132 CVEs tracked today. 13 Critical, 42 High, 63 Medium, 9 Low.
-
CVE-2020-37123
CRITICAL
CVSS 9.8
Remote code execution via OS command injection in Pinger 1.0 allows attackers to inject shell commands through the ping target parameter. EPSS 12.2% indicates significant exploitation likelihood. PoC available.
PHP
RCE
-
CVE-2026-24300
CRITICAL
CVSS 9.8
Elevation of privilege vulnerability in Azure Front Door allows attackers to gain elevated access. Microsoft Azure cloud service vulnerability affecting CDN/WAF infrastructure.
Azure
Azure Front Door
-
CVE-2026-23796
CRITICAL
CVSS 9.8
Session fixation vulnerability in Quick.Cart allows attackers to set a user's session identifier before authentication. The session ID persists through login, enabling session hijacking of authenticated users.
Information Disclosure
Quick.Cart
-
CVE-2026-0106
CRITICAL
CVSS 9.3
Missing bounds check in Android VPU (Video Processing Unit) driver's vpu_mmap allows arbitrary address memory mapping, potentially leading to local privilege escalation on Android devices.
Privilege Escalation
Android
Google
-
CVE-2025-68723
CRITICAL
CVSS 9.0
Multiple stored XSS vulnerabilities in Axigen Mail Server before 10.5.57 WebAdmin interface allow authenticated administrators to inject persistent malicious scripts that execute in other admin sessions.
Tls
XSS
Privilege Escalation
Axigen Mail Server
-
CVE-2025-68121
CRITICAL
CVSS 10.0
Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.
Golang
Tls
Authentication Bypass
Go
Redhat
-
CVE-2020-37138
CRITICAL
CVSS 9.8
Buffer overflow in 10-Strike Network Inventory Explorer 9.03 file import functionality allows attackers to execute arbitrary code via crafted import files. PoC available.
Buffer Overflow
Stack Overflow
-
CVE-2020-37129
CRITICAL
CVSS 9.8
Insecure folder permissions in MEmu Play 7.1.3 Android emulator allow low-privileged users to modify application binaries, enabling privilege escalation to SYSTEM. PoC available.
Privilege Escalation
-
CVE-2020-37126
CRITICAL
CVSS 9.8
Stack overflow in Free Desktop Clock 3.0 triggered by crafted Time Zones display name input allows attackers to execute arbitrary code. PoC available.
Stack Overflow
-
CVE-2020-37125
CRITICAL
CVSS 9.8
Unauthenticated remote code execution via OS command injection in Edimax EW-7438RPn-v3 Mini wireless extender firmware 1.27. EPSS 1.3% with PoC available.
RCE
Command Injection
Ew 7438rpn Mini Firmware
-
CVE-2020-37124
CRITICAL
CVSS 9.8
Buffer overflow in B64dec 1.1.2 base64 decoder allows attackers to execute arbitrary code by overwriting structured exception handler pointers. PoC available.
Buffer Overflow
-
CVE-2020-37120
CRITICAL
CVSS 9.8
Buffer overflow in Rubo DICOM Viewer 2.0 through the DICOM server name input field allows attackers to execute arbitrary code. PoC available.
RCE
Buffer Overflow
-
CVE-2020-37119
CRITICAL
CVSS 9.8
Stack-based buffer overflow in Nsauditor Network Auditing Tool 3.0.28 and 3.2.1.0 in the DNS Lookup tool allows attackers to execute arbitrary code via crafted input. PoC available.
Dns
Buffer Overflow
Nsauditor
-
CVE-2026-24302
HIGH
CVSS 8.6
Azure Arc Elevation of Privilege Vulnerability [CVSS 8.6 HIGH]
Microsoft
Authentication Bypass
-
CVE-2026-23572
HIGH
CVSS 7.2
Improper access control in TeamViewer clients (Windows, macOS, Linux) before version 15.74.5 permits authenticated remote users to circumvent confirmation-based access restrictions during active sessions. An attacker with valid remote session credentials can gain unauthorized access without triggering the expected local confirmation prompt, requiring only prior authentication via ID/password, session link, or Easy Access.
