitrary files from the device. An attacker with valid credentials can exploit this flaw to access sensitive information stored on the affected cameras. No patch is currently available for this vulnerability.
Path Traversal
-
CVE-2026-21624
MEDIUM
CVSS 5.4
Insufficient input validation in the Easy Discuss component for Joomla allows authenticated users to inject persistent cross-site scripting (XSS) payloads through user avatar text fields. An attacker with valid credentials can exploit this to execute malicious scripts in the browsers of other users viewing affected content. The vulnerability affects Joomla installations using the vulnerable Easy Discuss component, with no patch currently available.
Joomla
XSS
Easydiscuss
-
CVE-2026-21623
MEDIUM
CVSS 5.4
Stored cross-site scripting in Joomla's Easy Discuss component allows authenticated users to inject malicious scripts into forum posts due to insufficient input validation. An attacker with login credentials can execute arbitrary JavaScript in the browsers of other users viewing affected posts, potentially leading to session hijacking or credential theft. No patch is currently available for this vulnerability.
Joomla
XSS
Easydiscuss
-
CVE-2026-20894
MEDIUM
CVSS 4.8
Stored XSS in TOA Corporation TRIFORA 3 network cameras allows authenticated administrators to inject malicious scripts through configuration settings that execute in other administrators' browsers when accessing the settings interface. An attacker with administrative privileges could exploit this to compromise other admin sessions and potentially gain unauthorized access to camera management functions. No patch is currently available for this medium-severity vulnerability.
XSS
-
CVE-2026-1020
MEDIUM
CVSS 5.3
Gotac's Police Statistics Database System contains a path traversal vulnerability that enables unauthenticated remote attackers to enumerate system directories and access sensitive files. The flaw affects industrial and law enforcement deployments with network accessibility, potentially exposing confidential database contents and system architecture details. No patch is currently available for this medium-severity vulnerability.
Industrial
Path Traversal
Police Statistics Database System
-
CVE-2026-1011
MEDIUM
CVSS 6.1
Stored XSS in Altium Live's Support Center AddComment endpoint allows attackers to inject malicious JavaScript that persists and executes when support staff or other users view affected support cases. The vulnerability stems from inadequate server-side input validation that bypasses client-side HTML escaping, enabling attackers to compromise elevated-privilege support accounts through victim browser execution. No patch is currently available.
XSS
Altium Live
-
CVE-2026-1004
MEDIUM
CVSS 5.3
Essential Addons for Elementor (WordPress plugin) versions up to 6.5.5 is affected by missing authorization (CVSS 5.3).
WordPress
Information Disclosure
-
CVE-2026-1003
MEDIUM
CVSS 4.3
Unauthorized post deletion in GetGenie for WordPress (versions up to 4.3.0) allows authenticated users with Author-level permissions or higher to delete any post on a site, regardless of authorship, due to insufficient authorization checks. Attackers with basic authenticated access can exploit this to remove content authored by other users without proper privilege verification. No patch is currently available.
WordPress
-
CVE-2026-1000
MEDIUM
CVSS 6.5
The MailerLite WooCommerce integration plugin for WordPress fails to validate user permissions in its resetIntegration() function, allowing authenticated users with Subscriber-level access to delete critical plugin data including customer cart records and sync histories. Attackers can reset integration settings and drop associated database tables, resulting in complete loss of operational data without administrative authorization. No patch is currently available for versions up to 3.1.3.
WordPress
-
CVE-2026-0949
MEDIUM
CVSS 6.5
Postgres Enterprise Manager versions up to 9.8.1 is affected by cross-site scripting (xss) (CVSS 6.5).
XSS
Postgres Enterprise Manager
-
CVE-2026-0942
MEDIUM
CVSS 5.3
The Rede Itaú for WooCommerce plugin versions up to 5.1.2 lack proper authentication controls on the clearOrderLogs() function, allowing unauthenticated attackers to remotely delete order log metadata from WooCommerce installations. This missing capability check enables data tampering on affected WordPress sites without requiring user credentials. No patch is currently available for this vulnerability.
