201 CVEs tracked today. 28 Critical, 65 High, 101 Medium, 3 Low.
-
CVE-2026-20131
CRITICAL
CVSS 10.0
Cisco Secure Firewall Management Center (FMC) contains a critical unauthenticated Java deserialization vulnerability (CVE-2026-20131, CVSS 10.0) in its web interface that enables remote code execution as root. KEV-listed with public PoC, this vulnerability allows complete compromise of the central management platform that controls all Cisco firewalls in the organization, enabling attackers to modify security policies, disable protections, and access all network traffic.
Cisco
Java
Deserialization
RCE
-
CVE-2026-20079
CRITICAL
CVSS 10.0
Unauthenticated auth bypass in Cisco FMC web interface. CVSS 10.0.
Cisco
Authentication Bypass
-
CVE-2026-29119
CRITICAL
CVSS 9.8
Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.
Authentication Bypass
Sfx2100 Firmware
-
CVE-2026-29000
CRITICAL
CVSS 9.1
JWT authentication bypass in pac4j-jwt before 4.5.9/5.7.9/6.3.3 when processing encrypted JWTs. PoC available.
Authentication Bypass
-
CVE-2026-28783
CRITICAL
CVSS 9.1
Code injection bypass in Craft CMS before 5.9.0-beta.1/4.17.0-beta.1 via blocklist evasion. Patch available.
PHP
SSRF
Craft Cms
-
CVE-2026-28778
CRITICAL
CVSS 9.8
Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.
Authentication Bypass
RCE
Sfx2100 Firmware
-
CVE-2026-28777
CRITICAL
CVSS 9.8
Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.
Authentication Bypass
Sfx2100 Firmware
-
CVE-2026-28776
CRITICAL
CVSS 9.8
Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.
Authentication Bypass
Sfx2100 Firmware
-
CVE-2026-28775
CRITICAL
CVSS 9.8
Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.
Snmp
RCE
Sfx2100 Firmware
-
CVE-2026-28697
CRITICAL
CVSS 9.1
RCE in Craft CMS before 4.17.0-beta.1/5.9.0-beta.1 via template injection for authenticated admins. PoC and patch available.
PHP
RCE
Craft Cms
-
CVE-2026-27446
CRITICAL
CVSS 9.8
Missing authentication in Apache ActiveMQ Artemis. Unauthenticated remote attacker can access message broker. EPSS 0.20%.
Apache
Authentication Bypass
Activemq Artemis
Artemis
Redhat
-
CVE-2026-27441
CRITICAL
CVSS 9.8
Command injection in SEPPmail Secure Email Gateway before 15.0.1 via PDF encryption password.
Command Injection
Seppmail
-
CVE-2026-26478
CRITICAL
CVSS 9.8
Command injection in Mobvoi Tichome Mini smart speaker via crafted requests. EPSS 1.2%. PoC available.
Command Injection
Tichome Mini Firmware
-
CVE-2026-26002
CRITICAL
CVSS 9.8
Injection in Open OnDemand HPC portal Files application before 4.0.9/4.1.3.
Information Disclosure
Open Ondemand
-
CVE-2026-3545
CRITICAL
CVSS 9.6
Sandbox escape via navigation validation in Chrome before 145.0.7632.159. Patch available.
Google
Chrome
-
CVE-2025-70226
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWizard. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70225
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWWConfig. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70223
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvNetwork. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70222
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70221
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70220
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAutoDetecWAN_wizard4. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70219
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formDeviceReboot. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-70218
CRITICAL
CVSS 9.8
Stack buffer overflow in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvFirewall. Part of a family of 15+ critical buffer overflows in this router.
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2025-69969
CRITICAL
CVSS 9.6
Missing BLE authentication in Pebble Prism Ultra smartwatch. PoC available.
RCE
Information Disclosure
Pebble Prism Ultra Firmware
-
CVE-2025-66944
CRITICAL
CVSS 9.8
SQL injection in databaseir v.1.0.7 via query parameter. PoC available.
SQLi
Databasir
-
CVE-2025-66678
CRITICAL
CVSS 9.8
Code execution via HwRwDrv.sys in Nil Hardware Editor. PoC available.
RCE
SQLi
-
CVE-2025-59786
CRITICAL
CVSS 9.8
Insufficient session invalidation in 2N Access Commander 3.4.2. Multiple sessions remain valid after logout.
Information Disclosure
Access Commander
-
CVE-2025-46108
CRITICAL
CVSS 9.8
D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpipSetup. [CVSS 9.8 CRITICAL]
D-Link
Buffer Overflow
Dir 513 Firmware
-
CVE-2026-29120
HIGH
CVSS 7.8
Local privilege escalation in IDC SFX2100 Satellite Receiver firmware stems from a hardcoded root password hash stored in the installation configuration file that is vulnerable to offline dictionary attacks. An attacker with low-privileged local access can exploit this weak credential to escalate to root, though no patch is currently available. The vulnerability requires prior system compromise but provides a reliable path to full administrative control on affected devices.
Authentication Bypass
Sfx2100 Firmware
-
CVE-2026-29045
HIGH
CVSS 7.5
Hono versions prior to 4.12.4 suffer from an authentication bypass in serveStatic when combined with route-based middleware protections due to inconsistent URL decoding between the router and file serving components. An unauthenticated remote attacker can exploit this mismatch by encoding slashes (%2F) in request paths to access protected static resources that should be restricted by middleware rules. A patch is available in version 4.12.4 and later.
Authentication Bypass
Hono
-
CVE-2026-28784
HIGH
CVSS 7.2
Remote code execution in Craft CMS versions before 5.8.22 and 4.16.18 can be achieved by authenticated administrators or users with System Messages access by injecting malicious Twig payloads through the map filter in configurable text fields. An attacker with admin-level privileges and allowAdminChanges enabled, or non-admin access to System Messages utilities, can execute arbitrary code on the affected server. A patch is available and users should update immediately to mitigate this risk.
RCE
Craft Cms
-
CVE-2026-28774
HIGH
CVSS 8.8
Authenticated attackers can achieve remote code execution with root privileges on IDC SFX2100 satellite receiver devices through OS command injection in the web-based Traceroute diagnostic tool. By injecting shell metacharacters into the flags parameter, an attacker can execute arbitrary operating system commands on the affected system. Public exploit code exists for this vulnerability, and no patch is currently available.