Linux
Windows
macOS
-
CVE-2026-21532
HIGH
CVSS 8.2
Azure Function Information Disclosure Vulnerability [CVSS 8.2 HIGH]
Azure
Information Disclosure
Azure Functions
-
CVE-2026-1707
HIGH
CVSS 7.4
Command execution in pgAdmin 4 server mode allows authenticated attackers to bypass restore operation restrictions by extracting the restrict key during PLAIN-format dump file operations and injecting malicious payloads to re-enable meta-commands. An attacker with web interface access can race the restore process in real time to achieve reliable code execution on the pgAdmin host. No patch is currently available for this vulnerability.
Authentication Bypass
Pgadmin 4
Suse
-
CVE-2026-1294
HIGH
CVSS 7.2
All In One Image Viewer Block (WordPress plugin) is affected by server-side request forgery (ssrf) (CVSS 7.2).
WordPress
SSRF
-
CVE-2025-70073
HIGH
CVSS 7.2
An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute arbitrary code via the template creation function [CVSS 7.2 HIGH]
RCE
Code Injection
Chestnutcms
-
CVE-2025-69906
HIGH
CVSS 8.8
Monstra Cms versions up to 3.0.4 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).
RCE
Monstra Cms
-
CVE-2025-68722
HIGH
CVSS 8.8
Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (CSRF) vulnerability in the WebAdmin interface through improper handling of the _s (breadcrumb) parameter. The application accepts state-changing requests via the GET method and automatically processes base64-encoded commands queued in the _s parameter immediately after administrator authentication. Attackers can craft malicious URLs that, when clicked by administrators, execute arbitrary adminis...
CSRF
Axigen Mail Server
-
CVE-2025-68721
HIGH
CVSS 8.1
Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin interface. A delegated admin account with zero permissions can bypass access control checks and gain unauthorized access to the SSL Certificates management endpoint (page=sslcerts). [CVSS 8.1 HIGH]
Tls
Axigen Mail Server
-
CVE-2025-61732
HIGH
CVSS 8.6
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary. [CVSS 8.6 HIGH]
Golang
Go
Redhat
Suse
-
CVE-2025-15557
HIGH
CVSS 8.8
An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications. [CVSS 8.8 HIGH]
TP-Link
Tapo P100 Firmware
Tapo H100 Firmware
-
CVE-2025-15330
HIGH
CVSS 8.8
Tanium addressed an improper input validation vulnerability in Deploy. [CVSS 8.8 HIGH]
Authentication Bypass
Deploy
-
CVE-2025-15311
HIGH
CVSS 7.8
Tanium addressed an unauthorized code execution vulnerability in Tanium Appliance. [CVSS 7.8 HIGH]
RCE
Tanos
-
CVE-2025-13379
HIGH
CVSS 8.6
IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. [CVSS 8.6 HIGH]
IBM
SQLi
Aspera Console
-
CVE-2025-13192
HIGH
CVSS 8.2
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers plugin for WordPress is vulnerable to generic SQL Injection via the multiple REST API endpoints in all versions up to, and including, 2.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. [CVSS 8.2 HIGH]
WordPress
SQLi
PHP
-
CVE-2025-11730
HIGH
CVSS 7.2
A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI command in Zyxel ATP series firmware versions from V5.35 through V5.41, USG FLEX series firmware versions from V5.35 through V5.41, USG FLEX 50(W) series firmware versions from V5.35 through V5.41, and USG20(W)-VPN series firmware versions from V5.35 through V5.41 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device by supplying a specially crafted string as an argument to the CLI command. [CVSS 7.2 HIGH]
Zyxel
Dns
Command Injection
-
CVE-2025-10314
HIGH
CVSS 8.8
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) or DLLs in the installation directory with specially crafted files. As a result, the attacker may be able to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a Denial of Service (...
Windows
Denial Of Service
-
CVE-2020-37151
HIGH
CVSS 8.2
phpMyChat Plus 1.98 contains a SQL injection vulnerability in the deluser.php page through the pmc_username parameter that allows attackers to manipulate database queries. [CVSS 8.2 HIGH]
PHP
SQLi
Phpmychat Plus
-
CVE-2020-37150
HIGH
CVSS 7.5
Ew-7438Rpn Mini Firmware versions up to 1.27 contains a vulnerability that allows attackers to access the /wizard_reboot (CVSS 7.5).
Information Disclosure
Ew 7438rpn Mini Firmware
-
CVE-2020-37149
HIGH
CVSS 8.1
Ew-7438Rpn Mini Firmware versions up to 1.27 is affected by cross-site request forgery (csrf) (CVSS 8.1).
