122 CVEs tracked today. 7 Critical, 30 High, 17 Medium, 2 Low.
-
CVE-2026-26335
CRITICAL
CVSS 9.8
Static ASP.NET machineKey in Calero VeraSMART before 2022 R1. Hardcoded key enables ViewState deserialization attacks and cookie forgery.
Iis
Dotnet
RCE
Deserialization
Verasmart
-
CVE-2026-26333
CRITICAL
CVSS 9.8
Unauthenticated .NET Remoting endpoint in Calero VeraSMART before 2022 R1. TCP port 8001 exposes default Object URIs enabling deserialization attacks. EPSS 0.17%.
Iis
Dotnet
RCE
Verasmart
-
CVE-2026-26273
CRITICAL
CVSS 9.8
Critical authentication bypass in Known social publishing platform 1.6.2 and earlier. Broken authentication allows unauthorized access. PoC and patch available.
Information Disclosure
Known
-
CVE-2026-26190
CRITICAL
CVSS 9.8
Unauthenticated API access in Milvus vector database before 2.5.27/2.6.10. TCP port 9091 exposed by default without authentication. EPSS 0.32% with PoC and patch available.
Authentication Bypass
AI / ML
Milvus
Suse
-
CVE-2026-25108
HIGH
CVSS 8.8
FileZen contains an OS command injection vulnerability (CVE-2026-25108, CVSS 8.8) that allows authenticated users to execute arbitrary commands when the Antivirus Check Option is enabled. KEV-listed with EPSS 18.6%, this vulnerability in the Japanese file-sharing appliance has been actively exploited in campaigns targeting organizations in Japan and Asia-Pacific.
Command Injection
Filezen
-
CVE-2026-23112
CRITICAL
CVSS 9.8
Linux kernel NVMe-oF TCP transport lacks proper bounds checking in PDU processing, allowing a local attacker with low privileges to trigger a kernel panic by crafting malicious PDU parameters that exceed scatter-gather list boundaries. The vulnerability enables denial of service through GPF/KASAN errors when invalid memory offsets are dereferenced during data copy operations. No patch is currently available for affected systems.
Linux
Memory Corruption
Buffer Overflow
Redhat
Suse
-
CVE-2026-2441
HIGH
CVSS 8.8
Google Chrome's CSS engine contains a use-after-free vulnerability (CVE-2026-2441, CVSS 8.8) that allows remote attackers to execute arbitrary code within the browser sandbox through crafted HTML pages. KEV-listed with public PoC, this vulnerability enables drive-by exploitation when users visit malicious or compromised websites.
Google
Use After Free
Chrome
Redhat
Suse
-
CVE-2025-69770
CRITICAL
CVSS 10.0
Zip slip to RCE in MojoPortal CMS v2.9.0.1 via /DesignTools/SkinList.aspx. Malicious ZIP archives write files outside extraction directory, enabling code execution. CVSS 10.0.
Path Traversal
-
CVE-2025-69633
CRITICAL
CVSS 9.8
SQL injection in Advanced Popup Creator PrestaShop module 1.1.26-1.2.6. Fixed in 1.2.7.
PHP
SQLi
-
CVE-2026-26334
HIGH
CVSS 7.8
Local privilege escalation in Calero VeraSMART versions before 2026 R1 stems from hardcoded AES encryption keys embedded in Veramark.Framework.dll that protect service account credentials stored in app.settings. An attacker with local system access can extract these static keys, decrypt the stored passwords, and use the recovered credentials to authenticate as the service account, potentially gaining elevated privileges depending on that account's permissions. No patch is currently available for this vulnerability.
Windows
Privilege Escalation
Verasmart
-
CVE-2026-26268
HIGH
CVSS 8.0
Cursor versions before 2.5 allow sandbox escape through improper .git configuration file protections, enabling malicious prompts or agents to write git hooks that execute arbitrary code when git commands are triggered. An attacker can achieve remote code execution without user interaction since git automatically executes these hooks, potentially compromising systems where Cursor is used for AI-assisted development. A patch is available in version 2.5.
RCE
AI / ML
Cursor
-
CVE-2026-26264
HIGH
CVSS 8.1
Unauthenticated remote attackers can crash BACnet Stack prior to versions 1.5.0rc4 and 1.4.3rc2 by sending a malformed WriteProperty request that triggers an integer underflow during APDU decoding, resulting in an out-of-bounds memory read. Public exploit code exists for this vulnerability. The issue affects embedded systems running vulnerable versions of the BACnet protocol stack library.
Denial Of Service
Bacnet Stack
-
CVE-2026-26208
HIGH
CVSS 7.8
ADB Explorer on Windows versions prior to Beta 0.9.26020 allows local attackers to achieve remote code execution by crafting a malicious App.txt settings file that exploits insecure JSON deserialization with enabled type name handling. An attacker can inject a gadget chain payload into the configuration file that executes arbitrary code when the application launches and processes settings. No patch is currently available for affected versions.