Command Injection
Sfx2100 Firmware
-
CVE-2026-28773
HIGH
CVSS 8.8
Authenticated attackers can execute arbitrary OS commands with root privileges on IDC SFX2100 satellite receivers through command injection in the web-based Ping utility, bypassing input filters by using alternate shell metacharacters like the pipe operator. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw affects the web management interface and allows complete system compromise for any authenticated user.
Command Injection
Sfx2100 Firmware
-
CVE-2026-28770
HIGH
CVSS 8.8
XML injection in the IDC SFX2100 satellite receiver web interface allows authenticated attackers to inject arbitrary XML elements and execute reflected cross-site scripting attacks through unsanitized input in the checkifdone.cgi script. Public exploit code exists for this vulnerability, and potential for more severe attacks such as XXE exploitation has not been ruled out. No patch is currently available for affected firmware versions.
XSS
XXE
Sfx2100 Firmware
-
CVE-2026-28696
HIGH
CVSS 7.5
Craft is a content management system (CMS). [CVSS 7.5 HIGH]
Authentication Bypass
Craft Cms
-
CVE-2026-28695
HIGH
CVSS 7.2
Remote code execution in Craft CMS 5.8.21 allows authenticated administrators to execute arbitrary PHP code through Server-Side Template Injection in the create() Twig function combined with Symfony Process gadget chains. Public exploit code exists for this vulnerability, which bypasses the previous patch for CVE-2025-57811. Updates are available in Craft CMS 5.9.0-beta.1 and 4.17.0-beta.1.
PHP
RCE
Craft Cms
-
CVE-2026-28435
HIGH
CVSS 7.5
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. [CVSS 7.5 HIGH]
Denial Of Service
Cpp Httplib
Suse
-
CVE-2026-27803
HIGH
CVSS 8.3
Vaultwarden versions prior to 1.35.4 fail to properly enforce collection management permissions, allowing authenticated users with Manager roles to perform restricted management operations on collections where they lack authorization. An attacker with valid credentials can exploit this privilege escalation to modify or control collections they should not have access to. No patch is currently available for affected deployments.
Privilege Escalation
Vaultwarden
Redhat
-
CVE-2026-27802
HIGH
CVSS 8.3
Vaultwarden versions before 1.35.4 contain a privilege escalation vulnerability that allows authenticated Manager-level users to modify permissions on collections they should not have access to. An attacker with Manager role can exploit this during bulk permission updates to gain unauthorized access to sensitive collections. A patch is available in version 1.35.4 and should be applied immediately.
Privilege Escalation
Vaultwarden
Redhat
-
CVE-2026-27444
HIGH
CVSS 7.5
SEPPmail Secure Email Gateway versions before 15.0.1 misinterpret email addresses in message headers, enabling attackers to spoof sender identities or decrypt encrypted communications due to inconsistent header parsing with standard mail infrastructure. This unauthenticated network-based vulnerability affects all default installations with no available patch, presenting significant risk to organizations relying on the gateway for email security.
Information Disclosure
Seppmail
-
CVE-2026-27443
HIGH
CVSS 7.5
SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME message headers, enabling attackers to forge or manipulate email headers and bypass trust mechanisms without authentication. This allows adversaries to spoof trusted senders or inject malicious headers into encrypted messages, potentially facilitating phishing and social engineering attacks. No patch is currently available for affected installations.
Code Injection
Seppmail
-
CVE-2026-27442
HIGH
CVSS 7.5
Improper filename validation in SEPPmail Secure Email Gateway's GINA web interface (versions before 15.0.1) enables unauthenticated remote attackers to access arbitrary files on the gateway through specially crafted encrypted email attachments. This path traversal vulnerability affects the confidentiality of sensitive data stored on affected systems. No patch is currently available.
Path Traversal
Seppmail
-
CVE-2026-26673
HIGH
CVSS 7.5
Remote denial of service attacks against DJI Mavic Mini, Spark, and Mini SE firmware versions 0.1.00.0500 and below can be executed over the network by exploiting the Enhanced-WiFi transmission subsystem without authentication. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker can disrupt drone operations and connectivity by sending specially crafted wireless transmissions to affected devices.
Denial Of Service
Mini Se Firmware
Spark Firmware
Mavic Mini Firmware
-
CVE-2026-26514
HIGH
CVSS 7.5
Remote attackers can inject arbitrary command-line arguments into bird-lg-go's traceroute module through unsanitized user input, enabling denial-of-service attacks that exhaust system resources. The vulnerability affects Golang and bird-lg-go installations prior to commit 6187a4e, and public exploit code exists. A patch is available to remediate this high-severity flaw.
Golang
Denial Of Service
Bird Lg Go
-
CVE-2026-25750
HIGH
CVSS 8.1
LangSmith Studio contains a URL parameter injection vulnerability that allows attackers to steal authentication tokens, user IDs, and workspace credentials from users who click malicious links, enabling account takeover and unauthorized access to workspace resources. Both LangSmith Cloud and self-hosted Kubernetes deployments are affected, with exploitation requiring social engineering to trick authenticated users into clicking attacker-controlled URLs. No patch is currently available for this high-severity vulnerability (CVSS 8.1).
Kubernetes
Authentication Bypass
Langsmith
Langchain
AI / ML
-
CVE-2026-23236
HIGH
CVSS 7.3
The Linux kernel fbdev smscufx driver fails to properly copy user-supplied data to kernel memory in the UFX_IOCTL_REPORT_DAMAGE ioctl handler, instead directly referencing userspace memory which can be manipulated or invalidated. A local attacker with appropriate privileges can exploit this to cause a denial of service by triggering kernel memory access violations or crashes. No patch is currently available for this medium-severity vulnerability.
Linux
Information Disclosure
Redhat
Suse
-
CVE-2026-23235
HIGH
CVSS 7.1
Local privilege escalation in Linux kernel f2fs sysfs attributes allows unprivileged users to trigger out-of-bounds memory access and cause denial of service by writing oversized integer values to filesystem control interfaces. The vulnerability stems from improper bounds checking when mapping sysfs attributes to kernel structures of varying integer sizes, enabling attackers to corrupt kernel memory and crash the system. No patch is currently available for this vulnerability.
Linux
Buffer Overflow
Information Disclosure
Linux Kernel
Redhat
-
CVE-2026-23234
HIGH
CVSS 7.8
A use-after-free vulnerability in the Linux kernel's f2fs filesystem allows a local attacker with user privileges to trigger memory corruption and crash the system through a race condition between I/O completion and filesystem unmount operations. The vulnerability occurs when a loop device completes write operations concurrently with an unmount that frees filesystem structures still being accessed by pending I/O handlers. This issue has no available patch and requires kernel-level access to exploit.