CSRF
Ew 7438rpn Mini Firmware
-
CVE-2020-37143
HIGH
CVSS 7.5
ProficySCADA for iOS 5.0.25920 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the password input field. [CVSS 7.5 HIGH]
Scada
Denial Of Service
-
CVE-2020-37142
HIGH
CVSS 8.4
10-Strike Network Inventory Explorer 8.54 contains a structured exception handler buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting SEH records. [CVSS 8.4 HIGH]
RCE
Buffer Overflow
-
CVE-2020-37139
HIGH
CVSS 8.4
Odin Secure FTP Expert 7.6.3 contains a local denial of service vulnerability that allows attackers to crash the application by manipulating site information fields. [CVSS 8.4 HIGH]
Buffer Overflow
Denial Of Service
-
CVE-2020-37136
HIGH
CVSS 7.5
ZOC Terminal 7.25.5 contains a denial of service vulnerability in the private key file input field that allows attackers to crash the application. [CVSS 7.5 HIGH]
Ssh
Denial Of Service
-
CVE-2020-37134
HIGH
CVSS 7.5
UltraVNC Viewer 1.2.4.0 contains a denial of service vulnerability that allows attackers to crash the application by manipulating VNC Server input. Attackers can generate a malformed 256-byte payload and paste it into the VNC Server connection dialog to trigger an application crash. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2020-37133
HIGH
CVSS 7.5
UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in the Repeater Host configuration field that allows attackers to crash the application. Attackers can paste an overly long string of 300 characters into the Repeater Host property to trigger an application crash. [CVSS 7.5 HIGH]
Denial Of Service
Ultravnc
-
CVE-2020-37130
HIGH
CVSS 7.5
Nsauditor 3.2.0.0 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. [CVSS 7.5 HIGH]
Denial Of Service
Nsauditor
-
CVE-2020-37117
HIGH
CVSS 8.8
Jizhicms versions up to 1.6.7 is affected by unrestricted upload of file with dangerous type (CVSS 8.8).
File Upload
Jizhicms
-
CVE-2019-25288
HIGH
CVSS 7.8
Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local attackers to execute malicious code with elevated privileges. Attackers can insert an executable file in the service path to run unauthorized code when the service restarts or the system reboots. [CVSS 7.8 HIGH]
Authentication Bypass
-
CVE-2019-25287
HIGH
CVSS 7.8
WCAssistantService contains a vulnerability that allows attackers to potentially execute code with elevated privileges (CVSS 7.8).
Code Injection
-
CVE-2019-25286
HIGH
CVSS 7.8
gbClientService contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated privileges (CVSS 7.8).
RCE
-
CVE-2019-25285
HIGH
CVSS 7.8
ApHidMonitorService contains a vulnerability that allows attackers to execute code with elevated privileges (CVSS 7.8).
Information Disclosure
-
CVE-2019-25283
HIGH
CVSS 7.8
Shrew Soft VPN Client 2.2.2 contains an unquoted service path vulnerability that allows local users to execute arbitrary code with elevated system privileges. Attackers can place malicious executables in the unquoted service path to gain elevated access during service startup or system reboot. [CVSS 7.8 HIGH]
RCE
-
CVE-2019-25281
HIGH
CVSS 7.8
multiple Windows services contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
Windows
-
CVE-2019-25276
HIGH
CVSS 7.8
FactoryTalk Activation Service contains a vulnerability that allows attackers to potentially execute code with elevated privileges (CVSS 7.8).
Code Injection
-
CVE-2019-25275
HIGH
CVSS 7.8
BartVPNService contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated system privileges (CVSS 7.8).
RCE
-
CVE-2019-25274
HIGH
CVSS 7.8
ScsiAccess service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2019-25273
HIGH
CVSS 7.8
EasyRedirect service contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2019-25272
HIGH
CVSS 7.8
CCSrvProxy service contains a vulnerability that allows attackers to execute arbitrary code (CVSS 7.8).
