189 CVEs tracked today. 27 Critical, 74 High, 43 Medium, 4 Low.
-
CVE-2026-24858
CRITICAL
CVSS 9.8
Fortinet FortiAnalyzer and FortiManager contain a critical authentication bypass vulnerability (CVE-2026-24858, CVSS 9.8) that allows unauthenticated remote attackers to gain administrative access through an alternate authentication path. With EPSS 2.8% but KEV listing confirming active exploitation, this vulnerability threatens the security management infrastructure that organizations rely on to protect their networks.
Fortinet
Fortigate
Authentication Bypass
Fortiweb
Fortianalyzer
-
CVE-2026-24874
CRITICAL
CVSS 9.1
xray-monolith game mod has a type confusion vulnerability.
Buffer Overflow
-
CVE-2026-24872
CRITICAL
CVSS 9.8
SkyFire game server has improper pointer arithmetic enabling memory corruption.
Information Disclosure
-
CVE-2026-24832
CRITICAL
CVSS 9.8
ixray-1.6-stcop game engine has an OOB write vulnerability.
Buffer Overflow
Ix Ray Engine 1.6
-
CVE-2026-24830
CRITICAL
CVSS 9.8
IronOS soldering iron firmware has an integer overflow vulnerability that could cause unexpected behavior in temperature control.
Integer Overflow
-
CVE-2026-24811
CRITICAL
CVSS 9.8
ROOT data analysis framework has an input validation vulnerability in zlib modules enabling code execution through crafted data files.
Code Injection
Root
-
CVE-2026-24793
CRITICAL
CVSS 9.8
A product has an out-of-bounds write from classic buffer overflow enabling remote code execution.
Buffer Overflow
Azerothcore
-
CVE-2026-24770
CRITICAL
CVSS 9.8
Path traversal vulnerability in RAGFlow RAG engine version 0.23.1 allows unauthenticated attackers to read arbitrary files from the server filesystem. PoC available, patch available.
RCE
AI / ML
Ragflow
-
CVE-2026-24740
CRITICAL
CVSS 9.9
Critical access control flaw in Dozzle Docker log viewer allows users restricted by label filters to escape their scope and obtain an interactive root shell on out-of-scope containers. PoC available, patch in v9.0.3.
Docker
Dozzle
Suse
-
CVE-2026-24736
CRITICAL
CVSS 9.1
Server-Side Request Forgery (SSRF) vulnerability in Squidex CMS webhook configuration allows authenticated administrators to make requests to internal services by specifying localhost or internal IP addresses as webhook destinations. PoC available.
SSRF
Squidex
-
CVE-2026-24479
CRITICAL
CVSS 9.8
HUSTOJ online judge has a path traversal vulnerability enabling arbitrary file access on the competition server.
Linux
PHP
MySQL
RCE
Path Traversal
-
CVE-2026-24346
CRITICAL
CVSS 9.1
EZCast Pro II v1.17478.146 uses well-known default credentials in the Admin UI enabling immediate administrative access to the wireless presentation system.
Authentication Bypass
Ezcast Pro Dongle Ii Firmware
-
CVE-2026-22039
CRITICAL
CVSS 9.9
Kyverno Kubernetes policy engine prior to 1.x has a privilege escalation vulnerability (CVSS 9.9) allowing policy bypass and unauthorized cluster operations.
Kubernetes
Kyverno
Suse
-
CVE-2026-1470
CRITICAL
CVSS 9.9
n8n has a fifth critical RCE vulnerability (CVSS 9.9) in the Expression evaluator, enabling code execution through crafted workflow expressions.
RCE
AI / ML
N8n
-
CVE-2025-69565
CRITICAL
CVSS 9.8
Mobile Shop Management System has file upload enabling web shell deployment.
PHP
Mobile Shop Management System
-
CVE-2025-69564
CRITICAL
CVSS 9.8
Mobile Shop Management System has code injection in ExAddNewUser.php.
PHP
SQLi
Mobile Shop Management System
-
CVE-2025-69563
CRITICAL
CVSS 9.8
Mobile Shop Management System has SQL injection in ExLogin.php.
PHP
SQLi
Mobile Shop Management System
-
CVE-2025-69562
CRITICAL
CVSS 9.8
Mobile Shop Management System has SQL injection in insertmessage.php.
PHP
SQLi
Mobile Shop Management System
-
CVE-2025-69559
CRITICAL
CVSS 9.8
Computer Book Store v1.0 has file upload in admin_add.php.
PHP
Computer Book Store
-
CVE-2025-68670
CRITICAL
CVSS 9.1
xrdp open-source RDP server before v0.10.5 has an unauthenticated stack buffer overflow enabling remote code execution.
Buffer Overflow
Stack Overflow
Debian Linux
Xrdp
Suse
-
CVE-2025-21589
CRITICAL
CVSS 9.8
Authentication bypass in Juniper Networks Session Smart Router and Conductor allows network-based attackers to gain administrative control without credentials. The vulnerability affects multiple versions of the routing platform used in enterprise SD-WAN deployments.
Juniper
Authentication Bypass
-
CVE-2025-15467
CRITICAL
CVSS 9.8
OpenSSL has a critical out-of-bounds write when parsing CMS AuthEnvelopedData/EnvelopedData with malicious AEAD parameters, enabling potential RCE.
OpenSSL
Tls
RCE
Buffer Overflow
Stack Overflow
-
CVE-2021-47901
CRITICAL
CVSS 9.8
Dirsearch 0.4.1 has CSV injection in scan reports.
Code Injection
-
CVE-2021-47900
CRITICAL
CVSS 9.8
Gila CMS before 2.0.0 has an RFI vulnerability enabling unauthenticated RCE.
PHP
RCE
-
CVE-2020-36948
CRITICAL
CVSS 9.8
VestaCP 0.9.8-26 has a session management vulnerability allowing remote attackers to hijack admin sessions through the LoginAs module.
Authentication Bypass
-
CVE-2020-36941
CRITICAL
CVSS 9.8
Knockpy 4.1.1 has CSV injection in subdomain scan exports.
Code Injection
-
CVE-2020-36940
CRITICAL
CVSS 9.8
Easy CD & DVD Cover Creator 4.13 has a buffer overflow in serial number input.
Buffer Overflow
Denial Of Service
-
CVE-2026-24882
HIGH
CVSS 8.4
Stack-based buffer overflow in GnuPG's tpm2daemon component allows local attackers to achieve full system compromise through specially crafted PKDECRYPT commands targeting TPM-backed RSA and ECC keys. Public exploit code exists for this vulnerability, which affects GnuPG versions before 2.5.17 and impacts users of GnuPG, Gpg4win, and Stack Overflow integrations. No patch is currently available, leaving systems vulnerable to local privilege escalation and arbitrary code execution.
