211 CVEs tracked today. 21 Critical, 79 High, 102 Medium, 3 Low.
-
CVE-2025-40551
CRITICAL
CVSS 9.8
SolarWinds Web Help Desk contains an unauthenticated Java deserialization vulnerability (CVE-2025-40551, CVSS 9.8) that enables remote code execution. With EPSS 80.6% and KEV listing, this is the more severe of two concurrent WHD vulnerabilities, allowing attackers to execute arbitrary commands on the host server without any credentials.
RCE
Deserialization
Web Help Desk
-
CVE-2026-24897
CRITICAL
CVSS 10.0
Erugo file-sharing platform up to version 0.2.14 has a CVSS 10.0 path traversal allowing authenticated users to read any file on the server including secrets and configuration.
Golang
RCE
Erugo
-
CVE-2026-24857
CRITICAL
CVSS 9.8
bulk_extractor digital forensics tool starting from version 1.4 has a heap buffer overflow in its embedded unrar code that can be triggered by crafted RAR archives.
Industrial
Memory Corruption
Denial Of Service
Bulk Extractor
Suse
-
CVE-2026-24841
CRITICAL
CVSS 9.9
Dokploy self-hosted PaaS prior to 0.26.6 has a critical command injection vulnerability (CVSS 9.9) allowing authenticated users to execute arbitrary OS commands on the host.
Docker
Command Injection
Dokploy
-
CVE-2026-24838
CRITICAL
CVSS 9.1
DNN (DotNetNuke) CMS has a stored XSS vulnerability (CVSS 9.1) allowing persistent script injection that executes for all users viewing the affected content.
Dotnet
Dotnetnuke
-
CVE-2026-24785
CRITICAL
CVSS 9.1
Clatter Noise protocol library has a broken cryptographic algorithm implementation that weakens post-quantum security guarantees in encrypted communications.
Information Disclosure
Clatter
-
CVE-2026-24769
CRITICAL
CVSS 9.0
NocoDB spreadsheet platform prior to 0.301.0 has a stored XSS vulnerability (CVSS 9.0) that enables code execution through malicious cell content in shared views.
XSS
Nocodb
-
CVE-2026-23830
CRITICAL
CVSS 10.0
SandboxJS library prior to 0.8.26 has a CVSS 10.0 sandbox escape via AsyncFunction constructor, allowing execution of arbitrary code outside the sandbox boundary.
RCE
Sandboxjs
-
CVE-2026-1056
CRITICAL
CVSS 9.8
Snow Monkey Forms WordPress plugin has an arbitrary file deletion vulnerability through insufficient path validation, enabling attackers to delete critical WordPress files.
WordPress
PHP
RCE
-
CVE-2025-69602
CRITICAL
CVSS 9.1
66biolinks v62.0.0 has a session fixation vulnerability where the application doesn't regenerate session IDs after authentication, enabling session hijacking.
Information Disclosure
66biolinks
-
CVE-2025-61140
CRITICAL
CVSS 9.8
jsonpath library 1.1.1 has a prototype pollution vulnerability in the value function that allows attackers to modify JavaScript object prototypes and potentially achieve RCE.
Code Injection
Jsonpath
Redhat
Suse
-
CVE-2025-57795
CRITICAL
CVSS 9.9
Explorance Blue before 8.14.13 has an authenticated remote file download vulnerability in a web service that allows downloading arbitrary files from the server.
RCE
Blue
-
CVE-2025-57794
CRITICAL
CVSS 9.1
Explorance Blue before 8.14.9 has an authenticated file upload vulnerability allowing administrators to upload executable files to the server.
RCE
Blue
-
CVE-2025-57792
CRITICAL
CVSS 10.0
Explorance Blue versions before 8.14.9 have a CVSS 10.0 SQL injection vulnerability enabling unauthenticated attackers to fully compromise the survey and assessment database.
SQLi
Blue
-
CVE-2025-40554
CRITICAL
CVSS 9.8
SolarWinds Web Help Desk has a second authentication bypass (EPSS 7.8%) providing yet another path to unauthenticated admin access.
Authentication Bypass
Web Help Desk
-
CVE-2025-40553
CRITICAL
CVSS 9.8
SolarWinds Web Help Desk has a second deserialization vulnerability (EPSS 11.9%) providing another unauthenticated RCE path alongside CVE-2025-40551.
RCE
Deserialization
Web Help Desk
-
CVE-2025-40552
CRITICAL
CVSS 9.8
SolarWinds Web Help Desk has an authentication bypass vulnerability (EPSS 9.9%) that allows unauthenticated attackers to gain admin access to the helpdesk system.
Authentication Bypass
Web Help Desk
-
CVE-2025-40536
HIGH
CVSS 8.1
SolarWinds Web Help Desk contains a security control bypass vulnerability (CVE-2025-40536) that allows unauthenticated attackers to access restricted functionality. With EPSS 69% and KEV listing, this CVSS 8.1 vulnerability is particularly concerning given SolarWinds' history of being targeted in supply chain attacks and the sensitive IT service data typically stored in help desk systems.
Authentication Bypass
Web Help Desk
-
CVE-2020-36967
CRITICAL
CVSS 9.8
Zortam Mp3 Media Studio 27.60 has a buffer overflow in the library file selection dialog that allows code execution through crafted library files.
RCE
Buffer Overflow
-
CVE-2020-36964
CRITICAL
CVSS 9.8
YATinyWinFTP has a denial of service vulnerability allowing remote attackers to crash the FTP service by sending a 272-byte crafted packet.
Buffer Overflow
Denial Of Service
-
CVE-2020-36962
CRITICAL
CVSS 9.8
Tendenci 12.3.1 has a CSV formula injection in the contact form message field enabling code execution when administrators export and open data in spreadsheet applications.
Code Injection
Tendenci
-
CVE-2020-36961
CRITICAL
CVSS 9.8
10-Strike Network Inventory Explorer 8.65 has a buffer overflow in exception handling that allows remote code execution by crashing the application with crafted network data.
Buffer Overflow
-
CVE-2026-24856
HIGH
CVSS 7.8
Arbitrary code execution in iccDEV versions before 2.3.1.2 occurs when malformed ICC color profiles containing NaN floating-point values are parsed, causing undefined behavior during type conversion that corrupts memory structures. Local attackers can exploit this by crafting malicious ICC profiles that applications process, and public exploit code exists for this vulnerability. The issue affects any system using the iccDEV library to handle ICC profile data, with a patch available in version 2.3.1.2.
RCE
Code Injection
Iccdev
-
CVE-2026-24842
HIGH
CVSS 8.2
node-tar before version 7.5.7 contains a path traversal vulnerability where inconsistent path resolution between validation and execution logic allows attackers to bypass security checks and create hardlinks to arbitrary files outside the intended extraction directory. Public exploit code exists for this vulnerability, affecting Node.js applications that process untrusted TAR archives. An attacker can craft a malicious TAR file to write to sensitive locations on the system.
D-Link
Node.js
Industrial
Path Traversal
Tar
-
CVE-2026-24840
HIGH
CVSS 8.0
Dokploy versions before 0.26.6 contain hardcoded database credentials in the installation script, causing nearly all deployments to share identical credentials that can be obtained from the publicly available install.sh file. An authenticated attacker on the network can leverage these credentials to access the database, potentially achieving high-impact compromise of confidentiality, integrity, and availability. Public exploit code exists for this vulnerability and a patch is available in version 0.26.6 and later.