RCE
-
CVE-2019-25271
HIGH
CVSS 7.8
NETGATE Data Backup 3.0.620 contains an unquoted service path vulnerability in its NGDatBckpSrv Windows service configuration. Attackers can exploit the unquoted path to inject and execute malicious code with LocalSystem privileges by placing executable files in specific directory locations. [CVSS 7.8 HIGH]
Windows
-
CVE-2019-25269
HIGH
CVSS 7.8
Amiti Antivirus 25.0.640 contains an unquoted service path vulnerability in its Windows service configurations. Attackers can exploit the unquoted path to inject and execute malicious code with elevated LocalSystem privileges by placing executable files in specific directory locations. [CVSS 7.8 HIGH]
Windows
-
CVE-2019-25267
HIGH
CVSS 7.8
Wing Ftp Server versions up to 6.0.7 contains a vulnerability that allows attackers to potentially execute arbitrary code with elevated system privileges (CVSS 7.8).
RCE
Wing Ftp Server
-
CVE-2026-25198
MEDIUM
CVSS 4.7
Open redirect in web2py 2.27.1 and earlier allows unauthenticated remote attackers to redirect users to arbitrary websites via specially crafted URLs, potentially facilitating phishing attacks. The vulnerability requires user interaction to exploit and affects the application's integrity with network-accessible attack vectors. No patch is currently available.
Open Redirect
-
CVE-2026-23797
MEDIUM
CVSS 4.9
Quick.Cart version 6.7 stores user passwords in plaintext, allowing authenticated administrators to retrieve plaintext credentials through the user editing interface. This vulnerability poses a significant risk in multi-administrator environments where high-privileged users may abuse account access. No patch is currently available, and other versions may be similarly affected though unconfirmed.
Information Disclosure
Quick.Cart
-
CVE-2026-1964
MEDIUM
CVSS 4.3
Improper access controls in Wekan's REST API endpoint (models/boards.js) prior to version 8.21 allow authenticated users to modify resources they should not have permission to access. The vulnerability requires valid credentials but no user interaction, making it exploitable by any authenticated attacker with network access. Administrators should upgrade to version 8.21 or later to remediate this issue.
Information Disclosure
Wekan
-
CVE-2026-1963
MEDIUM
CVSS 6.3
Improper access controls in Wekan's attachment storage mechanism (models/attachments.js) up to version 8.20 allow authenticated remote attackers to gain unauthorized access to sensitive data and modify attachments. An attacker with valid credentials can exploit this vulnerability to read, modify, or delete attachments they should not have permission to access. Upgrading to version 8.21 or later resolves this issue.
Information Disclosure
Wekan
-
CVE-2026-1962
MEDIUM
CVSS 6.3
Improper access controls in Wekan's attachment migration component allow authenticated remote attackers to read, modify, or disrupt service functionality. The vulnerability affects Wekan versions up to 8.20 and requires valid user credentials to exploit. Users should upgrade to version 8.21 or later to remediate this issue.
Information Disclosure
Wekan
-
CVE-2026-1927
MEDIUM
CVSS 5.4
The Greenshift animation and page builder plugin for WordPress (up to version 12.6) fails to properly validate user capabilities on the greenshift_app_pass_validation() function, allowing authenticated subscribers and above to extract sensitive plugin configuration including stored AI API keys and inject malicious scripts through the custom_css setting. This combination of information disclosure and stored cross-site scripting (XSS) requires only valid WordPress user credentials to exploit, with a partial patch available in version 12.6.
WordPress
Authentication Bypass
XSS
-
CVE-2026-1898
MEDIUM
CVSS 6.3
Improper access controls in WeKan's LDAP user synchronization component (versions up to 8.20) allow authenticated remote attackers to gain unauthorized access to sensitive information or modify data with low complexity. The vulnerability affects the LDAP User Sync functionality in packages/wekan-ldap/server/syncUser.js and requires valid credentials to exploit. WeKan 8.21 and later address this issue and should be deployed immediately.
Ldap
Wekan
-
CVE-2026-1897
MEDIUM
CVSS 4.3
WeKan versions up to 8.20 contain an authorization bypass in the position history tracking functionality that allows authenticated remote attackers to access sensitive information without proper permissions. The vulnerability exists in the server/methods/positionHistory.js file and can be exploited by any user with login credentials. Upgrading to version 8.21 or later resolves this issue.