Buffer Overflow
Stack Overflow
Gpg4win
Gnupg
Redhat
-
CVE-2026-24881
HIGH
CVSS 8.1
GnuPG's gpg-agent fails to properly validate session key sizes in S/MIME messages, allowing remote attackers to trigger a stack buffer overflow via oversized CMS EnvelopedData payloads. Public exploit code exists for this vulnerability, which affects GnuPG versions before 2.5.17 and can be weaponized for denial of service or potentially remote code execution. No patch is currently available.
RCE
Buffer Overflow
Stack Overflow
Memory Corruption
Denial Of Service
-
CVE-2026-24875
HIGH
CVSS 7.8
An integer overflow vulnerability in yoyofr modizer before version 4.1.1 allows local attackers with user interaction to achieve high-impact compromise including confidentiality, integrity, and availability violations. The vulnerability requires local access and user interaction to trigger, enabling attackers to execute arbitrary code or cause denial of service through integer wraparound conditions. No patch is currently available for this vulnerability.
Integer Overflow
-
CVE-2026-24873
HIGH
CVSS 7.8
Out-of-bounds memory read in Rinnegatamante lpp-vita before version r6 allows local attackers with user interaction to read sensitive data, modify memory, or crash the application. The vulnerability requires local access and user interaction to trigger, affecting the integrity and confidentiality of affected systems. No patch is currently available.
Buffer Overflow
Information Disclosure
-
CVE-2026-24869
HIGH
CVSS 8.8
Firefox versions prior to 147.0.2 contain a use-after-free vulnerability in the Layout: Scrolling and Overflow component that can be triggered by user interaction, allowing remote attackers to achieve code execution with high integrity and confidentiality impact. The vulnerability requires network access and user interaction but does not require authentication, making it exploitable through malicious web content. No patch is currently available for this vulnerability.
Use After Free
Firefox
Redhat
Suse
-
CVE-2026-24831
HIGH
CVSS 7.5
Ix Ray Engine 1.6 before version 1.3 contains an infinite loop vulnerability that allows remote attackers to cause denial of service without authentication or user interaction. The flaw stems from an unreachable exit condition in a processing loop, enabling attackers to exhaust system resources and render the application unresponsive. No patch is currently available for this high-severity issue.
Denial Of Service
Ix Ray Engine 1.6
-
CVE-2026-24828
HIGH
CVSS 7.5
A memory leak in is-Engine before version 3.3.4 allows remote attackers to cause a denial of service by exhausting server memory without requiring authentication or user interaction. The vulnerability affects all versions of is-Engine prior to 3.3.4 and has a high CVSS score of 7.5 due to its network-accessible nature and ease of exploitation. No patch is currently available for this issue.
Denial Of Service
-
CVE-2026-24827
HIGH
CVSS 7.5
Commander-Genius prior to pull request 358 contains an out-of-bounds write vulnerability that allows remote attackers to cause denial of service through network access without authentication or user interaction. The vulnerability stems from improper memory boundary validation in the application, enabling attackers to crash the service or potentially execute arbitrary code. No patch is currently available for this issue.
Buffer Overflow
-
CVE-2026-24783
HIGH
CVSS 7.5
Incorrect rounding in the mulDiv() function of soroban-fixed-point-math versions 1.3.0 and 1.4.0 allows attackers to manipulate fixed-point arithmetic results in Soroban smart contracts by exploiting sign handling when both the intermediate product and divisor are negative. This affects all signed FixedPoint implementations (i64, i128, I256) and could enable financial miscalculations or loss of funds in dependent contracts. A patch is available in versions 1.3.1 and 1.4.1.
Information Disclosure
Soroban Fixed Point Math
-
CVE-2026-24779
HIGH
CVSS 7.1
vLLM before version 0.14.1 contains a server-side request forgery vulnerability in the MediaConnector class where inconsistent URL parsing between libraries allows attackers to bypass host restrictions and force the server to make arbitrary requests to internal network resources. Public exploit code exists for this vulnerability, which poses significant risk in containerized environments where a compromised vLLM instance could be leveraged to access restricted internal systems. The vulnerability affects users running vLLM's multimodal features with untrusted input.
Python
Industrial
SSRF
Denial Of Service
AI / ML
-
CVE-2026-24778
HIGH
CVSS 8.8
Ghost is an open source content management system. [CVSS 8.8 HIGH]
XSS
Ghost
Portal
-
CVE-2026-24765
HIGH
CVSS 7.8
Unsafe deserialization in PHPUnit versions before 8.5.52, 9.6.33, 10.5.62, 11.5.50, and 12.5.8 allows local attackers to execute arbitrary code by placing malicious serialized objects in `.coverage` files that are deserialized without validation during PHPT test execution. An attacker with file write access can exploit the `cleanupForCoverage()` method's lack of object class restrictions to trigger gadget chains through `__wakeup()` methods. This high-severity vulnerability (CVSS 7.8) affects developers and CI/CD systems running PHPUnit on Linux systems.
RCE
Deserialization
Debian Linux
Phpunit
Redhat
-
CVE-2026-24748
HIGH
CVSS 7.2
Kargo's GetConfig() API endpoint fails to validate Bearer token authenticity, allowing unauthenticated attackers to retrieve sensitive configuration data including Argo CD cluster endpoints and namespaces that could facilitate further attacks. The same authentication bypass affects the RefreshResource endpoint, which can be leveraged for denial-of-service attacks. Versions 1.6.3, 1.7.7, and 1.8.7 and later include patches for this vulnerability.
Golang
Kubernetes
Information Disclosure
Kargo
Suse
-
CVE-2026-24747
HIGH
CVSS 8.8
PyTorch is a Python package that provides tensor computation. [CVSS 8.8 HIGH]
Python
Deserialization
AI / ML
Pytorch
Redhat
-
CVE-2026-24741
HIGH
CVSS 8.1
Arbitrary file deletion in ConvertX prior to version 0.17.0 allows authenticated attackers to remove files outside the intended upload directory by exploiting insufficient path validation in the POST /delete endpoint. The vulnerability enables attackers to supply path traversal sequences that bypass directory restrictions, with impact limited only by server process permissions. Public exploit code exists for this HIGH severity flaw, though a patch is available in version 0.17.0.
Path Traversal
Convertx
-
CVE-2026-24490
HIGH
CVSS 8.1
MobSF versions prior to 4.4.5 are vulnerable to stored XSS through unsanitized rendering of Android manifest attributes in HTML reports, allowing attackers to inject malicious JavaScript by uploading crafted APK files. Public exploit code exists for this vulnerability, and successful exploitation enables session hijacking and account takeover of security analysts using the framework. Upgrade to version 4.4.5 or later to remediate.
Android
XSS
Mobile Security Framework
-
CVE-2026-24486
HIGH
CVSS 8.6
Arbitrary file write in Python-Multipart versions before 0.0.22 allows remote attackers to store uploaded files to any filesystem location when non-default configuration options UPLOAD_DIR and UPLOAD_KEEP_FILENAME=True are enabled. An attacker can exploit this path traversal vulnerability by crafting malicious filenames in multipart uploads, potentially overwriting critical system or application files. Public exploit code exists for this vulnerability; affected users should upgrade to version 0.0.22 or disable UPLOAD_KEEP_FILENAME=True as an interim mitigation.