Authentication Bypass
Dokploy
-
CVE-2026-24837
HIGH
CVSS 7.6
Stored cross-site scripting in DNN versions 9.0.0 through 9.13.9 and 10.0.0 through 10.1.x allows high-privileged users with UI interaction to inject malicious scripts into module friendly names that execute within the Persona Bar administrative interface. An authenticated attacker with sufficient permissions could exploit this to perform administrative actions or compromise other users' sessions. No patch is currently available for affected versions.
Dotnet
Dotnetnuke
-
CVE-2026-24836
HIGH
CVSS 7.6
Stored cross-site scripting in DNN versions 9.0.0 through 9.13.9 and 10.0.0 through 10.1.x allows authenticated administrators with high privileges to inject malicious scripts into log notes that execute within the PersonaBar interface. An attacker with admin credentials could perform actions as the victim or steal session data when the logs are viewed. Upgrade to DNN 9.13.10 or 10.2.0 to remediate this vulnerability.
Dotnet
Dotnetnuke
-
CVE-2026-24835
HIGH
CVSS 7.1
Podman Desktop versions prior to 1.25.1 contain an authentication bypass in the extension permission framework where the `isAccessAllowed()` function always returns true, allowing malicious extensions to hijack authentication sessions and access sensitive resources without authorization. Public exploit code exists for this vulnerability, affecting all current deployments of the affected product. Administrators should upgrade to version 1.25.1 or later immediately.
Kubernetes
Authentication Bypass
Podman Desktop
Redhat
-
CVE-2026-24833
HIGH
CVSS 7.6
DotNetNuke versions prior to 9.13.10 and 10.2.0 allow arbitrary script execution in the Persona Bar administrative interface through unsanitized richtext content in module descriptions. An authenticated attacker with module installation privileges can inject malicious scripts that execute in the context of administrative users, potentially compromising sensitive data or administrative functions. This vulnerability requires high privileges and user interaction to exploit, with no public patch currently available for affected versions.
Dotnet
Dotnetnuke
-
CVE-2026-24772
HIGH
CVSS 8.9
Token decryption in OpenProject 17.0 allows authenticated attackers to intercept and decrypt 24-hour authentication tokens by exploiting insufficient validation of backend URLs in the real-time collaboration synchronization server. An attacker with valid credentials could redirect the synchronization server to a controlled endpoint, forcing it to send the decrypted token and enabling unauthorized access to document collaboration features. No patch is currently available for this high-severity vulnerability affecting authenticated users.
Authentication Bypass
Openproject
-
CVE-2026-24685
HIGH
CVSS 8.8
Arbitrary file write in OpenProject versions before 16.6.6 and 17.0.2 allows authenticated users with repository browse permissions to inject malicious git command options via a crafted rev parameter, enabling creation or overwriting of arbitrary files with the privileges of the OpenProject process. An attacker can exploit the `/projects/:project_id/repository/diff.diff` endpoint to write git show output to attacker-controlled file paths on the server. No patch is currently available for this high-severity vulnerability affecting the open-source project management platform.
Denial Of Service
Openproject
-
CVE-2026-23743
HIGH
CVSS 7.5
Discourse is an open source discussion platform. [CVSS 7.5 HIGH]
Information Disclosure
Discourse
-
CVE-2026-22243
HIGH
CVSS 8.8
SQL injection in EGroupware's Nextmatch filter allows authenticated attackers to execute arbitrary database commands by exploiting PHP type juggling that bypasses integer validation checks. Public exploit code exists for this vulnerability affecting EGroupware versions prior to 23.1.20260113 and 26.0.20260113, and no patch is currently available. Attackers with valid credentials can manipulate WHERE clauses to extract sensitive data, modify records, or compromise database integrity.
PHP
SQLi
Egroupware
-
CVE-2026-21569
HIGH
CVSS 7.9
XXE injection in Atlassian Crowd Data Center and Server 7.1.0+ enables authenticated attackers to read local and remote files, significantly compromising confidentiality and availability. The vulnerability requires high privileges to exploit but accepts no user interaction, affecting multiple Crowd versions until patching to 7.1.3 or later. No patch is currently available for all affected versions.
Atlassian
Confluence
XXE
Crowd
-
CVE-2026-1545
HIGH
CVSS 7.3
School Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).
PHP
SQLi
School Management System
-
CVE-2026-1535
HIGH
CVSS 7.3
SQL injection in Online Music Site 1.0's AdminReply.php allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary SQL queries, potentially compromising database confidentiality and integrity. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations at immediate risk.
PHP
SQLi
Online Music Site
-
CVE-2026-1534
HIGH
CVSS 7.3
SQL injection in Online Music Site 1.0's AdminEditUser.php allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, enabling potential data theft, modification, or service disruption. No patch is currently available, leaving affected installations vulnerable.
PHP
SQLi
Online Music Site
-
CVE-2026-1506
HIGH
CVSS 7.2
Unauthenticated remote attackers can inject arbitrary OS commands through the MAC filter configuration parameter in D-Link DIR-615 firmware version 4.10 and potentially earlier versions. Public exploit code exists for this vulnerability, and affected devices are no longer receiving security updates from D-Link. Successful exploitation grants complete system compromise with high impact to confidentiality, integrity, and availability.
D-Link
PHP
Command Injection
Dir 615 Firmware
-
CVE-2026-1505
HIGH
CVSS 7.2
Command injection in D-Link DIR-615 firmware via the /set_temp_nodes.php URL Filter component allows unauthenticated remote attackers to execute arbitrary OS commands. Public exploit code exists for this vulnerability, which affects legacy unsupported devices with a 7.2 CVSS score and no available patch.
D-Link
PHP
Command Injection
Dir 615 Firmware
-
CVE-2026-1400
HIGH
CVSS 7.2
Arbitrary file upload in AI Engine WordPress plugin versions up to 3.3.2 allows authenticated Editor-level users to bypass file type validation and execute remote code by uploading files through the `update_media_metadata` REST endpoint. An attacker can upload a benign image file and then rename it to PHP, placing executable code in the web-accessible uploads directory. The vulnerability affects WordPress installations with the plugin installed and requires Editor or higher privileges to exploit.
WordPress
PHP
RCE
AI / ML
-
CVE-2026-1280
HIGH
CVSS 7.5
The Frontend File Manager Plugin for WordPress through version 23.5 lacks proper authorization checks on a file sharing AJAX endpoint, allowing unauthenticated attackers to enumerate and exfiltrate sensitive uploaded files via sequential ID manipulation. By exploiting this flaw, an attacker can email arbitrary files to themselves or others, potentially exposing restricted administrative data. No patch is currently available for this high-severity vulnerability.
WordPress
-
CVE-2026-0844
HIGH
CVSS 8.8
Simple User Registration (WordPress plugin) versions up to 6.7 is affected by improper access control (CVSS 8.8).
WordPress
Privilege Escalation
Authentication Bypass
-
CVE-2026-0832
HIGH
CVSS 7.3
New User Approve (WordPress plugin) versions up to 3.2.2. is affected by missing authorization (CVSS 7.3).