Authentication Bypass
Wekan
-
CVE-2026-1896
MEDIUM
CVSS 6.3
Improper access control in Wekan's board migration function allows authenticated remote attackers to manipulate the boardId parameter and gain unauthorized access to sensitive data or modify board information. Wekan versions up to 8.20 are affected, and administrators should upgrade to version 8.21 or later to remediate this vulnerability.
Information Disclosure
Wekan
-
CVE-2026-1654
MEDIUM
CVSS 6.1
Peter's Date Countdown plugin for WordPress through version 2.0.0 contains a reflected cross-site scripting vulnerability in the PHP_SELF parameter that allows unauthenticated attackers to inject malicious scripts. Exploitation requires social engineering to trick users into clicking a malicious link, but successful attacks can compromise user sessions and steal sensitive data. No patch is currently available.
WordPress
XSS
-
CVE-2026-1517
MEDIUM
CVSS 4.7
SQL injection in iomad's Company Admin Block component through version 5.0 allows remote attackers with high privileges to manipulate backend queries and gain unauthorized access to sensitive data. The vulnerability requires administrator credentials to exploit but enables attackers to read, modify, or delete database contents within the application's security context. No patch is currently available.
SQLi
-
CVE-2026-1319
MEDIUM
CVSS 6.4
Stored cross-site scripting in Robin Image Optimizer plugin versions up to 2.0.2 allows authenticated WordPress users with Author-level or higher privileges to inject malicious scripts through the Media Library image Alternative Text field. The injected scripts execute in the browsers of any user viewing affected pages, potentially compromising site visitors. No patch is currently available.
WordPress
XSS
-
CVE-2026-1271
MEDIUM
CVSS 5.3
Authenticated users can modify arbitrary user profile and cover images in WordPress ProfileGrid plugin versions up to 5.9.7.2 due to missing authorization checks in the image upload AJAX handlers. Attackers with Subscriber-level access can exploit this to deface administrator accounts and other users' profiles. No patch is currently available for this integrity vulnerability.
WordPress
PHP
-
CVE-2026-1268
MEDIUM
CVSS 6.4
Stored cross-site scripting in the Dynamic Widget Content plugin for WordPress (versions up to 1.3.6) allows authenticated users with Contributor privileges or higher to inject malicious scripts through the Gutenberg editor widget content field due to inadequate input sanitization. The injected scripts execute in the browsers of any user viewing the affected pages, potentially compromising account security and enabling credential theft or unauthorized actions.
WordPress
XSS
-
CVE-2026-1246
MEDIUM
CVSS 4.9
Arbitrary file read in ShortPixel Image Optimizer plugin for WordPress through path traversal in the loadLogFile AJAX action allows authenticated users with Editor-level privileges or higher to access sensitive server files including database credentials. The vulnerability exists in versions up to 6.4.2 due to insufficient path validation on the loadFile parameter, and no patch is currently available.
WordPress
Path Traversal
-
CVE-2026-0867
MEDIUM
CVSS 6.4
Stored cross-site scripting in Essential Widgets for WordPress through version 3.0 allows authenticated contributors and above to inject malicious scripts into pages via insufficiently sanitized shortcode attributes. When other users visit affected pages, the injected scripts execute in their browsers, potentially compromising sessions or stealing sensitive data. A patch is not currently available for this vulnerability.
WordPress
XSS
-
CVE-2026-0715
MEDIUM
CVSS 6.8
Bootloader menu access in Moxa UC series industrial computers can be obtained by attackers with physical access using a device-unique password, potentially enabling temporary denial-of-service through firmware reflashing. The vulnerability is constrained by bootloader signature verification that prevents installation of unsigned firmware or arbitrary code execution. No patch is currently available for affected Linux and UC firmware versions.
Linux
Privilege Escalation
V1202 Ct T Firmware
Uc 3424a T Lte Firmware
V2406c Wl1 Ct T Firmware
-
CVE-2026-0714
MEDIUM
CVSS 6.8
TPM-backed LUKS encryption bypass in Moxa Industrial Linux 3 on select industrial computers allows an attacker with invasive physical access to the SPI bus to intercept TPM communications and decrypt eMMC storage contents offline. This attack requires opening the device and connecting specialized equipment for extended signal capture, making it impractical for opportunistic access scenarios. Affected products include V1222 Ct T, Uc 3430a T Lte Wifi, Uc 8220 T Lx, and Uc 4414a I T firmware variants.