Windows
RCE
Deserialization
-
CVE-2026-26187
HIGH
CVSS 8.1
Authenticated users in lakeFS prior to version 1.77.0 can exploit path traversal vulnerabilities in the local block adapter to read and write files outside their intended storage boundaries by bypassing insufficient prefix validation checks. An attacker with valid credentials can manipulate object identifiers and path sequences to access sibling directories and storage namespaces they should not have access to. A patch is available in version 1.77.0 and later.
Path Traversal
Lakefs
Suse
-
CVE-2026-25991
HIGH
CVSS 7.7
Tandoor Recipes prior to 2.5.1 contains a blind server-side request forgery vulnerability in the Cookmate recipe import feature that allows authenticated users to bypass URL validation after HTTP redirects, enabling attacks against internal networks and cloud metadata services. An attacker with standard user privileges can leverage this flaw to scan internal ports, access sensitive metadata, or discover the server's real IP address. Public exploit code exists for this vulnerability.
SSRF
Recipes
-
CVE-2026-24853
HIGH
CVSS 8.1
Caido versions prior to 0.55.0 can be bypassed using a crafted X-Forwarded-Host header to circumvent domain whitelist restrictions, allowing unauthenticated remote attackers to reach non-whitelisted domains through port 8080. This vulnerability affects all users of the web security auditing toolkit and could enable attackers to exfiltrate data or attack internal systems. No patch is currently available for affected versions.
Authentication Bypass
Caido
-
CVE-2026-23111
HIGH
CVSS 7.8
A use-after-free vulnerability in the Linux kernel's netfilter nf_tables module allows local attackers with unprivileged access to cause memory corruption and denial of service through an inverted logic check in catchall map element activation during failed transactions. The flaw occurs in nft_map_catchall_activate() which incorrectly processes already-active elements instead of inactive ones, potentially leading to privilege escalation or system crash. No patch is currently available.
Linux
Use After Free
Privilege Escalation
Memory Corruption
Redhat
-
CVE-2026-21878
HIGH
CVSS 7.5
BACnet Stack is a BACnet open source protocol stack C library for embedded systems. [CVSS 7.5 HIGH]
Path Traversal
Bacnet Stack
-
CVE-2026-1844
HIGH
CVSS 7.2
Stored XSS in WordPress PixelYourSite PRO plugin versions up to 12.4.0.2 allows unauthenticated attackers to inject malicious scripts through the 'pysTrafficSource' and 'pys_landing_page' parameters due to insufficient input validation and output encoding. When site visitors access pages containing injected payloads, the malicious scripts execute in their browsers, potentially enabling session hijacking, credential theft, or malware distribution. No patch is currently available for this vulnerability.
WordPress
XSS
-
CVE-2026-1841
HIGH
CVSS 7.2
Stored XSS in the PixelYourSite WordPress plugin through versions 11.2.0 allows unauthenticated attackers to inject malicious scripts via the 'pysTrafficSource' and 'pys_landing_page' parameters due to inadequate input sanitization and output escaping. When users visit pages containing injected payloads, the scripts execute in their browsers, potentially compromising sessions and stealing sensitive data. No patch is currently available, leaving all affected installations vulnerable.
WordPress
XSS
-
CVE-2026-1619
HIGH
CVSS 8.3
Flexcity versions up to 1.0.36. is affected by authorization bypass through user-controlled key (CVSS 8.3).
Authentication Bypass
Flexcity
-
CVE-2026-1618
HIGH
CVSS 8.8
Flexcity versions before 1.0.36 contain an authentication bypass vulnerability that allows authenticated users to escalate their privileges through an alternate access path. An attacker with valid credentials can exploit this flaw to gain unauthorized elevated access to the system. No patch is currently available.