WordPress
Authentication Bypass
-
CVE-2026-0939
MEDIUM
CVSS 5.3
Rede Itaú for WooCommerce (WordPress plugin) versions up to 5.1.2. is affected by insufficient verification of data authenticity (CVSS 5.3).
WordPress
Information Disclosure
-
CVE-2026-0916
MEDIUM
CVSS 6.4
Stored XSS in the Related Posts by Taxonomy WordPress plugin through version 2.7.6 allows contributors and higher-privileged authenticated users to inject malicious scripts into shortcode attributes that execute in other users' browsers. The vulnerability stems from inadequate input sanitization and output escaping, enabling attackers to compromise page content viewed by site visitors. No patch is currently available.
WordPress
XSS
-
CVE-2026-0913
MEDIUM
CVSS 6.4
Stored cross-site scripting in the User Submitted Posts WordPress plugin through version 20260110 allows authenticated Contributor-level users to inject malicious scripts via the 'usp_access' shortcode due to inadequate input sanitization. When other users visit pages containing the injected payload, the attacker's JavaScript executes in their browsers, potentially enabling session hijacking or unauthorized actions. No patch is currently available to remediate this vulnerability.
WordPress
XSS
-
CVE-2026-0858
MEDIUM
CVSS 6.1
PlantUML versions before 1.2026.0 fail to properly sanitize interactive attributes in GraphViz diagrams, allowing attackers to inject malicious JavaScript into SVG output through crafted diagram files. Applications that render these SVGs are vulnerable to arbitrary script execution within the user's browser context. A patch is available to address this stored XSS vulnerability.
XSS
Plantuml
Redhat
Suse
-
CVE-2026-0696
MEDIUM
CVSS 6.5
Professional Service Automation contains a vulnerability that allows attackers to client-side scripts access to session cookie values (CVSS 6.5).
Information Disclosure
Professional Service Automation
-
CVE-2025-69581
MEDIUM
CVSS 5.5
An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. [CVSS 5.5 MEDIUM]
Information Disclosure
Chamilo Lms
-
CVE-2025-56451
MEDIUM
CVSS 6.1
A8\+ Collaborative Management versions up to 7.0 is affected by cross-site scripting (xss) (CVSS 6.1).
XSS
-
CVE-2025-51602
MEDIUM
CVSS 4.8
mmstu.c in VideoLAN VLC media player versions up to 3.0.22 is affected by out-of-bounds read (CVSS 4.8).
Denial Of Service
Information Disclosure
Buffer Overflow
Suse
-
CVE-2025-43904
MEDIUM
CVSS 4.2
In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting system can allow a Coordinator to promote a user to Administrator. [CVSS 4.2 MEDIUM]
Authentication Bypass
Suse
-
CVE-2025-43508
MEDIUM
CVSS 5.5
Macos versions up to 26.0 is affected by insertion of sensitive information into log file (CVSS 5.5).
Apple
macOS
-
CVE-2025-24531
MEDIUM
CVSS 6.7
In OpenSC pam_pkcs11 before 0.6.13, pam_sm_authenticate() wrongly returns PAM_IGNORE in many error situations (such as an error triggered by a smartcard before login), allowing authentication bypass. [CVSS 6.7 MEDIUM]
Authentication Bypass
Redhat
Suse
-
CVE-2025-24089
MEDIUM
CVSS 5.3
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.3 and iPadOS 18.3. [CVSS 5.3 MEDIUM]
Apple
iOS
Iphone Os
Ipados
-
CVE-2025-15529
MEDIUM
CVSS 5.3
A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. [CVSS 5.3 MEDIUM]
Denial Of Service
Open5gs
-
CVE-2025-15528
MEDIUM
CVSS 5.3
A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. [CVSS 5.3 MEDIUM]
Denial Of Service
Open5gs
-
CVE-2025-15527
MEDIUM
CVSS 4.3
WP Recipe Maker (WordPress plugin) versions up to 10.2.2 is affected by information exposure (CVSS 4.3).
WordPress
Information Disclosure
-
CVE-2025-15526
MEDIUM
CVSS 5.3
The Fancy Product Designer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 6.4.8. This is due to improper error handling in the PDF upload functionality that exposes server filesystem paths and stack traces in error messages. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulner...