Linux
V1222 Ct T Firmware
Uc 3430a T Lte Wifi Firmware
Uc 8220 T Lx Firmware
Uc 4414a I T Firmware
-
CVE-2026-0391
MEDIUM
CVSS 6.5
Edge Chromium is affected by user interface (ui) misrepresentation of critical information (CVSS 6.5).
Microsoft
Android
Edge Chromium
-
CVE-2025-70792
MEDIUM
CVSS 6.1
Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. [CVSS 6.1 MEDIUM]
XSS
Microweber
-
CVE-2025-70791
MEDIUM
CVSS 6.1
Cross Site Scripting vulnerability in the "/admin/order/abandoned" endpoint of Microweber 2.0.19. An attacker can manipulate the "orderDirection" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. [CVSS 6.1 MEDIUM]
XSS
Microweber
-
CVE-2025-69619
MEDIUM
CVSS 5.5
A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage. [CVSS 5.0 MEDIUM]
Denial Of Service
Path Traversal
My Teditor
-
CVE-2025-68643
MEDIUM
CVSS 5.4
Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the timeFormat account preference parameter. Attackers can exploit this by deploying a multi-stage attack. [CVSS 5.4 MEDIUM]
XSS
Axigen Mail Server
-
CVE-2025-58190
MEDIUM
CVSS 5.3
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content. [CVSS 5.3 MEDIUM]
Golang
Denial Of Service
Html
Redhat
Suse
-
CVE-2025-47911
MEDIUM
CVSS 5.3
Html contains a vulnerability that allows attackers to denial of service (DoS) if an attacker provides specially crafted HTML content (CVSS 5.3).
Golang
Denial Of Service
Html
Redhat
Suse
-
CVE-2025-32393
MEDIUM
CVSS 6.5
AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.32, there is a DoS vulnerability in ReadRSSFeedBlock. [CVSS 6.5 MEDIUM]
Denial Of Service
AI / ML
Autogpt Platform
-
CVE-2025-15551
MEDIUM
CVSS 5.6
The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. [CVSS 5.6 MEDIUM]
TP-Link
Tl Wr850n Firmware
Tl Wr845n Firmware
Archer Mr200 Firmware
Archer C20 Firmware
-
CVE-2025-15343
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Enforce. [CVSS 6.5 MEDIUM]
Privilege Escalation
Enforce
-
CVE-2025-15342
MEDIUM
CVSS 4.3
Tanium addressed an improper access controls vulnerability in Reputation. [CVSS 4.3 MEDIUM]
Authentication Bypass
Reputation
-
CVE-2025-15341
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Benchmark. [CVSS 6.5 MEDIUM]
Privilege Escalation
Benchmark
-
CVE-2025-15340
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Comply. [CVSS 6.5 MEDIUM]
Privilege Escalation
Comply
-
CVE-2025-15339
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Discover. [CVSS 6.5 MEDIUM]
Privilege Escalation
Discover
-
CVE-2025-15338
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Partner Integration. [CVSS 6.5 MEDIUM]
Privilege Escalation
Partner Integration
-
CVE-2025-15337
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Patch. [CVSS 6.5 MEDIUM]
Privilege Escalation
Patch
-
CVE-2025-15336
MEDIUM
CVSS 6.5
Tanium addressed an incorrect default permissions vulnerability in Performance. [CVSS 6.5 MEDIUM]
Privilege Escalation
Performance
-
CVE-2025-15335
MEDIUM
CVSS 4.3
Tanium addressed an information disclosure vulnerability in Threat Response. [CVSS 4.3 MEDIUM]
Information Disclosure
Threat Response
-
CVE-2025-15334
MEDIUM
CVSS 4.3
Tanium addressed an information disclosure vulnerability in Threat Response. [CVSS 4.3 MEDIUM]
Information Disclosure
Threat Response
-
CVE-2025-15333
MEDIUM
CVSS 4.3
Tanium addressed an information disclosure vulnerability in Threat Response. [CVSS 4.3 MEDIUM]
Information Disclosure
Threat Response
-
CVE-2025-15332
MEDIUM
CVSS 4.9
Tanium addressed an information disclosure vulnerability in Threat Response. [CVSS 4.9 MEDIUM]
Information Disclosure
Threat Response
-
CVE-2025-15331
MEDIUM
CVSS 4.3
Tanium addressed an uncontrolled resource consumption vulnerability in Connect. [CVSS 4.3 MEDIUM]
Denial Of Service
Connect
-