Linux
Use After Free
Information Disclosure
Memory Corruption
Linux Kernel
-
CVE-2026-23233
HIGH
CVSS 7.8
F2FS swapfile memory corruption in Linux kernel 6.6+ allows local attackers with user privileges to cause data corruption through improper physical block mapping when using fragmented swapfiles smaller than the F2FS section size. Public exploit code exists for this vulnerability, and attackers can trigger dm-verity corruption errors or F2FS node corruption leading to system crashes and data loss. No patch is currently available.
Linux
Google
Buffer Overflow
Memory Corruption
Linux Kernel
-
CVE-2026-23231
HIGH
CVSS 7.8
A use-after-free vulnerability in the Linux kernel's netfilter nf_tables chain registration allows local attackers with user privileges to trigger memory corruption and cause a denial of service, potentially leading to privilege escalation. The flaw occurs when hook registration fails during chain addition, allowing concurrent operations to access freed memory without proper RCU synchronization. The vulnerability affects systems running vulnerable Linux kernels with netfilter enabled, and no patch is currently available.
Linux
Use After Free
Information Disclosure
Memory Corruption
Redhat
-
CVE-2026-20105
HIGH
CVSS 7.7
Denial of service in Cisco Secure Firewall ASA and FTD Remote Access SSL VPN functionality allows authenticated attackers to exhaust device memory by sending specially crafted packets, forcing a device reload. The vulnerability stems from insufficient input validation on user-supplied data and requires valid VPN credentials to exploit. No patch is currently available.
Cisco
Tls
Denial Of Service
-
CVE-2026-20103
HIGH
CVSS 8.6
Denial of service in Cisco Secure Firewall ASA and FTD Remote Access SSL VPN allows unauthenticated remote attackers to exhaust device memory through malformed packets, causing the VPN service to become unresponsive. The vulnerability stems from insufficient input validation on the SSL VPN server and currently has no available patch. While the management interface remains accessible, new VPN connections cannot be established during an attack.
Cisco
Tls
Denial Of Service
-
CVE-2026-20101
HIGH
CVSS 8.6
Cisco Secure Firewall ASA and Secure FTD devices can be remotely rebooted by unauthenticated attackers through malformed SAML 2.0 authentication messages, causing service unavailability due to insufficient input validation. The vulnerability has a high attack surface as it requires no authentication or user interaction and affects the device's core authentication mechanism. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20100
HIGH
CVSS 7.7
Cisco Secure Firewall ASA and FTD devices are vulnerable to a denial of service attack through the Remote Access SSL VPN feature, where authenticated attackers can trigger unvalidated input processing in the Lua interpreter to force device reloads. The vulnerability stems from insufficient input validation in the Lua interpreter and can be exploited by sending specially crafted HTTP packets over an existing VPN connection. No patch is currently available for this HIGH severity issue (CVSS 7.7).
Cisco
Tls
Denial Of Service
-
CVE-2026-20082
HIGH
CVSS 8.6
Cisco Secure Firewall ASA devices fail to properly manage embryonic connection limits during TCP SYN flood attacks, allowing unauthenticated remote attackers to block all incoming TCP connections including management access and VPN services. An attacker can exploit this denial-of-service vulnerability by sending crafted traffic streams to management or data interfaces, effectively isolating the device from legitimate network access. No patch is currently available for this HIGH severity vulnerability.
Cisco
Denial Of Service
-
CVE-2026-20062
HIGH
CVSS 7.2
Cisco Secure Firewall ASA in multi-context mode contains an access control bypass in SCP operations that allows authenticated local administrators of one context to read, modify, or create files in other contexts, including sensitive admin and system configuration files. The vulnerability stems from improper validation of cross-context file access when the CiscoSSH stack is enabled. No patch is currently available for this high-severity flaw.
Cisco
-
CVE-2026-20049
HIGH
CVSS 7.7
Denial of service in Cisco ASA and FTD devices processing GCM-encrypted IKEv2 IPsec traffic results from inadequate memory allocation, allowing authenticated remote attackers to trigger device reloads by sending specially crafted encrypted packets. An attacker with valid VPN credentials can exploit this vulnerability to render affected firewalls unavailable. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20039
HIGH
CVSS 8.6
Unauthenticated remote attackers can trigger a denial of service against Cisco Secure Firewall ASA and FTD devices by sending crafted HTTP requests to the VPN web server, exploiting ineffective memory management to force device reloads. The vulnerability requires no authentication or user interaction and affects all network-exposed instances. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20014
HIGH
CVSS 7.7
Memory exhaustion in Cisco Secure Firewall ASA and FTD IKEv2 implementations allows authenticated remote attackers with valid VPN credentials to trigger device reloads by sending crafted packets, disrupting firewall availability and downstream network services. The vulnerability stems from improper IKEv2 packet processing that fails to constrain memory allocation. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20002
HIGH
CVSS 8.1
Unauthenticated SQL injection in Cisco Secure FMC's web management interface allows authenticated attackers to manipulate database queries and extract sensitive data or read operating system files. The vulnerability stems from insufficient input validation on user-supplied requests, requiring valid credentials to exploit. No patch is currently available.
Cisco
SQLi
-
CVE-2026-3544
HIGH
CVSS 8.8
Google Chrome versions before 145.0.7632.159 contain a heap buffer overflow in the WebCodecs component that enables remote attackers to write data outside allocated memory bounds through malicious HTML pages. An unauthenticated attacker can exploit this vulnerability with minimal user interaction to achieve arbitrary code execution on affected systems. A patch is available in Chrome 145.0.7632.159 and later.
Google
Buffer Overflow
Chrome
-
CVE-2026-3543
HIGH
CVSS 8.8
Out-of-bounds memory access in Google Chrome's V8 engine (versions prior to 145.0.7632.159) enables remote attackers to achieve memory corruption through malicious HTML pages without requiring user privileges beyond standard interaction. The vulnerability affects all Chrome users and could potentially lead to information disclosure, data corruption, or code execution depending on memory layout and exploitation context.