Python
Path Traversal
Python Multipart
Redhat
Suse
-
CVE-2026-24478
HIGH
CVSS 7.2
AnythingLLM versions prior to 1.10.0 contain a path traversal vulnerability in the DrupalWiki integration that allows malicious administrators or attackers with admin privileges to write arbitrary files to the server, potentially achieving remote code execution through configuration file overwriting or malicious script injection. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. The attack requires high-level privileges but carries critical risk due to the ability to completely compromise server integrity.
Drupal
RCE
Path Traversal
AI / ML
Anythingllm
-
CVE-2026-24477
HIGH
CVSS 7.5
Anythingllm versions up to 1.10.0 contains a vulnerability that allows attackers to complete compromise of the semantic search / retrieval functionality and indirec (CVSS 7.5).
Information Disclosure
AI / ML
Anythingllm
-
CVE-2026-24345
HIGH
CVSS 8.8
Ezcast Pro Dongle Ii Firmware versions up to 1.17478.146 is affected by improper input validation (CVSS 8.8).
CSRF
Ezcast Pro Dongle Ii Firmware
-
CVE-2026-23881
HIGH
CVSS 7.7
Kyverno versions up to 1.16.3 is affected by allocation of resources without limits or throttling (CVSS 7.7).
Denial Of Service
Kyverno
Suse
-
CVE-2026-23593
HIGH
CVSS 7.5
web-based management interface of HPE Aruba Networking Fabric Composer is affected by path traversal (CVSS 7.5).
Path Traversal
-
CVE-2026-23592
HIGH
CVSS 7.2
HPE Aruba Networking Fabric Composer's backup functionality contains insecure file operations that permit authenticated users to execute arbitrary OS commands, resulting in remote code execution on affected systems. An attacker with valid credentials could leverage this vulnerability to gain full system compromise through the backup restoration process. No patch is currently available to remediate this high-severity flaw.
RCE
-
CVE-2026-22264
HIGH
CVSS 7.4
Heap use-after-free in Suricata prior to versions 8.0.3 and 7.0.14 can be triggered via integer overflow when processing packets that generate excessive alert conditions, allowing an attacker to crash the IDS/IPS engine or potentially achieve code execution. Affected deployments using large rulesets are at risk when processing malicious or crafted network traffic designed to trigger simultaneous signature matches. Patches are available for both affected versions.
Use After Free
Integer Overflow
Suricata
Suse
-
CVE-2026-22260
HIGH
CVSS 7.5
Suricata versions 8.0.0 through 8.0.2 are susceptible to a stack overflow crash when processing network traffic with improperly configured body size limits. An unauthenticated remote attacker can trigger a denial of service by sending crafted requests that exceed the application's stack capacity. A patch is available in version 8.0.3, or administrators can apply the workaround of using default values for request-body-limit and response-body-limit configurations.
Stack Overflow
Denial Of Service
Suricata
Suse
-
CVE-2026-22259
HIGH
CVSS 7.5
Suricata versions prior to 8.0.3 and 7.0.14 are vulnerable to a denial of service condition where specially crafted DNP3 traffic triggers excessive memory consumption, potentially exhausting system memory and causing the service to crash. An unauthenticated attacker on the network can exploit this by sending malicious DNP3 packets to cause the IDS/IPS engine to become unavailable. A patch is available in the latest versions, and users can mitigate the risk by disabling the DNP3 parser if not required.
Denial Of Service
Suricata
Suse
-
CVE-2026-22258
HIGH
CVSS 7.5
Uncontrolled buffer expansion in Suricata's DCERPC parser allows remote attackers to trigger unbounded memory allocation and cause denial of service by sending specially crafted DCERPC traffic. The vulnerability affects versions prior to 8.0.3 and 7.0.14 across DCERPC/UDP, DCERPC/TCP, and SMB protocols, with TCP being partially protected by default stream depth limits. Patches are available, and administrators can mitigate by disabling vulnerable parsers or configuring stream reassembly depth limits.
Denial Of Service
Suricata
Suse
-
CVE-2026-21721
HIGH
CVSS 8.1
Dashboard permission API fails to validate scope boundaries, allowing authenticated users with permission management rights on any single dashboard to read and modify permissions across all organization dashboards. This privilege escalation affects multi-user dashboard environments where permission isolation is expected. No patch is currently available.
Privilege Escalation
Redhat
Suse
-
CVE-2026-21720
HIGH
CVSS 7.5
Grafana is vulnerable to denial of service through resource exhaustion when processing uncached avatar requests with random hashes. Sustained requests cause goroutines to accumulate indefinitely due to timeout handling issues, eventually consuming all available memory and crashing the application. An unauthenticated remote attacker can exploit this vulnerability without user interaction to render affected Grafana instances unavailable.
Grafana
Denial Of Service
Redhat
Suse
-
CVE-2026-21417
HIGH
CVSS 7.0
Dell CloudBoost Virtual Appliance versions before 19.14.0.0 store sensitive passwords in plaintext, allowing authenticated remote attackers to retrieve credentials and escalate privileges. This vulnerability carries a high availability impact alongside confidentiality and integrity concerns, though exploitation requires substantial technical complexity. No patch is currently available.
Information Disclosure
Dell
Cloudboost Virtual Appliance
-
CVE-2026-21408
HIGH
CVSS 7.3
beat-access for Windows version 3.0.3 and prior allows local attackers with user privileges to execute arbitrary code with SYSTEM-level permissions through insecure DLL search path resolution. An attacker can exploit this vulnerability by placing a malicious DLL in a predictable location, which the application will load and execute during normal operation. No patch is currently available for this vulnerability.