WordPress
-
CVE-2026-0750
HIGH
CVSS 7.5
Commerce Paybox versions up to 7.X-1.5. is affected by improper verification of cryptographic signature (CVSS 7.5).
Drupal
Authentication Bypass
Commerce Paybox
-
CVE-2026-0702
HIGH
CVSS 7.5
Unauthenticated attackers can exploit time-based SQL injection in the VidShop plugin for WordPress (versions up to 1.1.4) through the unescaped 'fields' parameter to extract sensitive database information. The vulnerability stems from insufficient input validation and improper query preparation, allowing attackers to inject malicious SQL commands without authentication. No patch is currently available for this high-severity flaw affecting WooCommerce installations.
WordPress
SQLi
-
CVE-2025-71007
HIGH
CVSS 7.5
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-71003
HIGH
CVSS 7.5
An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-71000
HIGH
CVSS 7.5
An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-70999
HIGH
CVSS 7.5
A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-69517
HIGH
CVSS 8.8
An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator att...
RCE
Code Injection
-
CVE-2025-68662
HIGH
CVSS 7.6
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. [CVSS 7.6 HIGH]
SSRF
Discourse
-
CVE-2025-68479
HIGH
CVSS 7.1
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, some subscription endpoints lack proper checking for ownership before making changes. [CVSS 7.1 HIGH]
Authentication Bypass
Discourse
-
CVE-2025-68119
HIGH
CVSS 7.0
Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. [CVSS 7.0 HIGH]
Buffer Overflow
RCE
Go
Redhat
Suse
-
CVE-2025-67645
HIGH
CVSS 8.8
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. [CVSS 8.8 HIGH]
Authentication Bypass
Openemr
-
CVE-2025-65891
HIGH
CVSS 7.5
A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-65890
HIGH
CVSS 7.5
A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-65889
HIGH
CVSS 7.5
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-65888
HIGH
CVSS 7.5
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-65886
HIGH
CVSS 7.5
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes. [CVSS 7.5 HIGH]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-61731
HIGH
CVSS 7.8
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. [CVSS 7.8 HIGH]
Golang
Go
Redhat
Suse
-
CVE-2025-61726
HIGH
CVSS 7.5
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. [CVSS 7.5 HIGH]
Denial Of Service
Go
Redhat
Suse
-
CVE-2025-59895
HIGH
CVSS 7.5
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a remote denial-of-service (DoS) vulnerability in the configuration restore functionality. The issue is due to insufficient validation of user-supplied data during this process. [CVSS 7.5 HIGH]
Denial Of Service
Code Injection
Syncbreeze
Diskpulse
-
CVE-2025-59894
HIGH
CVSS 8.0
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. [CVSS 8.0 HIGH]
CSRF
Diskpulse
Syncbreeze
-
CVE-2025-59893
HIGH
CVSS 8.0
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. [CVSS 8.0 HIGH]
CSRF
Syncbreeze
Diskpulse
-
CVE-2025-59892
HIGH
CVSS 8.0
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. [CVSS 8.0 HIGH]
CSRF
Diskpulse
Syncbreeze
-
CVE-2025-59891
HIGH
CVSS 8.0
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. [CVSS 8.0 HIGH]
CSRF
Diskpulse
Syncbreeze
-
CVE-2025-58150
HIGH
CVSS 8.8
Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. [CVSS 8.8 HIGH]
Buffer Overflow
Xen
Suse
-
CVE-2025-57793
HIGH
CVSS 8.6
Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. [CVSS 8.6 HIGH]
SQLi
Blue
-
CVE-2025-57283
HIGH
CVSS 7.8
The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js. [CVSS 7.8 HIGH]
Node.js
Command Injection
Browserstack Local
Redhat
-
CVE-2025-55292
HIGH
CVSS 8.2
Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. [CVSS 8.2 HIGH]
Information Disclosure
Meshtastic Firmware
-
CVE-2025-46691
HIGH
CVSS 7.8
Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. [CVSS 7.8 HIGH]
Authentication Bypass
Dell
Premiercolor
-
CVE-2025-40537
HIGH
CVSS 7.5
SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions. [CVSS 7.5 HIGH]
Authentication Bypass
Web Help Desk
-
CVE-2025-33220
HIGH
CVSS 7.8
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. [CVSS 7.8 HIGH]
Denial Of Service
Privilege Escalation
Information Disclosure
-
CVE-2025-33219
HIGH
CVSS 7.8
NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. [CVSS 7.8 HIGH]
Linux
Integer Overflow
Denial Of Service
Privilege Escalation
Information Disclosure
-
CVE-2025-33218
HIGH
CVSS 7.8
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. [CVSS 7.8 HIGH]
Linux
Windows
Integer Overflow
Denial Of Service
Privilege Escalation
-
CVE-2025-33217
HIGH
CVSS 7.8
NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. [CVSS 7.8 HIGH]
Windows
Use After Free
Denial Of Service
Privilege Escalation
Information Disclosure
-
CVE-2025-14840
HIGH
CVSS 7.5
Http Client Manager versions up to 9.3.13 is affected by improper check for unusual or exceptional conditions (CVSS 7.5).
Drupal
Http Client Manager
Redhat
-
CVE-2025-14610
HIGH
CVSS 7.2
The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config....
WordPress
PHP
SSRF
-
CVE-2025-14472
HIGH
CVSS 8.1
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3. [CVSS 8.1 HIGH]
Drupal
CSRF
Acquia Content Hub
-
CVE-2025-14386
HIGH
CVSS 8.8
The Search Atlas SEO - Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization plugin for WordPress is vulnerable to authentication bypass due to a missing capability check on the 'generate_sso_url' and 'validate_sso_token' functions in versions 2.4.4 to 2.5.12. [CVSS 8.8 HIGH]
WordPress
Authentication Bypass
PHP
-
CVE-2025-13982
HIGH
CVSS 8.1
Login Time Restriction versions up to 1.0.3. is affected by cross-site request forgery (csrf) (CVSS 8.1).
Drupal
CSRF
Login Time Restriction
-
CVE-2025-13917
HIGH
CVSS 7.0
WSS Agent, prior to 9.8.5, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. [CVSS 7.0 HIGH]
Privilege Escalation
-
CVE-2022-40620
HIGH
CVSS 7.7
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. [CVSS 7.7 HIGH]
Netgear
Tls
R6230 Firmware
Rax120 Firmware
R8900 Firmware
-
CVE-2022-40619
HIGH
CVSS 7.7
FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. [CVSS 7.7 HIGH]
Netgear
Command Injection
R7000 Firmware
Xr300 Firmware
R6230 Firmware
-
CVE-2020-36992
HIGH
CVSS 7.8
its nordvpn-service contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Information Disclosure
-
CVE-2020-36991
HIGH
CVSS 7.8
ShareMouse 5.0.43 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. [CVSS 7.8 HIGH]
RCE
-
CVE-2020-36990
HIGH
CVSS 7.8
its Windows service configuration contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Windows
-
CVE-2020-36989
HIGH
CVSS 7.8
ForensiT AppX Management Service 2.2.0.4 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. [CVSS 7.8 HIGH]
RCE
-
CVE-2020-36987
HIGH
CVSS 7.8
PACService.exe contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Code Injection
-
CVE-2020-36986
HIGH
CVSS 7.8
Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot. [CVSS 7.8 HIGH]
Information Disclosure
-
CVE-2020-36985
HIGH
CVSS 7.8
its Windows service configuration contains a vulnerability that allows attackers to execute arbitrary code (CVSS 7.8).