Chrome
Google
-
CVE-2026-3542
HIGH
CVSS 8.8
Out-of-bounds memory access in Google Chrome's WebAssembly implementation (versions prior to 145.0.7632.159) enables remote attackers to achieve full memory corruption through malicious HTML pages, requiring only user interaction. An attacker can exploit this to read sensitive data, modify memory, or crash the browser with no authentication needed. A patch is available in Chrome 145.0.7632.159 and later.
Google
Chrome
-
CVE-2026-3541
HIGH
CVSS 8.8
Out-of-bounds memory read in Google Chrome's CSS implementation (versions prior to 145.0.7632.159) allows network attackers to read sensitive memory contents by tricking users into viewing a malicious HTML page. The vulnerability requires user interaction but carries high impact, enabling information disclosure without authentication or special privileges. A patch is available in Chrome 145.0.7632.159 and later.
Google
Chrome
-
CVE-2026-3540
HIGH
CVSS 8.8
Out-of-bounds memory access in Google Chrome's WebAudio component (versions prior to 145.0.7632.159) enables remote attackers to read, modify, or crash the browser by tricking users into visiting malicious web pages. This network-based vulnerability requires no special privileges and affects all Chrome users who interact with untrusted content. A patch is available in Chrome 145.0.7632.159 and later versions.
Google
Chrome
-
CVE-2026-3539
HIGH
CVSS 8.8
Heap corruption in Google Chrome's DevTools prior to version 145.0.7632.159 can be triggered through a malicious extension, requiring user installation and interaction. An attacker exploiting this object lifecycle vulnerability could achieve arbitrary code execution with full system privileges. A patch is available in Chrome 145.0.7632.159 and later versions.
Google
Chrome
-
CVE-2026-3538
HIGH
CVSS 8.8
Google Chrome's Skia rendering engine contains an integer overflow flaw that enables remote attackers to access out-of-bounds memory when processing malicious HTML pages. Affected users running Chrome versions prior to 145.0.7632.159 could face memory corruption leading to information disclosure, data modification, or denial of service. A security patch is available to remediate this critical vulnerability.
Integer Overflow
Chrome
Google
-
CVE-2026-3537
HIGH
CVSS 8.8
Heap corruption in Chrome's PowerVR graphics driver on Android versions prior to 145.0.7632.159 can be triggered through malicious HTML pages, potentially enabling remote code execution without user interaction beyond visiting a compromised website. The vulnerability stems from improper object lifecycle management and affects all Android users running vulnerable Chrome versions. A patch is available and should be applied immediately given the high exploitation potential.
Android
Chrome
Google
-
CVE-2026-3536
HIGH
CVSS 8.8
Google Chrome's ANGLE graphics library before version 145.0.7632.159 contains an integer overflow vulnerability that enables remote attackers to access out-of-bounds memory through malicious HTML pages. An unauthenticated attacker can exploit this flaw by tricking users into visiting a crafted webpage, potentially compromising confidentiality, integrity, and availability. A patch is available in Chrome 145.0.7632.159 and later versions.
Integer Overflow
Chrome
Google
-
CVE-2026-3520
HIGH
CVSS 7.5
Multer versions before 2.1.1 are susceptible to denial of service attacks when processing malformed multipart/form-data requests, which can trigger stack overflow conditions and crash Node.js applications. An unauthenticated remote attacker can exploit this vulnerability without user interaction to render affected services unavailable. The vulnerability affects Node.js applications using Multer for file upload handling, and patches are available in version 2.1.1 and later.
Node.js
Stack Overflow
Denial Of Service
Multer
-
CVE-2026-3452
HIGH
CVSS 7.2
Remote code execution in Concrete CMS prior to version 9.4.8 stems from unsafe deserialization of PHP objects in the Express Entry List block configuration. An authenticated administrator can inject malicious serialized data through the columns parameter that executes arbitrary code when unserialized without validation. This allows attackers with admin privileges to achieve complete system compromise through stored object injection attacks.
PHP
RCE
Deserialization
Concrete Cms
-
CVE-2026-3094
HIGH
CVSS 7.8
Arbitrary code execution in Delta Electronics CNCSoft-G2 occurs when the application fails to properly validate user-supplied files, allowing an attacker to execute malicious code by tricking a user into opening a crafted file. This local vulnerability affects industrial environments running CNCSoft-G2 and requires user interaction to exploit. No patch is currently available.
Industrial
Cncsoft G2
-
CVE-2026-2747
HIGH
CVSS 7.5
SEPPmail Secure Email Gateway versions prior to 15.0.1 fail to properly isolate decrypted PGP message content from surrounding plaintext, enabling attackers to access encrypted sensitive information over the network without authentication. This high-severity flaw affects organizations relying on SEPPmail for secure email handling and exposes confidential data despite encryption protections. No patch is currently available for this vulnerability.
Information Disclosure
Seppmail
-
CVE-2026-2025
HIGH
CVSS 7.5
Unauthenticated disclosure of WordPress user email addresses in Mail Mint plugin versions before 1.19.5 through an unprotected REST API endpoint allows remote attackers to enumerate users without authentication. Public exploit code exists for this vulnerability, and no patch is currently available. This affects all installations of the Mail Mint plugin below the patched version.
WordPress
-
CVE-2026-1945
HIGH
CVSS 7.2
Stored XSS in WPBookit plugin through version 1.0.8 allows unauthenticated attackers to inject malicious scripts via user name and email fields due to improper input validation. When site visitors access pages containing the injected payload, the scripts execute in their browsers, potentially compromising user sessions and data. No patch is currently available for this vulnerability.
WordPress
XSS
-
CVE-2026-1273
HIGH
CVSS 7.2
The PostX WordPress plugin versions up to 5.0.8 contains a server-side request forgery vulnerability in its REST API endpoints that allows authenticated administrators to make arbitrary web requests from the server to internal or external systems. This could enable attackers with admin privileges to query, exfiltrate, or modify data from internal services accessible to the web server. No patch is currently available for this vulnerability.
WordPress
SSRF
-
CVE-2026-0847
HIGH
CVSS 8.6
Unauthorized file access in NLTK through path traversal flaws in multiple CorpusReader classes (versions up to 3.9.2) allows unauthenticated attackers to read arbitrary files on affected systems, potentially exposing SSH keys, API tokens, and other sensitive data. The vulnerability affects NLP applications and machine learning APIs that process user-controlled file inputs without proper validation. No patch is currently available.