Windows
-
CVE-2026-1483
HIGH
CVSS 7.5
Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to extract sensitive database information through covert channels, bypassing normal application output mechanisms. This vulnerability affects the '/evaluacion_objetivos_ver_auto.aspx' endpoint and compromises data confidentiality with no patch currently available.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1482
HIGH
CVSS 7.5
Unauthenticated attackers can exploit an out-of-band SQL injection flaw in the Evaluacion De Desempeno application's 'Id_evaluacion' parameter to extract sensitive database information through indirect data exfiltration channels. This network-accessible vulnerability requires no user interaction and affects all instances without authentication controls, potentially exposing confidential evaluation records. No patch is currently available.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1481
HIGH
CVSS 7.5
Out-of-band SQL injection in the Performance Evaluation (Evaluacion De Desempeno) application allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' parameter in '/evaluacion_objetivos_anyo_sig_ver_auto.aspx' by exfiltrating data via external channels. The vulnerability compromises data confidentiality without requiring user interaction, affecting all deployments of the affected application. No patch is currently available.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1480
HIGH
CVSS 7.5
Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to extract sensitive database information through external data exfiltration channels. This vulnerability affects the '/evaluacion_objetivos_anyo_sig_evalua.aspx' endpoint and compromises confidentiality without requiring user interaction. No patch is currently available.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1479
HIGH
CVSS 7.5
Out-of-band SQL injection in Evaluacion De Desempeno's '/evaluacion_hca_ver_auto.asp' endpoint allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' and 'Id_evaluacion' parameters. The vulnerability compromises confidentiality by enabling data exfiltration via covert channels without requiring direct application responses. No patch is currently available for affected deployments.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1478
HIGH
CVSS 7.5
Unauthenticated attackers can exploit an out-of-band SQL injection flaw in the Performance Evaluation (EDD) application via the 'Id_usuario' and 'Id_evaluacion' parameters to extract sensitive database information through external channels, compromising data confidentiality. The vulnerability requires no user interaction and is remotely exploitable from the network. No patch is currently available.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1477
HIGH
CVSS 7.5
Out-of-band SQL injection in the Evaluacion De Desempeno application allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' and 'Id_evaluacion' parameters in the '/evaluacion_competencias_evalua_old.aspx' endpoint. An attacker can bypass normal application output channels to exfiltrate confidential data, compromising database confidentiality. No patch is currently available for this vulnerability.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1476
HIGH
CVSS 7.5
Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to extract sensitive database information through indirect data exfiltration channels. This vulnerability in the '/evaluacion_acciones_ver_auto.aspx' endpoint compromises the confidentiality of stored data without requiring user interaction. No patch is currently available for this HIGH severity vulnerability.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1475
HIGH
CVSS 7.5
Unauthenticated attackers can extract sensitive database information from the Evaluacion De Desempeno application through an out-of-band SQL injection vulnerability in the 'Id_usuario' parameter of '/evaluacion_acciones_evalua.aspx'. The vulnerability allows data exfiltration via external channels without direct application responses, compromising database confidentiality. No patch is currently available for this high-severity flaw.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1474
HIGH
CVSS 7.5
Out-of-band SQL injection in the Performance Evaluation (EDD) application allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' and 'Id_evaluacion' parameters in '/evaluacion_inicio.aspx'. An attacker can exfiltrate confidential data via external channels without direct application feedback, compromising data confidentiality. No patch is currently available for this vulnerability.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1473
HIGH
CVSS 7.5
Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to exfiltrate sensitive database information through covert channels. The vulnerability affects the '/evaluacion_competencias_evalua.aspx' endpoint and enables unauthorized access to confidential data despite the application not directly returning query results. No patch is currently available for this HIGH severity vulnerability.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1472
HIGH
CVSS 7.5
Out-of-band SQL injection in the Evaluacion De Desempeno application allows unauthenticated remote attackers to extract sensitive database information through the 'txAny' parameter in '/evaluacion_competencias_autoeval_list.aspx' without direct output reflection. By leveraging external data channels, an attacker can bypass normal application responses to exfiltrate confidential data and compromise database confidentiality. No patch is currently available for this vulnerability.
SQLi
Evaluacion De Desempeno
-
CVE-2026-1449
HIGH
CVSS 7.3
SQL injection in Hisense TransTech Smart Bus Management System through version 20260113 allows unauthenticated remote attackers to manipulate the key parameter in the TireMng.aspx Page_Load function and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or responded to disclosure attempts. An attacker can exploit this over the network without authentication to read, modify, or delete sensitive data.
SQLi
-
CVE-2026-1448
HIGH
CVSS 7.2
Remote code execution in D-Link DIR-615 firmware through os command injection via the ipaddr parameter in the Web Management Interface allows unauthenticated remote attackers to execute arbitrary commands. The vulnerability affects unsupported firmware versions up to 4.10, and public exploit code is available. No patch has been released by the vendor.
D-Link
PHP
Command Injection
Dir 615 Firmware
-
CVE-2026-1361
HIGH
CVSS 7.8
ASDA-Soft Stack-based Buffer Overflow Vulnerability [CVSS 7.8 HIGH]
Buffer Overflow
Stack Overflow
Asda Soft
-
CVE-2026-1315
HIGH
CVSS 7.5
Unauthenticated remote attackers can crash core system services on Tapo C220 and C520WS cameras by sending specially crafted files to the firmware update endpoint, bypassing authentication and integrity checks. This results in a persistent denial of service condition that requires manual device reboot to restore functionality. No patch is currently available for affected firmware versions.
Denial Of Service
Tapo C520ws Firmware
Tapo C220 Firmware
-
CVE-2026-0919
HIGH
CVSS 7.5
Tapo C220 and C520WS network cameras contain an HTTP parser defect that crashes the device when processing requests with excessively long URL paths, allowing unauthenticated remote attackers to trigger repeated denial of service through device reboots. The vulnerability stems from improper error handling that attempts to access unallocated buffers during cleanup operations. No patch is currently available for affected firmware versions.
Denial Of Service
Tapo C220 Firmware
Tapo C520ws Firmware
-
CVE-2026-0918
HIGH
CVSS 7.5
Unauthenticated remote denial of service in TP-Link Tapo C220 and C520WS network cameras allows attackers to crash the HTTP service by sending POST requests with malformed Content-Length headers, triggering a null pointer dereference. Repeated attacks can keep the devices offline despite automatic restarts, with no available patch to mitigate the vulnerability. This affects camera availability and requires manual intervention to restore service.
Null Pointer Dereference
Denial Of Service
Tapo C520ws Firmware
Tapo C220 Firmware
-
CVE-2026-0648
HIGH
CVSS 7.8
Memory corruption in ThreadX RTOS CreateCounter() function allows local attackers with user privileges to trigger hard faults or corrupt kernel memory by exhausting the counter pool, which causes an unchecked error code to be cast as a wild pointer. The vulnerability stems from incorrect error validation logic that fails to detect counter allocation failures, enabling subsequent writes to arbitrary memory addresses. No patch is currently available.
Buffer Overflow
-
CVE-2025-69421
HIGH
CVSS 7.5
Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to
Denial of Service for an application processing PKCS#12 files. [CVSS 7.5 HIGH]
OpenSSL
Tls
Null Pointer Dereference
Denial Of Service
Redhat
-
CVE-2025-69420
HIGH
CVSS 7.5
Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malformed TimeStamp Response file. [CVSS 7.5 HIGH]
OpenSSL
Tls
Null Pointer Dereference
Denial Of Service
Redhat
-
CVE-2025-69419
HIGH
CVSS 7.4
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously
crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing
non-ASCII BMP code point can trigger a one byte write before the allocated
buffer. [CVSS 7.4 HIGH]
OpenSSL
Tls
Memory Corruption
Denial Of Service
Redhat
-
CVE-2025-55102
HIGH
CVSS 8.7
A denial-of-service vulnerability exists in the NetX IPv6 component functionality of Eclipse ThreadX NetX Duo. A specially crafted network packet of "Packet Too Big" with more than 15 different source address can lead to denial of service.