CVE-2025-15329
MEDIUM
CVSS 4.9
Tanium addressed an information disclosure vulnerability in Threat Response. [CVSS 4.9 MEDIUM]
Information Disclosure
Threat Response
-
CVE-2025-15328
MEDIUM
CVSS 5.0
Tanium addressed an improper link resolution before file access vulnerability in Enforce. [CVSS 5.0 MEDIUM]
Path Traversal
Enforce
-
CVE-2025-15327
MEDIUM
CVSS 4.3
Tanium addressed an improper access controls vulnerability in Deploy. [CVSS 4.3 MEDIUM]
Authentication Bypass
Deploy
-
CVE-2025-15326
MEDIUM
CVSS 4.3
Tanium addressed an improper access controls vulnerability in Patch. [CVSS 4.3 MEDIUM]
Authentication Bypass
Patch
-
CVE-2025-15325
MEDIUM
CVSS 6.3
Tanium addressed an improper input validation vulnerability in Discover. [CVSS 6.3 MEDIUM]
SQLi
Discover
-
CVE-2025-15324
MEDIUM
CVSS 6.6
Tanium addressed a documentation issue in Engage. [CVSS 6.6 MEDIUM]
Path Traversal
Engage
-
CVE-2025-15312
MEDIUM
CVSS 6.6
Tanium addressed an improper output sanitization vulnerability in Tanium Appliance. [CVSS 6.6 MEDIUM]
XSS
Tanos
-
CVE-2025-14150
MEDIUM
CVSS 6.5
IBM webMethods Integration (on prem) - Integration Server 10.15 through IS_10.15_Core_Fix2411.1 to IS_11.1_Core_Fix8 IBM webMethods Integration could disclose sensitive user information in server responses. [CVSS 6.5 MEDIUM]
IBM
-
CVE-2025-14079
MEDIUM
CVSS 5.3
The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.5. [CVSS 5.3 MEDIUM]
WordPress
PHP
-
CVE-2025-13491
MEDIUM
CVSS 5.1
IBM App Connect Enterprise Certified Container versions up to 12.19.0 is affected by untrusted search path (CVSS 5.1).
IBM
Information Disclosure
-
CVE-2025-13416
MEDIUM
CVSS 4.3
The ProfileGrid - User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized user suspension due to a missing capability check on the pm_deactivate_user_from_group() function in all versions up to, and including, 5.9.7.2. [CVSS 4.3 MEDIUM]
WordPress
PHP
-
CVE-2025-12131
MEDIUM
CVSS 6.5
A truncated 802.15.4 packet can lead to an assert, resulting in a denial of service. [CVSS 6.5 MEDIUM]
Denial Of Service
Simplicity Software Development Kit
-
CVE-2025-10258
MEDIUM
CVSS 6.3
Infinera DNA is vulnerable to a time-based SQL injection vulnerability due to insufficient input validation, which may result in leaking of sensitive information. [CVSS 6.3 MEDIUM]
SQLi
Infinera Dna
-
CVE-2020-37152
MEDIUM
CVSS 6.1
PHP-Fusion 9.03.50 panels.php is vulnerable to cross-site scripting (XSS) via the 'panel_content' POST parameter. The application fails to properly sanitize user input before rendering it in the browser, allowing attackers to inject arbitrary JavaScript. [CVSS 6.1 MEDIUM]
PHP
XSS
Phpfusion
-
CVE-2020-37145
MEDIUM
CVSS 4.3
HRSALE 1.1.8 contains a cross-site request forgery vulnerability that allows attackers to add unauthorized administrative users through the employee registration form. [CVSS 4.3 MEDIUM]
CSRF
-
CVE-2020-37144
MEDIUM
CVSS 5.3
Exagate SYSGuard 6001 contains a cross-site request forgery vulnerability that allows attackers to create unauthorized admin accounts through a crafted HTML form. [CVSS 5.3 MEDIUM]
PHP
CSRF
-
CVE-2020-37140
MEDIUM
CVSS 4.6
Everest, later referred to as AIDA64, 5.50.2100 contains a denial of service vulnerability that allows local attackers to crash the application by manipulating file open functionality. [CVSS 5.5 MEDIUM]
Denial Of Service
Memory Corruption
Buffer Overflow
-
CVE-2020-37137
MEDIUM
CVSS 6.1
PHP-Fusion 9.03.50 contains a remote code execution vulnerability in the 'add_panel_form()' function that allows attackers to execute arbitrary code through an eval() function with unsanitized POST data. [CVSS 6.1 MEDIUM]
PHP
RCE
Phpfusion
-
CVE-2020-37132
MEDIUM
CVSS 6.2
UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in its password configuration properties that allows local attackers to crash the application. [CVSS 6.2 MEDIUM]