Ssh
RCE
Path Traversal
AI / ML
Redhat
-
CVE-2025-71238
HIGH
CVSS 7.8
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix bsg_done() causing double free
Kernel panic observed on system,
[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000
[5353358.825194] #PF: supervisor write access in kernel mode
[5353358.825195] #PF: error_code(0x0002) - not-present page
[5353358.825196] PGD 100006067 P4D 0
[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI
[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1
[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025
[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10
[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246
[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000
[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000
[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000
[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090
[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000
[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000
[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0
[5353358.825221] PKRU: 55555554
[5353358.825222] Call Trace:
[5353358.825223] <TASK>
[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df
[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df
[5353358.825232] ? sg_copy_buffer+0xc8/0x110
[5353358.825236] ? __die_body.cold+0x8/0xd
[5353358.825238] ? page_fault_oops+0x134/0x170
[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110
[5353358.825244] ? exc_page_fault+0xa8/0x150
[5353358.825247] ? asm_exc_page_fault+0x22/0x30
[5353358.825252] ? memcpy_erms+0x6/0x10
[5353358.825253] sg_copy_buffer+0xc8/0x110
[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]
[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]
Most routines in qla_bsg.c call bsg_done() only for success cases.
Linux
Information Disclosure
Linux Kernel
Redhat
Suse
-
CVE-2025-70341
HIGH
CVSS 7.8
Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allows attackers to write arbitrary files. [CVSS 7.8 HIGH]
Race Condition
App Auto Patch
-
CVE-2025-59785
HIGH
CVSS 7.2
Access Commander contains a vulnerability that allows attackers to bypass password policy for backup file encryption (CVSS 7.2).
Authentication Bypass
Access Commander
-
CVE-2025-59784
HIGH
CVSS 7.2
2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation. [CVSS 7.2 HIGH]
Information Disclosure
Access Commander
-
CVE-2025-59783
HIGH
CVSS 7.2
API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges. [CVSS 7.2 HIGH]
Command Injection
Access Commander
-
CVE-2025-15558
HIGH
CVSS 8.0
Docker CLI for Windows searches for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. [CVSS 8.0 HIGH]
Windows
Docker
Github
Command Line Interface
Redhat
-
CVE-2023-7337
HIGH
CVSS 7.5
The JS Help Desk - AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the 'js-support-ticket-token-tkstatus' cookie in version 2.8.2 due to an incomplete fix for CVE-2023-50839 where a second sink was left with insufficient escaping on the user supplied values and lack of sufficient preparation on the existing SQL query. [CVSS 7.5 HIGH]
WordPress
SQLi
-
CVE-2019-25507
HIGH
CVSS 8.2
Ashop Shopping Cart Software contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'shop' parameter. [CVSS 8.2 HIGH]
PHP
SQLi
-
CVE-2019-25506
HIGH
CVSS 8.2
FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. [CVSS 8.2 HIGH]
PHP
SQLi
Authentication Bypass
Freesms
-
CVE-2019-25505
HIGH
CVSS 7.1
Tradebox 5.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the symbol parameter. [CVSS 7.1 HIGH]
SQLi
Tradebox
-
CVE-2019-25504
HIGH
CVSS 8.2
NCrypted Jobgator contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the experience parameter. [CVSS 8.2 HIGH]
SQLi
-
CVE-2019-25503
HIGH
CVSS 7.1
PHPads 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the bannerID parameter in click.php3. [CVSS 7.1 HIGH]
PHP
SQLi
Phpads
-
CVE-2019-25501
HIGH
CVSS 8.2
Simple Job Script contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the app_id parameter. [CVSS 8.2 HIGH]
PHP
SQLi
Authentication Bypass
Simplejobscript
-
CVE-2019-25500
HIGH
CVSS 8.2
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the employerid parameter. [CVSS 8.2 HIGH]
SQLi
Simplejobscript
-
CVE-2019-25499
HIGH
CVSS 8.2
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the job_id parameter. [CVSS 8.2 HIGH]
PHP
SQLi
Authentication Bypass
Simplejobscript
-
CVE-2019-25498
HIGH
CVSS 8.2
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. [CVSS 8.2 HIGH]
SQLi
Authentication Bypass
Simplejobscript
-
CVE-2026-29086
MEDIUM
CVSS 5.4
Hono versions up to 4.12.4 contains a vulnerability that allows attackers to injection of additional cookie attributes if untrusted input was passed into the (CVSS 5.4).
Code Injection
Hono
-
CVE-2026-29085
MEDIUM
CVSS 6.5
Hono versions up to 4.12.4 contains a vulnerability that allows attackers to injection of additional SSE fields within the same event frame if untrusted inpu (CVSS 6.5).
Code Injection
Hono
-
CVE-2026-29069
MEDIUM
CVSS 5.3
Unauthenticated attackers can trigger activation emails for pending user accounts in Craft CMS versions prior to 5.9.0-beta.2 and 4.17.0-beta.2 by exploiting an unprotected endpoint that lacks permission checks. If an attacker controls the target user's email address, they can complete account activation and gain unauthorized system access. A patch is available in the latest beta versions.
Authentication Bypass
Craft Cms
-
CVE-2026-28782
MEDIUM
CVSS 4.3
Craft CMS prior to versions 5.9.0-beta.1 and 4.17.0-beta.1 fails to properly authorize the "Duplicate" entry action, allowing authenticated users to bypass UI restrictions and duplicate entries via direct requests. An attacker with minimal "View Entries" permissions can exploit predictable, incremental Entry IDs to brute-force and duplicate other users' restricted content, gaining unauthorized access to sensitive data. Public exploit code exists for this vulnerability.
Authentication Bypass
Craft Cms
-
CVE-2026-28781
MEDIUM
CVSS 6.5
Craft CMS prior to versions 4.17.0-beta.1 and 5.9.0-beta.1 allows users with entry creation permissions to arbitrarily assign authorship of new entries to any user, including administrators, through mass assignment of the authorId parameter. Public exploit code exists for this vulnerability, enabling attackers to spoof entry authorship and manipulate content attribution. The vulnerability is fixed in the specified beta releases.
Authentication Bypass
Craft Cms
-
CVE-2026-28772
MEDIUM
CVSS 6.1
Reflected XSS in IDC SFX2100 Firmware's logging interface allows remote attackers to inject malicious scripts through the submitType parameter without authentication or user interaction. Public exploit code exists for this vulnerability, enabling attackers to execute arbitrary JavaScript in users' browsers and potentially steal sensitive data or perform unauthorized actions. No patch is currently available.