Denial Of Service
-
CVE-2025-41727
HIGH
CVSS 7.8
A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access. [CVSS 7.8 HIGH]
Authentication Bypass
-
CVE-2025-41726
HIGH
CVSS 8.8
A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within privileged processes. [CVSS 8.8 HIGH]
Integer Overflow
RCE
-
CVE-2025-33234
HIGH
CVSS 7.8
NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. [CVSS 7.8 HIGH]
Denial Of Service
Privilege Escalation
Code Injection
Information Disclosure
AI / ML
-
CVE-2021-47902
HIGH
CVSS 8.2
Testa Online Test Management System 3.4.7 contains a SQL injection vulnerability that allows attackers to manipulate database queries through the 'q' search parameter. [CVSS 8.2 HIGH]
SQLi
-
CVE-2020-36983
HIGH
CVSS 7.8
Quick 'n Easy FTP Service 3.2 contains an unquoted service path vulnerability that allows local attackers to execute arbitrary code during service startup. [CVSS 7.8 HIGH]
RCE
-
CVE-2020-36982
HIGH
CVSS 7.8
MotoHelperService.exe service contains a vulnerability that allows attackers to potentially inject malicious code (CVSS 7.8).
RCE
-
CVE-2020-36981
HIGH
CVSS 7.8
PST Service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2020-36980
HIGH
CVSS 7.8
its Windows service configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
Privilege Escalation
-
CVE-2020-36979
HIGH
CVSS 7.8
Atheros Coex Service Application 8.0.0.255 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path by placing malicious executables in the service path to gain elevated system privileges during service startup. [CVSS 7.8 HIGH]
Windows
-
CVE-2020-36977
HIGH
CVSS 7.8
ElevationService executable contains a vulnerability that allows attackers to potentially inject malicious code (CVSS 7.8).
Privilege Escalation
-
CVE-2020-36976
HIGH
CVSS 7.8
its service configuration contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2020-36975
HIGH
CVSS 7.8
EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. [CVSS 7.8 HIGH]
RCE
-
CVE-2020-36974
HIGH
CVSS 7.8
Realtek Andrea RT Filters 1.0.64.7 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. [CVSS 7.8 HIGH]
RCE
-
CVE-2020-36951
HIGH
CVSS 8.2
Phpscript-sgh 0.1.0 contains a time-based blind SQL injection vulnerability in the admin interface that allows attackers to manipulate database queries through the 'id' parameter. [CVSS 8.2 HIGH]
SQLi
-
CVE-2020-36949
HIGH
CVSS 7.5
Tapinradio versions up to 2.13.7 is affected by allocation of resources without limits or throttling (CVSS 7.5).
Denial Of Service
Tapinradio
-
CVE-2020-36947
HIGH
CVSS 7.1
LibreNMS 1.46 contains an authenticated SQL injection vulnerability in the MAC accounting graph endpoint that allows remote attackers to extract database information. [CVSS 7.1 HIGH]
SQLi
Librenms
-
CVE-2020-36946
HIGH
CVSS 7.5
SyncBreeze 10.0.28 contains a denial of service vulnerability in the login endpoint that allows remote attackers to crash the service. Attackers can send an oversized payload in the login request to overwhelm the application and potentially disrupt service availability. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2020-36942
HIGH
CVSS 8.8
Victor Cms versions up to 1.0 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).
PHP
Victor Cms
-
CVE-2020-36939
HIGH
CVSS 7.5
Cassandra Web 0.5.0 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating path traversal parameters. [CVSS 7.5 HIGH]
Apache
Path Traversal
-
CVE-2020-36938
HIGH
CVSS 8.8
WinAVR version 20100110 contains an insecure permissions vulnerability that allows authenticated users to modify system files and executables. Attackers can leverage the overly permissive access controls to potentially modify critical DLLs and executable files in the WinAVR installation directory. [CVSS 8.8 HIGH]
Privilege Escalation
-
CVE-2026-24910
MEDIUM
CVSS 5.9
Bun versions prior to 1.3.5 allow attackers to bypass the trusted dependencies allowlist by creating non-npm packages with names matching legitimate packages, enabling potential code execution through dependency confusion attacks. This local vulnerability affects systems using Bun's package management where an attacker can craft malicious packages with identical names to trusted dependencies. No patch is currently available for affected Node.js and GitHub integrations.
Node.js
Github
-
CVE-2026-24909
MEDIUM
CVSS 5.9
Path traversal in vlt versions before 1.0.0-rc.10 allows local attackers to write files outside their intended directories during tar archive extraction due to insufficient path sanitization. An attacker with local access could exploit this to overwrite arbitrary files on the system with elevated scope impact. No patch is currently available for this vulnerability.
Path Traversal
-
CVE-2026-24868
MEDIUM
CVSS 6.5
Firefox's Anti-Tracking privacy protection can be bypassed by unauthenticated remote attackers through user interaction, potentially allowing tracking mechanisms to function despite enabled privacy protections. The vulnerability affects Firefox versions below 147.0.2 and currently has no available patch. An attacker could exploit this to circumvent Firefox's tracking prevention features and monitor user activity.
Mozilla
Authentication Bypass
Firefox
Redhat
Suse
-
CVE-2026-24829
MEDIUM
CVSS 6.5
Heap-based buffer overflow in is-Engine before version 3.3.4 allows remote attackers to cause denial of service through out-of-bounds memory writes. The vulnerability requires user interaction and network access but has no patch currently available. Affected installations should upgrade to version 3.3.4 or later to mitigate this denial of service risk.
Buffer Overflow
Heap Overflow
-
CVE-2026-24771
MEDIUM
CVSS 4.7
Hono's ErrorBoundary JSX component before version 4.11.7 fails to properly sanitize user-controlled input, allowing attackers to inject and execute arbitrary JavaScript in victims' browsers through reflected XSS. The vulnerability requires user interaction and network access but can compromise the confidentiality and integrity of affected applications. A patch is available in version 4.11.7.
XSS
Hono
-
CVE-2026-24738
MEDIUM
CVSS 6.5
gmrtd library versions prior to 0.17.2 fail to validate TLV (Tag-Length-Value) data lengths, allowing attackers to specify values up to 4GB that trigger excessive memory allocation and CPU consumption. Applications using gmrtd to parse travel documents from NFC devices or external APIs are vulnerable to denial of service attacks, particularly on resource-constrained environments like mobile devices. A patch is available in version 0.17.2 and later.
Golang
Gmrtd
Suse
-
CVE-2026-24688
MEDIUM
CVSS 4.3
Pypdf versions up to 6.6.2 is affected by loop with unreachable exit condition (infinite loop) (CVSS 4.3).
Python
Pypdf
Redhat
Suse
-
CVE-2026-24686
MEDIUM
CVSS 4.7
Path traversal in go-tuf versions 2.0.0 through 2.4.0 allows local attackers with low privileges to write metadata files outside the intended cache directory by injecting directory traversal sequences into the repository name parameter. An attacker supplying a malicious map file can escape the LocalMetadataDir boundary and create directories within the process's filesystem permissions. Public exploit code exists; update to version 2.4.1 or later.