Denial Of Service
Ultravnc
-
CVE-2020-37131
MEDIUM
CVSS 6.7
Nsauditor Product Key Explorer 4.2.2.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting a specially crafted registration key. [CVSS 6.2 MEDIUM]
Denial Of Service
Buffer Overflow
-
CVE-2020-37128
MEDIUM
CVSS 6.2
ZOC Terminal 7.25.5 contains a script processing vulnerability that allows local attackers to crash the application by loading a maliciously crafted REXX script file. [CVSS 6.2 MEDIUM]
Denial Of Service
-
CVE-2020-37127
MEDIUM
CVSS 5.5
Dnsmasq-utils 2.79-1 contains a buffer overflow vulnerability in the dhcp_release utility that allows attackers to cause a denial of service by supplying excessive input. [CVSS 5.5 MEDIUM]
Buffer Overflow
Denial Of Service
Redhat
Suse
-
CVE-2020-37121
MEDIUM
CVSS 5.5
CODE::BLOCKS 16.01 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler with crafted Unicode characters. [CVSS 5.5 MEDIUM]
RCE
Buffer Overflow
-
CVE-2026-25815
LOW
CVSS 3.2
Fortinet FortiOS versions up to 7.6.6 contains a vulnerability that allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in t (CVSS 3.2).
Fortinet
Fortigate
Ldap
-
CVE-2026-1970
LOW
CVSS 3.5
A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products t...
Open Redirect
-
CVE-2026-1966
None
YugabyteDB Anywhere displays LDAP bind passwords configured via gflags in cleartext within the web UI. An authenticated user with access to the configuration view could obtain LDAP credentials, potentially enabling unauthorized access to external directory services.
Dns
Ldap
-
CVE-2026-1953
None
user profile edit functionality at /ngc-cms/user-edit-profile.php. The application fails to properly sanitize user input in the name field is affected by cross-site scripting (xss).
PHP
XSS
-
CVE-2026-1523
None
Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azkoyen Group). This vulnerability allows an attacker to access arbitrary files in the server's file system, thet is, 'http://<host>/..%2F..% 2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd'.
Path Traversal
Information Disclosure
-
CVE-2026-1301
None
In builds with PubSub and JSON enabled, a crafted JSON message can cause the decoder to write beyond a heap-allocated array before authentication, reliably crashing the process and corrupting memory.
Denial Of Service
-
CVE-2025-68458
LOW
CVSS 3.7
Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). [CVSS 3.7 LOW]
SSRF
-
CVE-2025-68157
LOW
CVSS 3.7
Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) enforces allowedUris only for the initial URL, but does not re-validate allowedUris after following HTTP 30x redirects. [CVSS 3.7 LOW]
SSRF
-
CVE-2025-15323
LOW
CVSS 3.7
Tanium addressed an improper certificate validation vulnerability in Tanium Appliance. [CVSS 3.7 LOW]
Authentication Bypass
-
CVE-2025-15321
LOW
CVSS 2.7
Tanium addressed an improper input validation vulnerability in Tanium Appliance. [CVSS 2.7 LOW]
Privilege Escalation
-
CVE-2025-15289
LOW
CVSS 3.1
Tanium addressed an improper access controls vulnerability in Interact. [CVSS 3.1 LOW]
Authentication Bypass
-
CVE-2025-15080
None
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R Series R08PCPU, R16PCPU, R32PCPU, and R120PCPU allows an unauthenticated attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial of service (DoS) condition on the affected product by sending a specially crafted packet containing a specific command to the affected product.
Denial Of Service
-
CVE-2020-37148
LOW
CVSS 3.5
P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. [CVSS 3.5 LOW]
XSS
-
CVE-2020-37118
LOW
CVSS 3.5
P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without user interaction. [CVSS 3.5 LOW]
CSRF