WordPress
PHP
-
CVE-2025-15370
MEDIUM
CVSS 4.3
and Prevents Security Breache versions up to 21.0.9 is affected by authorization bypass through user-controlled key (CVSS 4.3).
WordPress
PHP
-
CVE-2025-15104
MEDIUM
CVSS 5.3
Nu Html Checker (validator.nu) contains a restriction bypass that allows remote attackers to make the server perform arbitrary HTTP/HTTPS requests to internal resources, including localhost services. [CVSS 5.3 MEDIUM]
Dns
Validator
-
CVE-2025-14982
MEDIUM
CVSS 4.3
The Booking Calendar plugin for WordPress is vulnerable to Missing Authorization leading to Sensitive Information Exposure in all versions up to, and including, 10.14.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view all booking records in the database, including personally identifiable information (PII) such as names, email addresses, phone numbers, physical addresses, payment status, booking costs, and booking hashes belonging to other u...
WordPress
Information Disclosure
PHP
-
CVE-2025-14853
MEDIUM
CVSS 4.3
LEAV Last Email Address Validator (WordPress plugin) is affected by cross-site request forgery (csrf) (CVSS 4.3).
WordPress
CSRF
PHP
-
CVE-2025-14793
MEDIUM
CVSS 5.0
The DK PDF - WordPress PDF Generator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.3.0 via the 'addContentToMpdf' function. [CVSS 5.0 MEDIUM]
WordPress
SSRF
-
CVE-2025-14757
MEDIUM
CVSS 5.3
The Cost Calculator Builder plugin for WordPress is vulnerable to Unauthenticated Payment Status Bypass in all versions up to, and including, 3.6.9 only when used in combination with Cost Calculator Builder PRO. This is due to the complete_payment AJAX action being registered via wp_ajax_nopriv, making it accessible to unauthenticated users, and the complete() function only verifying a nonce without checking user capabilities or order ownership. Since nonces are exposed to all visitors via wi...
WordPress
Cost Calculator Builder
PHP
-
CVE-2025-14435
MEDIUM
CVSS 6.8
Mattermost versions 10.11.x <= 10.11.8, 11.1.x <= 11.1.1, 11.0.x <= 11.0.6 fail to prevent infinite re-renders on API errors which allows authenticated users to cause application-level DoS via triggering unbounded component re-render loops. [CVSS 6.8 MEDIUM]
Denial Of Service
Mattermost Server
Suse
-
CVE-2025-14384
MEDIUM
CVSS 4.3
The All in One SEO - Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/aioseo/v1/ai/credits` REST route in all versions up to, and including, 4.9.2. [CVSS 4.3 MEDIUM]
WordPress
AI / ML
PHP
-
CVE-2025-14375
MEDIUM
CVSS 6.1
The RSS Aggregator - RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘className’ parameter in all versions up to, and including, 5.0.10 due to insufficient input sanitization and output escaping. [CVSS 6.1 MEDIUM]
WordPress
XSS
PHP
-
CVE-2025-12641
MEDIUM
CVSS 6.5
The Awesome Support - WordPress HelpDesk & Support Plugin for WordPress is vulnerable to authorization bypass due to missing capability checks in all versions up to, and including, 6.3.6. [CVSS 6.5 MEDIUM]
WordPress
PHP
-
CVE-2021-47844
MEDIUM
CVSS 6.1
Xmind 2020 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into mind mapping files or custom headers. [CVSS 6.1 MEDIUM]
RCE
XSS
-
CVE-2021-47841
MEDIUM
CVSS 6.1
SnipCommand 0.1.0 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into command snippets. Attackers can execute arbitrary code by embedding malicious JavaScript that triggers remote command execution through file or title inputs. [CVSS 6.1 MEDIUM]
XSS
-
CVE-2021-47836
MEDIUM
CVSS 6.1
Markdown Explorer 0.1.1 contains a cross-site scripting vulnerability that allows attackers to inject malicious code through file uploads and editor inputs. Attackers can upload markdown files with embedded JavaScript payloads to execute remote commands and potentially gain system access. [CVSS 6.1 MEDIUM]
XSS
-
CVE-2021-47834
MEDIUM
CVSS 6.4