Golang
Go Tuf
Redhat
Suse
-
CVE-2026-24489
MEDIUM
CVSS 5.3
HTTP header injection in the Gakido Python HTTP client prior to version 0.1.1 allows unauthenticated attackers to inject arbitrary headers into requests by embedding CRLF or null byte sequences in user-supplied header values and names. An attacker could leverage this to manipulate HTTP requests and potentially bypass security controls or perform request smuggling attacks. The vulnerability has been patched in version 0.1.1 with header sanitization functions, though no patch is currently available for affected systems.
Python
-
CVE-2026-24473
MEDIUM
CVSS 5.3
Hono versions before 4.11.7 contain an information disclosure vulnerability in the static file serving middleware for Cloudflare Workers that allows unauthenticated remote attackers to read sensitive environment keys through path traversal. The lack of proper input validation enables attackers to access internal asset keys that should remain protected. A patch is available in version 4.11.7 and later.
Information Disclosure
Hono
-
CVE-2026-24472
MEDIUM
CVSS 5.3
Hono versions up to 4.11.7 contains a vulnerability that allows attackers to private or authenticated responses being cached and subsequently exposed to unau (CVSS 5.3).
Information Disclosure
Hono
-
CVE-2026-24398
MEDIUM
CVSS 4.8
Hono's IP Restriction Middleware fails to properly validate IPv4 octet ranges, allowing attackers to bypass IP-based access controls by submitting malformed addresses with values exceeding 255. This affects all users relying on Hono's IP filtering mechanisms for authentication or authorization. A patch is available in version 4.11.7 and later.
Authentication Bypass
Hono
-
CVE-2026-24348
MEDIUM
CVSS 6.1
Ezcast Pro Dongle Ii Firmware versions up to 1.17478.146 is affected by improper input validation (CVSS 6.1).
XSS
Ezcast Pro Dongle Ii Firmware
-
CVE-2026-24347
MEDIUM
CVSS 5.3
Ezcast Pro Dongle Ii Firmware versions up to 1.17478.146 is affected by improper input validation (CVSS 5.3).
Code Injection
Ezcast Pro Dongle Ii Firmware
-
CVE-2026-24116
MEDIUM
CVSS 5.5
Wasmtime versions 29.0.0 through 41.0.0 on x86-64 platforms with AVX contain an out-of-bounds memory read in the f64.copysign instruction compilation that can cause application crashes when signal-based traps are disabled. In configurations with disabled guard pages, this vulnerability could potentially leak out-of-sandbox data, though the data remains inaccessible to WebAssembly guests without additional Cranelift bugs. Patches are available in versions 36.0.5, 40.0.3, and 41.0.1.
Buffer Overflow
Information Disclosure
Wasmtime
-
CVE-2026-23892
MEDIUM
CVSS 5.9
OctoPrint versions up to 1.11.5 contain a timing attack vulnerability in API key validation that enables remote extraction of valid API keys through network-based response time analysis. An unauthenticated attacker with network access can exploit the character-by-character comparison method to gradually recover API keys by measuring authentication response delays. The attack's practicality depends heavily on network conditions, but a patch is available in version 1.11.6.
Information Disclosure
Octoprint
-
CVE-2026-23683
MEDIUM
CVSS 4.3
Insufficient authorization checks in SAP Fiori App Intercompany Balance Reconciliation allow authenticated users to access data beyond their intended permissions, resulting in privilege escalation with limited confidentiality impact. An attacker with valid credentials can exploit this flaw to view sensitive financial reconciliation information they should not have access to. No patch is currently available.
Sap
Privilege Escalation
-
CVE-2026-22796
MEDIUM
CVSS 5.3
OpenSSL's PKCS#7 signature verification fails to validate ASN1_TYPE union members before access, allowing attackers to trigger null pointer dereference crashes by submitting malformed PKCS#7 data. Applications performing signature verification or using PKCS7_digest_from_attributes() directly are vulnerable to denial of service attacks. A patch is available to address this type confusion vulnerability.
OpenSSL
Tls
Null Pointer Dereference
Denial Of Service
Redhat
-
CVE-2026-22795
MEDIUM
CVSS 5.5
Processing a malformed PKCS#12 file in OpenSSL and related TLS libraries can trigger a null pointer dereference due to improper type validation in ASN.1 parsing, causing applications to crash. This vulnerability requires local user interaction to exploit and results only in denial of service, with no impact on data confidentiality or integrity. A patch is available to address this medium-severity issue.
OpenSSL
Tls
Null Pointer Dereference
Denial Of Service
Redhat
-
CVE-2026-22263
MEDIUM
CVSS 5.3
Suricata versions up to 8.0.3 contains a vulnerability that allows attackers to slowdown over multiple packets (CVSS 5.3).
Information Disclosure
Suricata
Redhat
Suse
-
CVE-2026-22262
MEDIUM
CVSS 5.9
Suricata versions prior to 8.0.3 and 7.0.14 are vulnerable to a stack buffer overflow when processing oversized datasets with the save or state options enabled, allowing an attacker with network access to cause a denial of service. The vulnerability requires specific conditions to trigger but does not require authentication or user interaction. A patch is available in the latest versions.
Stack Overflow
Suricata
Redhat
Suse
-
CVE-2026-1504
MEDIUM
CVSS 6.5
Cross-origin data disclosure in Google Chrome's Background Fetch API prior to version 144.0.7559.110 enables remote attackers to steal sensitive information from other websites through specially crafted HTML pages, requiring only user interaction. The vulnerability affects all Chrome users and has a patch available in the latest version.
Google
Chrome
Redhat
Suse
-
CVE-2026-1489
MEDIUM
CVSS 5.4
GLib's Unicode case conversion function contains an integer overflow flaw that causes undersized memory allocation when processing extremely large strings, enabling out-of-bounds writes. Applications using GLib for string operations could experience crashes or instability when exposed to specially crafted input. No patch is currently available for this medium-severity vulnerability.
Integer Overflow
Memory Corruption
Denial Of Service
Redhat
Suse
-
CVE-2026-1484
MEDIUM
CVSS 4.2
GLib's Base64 encoder miscalculates buffer boundaries when handling extremely large inputs due to integer type misuse, potentially causing out-of-bounds memory writes. Applications processing untrusted large Base64 data could experience crashes or unpredictable behavior, though code execution is not indicated by the vector constraints. No patch is currently available for this medium-severity vulnerability.
Denial Of Service
Redhat
Suse
-
CVE-2026-1467
MEDIUM
CVSS 5.8
libsoup's improper handling of URL-decoded input in HTTP proxy configurations allows remote attackers to inject CRLF sequences into the Host header, enabling injection of arbitrary HTTP headers or request bodies. Public exploit code exists for this vulnerability, which could allow attackers to manipulate downstream services through compromised proxy requests. Affected applications using libsoup with HTTP proxy functionality are at risk of integrity compromise, though no patch is currently available.
Authentication Bypass
Redhat
Suse
-
CVE-2026-0746
MEDIUM
CVSS 6.4
The AI Engine plugin for WordPress versions up to 3.3.2 contains a server-side request forgery vulnerability in the 'get_audio' function that allows authenticated subscribers and higher-privileged users to make arbitrary web requests from the server. When the Public API setting is enabled and allow_url_fopen is active, attackers can query and modify data on internal services accessible to the web application. No patch is currently available for this vulnerability.