Windows
-
CVE-2020-36984
HIGH
CVSS 7.8
SENADB service contains a vulnerability that allows attackers to execute code with elevated system privileges (CVSS 7.8).
Code Injection
-
CVE-2020-36972
HIGH
CVSS 8.2
SmartBlog 2.0.1 contains a blind SQL injection vulnerability in the 'id_post' parameter of the details controller that allows attackers to extract database information. [CVSS 8.2 HIGH]
SQLi
Smartblog
-
CVE-2020-36971
HIGH
CVSS 8.4
Nidesoft 3GP Video Converter 2.6.18 contains a local stack buffer overflow vulnerability in the license registration parameter. Attackers can craft a malicious payload and paste it into the 'License Code' field to execute arbitrary code on the system. [CVSS 8.4 HIGH]
Buffer Overflow
-
CVE-2020-36970
HIGH
CVSS 8.4
PMB 5.6 contains a local file disclosure vulnerability in getgif.php that allows attackers to read arbitrary system files by manipulating the 'chemin' parameter. [CVSS 8.4 HIGH]
PHP
-
CVE-2020-36969
HIGH
CVSS 8.8
M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. [CVSS 8.8 HIGH]
Privilege Escalation
-
CVE-2020-36965
HIGH
CVSS 8.4
docPrint Pro 8.0 contains a local buffer overflow vulnerability in the 'Add URL' input field that allows attackers to execute arbitrary code by overwriting memory. [CVSS 8.4 HIGH]
Buffer Overflow
-
CVE-2020-36963
HIGH
CVSS 7.5
Intelbras Router RF 301K firmware version 1.1.2 contains an authentication bypass vulnerability that allows unauthenticated attackers to download router configuration files. [CVSS 7.5 HIGH]
Authentication Bypass
-
CVE-2020-36945
HIGH
CVSS 8.2
WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating email credentials. [CVSS 8.2 HIGH]
SQLi
-
CVE-2020-36943
HIGH
CVSS 7.5
aSc TimeTables 2021.6.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting subject title fields with excessive data. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2026-24889
MEDIUM
CVSS 5.3
Arithmetic overflow in Soroban SDK versions up to 25.0.2 allows contracts using user-controlled range bounds in Bytes::slice, Vec::slice, or Prng::gen_range methods to operate on incorrect data ranges or generate unintended random numbers, potentially corrupting contract state. Developers who do not enable overflow-checks in their Rust configuration are vulnerable to this silent data corruption. A patch is available and should be applied immediately to affected Soroban contracts.
Github
Rs Soroban Sdk
-
CVE-2026-24888
MEDIUM
CVSS 6.5
Maker.js versions up to 0.19.1 improperly validate object properties in the `extendObject` function, allowing inherited and malicious properties to be copied to target objects without filtering. Applications using the library are vulnerable to property injection attacks, and public exploit code exists for this vulnerability. A patch is available in version 0.19.2.
Code Injection
Maker.Js
-
CVE-2026-24852
MEDIUM
CVSS 6.1
A heap buffer over-read in iccDEV versions prior to 2.3.1.2 allows local attackers with user interaction to leak sensitive heap memory contents or crash the application when processing specially crafted ICC color profiles. The vulnerability stems from unsafe handling of non-null-terminated buffers in the strlen() function during ICC profile processing. Users of the iccDEV library should upgrade to version 2.3.1.2 to remediate this issue.
Buffer Overflow
Iccdev
-
CVE-2026-24850
MEDIUM
CVSS 5.3
The RustCrypto ml-dsa crate versions 0.0.4 through 0.1.0-rc.3 incorrectly validate ML-DSA digital signatures by accepting duplicate hint indices that should be strictly increasing per the FIPS 204 specification, allowing attackers to forge valid signatures that should be rejected. This regression was introduced by a comparison operator change in version 0.0.4 and affects any application relying on this crate for signature verification. A patch is available in version 0.1.0-rc.4.
Information Disclosure
-
CVE-2026-24839
MEDIUM
CVSS 4.7
Dokploy versions up to 0.26.6 is affected by improper restriction of rendered ui layers or frames (CVSS 4.7).
XSS
Dokploy
-
CVE-2026-24784
MEDIUM
CVSS 6.8
Stored cross-site scripting in DNN versions 9.0.0 through 10.1.x allows content editors to inject malicious scripts into module headers and footers that execute in the browsers of other users. An authenticated editor with content creation privileges can exploit this to steal session tokens, perform actions on behalf of other users, or redirect them to malicious sites. Updates to version 9.13.10 or 10.2.0 are required to remediate the vulnerability.
Dotnet
Dotnetnuke
-
CVE-2026-24775
MEDIUM
CVSS 6.3
Insufficient input validation in OpenProject's BlockNote editor extension allows authenticated users to craft malicious documents containing relative links that trigger arbitrary GET requests to any URL within the OpenProject instance when opened. An attacker with document creation privileges can exploit this to access sensitive information or perform unauthorized actions on behalf of other users. A patch is available in OpenProject 17.0.2 and op-blocknote-extensions 0.0.22.
Authentication Bypass
Openproject
-
CVE-2026-24768
MEDIUM
CVSS 6.1
NocoDB versions prior to 0.301.0 contain an open redirect vulnerability in the login flow where the `continueAfterSignIn` parameter is not validated, allowing attackers to redirect authenticated users to arbitrary external websites. Public exploit code exists for this vulnerability, which enables phishing attacks by abusing user trust in the legitimate login process to facilitate credential theft through social engineering. Authenticated users are at risk of being redirected to attacker-controlled domains immediately after successful login.
Privilege Escalation
Authentication Bypass
Open Redirect
Nocodb
-
CVE-2026-24767
MEDIUM
CVSS 4.9
NocoDB versions prior to 0.301.0 contain a blind SSRF vulnerability in the uploadViaURL feature where an unvalidated HEAD request allows authenticated attackers to probe arbitrary URLs and internal networks before SSRF protections are enforced. Public exploit code exists for this vulnerability, though it has limited impact due to the lack of response data exfiltration. Users should upgrade to version 0.301.0 or later, though no patch is currently available for older versions.
SSRF
Nocodb
-
CVE-2026-24766
MEDIUM
CVSS 4.9
Prototype pollution in NocoDB's connection test endpoint allows authenticated org-level creators to disrupt all database write operations application-wide until server restart, with public exploit code available. Although the vulnerability can bypass SUPER_ADMIN authorization checks, the resulting denial of service prevents actual exploitation of elevated privileges. The issue affects versions prior to 0.301.0 with no patch currently available.
Code Injection
Nocodb
-
CVE-2026-24742
MEDIUM
CVSS 6.5
Discourse versions before 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 allow non-admin moderators to access restricted staff action logs containing sensitive data such as webhook secrets, API keys, private messages, and restricted category information. An attacker with moderator privileges could extract confidential information and use leaked webhook credentials to spoof events to integrated services. No patch is currently available for this access control bypass.