Schlix CMS 2.2.6-6 contains a persistent cross-site scripting vulnerability that allows authenticated users to inject malicious scripts into category titles. Attackers can create a new contact category with a script payload that will execute when the page is viewed by other users. [CVSS 6.4 MEDIUM]
XSS
-
CVE-2021-47820
MEDIUM
CVSS 5.3
Ubee EVW327 contains a cross-site request forgery vulnerability that allows attackers to enable remote access without user interaction. Attackers can craft a malicious webpage that automatically submits a form to change router remote access settings to port 8080 without the user's consent. [CVSS 5.3 MEDIUM]
CSRF
-
CVE-2021-47808
MEDIUM
CVSS 5.4
Cotonti Siena 0.9.19 contains a stored cross-site scripting vulnerability in the admin configuration panel's site title parameter. Attackers can inject malicious JavaScript code through the 'maintitle' parameter to execute scripts when administrators view the page. [CVSS 5.4 MEDIUM]
XSS
Cotonti Siena
-
CVE-2021-47800
MEDIUM
CVSS 5.3
b2evolution 7.2.2 contains a cross-site request forgery vulnerability that allows attackers to modify admin account details without authentication. Attackers can craft a malicious HTML form to submit unauthorized changes to user profiles by tricking victims into loading a specially crafted webpage. [CVSS 5.3 MEDIUM]
CSRF
-
CVE-2021-47795
MEDIUM
CVSS 6.2
GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. [CVSS 6.2 MEDIUM]
RCE
XSS
Lfi
Path Traversal
-
CVE-2021-47783
MEDIUM
CVSS 5.4
Phpwcms versions up to 1.9.30 is affected by unrestricted upload of file with dangerous type (CVSS 5.4).
XSS
Phpwcms
-
CVE-2021-47779
MEDIUM
CVSS 5.4
Dolibarr ERP-CRM 14.0.2 contains a stored cross-site scripting vulnerability in the ticket creation module that allows low-privilege users to inject malicious scripts. [CVSS 5.4 MEDIUM]
XSS
Privilege Escalation
-
CVE-2026-23735
None
testable and extendable modules out of your GraphQL server. From 2.2.1 to versions up to 2.4.1 is affected by race condition.
Race Condition
-
CVE-2026-23634
NONE
Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors.
Kubernetes
-
CVE-2026-0629
None
Authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state.
Authentication Bypass
-
CVE-2025-61873
LOW
CVSS 2.6
Best Practical Request Tracker (RT) before 4.4.9, 5.0.9, and 6.0.2 allows CSV Injection via ticket values when TSV export is used. [CVSS 2.6 LOW]
Code Injection
-
CVE-2025-31186
LOW
CVSS 3.3
A permissions issue was addressed with additional restrictions. This issue is fixed in Xcode 16.3. [CVSS 3.3 LOW]
Apple
Authentication Bypass
-
CVE-2025-29943
None
Write what were condition within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest.
Information Disclosure
-
CVE-2025-24090
LOW
CVSS 3.3
A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.3 and iPadOS 18.3. [CVSS 3.3 LOW]
Apple
iOS
-
CVE-2025-14822
LOW
CVSS 3.1
Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens [CVSS 3.1 LOW]
Information Disclosure
-
CVE-2025-5489
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2025-5102
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2024-54556
LOW
CVSS 2.4
This issue was addressed through improved state management. This issue is fixed in iOS 18.1 and iPadOS 18.1. [CVSS 2.4 LOW]
Apple
iOS
-
CVE-2024-44210
LOW
CVSS 3.3
This issue was addressed with improved permissions checking. This issue is fixed in macOS Sequoia 15.1. [CVSS 3.3 LOW]
Apple
macOS
-
CVE-2024-8506
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2024-8491
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.
Information Disclosure
-
CVE-2019-25297
None
Quiz Maker Plugin by Opinion Stage Wordpre versions up to 19.6.25 is affected by cross-site scripting (xss).
WordPress
XSS
-
CVE-2012-10064
None
Omni Secure File versions up to 0.1.14 is affected by unrestricted upload of file with dangerous type.
WordPress
PHP
RCE