Privilege Escalation
Authentication Bypass
Flexcity
-
CVE-2025-70957
HIGH
CVSS 7.5
A Denial of Service (DoS) vulnerability was discovered in the TON Lite Server before v2024.09. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2025-70956
HIGH
CVSS 7.5
A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. [CVSS 7.5 HIGH]
Denial Of Service
-
CVE-2025-70955
HIGH
CVSS 7.5
A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) before v2024.10. The vulnerability stems from the improper handling of vmstate and continuation jump instructions, which allow for continuous dynamic tail calls. [CVSS 7.5 HIGH]
Stack Overflow
Denial Of Service
-
CVE-2025-70954
HIGH
CVSS 7.5
A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. [CVSS 7.5 HIGH]
Null Pointer Dereference
Denial Of Service
-
CVE-2025-70866
HIGH
CVSS 8.8
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. [CVSS 8.8 HIGH]
Authentication Bypass
Lavalite
-
CVE-2025-70123
HIGH
CVSS 7.5
An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. [CVSS 7.5 HIGH]
Denial Of Service
Free5gc
-
CVE-2025-70122
HIGH
CVSS 7.5
A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted PFCP Session Modification Request. [CVSS 7.5 HIGH]
Buffer Overflow
Denial Of Service
Free5gc
-
CVE-2025-70121
HIGH
CVSS 7.5
An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted 5GS Mobile Identity in a NAS Registration Request message. [CVSS 7.5 HIGH]
Denial Of Service
Free5gc
-
CVE-2025-70093
HIGH
CVSS 7.4
An issue in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code via returning a crafted AJAX response. [CVSS 7.4 HIGH]
Command Injection
RCE
Open Source Point Of Sale
-
CVE-2025-40905
HIGH
CVSS 7.3
WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. [CVSS 7.3 HIGH]
Information Disclosure
-
CVE-2025-33042
HIGH
CVSS 7.3
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas. This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0. [CVSS 7.3 HIGH]
Apache
Java
Code Injection
Avro
Redhat
-
CVE-2025-15157
HIGH
CVSS 8.8
The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function in all versions up to, and including, 3.1.19. [CVSS 8.8 HIGH]
WordPress
Privilege Escalation
PHP
-
CVE-2025-14349
HIGH
CVSS 8.8
Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36. [CVSS 8.8 HIGH]
Privilege Escalation
Flexcity
-
CVE-2025-9293
HIGH
CVSS 7.7
A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication.
Information Disclosure
-
CVE-2025-1924
HIGH
CVSS 8.2
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. [CVSS 8.2 HIGH]
Denial Of Service
-
CVE-2026-26269
MEDIUM
CVSS 5.4
Stack buffer overflow in Vim's NetBeans integration allows a malicious NetBeans server to corrupt memory and potentially crash the editor or execute arbitrary code through a specially crafted specialKeys command. The vulnerability affects Vim builds with NetBeans support enabled and requires user interaction to connect to a compromised server. A patch is available in Vim version 9.1.2148 and later.
Buffer Overflow
Vim
Redhat
Suse
-
CVE-2026-25964
MEDIUM
CVSS 4.9
Path traversal in Tandoor Recipes prior to 2.5.1 allows authenticated users with import permissions to read arbitrary files from the server by manipulating file paths during recipe import operations. An attacker could access sensitive system files like /etc/passwd or application configuration files, potentially leading to full system compromise. Public exploit code exists for this vulnerability.
Path Traversal
Recipes
-
CVE-2026-25531
MEDIUM
CVSS 4.3
Kanboard versions prior to 1.2.50 allow authenticated users to duplicate tasks into projects they lack access permissions for due to insufficient validation in the TaskCreationController endpoint. This privilege escalation vulnerability enables users to move sensitive tasks across project boundaries they should not be able to access. Public exploit code exists for this incomplete fix of a prior authorization bypass vulnerability.
Authentication Bypass
Kanboard
-
CVE-2026-22892
MEDIUM
CVSS 4.3
Mattermost versions 11.1.2, 10.11.9, and 11.2.1 and earlier fail to properly enforce access controls in the Jira plugin's /create-issue API endpoint, allowing authenticated users to read restricted post content and attachments from channels they cannot access by referencing post IDs. An attacker with Jira plugin access can exploit this to enumerate and exfiltrate sensitive information from private or restricted channels. No patch is currently available for affected versions.
Jira
Mattermost Server
Suse
-
CVE-2026-21870
MEDIUM
CVSS 5.5
The BACnet Protocol Stack library versions 1.4.2 and earlier contain an off-by-one buffer overflow in the ubasic interpreter's string tokenizer that crashes the application when processing oversized string literals. Public exploit code exists for this vulnerability, which affects any system running vulnerable versions of the BACnet Stack or Stack Overflow products. An attacker with local access and user interaction can trigger a denial of service condition through a specially crafted input string.
Buffer Overflow
Stack Overflow
Denial Of Service
Bacnet Stack
-
CVE-2026-2443
MEDIUM
CVSS 5.3
libsoup's improper validation of HTTP Range headers enables remote attackers to read sensitive server memory when processing specially crafted requests against vulnerable SoupServer instances. The flaw affects GNOME-based systems using certain build configurations and requires no authentication or user interaction. No patch is currently available, and exploitation likelihood remains low at 0.1% EPSS.
Buffer Overflow
Information Disclosure
Redhat
Suse
-
CVE-2026-2026
MEDIUM
CVSS 6.1
Nessus Agent on Windows systems contains improper file permission controls that allow local authenticated users to trigger denial of service attacks against the agent process. The vulnerability requires local access with standard user privileges and could disrupt security monitoring capabilities on affected hosts. No patch is currently available for this issue.