Authentication Bypass
Discourse
-
CVE-2026-24739
MEDIUM
CVSS 6.3
Symfony versions up to 5.4.51 contains a vulnerability that allows attackers to operations being performed on an unintended path, up to and including deletion o (CVSS 6.3).
Windows
PHP
Symfony
-
CVE-2026-24134
MEDIUM
CVSS 6.5
headless content management system. versions up to 0.2.0 is affected by authorization bypass through user-controlled key (CVSS 6.5).
Authentication Bypass
Studiocms
-
CVE-2026-23014
MEDIUM
CVSS 5.5
Linux kernel perf subsystem denial of service via improper hrtimer cleanup allows local users with standard privileges to cause a system crash when perf events are freed with active hrtimerss still pending. The vulnerability stems from insufficient timer cancellation during event destruction, enabling resource exhaustion. No patch is currently available.
Linux
Information Disclosure
Linux Kernel
Redhat
Suse
-
CVE-2026-21865
MEDIUM
CVSS 6.5
Discourse versions before 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 allow moderators with insufficient permissions to convert private messages into public topics, potentially exposing sensitive user communications. The vulnerability affects any Discourse instance where untrusted moderators have access to moderation features. Site administrators can mitigate this by temporarily removing moderator privileges or disabling personal message access for moderator groups until patching to a fixed version.
Industrial
Discourse
-
CVE-2026-1550
MEDIUM
CVSS 6.3
Improper authorization in PHPGurukul Hospital Management System 1.0 allows authenticated attackers to manipulate the Admin Dashboard Page and gain unauthorized access to sensitive functionality. Public exploit code exists for this vulnerability, and no patch is currently available. The network-accessible flaw requires only valid credentials to exploit, enabling attackers to bypass access controls with low complexity.
Information Disclosure
Hospital Management System
-
CVE-2026-1549
MEDIUM
CVSS 4.3
jshERP versions up to 3.6 contain a path traversal vulnerability in the PluginController's file upload functionality that allows authenticated attackers to read arbitrary files on the server. Public exploit code exists for this vulnerability, and the vendor has not yet released a patch despite being notified of the issue.
Path Traversal
Jsherp
-
CVE-2026-1548
MEDIUM
CVSS 6.3
Command injection in Totolik A7000R firmware (version 4.1cu.4154) via the CloudACManualUpdateUserdata function allows authenticated remote attackers to execute arbitrary commands through a crafted url parameter. Public exploit code exists for this vulnerability and no patch is currently available.
Command Injection
A7000r Firmware
-
CVE-2026-1547
MEDIUM
CVSS 6.3
Command injection in Totolik A7000R firmware allows authenticated remote attackers to execute arbitrary commands through the plugin_name parameter in the setUnloadUserData function. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires network access and valid credentials but no user interaction.
Command Injection
A7000r Firmware
-
CVE-2026-1546
MEDIUM
CVSS 6.3
SQL injection in jshERP up to version 3.6 allows authenticated remote attackers to manipulate the barCodes parameter in the DepotItem import function, potentially enabling unauthorized data access or modification. Public exploit code exists for this vulnerability, and no patch is currently available. The vendor has not responded to early notification of this issue.
SQLi
Jsherp
-
CVE-2026-1544
MEDIUM
CVSS 6.3
D-Link DIR-823X routers are vulnerable to remote command injection through the lan_gateway parameter in the /goform/set_mode function, allowing authenticated attackers to execute arbitrary OS commands. Public exploit code is available for this vulnerability, and affected devices are no longer receiving security updates from the vendor. The attack requires network access and valid credentials but has a low CVSS score of 6.3 due to limited impact scope.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-1539
MEDIUM
CVSS 5.8
libsoup's HTTP redirect handling fails to strip Proxy-Authorization headers when requests are forwarded to different hosts, allowing proxy credentials to be exposed to unintended third-party servers. Applications relying on libsoup for HTTP communication are vulnerable to disclosure of sensitive proxy authentication data. No patch is currently available.
Information Disclosure
Redhat
Suse
-
CVE-2026-1536
MEDIUM
CVSS 5.8
HTTP header injection in libsoup through CRLF sequences in the Content-Disposition header allows unauthenticated remote attackers to inject arbitrary headers or split responses without user interaction. Public exploit code exists for this vulnerability. The flaw affects any application using vulnerable versions of libsoup to process untrusted HTTP headers, with no patch currently available.
Code Injection
Redhat
Suse
-
CVE-2026-1533
MEDIUM
CVSS 4.7
SQL injection in Online Music Site 1.0's AdminAddCategory.php allows remote attackers with high privileges to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available.
PHP
SQLi
Online Music Site
-
CVE-2026-1522
MEDIUM
CVSS 5.3
Remote denial of service in Open5GS up to version 2.7.6 affects the SGWC component's bearer response handler, allowing unauthenticated attackers to crash the service over the network. Public exploit code exists for this vulnerability, though a patch (commit b19cf6a) is available to resolve it.
Denial Of Service
Open5gs
-
CVE-2026-1521
MEDIUM
CVSS 5.3
Remote denial of service in Open5GS up to version 2.7.6 allows unauthenticated attackers to crash the SGWC component by manipulating bearer resource failure indication messages. Public exploit code exists for this vulnerability, and a patch is available in commit 69b53add90a9479d7960b822fc60601d659c328b.
Denial Of Service
Open5gs
-
CVE-2026-1514
MEDIUM
CVSS 6.5
The 2100 Technology Document Management System contains an authorization bypass that permits authenticated users to access and read all official documents by manipulating front-end code. An attacker with valid credentials can exploit this vulnerability to disclose sensitive documents without requiring additional privileges or user interaction. No patch is currently available for this vulnerability.
Authentication Bypass
-
CVE-2026-1513
MEDIUM
CVSS 6.1
Cross-site scripting (XSS) in Billboard.js versions before 3.18.0 enables remote attackers to inject and execute arbitrary JavaScript through inadequately sanitized chart configuration options, affecting any application using the vulnerable library. The attack requires user interaction but can compromise confidentiality and integrity of affected web applications. No patch is currently available.
XSS
Billboard.Js
Suse
-
CVE-2026-1466
MEDIUM
CVSS 6.1
Jirafeau's MIME type validation can be bypassed by sending crafted HTTP requests with invalid MIME types, allowing attackers to trigger browser-based MIME sniffing that may execute malicious JavaScript embedded in SVG or HTML files. An unauthenticated remote attacker can exploit this through a simple network request requiring user interaction to view a malicious preview. A patch is available and the vulnerability affects Jirafeau and related products.
Jira
XSS
Jirafeau
-
CVE-2026-1399
MEDIUM
CVSS 4.4
Stored XSS in WP Google Ad Manager Plugin up to version 1.1.0 allows administrators to inject malicious scripts into WordPress pages through insufficiently sanitized admin settings, affecting multi-site installations and configurations with disabled unfiltered_html. Authenticated attackers with administrator privileges can exploit this to execute arbitrary JavaScript that persists and runs for all users visiting affected pages. No patch is currently available.