WordPress
SSRF
AI / ML
-
CVE-2026-0705
MEDIUM
CVSS 6.7
Acronis Cloud Manager for Windows before build 6.4.25342.354 is vulnerable to local privilege escalation through improperly configured folder permissions, allowing authenticated users with low privileges to escalate to higher privileges. An attacker with local access and user interaction can exploit this vulnerability to gain full system control. No patch is currently available for this vulnerability.
Windows
Privilege Escalation
-
CVE-2025-69418
MEDIUM
CVSS 4.0
Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. [CVSS 4.0 MEDIUM]
OpenSSL
Tls
Redhat
Suse
-
CVE-2025-68160
MEDIUM
CVSS 4.7
Issue summary: Writing large, newline-free data into a BIO chain using the
line-buffering filter where the next BIO performs short writes can trigger
a heap-based out-of-bounds write. [CVSS 4.7 MEDIUM]
OpenSSL
Tls
Heap Overflow
Memory Corruption
Denial Of Service
-
CVE-2025-66199
MEDIUM
CVSS 5.9
Issue summary: A TLS 1.3 connection using certificate compression can be
forced to allocate a large buffer before decompression without checking
against the configured certificate size limit. [CVSS 5.9 MEDIUM]
OpenSSL
Tls
Memory Corruption
Denial Of Service
Information Disclosure
-
CVE-2025-65264
MEDIUM
CVSS 5.5
The kernel driver of CPUID CPU-Z v2.17 and earlier does not validate user-supplied values passed via its IOCTL interface, allowing an attacker to access sensitive information via a crafted request. [CVSS 5.5 MEDIUM]
Linux
Cpu Z
-
CVE-2025-55095
MEDIUM
CVSS 4.2
The function _ux_host_class_storage_media_mount() is responsible for mounting partitions on a USB mass storage device. When it encounters an extended partition entry in the partition table, it recursively calls itself to mount the next logical partition. [CVSS 4.2 MEDIUM]
Stack Overflow
Buffer Overflow
-
CVE-2025-41728
MEDIUM
CVSS 5.3
A low privileged remote attacker may be able to disclose confidential information from the memory of a privileged process by sending specially crafted calls to the Device Manager web service that cause an out-of-bounds read operation under certain circumstances due to ASLR and thereby potentially copy confidential information into a response. [CVSS 5.3 MEDIUM]
Buffer Overflow
Information Disclosure
-
CVE-2025-28164
MEDIUM
CVSS 5.5
Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function. [CVSS 5.5 MEDIUM]
Buffer Overflow
Denial Of Service
Libpng
Redhat
Suse
-
CVE-2025-28162
MEDIUM
CVSS 5.5
Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive [CVSS 5.5 MEDIUM]
Buffer Overflow
Denial Of Service
Libpng
Redhat
Suse
-
CVE-2025-15469
MEDIUM
CVSS 5.5
Issue summary: The 'openssl dgst' command-line tool silently truncates input
data to 16MB when using one-shot signing algorithms and reports success instead
of an error. [CVSS 5.5 MEDIUM]
OpenSSL
Tls
Redhat
Suse
-
CVE-2025-15468
MEDIUM
CVSS 5.9
Issue summary: If an application using the SSL_CIPHER_find() function in
a QUIC protocol client or server receives an unknown cipher suite from
the peer, a NULL dereference occurs. [CVSS 5.9 MEDIUM]
OpenSSL
Tls
Null Pointer Dereference
Denial Of Service
Redhat
-
CVE-2025-14971
MEDIUM
CVSS 5.3
Link Invoice Payment for WooCommerce (WordPress plugin) versions up to 2.8.0. is affected by missing authorization (CVSS 5.3).
WordPress
PHP
-
CVE-2025-14911
MEDIUM
CVSS 6.5
User-controlled chunkSize metadata from MongoDB lacks appropriate validation allowing malformed GridFS metadata to overflow the bounding container. [CVSS 6.5 MEDIUM]
MongoDB
Redhat
Suse
-
CVE-2025-12810
MEDIUM
CVSS 6.5
Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation modules).This issue affects Secret Server On-Prem: 11.8.1, 11.9.6, 11.9.25. [CVSS 6.5 MEDIUM]
Authentication Bypass
Secret Server
-
CVE-2025-11187
MEDIUM
CVSS 6.1
Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation
which can trigger a stack-based buffer overflow, invalid pointer or NULL
pointer dereference during MAC verification. [CVSS 6.1 MEDIUM]
OpenSSL
Buffer Overflow
Null Pointer Dereference
Denial Of Service
RCE
-
CVE-2020-36978
MEDIUM
CVSS 6.4
Froxlor Server Management Panel 0.10.16 contains a persistent cross-site scripting vulnerability in customer registration input fields. Attackers can inject malicious scripts through username, name, and firstname parameters to execute code when administrators view customer traffic modules. [CVSS 6.4 MEDIUM]
XSS
-
CVE-2020-36950
MEDIUM
CVSS 6.5
Laravel Nova 3.7.0 contains a denial of service vulnerability that allows authenticated users to crash the application by manipulating the 'range' parameter. Attackers can send simultaneous requests with an extremely high range value to overwhelm and crash the server. [CVSS 6.5 MEDIUM]
Laravel
Denial Of Service
-
CVE-2026-24883
LOW
CVSS 3.7
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash). [CVSS 3.7 LOW]
Denial Of Service
-
CVE-2026-24871
None
Improper Control of Generation of Code ('Code Injection') vulnerability in pilgrimage233 Minecraft-Rcon-Manage.This issue affects Minecraft-Rcon-Manage: before 3.0.
Code Injection
-
CVE-2026-24870
LOW
CVSS 3.7
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3. [CVSS 3.7 LOW]
Information Disclosure
-
CVE-2026-24826
None
Out-of-bounds Write, Divide By Zero, NULL Pointer Dereference, Use of Uninitialized Resource, Out-of-bounds Read, Reachable Assertion vulnerability in cadaver turso3d.This issue affects .
Null Pointer Dereference
-
CVE-2026-24825
None
Missing Release of Memory after Effective Lifetime vulnerability in ydb-platform ydb (contrib/libs/yajl modules). This vulnerability is associated with program files yail_tree.C.
Denial Of Service
-
CVE-2026-24824
None
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in yacy yacy_search_server (source/net/yacy/http/servlets modules). This vulnerability is associated with program files YaCyDefaultServlet.Java.
Java
XSS
-
CVE-2026-24823
None
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in FASTSHIFT X-TRACK (Software/X-Track/USER/App/Utils/lv_img_png/PNGdec/src modules). This vulnerability is associated with program files inflate.C.
Buffer Overflow
-
CVE-2026-24822
None
Out-of-bounds Write, Heap-based Buffer Overflow vulnerability in ttttupup wxhelper (src modules). This vulnerability is associated with program files mongoose.C.