Windows
Denial Of Service
Nessus Agent
-
CVE-2025-70095
MEDIUM
CVSS 6.5
A cross-site scripting (XSS) vulnerability in the item management and sales invoice function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload. [CVSS 6.5 MEDIUM]
XSS
Open Source Point Of Sale
-
CVE-2025-70094
MEDIUM
CVSS 6.5
A cross-site scripting (XSS) vulnerability in the Generate Item Barcode function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Item Category parameter. [CVSS 6.5 MEDIUM]
XSS
Open Source Point Of Sale
-
CVE-2025-70091
MEDIUM
CVSS 6.5
A cross-site scripting (XSS) vulnerability in the Customers function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Phone Number parameter. [CVSS 6.5 MEDIUM]
XSS
Open Source Point Of Sale
-
CVE-2025-66676
MEDIUM
CVSS 6.2
An issue in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) via a crafted request. [CVSS 6.2 MEDIUM]
Denial Of Service
-
CVE-2025-48023
MEDIUM
CVSS 6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. [CVSS 6.5 MEDIUM]
Denial Of Service
-
CVE-2025-48022
MEDIUM
CVSS 6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. [CVSS 6.5 MEDIUM]
Information Disclosure
-
CVE-2025-48021
MEDIUM
CVSS 6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. [CVSS 6.5 MEDIUM]
Integer Overflow
-
CVE-2025-48020
MEDIUM
CVSS 6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. [CVSS 6.5 MEDIUM]
Denial Of Service
-
CVE-2025-48019
MEDIUM
CVSS 6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. [CVSS 6.5 MEDIUM]
Denial Of Service
-
CVE-2025-15520
MEDIUM
CVSS 4.3
The RegistrationMagic WordPress plugin before 6.0.7.2 checks nonces but not capabilities, allowing for the disclosure of some sensitive data to subscribers and above. [CVSS 4.3 MEDIUM]
WordPress
PHP
-
CVE-2026-26226
None
beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to cross-site scripting (XSS) when rendering attacker-controlled Mermaid diagrams.
XSS
-
CVE-2026-26221
None
Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Service (Hyland.Core.Workflow.NTService.exe).
Dotnet
RCE
-
CVE-2026-20796
LOW
CVSS 3.1
Mattermost versions 10.11.x <= 10.11.9 fail to properly validate channel membership at the time of data retrieval which allows a deactivated user to learn team names they should not have access to via a race condition in the /common_teams API endpoint.. Mattermost Advisory ID: MMSA-2025-00549 [CVSS 3.1 LOW]
Race Condition
-
CVE-2026-1721
None
Summary
A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's OAuth callback handler.
Github
XSS
-
CVE-2026-1578
None
HP App for Android is potentially vulnerable to cross-site scripting (XSS) when using an outdated version of the application via mobile devices. HP is releasing updates to mitigate these potential vulnerabilities.
Android
XSS
-
CVE-2026-0872
None
Improper Certificate Validation vulnerability in Thales SafeNet Agent for Windows Logon on Windows allows Signature Spoofing by Improper Validation.This issue affects SafeNet Agent for Windows Logon: 4.0.0, 4.1.1, 4.1.2.
Windows
-
CVE-2025-68128
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-68127
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-68126
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-68125
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-68124
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-58184
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-58182
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-47915
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2025-36552
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36545
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36542
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36538
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36534
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Linux
Denial Of Service
-
CVE-2025-36532
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36526
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36524
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-36523
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-36517
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-35997
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-35993
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-35976
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-35962
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-35961
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-35960
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-32734
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-32733
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-32090
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-32085
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-32082
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-32009
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-31942
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-31364
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-31358
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-31145
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-30517
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-29869
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-27941
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-27928
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-27573
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-27569
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-27251
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-26471
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-25049
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-24524
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-24518
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-24492
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-24321
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-24300
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-22845
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Denial Of Service
-
CVE-2025-20110
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-20107
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-20098
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-20089
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-20078
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-20066
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-20038
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Linux
Denial Of Service
-
CVE-2025-20007
None
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused. No vendor patch available.
Information Disclosure
-
CVE-2025-9292
LOW
CVSS 2.0
A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface.
Information Disclosure
Cors Misconfiguration
-
CVE-2025-1790
None
Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
Windows
Privilege Escalation
-
CVE-2024-34157
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2024-34154
None
Rejected reason: reserved but not needed. No vendor patch available.
Information Disclosure
-
CVE-2024-21961
None
Improper restriction of operations within the bounds of a memory buffer in PCIe® Link could allow an attacker with access to a guest virtual machine to potentially perform a denial of service attack against the host resulting in loss of availability.
Denial Of Service