WordPress
XSS
-
CVE-2026-1398
MEDIUM
CVSS 4.3
The Change WP URL plugin for WordPress through version 1.0 lacks proper nonce validation, allowing unauthenticated attackers to modify the WordPress login URL through cross-site request forgery if they can socially engineer a site administrator into clicking a malicious link. This vulnerability affects all WordPress installations using the vulnerable plugin and enables attackers to redirect administrator access to attacker-controlled pages. No patch is currently available.
WordPress
CSRF
-
CVE-2026-1391
MEDIUM
CVSS 5.3
The Vzaar Media Management WordPress plugin through version 1.2 contains a reflected cross-site scripting vulnerability in the PHP_SELF variable that lacks proper input sanitization, allowing unauthenticated attackers to inject malicious scripts. An attacker can exploit this by crafting a malicious link and tricking users into clicking it, leading to arbitrary script execution in their browsers. No patch is currently available for this vulnerability.
WordPress
XSS
-
CVE-2026-1389
MEDIUM
CVSS 4.3
Authenticated attackers with Author-level permissions can read, modify, and delete document library entries belonging to other users in the Document Embedder plugin for WordPress through improper access control checks in multiple AJAX handlers. The vulnerability affects all versions up to 2.0.4 and requires no additional user interaction, allowing privilege escalation within the plugin's document management system. No patch is currently available.
WordPress
Authentication Bypass
-
CVE-2026-1381
MEDIUM
CVSS 4.4
Order Minimum/Maximum Amount Limits for WooCommerce (WordPress plugin) is affected by cross-site scripting (xss) (CVSS 4.4).
WordPress
XSS
-
CVE-2026-1380
MEDIUM
CVSS 4.3
Bitcoin Donate Button (WordPress plugin) is affected by cross-site request forgery (csrf) (CVSS 4.3).
WordPress
CSRF
-
CVE-2026-1377
MEDIUM
CVSS 4.3
Unauthenticated attackers can modify WordPress imwptip plugin settings through cross-site request forgery attacks by exploiting missing nonce validation in versions up to 1.1. An attacker can trick site administrators into clicking a malicious link to alter plugin configurations without authentication. No patch is currently available for this vulnerability.
WordPress
CSRF
-
CVE-2026-1310
MEDIUM
CVSS 5.3
Unauthenticated attackers can delete arbitrary calendar entries in the Simple Calendar for Elementor WordPress plugin through versions 1.6.6 due to missing authorization checks on an AJAX function that accepts both authenticated and unauthenticated requests. An attacker only needs a valid nonce and the target calendar entry ID to perform the deletion. No patch is currently available for this vulnerability.
WordPress
-
CVE-2026-1298
MEDIUM
CVSS 4.3
The Easy Replace Image plugin for WordPress up to version 3.5.2 lacks proper authorization checks on its AJAX image replacement function, allowing authenticated users with Contributor-level privileges to replace arbitrary image attachments with external URLs. This enables attackers to deface sites, conduct phishing attacks, or manipulate content without administrative oversight. No patch is currently available for this medium-severity vulnerability.
WordPress
Authentication Bypass
-
CVE-2026-1295
MEDIUM
CVSS 6.4
The Buy Now Plus plugin for WordPress versions up to 1.0.2 allows authenticated users with Contributor access or higher to execute arbitrary JavaScript in pages through improper sanitization of the 'buynowplus' shortcode attributes. This stored cross-site scripting vulnerability enables attackers to inject malicious scripts that execute whenever visitors view affected pages. No patch is currently available for this vulnerability.
WordPress
XSS
-
CVE-2026-1244
MEDIUM
CVSS 6.4
Stored cross-site scripting in Forms Bridge - Infinite integrations plugin for WordPress versions up to 4.2.5 allows authenticated contributors and higher-privilege users to inject malicious scripts through the 'id' shortcode parameter. The vulnerability stems from insufficient input sanitization and output escaping, enabling attackers to execute arbitrary JavaScript in pages viewed by other users. No patch is currently available for this vulnerability.
WordPress
XSS
-
CVE-2026-1083
MEDIUM
CVSS 4.4
The Appointment Hour Booking plugin for WordPress through version 1.5.60 allows administrators to inject persistent JavaScript into the form builder interface through inadequately sanitized field configuration parameters. Exploitation requires high-level authenticated access and affects only multisite installations or those with unfiltered HTML disabled. Injected scripts execute in the context of other users accessing the form builder, enabling credential theft or unauthorized actions.
WordPress
XSS
-
CVE-2026-1060
MEDIUM
CVSS 5.3
WP Adminify (WordPress plugin) versions up to 4.0.7.7 is affected by information exposure (CVSS 5.3).
WordPress
Information Disclosure
-
CVE-2026-1054
MEDIUM
CVSS 5.3
RegistrationMagic (WordPress plugin) versions up to 6.0.7.4. is affected by missing authorization (CVSS 5.3).
WordPress
-
CVE-2026-1053
MEDIUM
CVSS 4.4
Stored XSS in Ivory Search WordPress plugin up to version 5.5.13 allows administrators to inject malicious scripts into admin settings due to inadequate input sanitization, affecting multi-site installations and those with unfiltered_html disabled. Attackers with admin privileges can execute arbitrary JavaScript that persists and runs for all users accessing affected pages. A patch is not currently available.
WordPress
XSS
-
CVE-2026-0825
MEDIUM
CVSS 5.3
Unauthenticated attackers can bypass authorization checks in WordPress form plugins (Database for Contact Form 7, WPforms, Elementor forms) through version 1.4.5 to download CSV exports of all form submissions containing sensitive personally identifiable information. The vulnerability exists because the CSV export endpoint lacks proper capability verification and exports complete datasets regardless of user permissions, while an export key is exposed in publicly accessible page source code. This allows attackers to retrieve sensitive data without authentication or proper authorization.
WordPress
-
CVE-2026-0818
MEDIUM
CVSS 4.3
Thunderbird's inline OpenPGP message decryption can leak secret email contents through CSS style injection when remote content loading is enabled, allowing attackers to extract decrypted plaintext via crafted email formatting. This affects Thunderbird versions before 147.0.1 and 140.7.1, requiring user interaction to trigger the vulnerability. No patch is currently available.
Mozilla
XSS
Thunderbird
Redhat
Suse
-
CVE-2026-0749
MEDIUM
CVSS 6.1
Cross-site scripting (XSS) in Drupal Form Builder 7.x versions 1.0 through 1.22 allows unauthenticated attackers to inject malicious scripts through improperly sanitized form inputs, affecting users who interact with compromised forms. Public exploit code exists for this vulnerability, and no patch is currently available, leaving vulnerable installations at active risk of session hijacking, credential theft, and defacement.