XSS
Sfx2100 Firmware
-
CVE-2026-28771
MEDIUM
CVSS 6.1
The SFX2100 web management interface fails to sanitize the `cat` parameter in /index.cgi, enabling reflected XSS attacks that allow remote attackers to execute arbitrary JavaScript in a victim's browser without authentication. Public exploit code exists for this vulnerability, and currently no patch is available. An attacker could exploit this to steal session cookies, perform unauthorized actions, or redirect users to malicious content.
XSS
Sfx2100 Firmware
-
CVE-2026-28769
MEDIUM
CVSS 6.5
Authenticated users can exploit a path traversal vulnerability in the SFX2100 firmware's logging interface to enumerate arbitrary files on the system through directory traversal in the file parameter. Public exploit code exists for this medium-severity flaw, and no patch is currently available, leaving affected organizations reliant on access controls to mitigate risk. The vulnerability allows attackers with valid credentials to confirm file existence through backup operation responses, potentially exposing sensitive system information.
Path Traversal
Sfx2100 Firmware
-
CVE-2026-28434
MEDIUM
CVSS 5.3
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. [CVSS 5.3 MEDIUM]
Information Disclosure
Cpp Httplib
Suse
-
CVE-2026-27898
MEDIUM
CVSS 5.4
Vaultwarden versions up to 1.35.4 is affected by authorization bypass through user-controlled key (CVSS 5.4).
Authentication Bypass
Vaultwarden
Redhat
-
CVE-2026-27801
MEDIUM
CVSS 5.9
Two-factor authentication bypass in Vaultwarden 1.34.3 and earlier allows authenticated attackers to circumvent 2FA protections on sensitive operations, enabling unauthorized access to API keys and destructive actions against vaults and organizations. Public exploit code exists for this vulnerability, which affects the unofficial Bitwarden-compatible server and currently lacks an available patch. Attackers with legitimate account credentials can escalate privileges to perform administrative actions typically restricted by 2FA controls.
Authentication Bypass
Vaultwarden
Redhat
-
CVE-2026-27445
MEDIUM
CVSS 5.3
Seppmail versions up to 15.0.1 is affected by improper verification of cryptographic signature (CVSS 5.3).
Information Disclosure
Seppmail
-
CVE-2026-26949
MEDIUM
CVSS 5.5
Dell Device Management Agent versions before 26.02 suffer from an authorization bypass that allows local attackers with low privileges to escalate their access on affected systems. The vulnerability stems from improper privilege validation and requires only local access with no user interaction to exploit. No patch is currently available for this issue.
Authentication Bypass
Dell
Device Management Agent
-
CVE-2026-25907
MEDIUM
CVSS 5.3
Dell PowerScale OneFS 9.13.0.0 is vulnerable to denial of service through an overly restrictive account lockout mechanism that can be triggered by unauthenticated remote attackers. The flaw allows an attacker to lock out legitimate users without authentication, disrupting service availability. No patch is currently available for this medium-severity vulnerability.
Denial Of Service
Powerscale Onefs
-
CVE-2026-23812
MEDIUM
CVSS 4.3
ArubaOS access points are vulnerable to gateway impersonation attacks when clients connect via wired or wireless interfaces, allowing unauthenticated attackers to redirect network traffic into a man-in-the-middle position. An attacker can exploit address-based spoofing to intercept or modify data streams intended for the legitimate gateway, compromising the confidentiality of client communications. No patch is currently available.
Information Disclosure
Arubaos
-
CVE-2026-23811
MEDIUM
CVSS 4.3
Arubaos contains a vulnerability that allows attackers to bypass Layer 2 (L2) communication restrictions between clients and redirect traf (CVSS 4.3).
Authentication Bypass
Arubaos
-
CVE-2026-23810
MEDIUM
CVSS 4.3
Arubaos contains a vulnerability that allows attackers to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks (CVSS 4.3).
Code Injection
Arubaos
-
CVE-2026-23809
MEDIUM
CVSS 5.4
Traffic interception in ArubaOS Wi-Fi networks allows adjacent attackers to bypass BSSID isolation controls and redirect victim traffic by exploiting port associations across multiple wireless networks. Successful attacks could enable eavesdropping, session hijacking, or denial of service without authentication or user interaction. No patch is currently available for this medium-severity vulnerability.
Denial Of Service
Arubaos
-
CVE-2026-23808
MEDIUM
CVSS 5.4
Malicious actors can install unauthorized Group Temporal Keys on ArubaOS wireless clients through a standardized roaming protocol vulnerability, enabling frame injection and network segmentation bypass. An attacker positioned on the local network could leverage this to intercept traffic, bypass client isolation, and compromise network integrity and confidentiality. No patch is currently available.
RCE
Code Injection
Arubaos
-
CVE-2026-23601
MEDIUM
CVSS 5.4
Improper cryptographic validation in ArubaOS Wi-Fi encryption allows adjacent network attackers to forge authenticated frames by spoofing the primary BSSID and inject tampered data to targeted clients without authentication. This medium-severity flaw (CVSS 5.4) bypasses standard encryption separation between wireless endpoints, enabling data manipulation on affected networks. No patch is currently available.
Authentication Bypass
Arubaos
-
CVE-2026-23238
MEDIUM
CVSS 5.5
The Linux kernel's romfs filesystem fails to validate the return value of sb_set_blocksize(), allowing a local attacker with user privileges to trigger a denial of service by mounting a romfs image on a loop device configured with an incompatible block size. Public exploit code exists for this vulnerability. The flaw causes the filesystem to proceed with an invalid superblock configuration, potentially leading to system crashes or filesystem corruption.
Linux
Information Disclosure
Linux Kernel
Redhat
Suse
-
CVE-2026-23237
MEDIUM
CVSS 5.5
The Linux kernel's Classmate laptop driver lacks NULL pointer checks in sysfs attribute handlers, allowing local users to trigger a denial of service by accessing device attributes before driver initialization completes. A premature sysfs access can cause the driver to dereference a NULL pointer when retrieving uninitialized device data, crashing the affected system.
Linux
Null Pointer Dereference
Denial Of Service
Linux Kernel
Redhat
-
CVE-2026-23232
MEDIUM
CVSS 5.5
A revert of a Linux kernel patch introduces a potential deadlock condition in the f2fs filesystem when concurrent write operations and checkpoint operations occur, allowing a local user with write permissions to cause a denial of service through system hang. The vulnerability affects the Linux kernel's f2fs module and requires low privileges to trigger. No patch is currently available to address this issue.