Buffer Overflow
Heap Overflow
-
CVE-2026-24821
None
Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulnerability is associated with program files lparser.C.
Buffer Overflow
Information Disclosure
-
CVE-2026-24820
None
Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulnerability is associated with program files ldebug.C.
Buffer Overflow
Information Disclosure
-
CVE-2026-24819
None
Improperly Controlled Sequential Memory Allocation vulnerability in foxinmy weixin4j (weixin4j-base/src/main/java/com/foxinmy/weixin4j/util modules). This vulnerability is associated with program files CharArrayBuffer.Java, ClassUtil.Java.
Java
-
CVE-2026-24818
None
Out-of-bounds Read vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerability is associated with program files lparser.C.
Buffer Overflow
Information Disclosure
-
CVE-2026-24817
None
Out-of-bounds Write vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerability is associated with program files ldebug.C, lvm.C.
Buffer Overflow
-
CVE-2026-24816
None
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in datavane tis (tis-console/src/main/java/com/qlangtech/tis/runtime/module/action modules). This vulnerability is associated with program files ChangeDomainAction.Java.
Java
-
CVE-2026-24815
None
Unrestricted Upload of File with Dangerous Type, Deserialization of Untrusted Data vulnerability in datavane tis (tis-plugin/src/main/java/com/qlangtech/tis/extension/impl modules). This vulnerability is associated with program files XmlFile.Java.
Java
Deserialization
-
CVE-2026-24814
None
Integer Overflow or Wraparound vulnerability in swoole swoole-src (thirdparty/hiredis modules). This vulnerability is associated with program files sds.C.
Redis
Integer Overflow
-
CVE-2026-24813
None
NULL Pointer Dereference vulnerability in abcz316 SKRoot-linuxKernelRoot (testRoot/jni/utils modules). This vulnerability is associated with program files cJSON.Cpp.
Linux
Null Pointer Dereference
-
CVE-2026-24812
None
Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with program files inftrees.C.
Buffer Overflow
Information Disclosure
-
CVE-2026-24810
None
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc.
Buffer Overflow
-
CVE-2026-24809
None
An issue from the component luaG_runerror in dependencies/lua/src/ldebug.c in praydog/REFramework versions up to 1.5.5 is affected by out-of-bounds write.
Buffer Overflow
-
CVE-2026-24808
None
Integer Overflow or Wraparound vulnerability in RawTherapee (rtengine modules). This vulnerability is associated with program files dcraw.Cc.
Integer Overflow
-
CVE-2026-24807
None
Improper Verification of Cryptographic Signature vulnerability in liuyueyi quick-media (plugins/svg-plugin/batik-codec-fix/src/main/java/org/apache/batik/ext/awt/image/codec/util modules). This vulnerability is associated with program files SeekableOutputStream.Java.
Apache
Java
-
CVE-2026-24806
None
Improper Control of Generation of Code ('Code Injection') vulnerability in liuyueyi quick-media (plugins/svg-plugin/batik-codec-fix/src/main/java/org/apache/batik/ext/awt/image/codec/png modules). This vulnerability is associated with program files PNGImageEncoder.Java.
Apache
Java
Code Injection
-
CVE-2026-24805
None
NULL Pointer Dereference vulnerability in visualfc liteide (liteidex/src/3rdparty/libvterm/src modules). This vulnerability is associated with program files screen.C, state.C, vterm.C.
Null Pointer Dereference
-
CVE-2026-24804
None
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7603e/src/mt7603_wifi/common modules). This vulnerability is associated with program files bn_lib.C.
Denial Of Service
-
CVE-2026-24803
None
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7615d/src/mt_wifi/embedded/security modules). This vulnerability is associated with program files bn_lib.C.
Denial Of Service
-
CVE-2026-24802
None
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in briandilley jsonrpc4j (src/main/java/com/googlecode/jsonrpc4j modules). This vulnerability is associated with program files NoCloseOutputStream.Java.
Java
-
CVE-2026-24801
None
Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C.
Path Traversal
-
CVE-2026-24800
None
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in tildearrow furnace (extern/zlib modules). This vulnerability is associated with program files inflate.C.
Buffer Overflow
-
CVE-2026-24799
None
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in davisking dlib (dlib/external/zlib modules). This vulnerability is associated with program files inflate.C.
Buffer Overflow
-
CVE-2026-24798
None
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GaijinEntertainment DagorEngine (prog/3rdPartyLibs/miniupnpc modules). This vulnerability is associated with program files upnpreplyparse.C.
Buffer Overflow
-
CVE-2026-24797
None
Out-of-bounds Write vulnerability in neka-nat cupoch (third_party/libjpeg-turbo/libjpeg-turbo modules). This vulnerability is associated with program files tjbench.C.
Buffer Overflow
-
CVE-2026-24796
None
Out-of-bounds Read vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regparse.C.
Buffer Overflow
Information Disclosure
-
CVE-2026-24795
None
Out-of-bounds Write vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regcomp.C.
Buffer Overflow
-
CVE-2026-24794
None
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in CardboardPowered cardboard (src/main/java/org/cardboardpowered/impl/world modules). This vulnerability is associated with program files WorldImpl.Java.
Java
-
CVE-2026-24480
None
QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called "pre-commit checks" that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context.
Github
RCE
-
CVE-2026-24344
None
Multiple Buffer Overflows in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to cause a program crash and potential remote code execution
RCE
Buffer Overflow
Denial Of Service
-
CVE-2026-22261
LOW
CVSS 3.7
Suricata versions up to 8.0.3 contains a vulnerability that allows attackers to severe slowdowns (CVSS 3.7).
Information Disclosure
-
CVE-2026-1485
LOW
CVSS 2.8
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. [CVSS 2.8 LOW]
Denial Of Service
-
CVE-2026-1465
None
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in anyrtcIO-Community anyRTC-RTMP-OpenSource (third_party/faad2-2.7/libfaad modules). This vulnerability is associated with program files bits.C, syntax.C.
Buffer Overflow
-
CVE-2026-1464
None
Integer Overflow or Wraparound vulnerability in MuntashirAkon AppManager (app/src/main/java/org/apache/commons/compress/archivers/tar modules). This vulnerability is associated with program files TarUtils.Java.
Apache
Java
Integer Overflow
-
CVE-2026-1213
None
All versions of askbot before and including 0.12.2 allow an attacker authenticated with normal user permissions to modify the profile picture of other application users.This issue affects askbot: 0.12.2.
Authentication Bypass
-
CVE-2025-14988
None
A security issue has been identified in ibaPDA that could allow unauthorized actions on the file system under certain conditions. This may impact the confidentiality, integrity, or availability of the system.
Privilege Escalation
-
CVE-2025-12387
None
A vulnerability in the Pix-Link LV-WR21Q router's language module allows remote attackers to trigger a denial of service (DoS) by sending a specially crafted HTTP POST request containing non-existing language parameter.
Denial Of Service
-
CVE-2025-12386
None
Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point.
Authentication Bypass