Drupal
XSS
Form Builder
-
CVE-2025-71006
MEDIUM
CVSS 6.5
A floating point exception (FPE) in the oneflow.reshape component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-71005
MEDIUM
CVSS 6.5
A floating point exception (FPE) in the oneflow.view component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-71004
MEDIUM
CVSS 6.5
A segmentation violation in the oneflow.logical_or component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-71002
MEDIUM
CVSS 6.5
A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-71001
MEDIUM
CVSS 6.5
A segmentation violation in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-70336
MEDIUM
CVSS 4.8
A Stored cross-site scripting (XSS) vulnerability in 'Create New Live Item' in PodcastGenerator 3.2.9 allows remote attackers to inject arbitrary script or HTML via the 'TITLE', 'SHORT DESCRIPTION' and 'LONG DESCRIPTION' parameters. [CVSS 4.8 MEDIUM]
XSS
Podcast Generator
-
CVE-2025-69601
MEDIUM
CVSS 6.5
A directory traversal (Zip Slip) vulnerability exists in the “Static Sites” feature of 66biolinks v44.0.0 by AltumCode. Uploaded ZIP archives are automatically extracted without validating or sanitizing file paths. [CVSS 6.5 MEDIUM]
Path Traversal
66biolinks
-
CVE-2025-69289
MEDIUM
CVSS 5.4
Discourse is an open source discussion platform. A privilege escalation vulnerability in versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 allows a non-admin moderator to bypass email-change restrictions, allowing a takeover of non-staff accounts. [CVSS 5.4 MEDIUM]
Privilege Escalation
Discourse
-
CVE-2025-69218
MEDIUM
CVSS 6.5
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, moderators can access the `top_uploads` admin report which should be restricted to admins only. [CVSS 6.5 MEDIUM]
Authentication Bypass
Discourse
-
CVE-2025-68934
MEDIUM
CVSS 6.5
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, authenticated users can submit crafted payloads to /drafts.json that cause O(n^2) processing in Base62.decode, tying up workers for 35-60 seconds per request. This affects all users as the shared worker pool becomes exhausted. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. Lowering the max_draft_length site setting reduces attack surface but does not f...
Denial Of Service
Discourse
-
CVE-2025-68933
MEDIUM
CVSS 6.9
Discourse is an open source discussion platform. [CVSS 6.9 MEDIUM]
Authentication Bypass
Discourse
-
CVE-2025-68666
MEDIUM
CVSS 6.5
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, users archives are viewable by users with moderation privileges even though moderators should not have access to the archives. [CVSS 6.5 MEDIUM]
Authentication Bypass
Discourse
-
CVE-2025-68660
MEDIUM
CVSS 5.4
Discourse is an open source discussion platform. [CVSS 5.4 MEDIUM]
Authentication Bypass
AI / ML
Discourse
-
CVE-2025-68659
MEDIUM
CVSS 4.3
Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application level denial of service vulnerabilityin the username change functionality at try.discourse.org. The vulnerability allows attackers to cause noticeable server delays and resource exhaustion by sending large JSON payloads to the username preference endpoint PUT /u//preferences/username, resulting in degraded performance for other users and endpoints. This issue is pat...
Denial Of Service
Discourse
-
CVE-2025-67723
MEDIUM
CVSS 4.6
Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have a content-security-policy-mitigated cross-site scriptinv vulnerability on the Discourse Math plugin when using its KaTeX variant. [CVSS 4.6 MEDIUM]
XSS
Discourse
-
CVE-2025-66488
MEDIUM
CVSS 4.6
Discourse is an open source discussion platform. A vulnerability present in versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 affects anyone who uses S3 for uploads. [CVSS 4.6 MEDIUM]
XSS
Discourse
-
CVE-2025-65887
MEDIUM
CVSS 6.5
A division-by-zero vulnerability in the flow.floor_divide() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input tensor with zero. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Oneflow
-
CVE-2025-61730
MEDIUM
CVSS 5.3
During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. [CVSS 5.3 MEDIUM]
Tls
Information Disclosure
Go
Suse
-
CVE-2025-61728
MEDIUM
CVSS 6.5
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. [CVSS 6.5 MEDIUM]
Denial Of Service
Go
Redhat
Suse
-
CVE-2025-59900
MEDIUM
CVSS 5.4
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. [CVSS 5.4 MEDIUM]
XSS
Diskpulse
Syncbreeze
-
CVE-2025-59899
MEDIUM
CVSS 5.4
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. [CVSS 5.4 MEDIUM]
XSS
Syncbreeze
Diskpulse
-
CVE-2025-59898
MEDIUM
CVSS 5.4
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. [CVSS 5.4 MEDIUM]
XSS
Diskpulse
Syncbreeze
-
CVE-2025-59897
MEDIUM
CVSS 5.4
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. [CVSS 5.4 MEDIUM]
XSS
Syncbreeze
Diskpulse
-
CVE-2025-59896
MEDIUM
CVSS 5.4
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. [CVSS 5.4 MEDIUM]
XSS
Diskpulse
Syncbreeze
-
CVE-2025-57796
MEDIUM
CVSS 6.8
Explorance Blue versions prior to 8.14.12 use reversible symmetric encryption with a hardcoded static key to protect sensitive data, including user passwords and system configurations. This approach allows stored values to be decrypted offline if the encrypted data are obtained. [CVSS 6.8 MEDIUM]
Information Disclosure
Blue
-
CVE-2025-54373
MEDIUM
CVSS 6.5
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a vulnerability where sensitive data is unintentionally revealed to unauthorized parties. [CVSS 6.5 MEDIUM]
Information Disclosure
Openemr
-
CVE-2025-46316
MEDIUM
CVSS 4.3
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 26.1 and iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. [CVSS 4.3 MEDIUM]
Apple
Buffer Overflow
Information Disclosure
-
CVE-2025-46306
MEDIUM
CVSS 5.5
The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26, Keynote 15.1, iOS 26 and iPadOS 26. [CVSS 5.5 MEDIUM]
Apple
Information Disclosure
Buffer Overflow
macOS
iOS
-
CVE-2025-33237
MEDIUM
CVSS 5.5
NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker could exploit a NULL pointer dereference issue. A successful exploit of this vulnerability might lead to a denial of service. [CVSS 5.5 MEDIUM]
Windows
Null Pointer Dereference
Denial Of Service
-
CVE-2025-15511
MEDIUM
CVSS 5.3
The Rupantorpay plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_webhook() function in all versions up to, and including, 2.0.0. [CVSS 5.3 MEDIUM]
WordPress
PHP
-
CVE-2025-14865
MEDIUM
CVSS 6.4
The Passster - Password Protect Pages and Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'content_protector' shortcode in all versions up to, and including, 4.2.24. [CVSS 6.4 MEDIUM]
WordPress
XSS
PHP
-
CVE-2025-14795
MEDIUM
CVSS 4.3
Stop Spammers Classic (WordPress plugin) is affected by cross-site request forgery (csrf) (CVSS 4.3).