Linux
Information Disclosure
Linux Kernel
Redhat
Suse
-
CVE-2026-22285
MEDIUM
CVSS 4.4
Dell Device Management Agent versions before 26.02 store passwords in plaintext, allowing high-privileged local attackers to gain unauthorized access to sensitive systems. The vulnerability requires administrative-level access and local presence but poses a confidentiality risk to affected deployments. No patch is currently available.
Authentication Bypass
Dell
Device Management Agent
-
CVE-2026-22270
MEDIUM
CVSS 6.7
Dell PowerScale OneFS versions before 9.10.1.6 and 9.11.0.0 through 9.12.0.1 contain an uncontrolled search path vulnerability that allows high-privileged local attackers to achieve privilege escalation, information disclosure, and denial of service. The vulnerability requires local access and high privileges to exploit, making it suitable primarily for insider threats or attackers who have already gained initial system access. No patch is currently available for affected systems.
Denial Of Service
Information Disclosure
Powerscale Onefs
-
CVE-2026-22040
MEDIUM
CVSS 5.3
NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. [CVSS 5.3 MEDIUM]
Memory Corruption
Use After Free
Buffer Overflow
Nanomq
-
CVE-2026-21426
MEDIUM
CVSS 6.7
Powerscale Onefs versions up to 9.10.1.6 is affected by execution with unnecessary privileges (CVSS 6.7).
Denial Of Service
Information Disclosure
Powerscale Onefs
-
CVE-2026-21425
MEDIUM
CVSS 6.7
Privilege escalation in Dell PowerScale OneFS versions before 9.10.1.6 and 9.11.0.0 through 9.12.0.1 stems from incorrect privilege assignment that allows local attackers with low privileges to gain elevated access. An attacker with local system access and user interaction can exploit this vulnerability to achieve complete system compromise through unauthorized privilege elevation.
Information Disclosure
Dell
Powerscale Onefs
-
CVE-2026-21424
MEDIUM
CVSS 6.7
Powerscale Onefs versions up to 9.10.1.6 is affected by execution with unnecessary privileges (CVSS 6.7).
Privilege Escalation
Dell
Powerscale Onefs
-
CVE-2026-21423
MEDIUM
CVSS 6.7
Incorrect default file permissions in Dell PowerScale OneFS versions before 9.10.1.6 and 9.11.0.0 through 9.12.0.1 allow high-privileged local attackers to achieve code execution, privilege escalation, and information disclosure. The vulnerability requires local access and high privileges to exploit, but no patch is currently available. Affected organizations should implement access controls and monitor for unauthorized local activity until an update is released.
Denial Of Service
Information Disclosure
Powerscale Onefs
-
CVE-2026-21421
MEDIUM
CVSS 6.7
Powerscale Onefs versions up to 9.10.1.6 is affected by execution with unnecessary privileges (CVSS 6.7).
Privilege Escalation
Dell
Powerscale Onefs
-
CVE-2026-20149
MEDIUM
CVSS 6.1
Cisco Webex is vulnerable to reflected cross-site scripting (XSS) attacks due to insufficient input validation, allowing unauthenticated attackers to inject malicious scripts by tricking users into clicking crafted links. Successful exploitation could enable attackers to steal session tokens, redirect users, or perform actions on behalf of targeted victims. Although Cisco has released a fix, no patch is currently available for this MEDIUM severity vulnerability.
Cisco
XSS
Webex
-
CVE-2026-20106
MEDIUM
CVSS 5.3
Unauthenticated remote attackers can trigger memory exhaustion on Cisco ASA and FTD devices by sending specially crafted packets to the SSL VPN service, exploiting insufficient input validation in the Remote Access SSL VPN, HTTP management, and MUS functionality. Successful exploitation causes a denial of service condition that requires manual device reboot. No patch is currently available.
Cisco
Tls
Denial Of Service
-
CVE-2026-20102
MEDIUM
CVSS 6.1
Reflected XSS in Cisco Secure Firewall ASA and FTD SAML 2.0 authentication allows unauthenticated attackers to steal sensitive browser-based information by tricking users into clicking malicious links. The vulnerability stems from inadequate input validation of HTTP parameters in the SSO feature and requires user interaction to exploit. No patch is currently available.
Cisco
XSS
-
CVE-2026-20073
MEDIUM
CVSS 5.8
Unauthenticated remote attackers can bypass firewall access controls on Cisco Secure Firewall ASA and FTD devices by exploiting improper error handling during cluster memory exhaustion when syncing security rules. This allows attackers to send traffic that should be blocked through affected devices to reach protected networks. No patch is currently available.
Cisco
-
CVE-2026-20070
MEDIUM
CVSS 6.1
Cross-site scripting (XSS) in the VPN web services component of Cisco Secure Firewall ASA and FTD allows unauthenticated remote attackers to inject malicious scripts that execute in a user's browser when visiting a crafted link. An attacker can exploit this through improper input validation to execute arbitrary HTML or JavaScript in the context of the VPN web server. No patch is currently available for this medium-severity vulnerability.
Cisco
XSS
-
CVE-2026-20069
MEDIUM
CVSS 4.3
Cisco Secure Firewall ASA and FTD devices with VPN web services enabled are vulnerable to cross-site request forgery (CSRF) attacks due to insufficient HTTP request validation. An attacker can trick users into visiting a malicious website that sends crafted requests to the affected appliance, potentially allowing injection of malicious content reflected back to the victim's browser. No patch is currently available for this vulnerability.
Cisco
XSS
-
CVE-2026-20068
MEDIUM
CVSS 5.8
Snort 3 detection engine contains a vulnerability that allows attackers to cause a DoS condition when the Snort 3 Detection Engine unexpectedly restarts (CVSS 5.8).
Cisco
Denial Of Service
-
CVE-2026-20067
MEDIUM
CVSS 5.8
Unauthenticated remote attackers can crash the Snort 3 Detection Engine by sending crafted HTTP packets with malformed Multicast DNS fields, causing a denial of service that interrupts packet inspection across multiple Cisco products. The vulnerability stems from incomplete error checking in HTTP header parsing and requires no authentication or user interaction to trigger. No patch is currently available for this MEDIUM severity issue.