WordPress
CSRF
PHP
-
CVE-2025-14616
MEDIUM
CVSS 4.3
The Recooty - Job Widget (Old Dashboard) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing nonce validation on the recooty_save_maybe() function. [CVSS 4.3 MEDIUM]
WordPress
CSRF
PHP
-
CVE-2025-14283
MEDIUM
CVSS 6.4
The BlockArt Blocks - Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the BlockArt Counter in all versions up to, and including, 2.2.14 due to insufficient input sanitization and output escaping on user supplied attributes. [CVSS 6.4 MEDIUM]
WordPress
XSS
-
CVE-2025-14063
MEDIUM
CVSS 6.1
The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'google_error' parameter in all versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping. [CVSS 6.1 MEDIUM]
WordPress
XSS
-
CVE-2025-14039
MEDIUM
CVSS 6.4
The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_simple_folio_item_client_name' and '_simple_folio_item_link' meta fields in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]
WordPress
XSS
PHP
-
CVE-2025-13986
MEDIUM
CVSS 4.2
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass.This issue affects Disable Login Page: from 0.0.0 before 1.1.3. [CVSS 4.2 MEDIUM]
Drupal
Authentication Bypass
Disable Login Page
-
CVE-2025-13985
MEDIUM
CVSS 5.3
Incorrect Authorization vulnerability in Drupal Entity Share allows Forceful Browsing.This issue affects Entity Share: from 0.0.0 before 3.13.0. [CVSS 5.3 MEDIUM]
Drupal
Entity Share
-
CVE-2025-13984
MEDIUM
CVSS 6.1
Permissive Cross-domain Security Policy with Untrusted Domains vulnerability in Drupal Next.Js allows Cross-Site Scripting (XSS).This issue affects Next.Js: from 0.0.0 before 1.6.4, from 2.0.0 before 2.0.1. [CVSS 6.1 MEDIUM]
Drupal
XSS
Next.Js
-
CVE-2025-13983
MEDIUM
CVSS 5.4
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Tagify allows Cross-Site Scripting (XSS).This issue affects Tagify: from 0.0.0 before 1.2.44. [CVSS 5.4 MEDIUM]
Drupal
XSS
Tagify
-
CVE-2025-13981
MEDIUM
CVSS 4.4
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal AI (Artificial Intelligence) allows Cross-Site Scripting (XSS).This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.7, from 1.1.0 before 1.1.7, from 1.2.0 before 1.2.4. [CVSS 4.4 MEDIUM]
Drupal
XSS
AI / ML
Artificial Intelligence
-
CVE-2025-13980
MEDIUM
CVSS 5.3
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium Features allows Functionality Bypass.This issue affects CKEditor 5 Premium Features: from 0.0.0 before 1.2.10, from 1.3.0 before 1.3.6, from 1.4.0 before 1.4.3, from 1.5.0 before 1.5.1, from 1.6.0 before 1.6.4. [CVSS 5.3 MEDIUM]
Drupal
Authentication Bypass
Ckeditor 5 Premium Features
-
CVE-2025-13979
MEDIUM
CVSS 5.4
Privilege Defined With Unsafe Actions vulnerability in Drupal Mini site allows Stored XSS.This issue affects Mini site: from 0.0.0 before 3.0.2. [CVSS 5.4 MEDIUM]
Drupal
Mini Site
XSS
-
CVE-2025-13919
MEDIUM
CVSS 4.4
Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry. [CVSS 4.4 MEDIUM]
Windows
-
CVE-2025-13918
MEDIUM
CVSS 6.7
Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. [CVSS 6.7 MEDIUM]
Broadcom
Privilege Escalation
-
CVE-2025-13471
MEDIUM
CVSS 5.3
The User Activity Log WordPress plugin through 2.2 does not properly handle failed login attempts in some cases, allowing unauthenticated users to set arbitrary options to 1 (for example to enable User Registration when it has been turned off) [CVSS 5.3 MEDIUM]
WordPress
PHP
-
CVE-2025-12709
MEDIUM
CVSS 6.4
The Interactions - Create Interactive Experiences in the Block Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event selectors in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]
WordPress
XSS
PHP
-
CVE-2025-9082
MEDIUM
CVSS 6.4
The WPBITS Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widget parameters in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping when dynamic content is enabled. [CVSS 6.4 MEDIUM]
WordPress
XSS
PHP
-
CVE-2025-8072
MEDIUM
CVSS 6.4
The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder_img’ parameter in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping. [CVSS 6.4 MEDIUM]
WordPress
XSS
PHP
-
CVE-2023-37525
MEDIUM
CVSS 5.3
A sensitive information disclosure in HCL BigFix Compliance allows a remote attacker to access files under the WEB-INF directory, which may contain Java class files and configuration information, leading to unauthorized access to application internals. [CVSS 5.3 MEDIUM]
Java
Information Disclosure
Bigfix Compliance
-
CVE-2020-36993
MEDIUM
CVSS 5.4
LimeSurvey 4.3.10 contains a stored cross-site scripting vulnerability in the Survey Menu functionality of the administration panel. [CVSS 5.4 MEDIUM]
XSS
Limesurvey
-
CVE-2020-36988
MEDIUM
CVSS 5.4
PDW File Browser version 1.3 contains stored and reflected cross-site scripting vulnerabilities that allow authenticated attackers to inject malicious scripts through file rename and path parameters. [CVSS 5.4 MEDIUM]
XSS
-
CVE-2020-36973
MEDIUM
CVSS 6.5
PDW File Browser 1.3 contains a remote code execution vulnerability that allows authenticated users to upload and rename webshell files to arbitrary web server locations. [CVSS 6.5 MEDIUM]
PHP
RCE
Path Traversal
-
CVE-2020-36968
MEDIUM
CVSS 6.5
M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. [CVSS 6.5 MEDIUM]
Authentication Bypass
-
CVE-2020-36944
MEDIUM
CVSS 4.0
ILIAS Learning Management System 4.3 contains a server-side request forgery vulnerability that allows attackers to read local files through portfolio PDF export functionality. [CVSS 4.0 MEDIUM]
SSRF
Ilias
-
CVE-2026-23553
LOW
CVSS 2.9
In the context switch logic Xen attempts to skip an IBPB in the case of
a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest
kernel correctly isolating between tasks. [CVSS 2.9 LOW]
Linux
-
CVE-2026-1532
LOW
CVSS 2.4
A vulnerability was identified in D-Link DCS-700L 1.03.09. The affected element is the function uploadmusic of the file /setUploadMusic of the component Music File Upload Service. [CVSS 2.4 LOW]
D-Link
Path Traversal
-
CVE-2026-1520
LOW
CVSS 2.4
A vulnerability was identified in rethinkdb versions up to 2.4.3. is affected by cross-site scripting (xss) (CVSS 2.4).
XSS
-
CVE-2026-1237
None
Vulnerable cross-model authorization in juju.
Information Disclosure
-
CVE-2026-0483
None
Stored Cross-Site Scripting (XSS) vulnerability in the PDF file upload functionality of Live Helper Chat, versions prior to 4.72.
XSS
-
CVE-2025-59901
None
Disk Pulse Enterprise v10.4.18 has an authenticated reflected XSS vulnerability in the '/monitor_directory?sid=' endpoint, caused by insufficient validation of the 'monitor_directory' parameter sent by POST.
XSS
-
CVE-2025-41351
None
Vulnerability that allows a Padding Oracle Attack to be performed on the Funambol v30.0.0.20 cloud server. The thumbnail display URL allows an attacker to decrypt and encrypt the parameters used by the application to generate ‘self-signed’ access URLs.
Authentication Bypass
-
CVE-2025-26386
None
Johnson Controls iSTAR Configuration Utility (ICU) has Stack-based Buffer Overflow vulnerability. This issue affects iSTAR Configuration Utility (ICU) version 6.9.7 and prior.
Buffer Overflow
Stack Overflow
-
CVE-2025-7740
None
Default credentials vulnerability exists in SuprOS
product. If exploited, this could allow an authenticated
local attacker to use an admin account created during
product deployment.
Information Disclosure