Cisco
Dns
Denial Of Service
-
CVE-2026-20066
MEDIUM
CVSS 5.8
Cisco Snort 3 Detection Engine can be remotely restarted by an unauthenticated attacker through crafted HTTP packets exploiting improper JavaScript normalization in the JSTokenizer logic, causing a denial of service condition that interrupts packet inspection. The vulnerability requires the JSTokenizer feature to be enabled and can be triggered via an established network connection without authentication. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20065
MEDIUM
CVSS 5.8
Snort 3 Detection Engine in multiple Cisco products can be remotely restarted by unauthenticated attackers through crafted packets sent over established connections, due to improper binder module initialization logic. This denial-of-service vulnerability interrupts packet inspection capabilities and can be triggered without authentication or user interaction. No patch is currently available for this medium-severity flaw.
Cisco
Denial Of Service
-
CVE-2026-20064
MEDIUM
CVSS 6.5
Cisco Secure Firewall Threat Defense (FTD) devices can be forcibly rebooted by authenticated local attackers through improper input validation in CLI commands, resulting in denial of service. This vulnerability affects low-privileged accounts and requires no user interaction to exploit. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20063
MEDIUM
CVSS 6.0
CLI of Cisco Secure FTD Software contains a vulnerability that allows attackers to execute commands on the underlying operating system as root (CVSS 6.0).
Cisco
-
CVE-2026-20058
MEDIUM
CVSS 5.8
Snort 3 Detection Engine crashes when processing malformed VBA data due to improper decompression error handling, allowing unauthenticated remote attackers to trigger denial-of-service conditions across multiple Cisco products. An attacker can exploit this vulnerability by sending crafted VBA payloads to cause unexpected engine restarts without requiring authentication or user interaction. No patch is currently available for this medium-severity flaw.
Cisco
Denial Of Service
-
CVE-2026-20057
MEDIUM
CVSS 5.8
Denial of service in Cisco Snort 3's VBA decompression feature allows unauthenticated remote attackers to crash the detection engine by sending maliciously crafted VBA data. The vulnerability stems from insufficient error checking during VBA data processing, enabling attackers to trigger unexpected restarts of the Snort 3 Detection Engine. No patch is currently available for this medium-severity issue affecting multiple Cisco products.
Cisco
Denial Of Service
-
CVE-2026-20054
MEDIUM
CVSS 5.8
Improper error checking in Cisco Snort 3's VBA decompression feature allows unauthenticated remote attackers to trigger an infinite loop by sending specially crafted VBA data, causing a denial of service condition. The vulnerability affects multiple Cisco products and requires no user interaction or authentication to exploit. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20053
MEDIUM
CVSS 5.8
Improper range checking in Cisco Snort 3's VBA decompression feature allows unauthenticated remote attackers to trigger a heap buffer overflow by sending crafted VBA data, causing denial of service. The vulnerability affects multiple Cisco products and requires no authentication or user interaction to exploit. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20052
MEDIUM
CVSS 5.8
Denial of service in Cisco Secure Firewall Threat Defense via crafted SSL packets allows unauthenticated remote attackers to crash the Snort 3 Detection Engine through a memory management logic error during SSL inspection. An attacker can exploit this vulnerability by sending malicious SSL packets through an established connection, forcing the detection engine to unexpectedly restart and interrupt security monitoring. No patch is currently available for this medium-severity issue.
Cisco
Tls
Denial Of Service
-
CVE-2026-20050
MEDIUM
CVSS 6.8
Device reloads in Cisco Secure Firewall Threat Defense can be triggered by unauthenticated remote attackers sending specially crafted TLS 1.2 traffic through the SSL decryption feature, exploiting improper memory management in the Do Not Decrypt exclusion logic. The vulnerability requires specific network conditions and TLS 1.2 traffic to trigger, resulting in denial of service with no authentication required. No patch is currently available for this medium-severity issue affecting Cisco and TLS implementations.
Cisco
Tls
Denial Of Service
-
CVE-2026-20044
MEDIUM
CVSS 6.0
Cisco Secure Firewall Management Center lockdown bypass allows authenticated local administrators to execute arbitrary commands as root by sending crafted CLI input that exploits insufficient restrictions on remediation modules. An attacker with valid admin credentials can circumvent lockdown protections to achieve full system compromise. No patch is currently available.
Cisco
-
CVE-2026-20031
MEDIUM
CVSS 5.3
ClamAV's HTML CSS parser fails to properly handle UTF-8 string operations, enabling remote attackers to crash the scanning engine by submitting a malicious HTML file. An unauthenticated attacker can exploit this weakness over the network without user interaction to achieve denial of service. No patch is currently available.
Denial Of Service
Suse
-
CVE-2026-20025
MEDIUM
CVSS 6.8
Denial of service in Cisco Secure Firewall ASA and Secure FTD devices results from improper validation of OSPF link-state update packets, allowing authenticated adjacent attackers with the OSPF secret key to trigger heap corruption and forced device reloads. An attacker can exploit this by crafting malicious OSPF packets to crash affected devices, causing service disruption. No patch is currently available for this vulnerability.
Cisco
Denial Of Service
-
CVE-2026-20024
MEDIUM
CVSS 6.8
OSPF protocol of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software is affected by buffer overflow (CVSS 6.8).
Cisco
Denial Of Service
-
CVE-2026-20023
MEDIUM
CVSS 6.1
Memory corruption in Cisco Secure Firewall ASA and FTD OSPF packet processing allows adjacent, unauthenticated attackers to crash affected devices by sending crafted protocol packets. The vulnerability results in device reboot and denial of service, with no authentication or user interaction required. No patch is currently available.
Cisco
Memory Corruption
Denial Of Service
-
CVE-2026-20022
MEDIUM
CVSS 6.1
Device denial of service in Cisco Secure Firewall ASA and Secure FTD Software occurs when an unauthenticated adjacent attacker sends specially crafted OSPF packets to trigger out-of-bounds memory writes during packet canonicalization processing. An attacker can exploit this by sending malicious OSPF LSU packets when debug logging is enabled, forcing the affected device to reload and become unavailable. No patch is currently available for this medium-severity vulnerability.
Cisco
Denial Of Service
-
CVE-2026-20021
MEDIUM
CVSS 4.3
Memory exhaustion in Cisco ASA and FTD OSPF protocol implementation allows adjacent authenticated attackers to trigger denial of service by sending specially crafted packets that bypass input validation. An attacker with network access to the affected device can exploit improper packet parsing to consume available memory and crash the appliance. No patch is currently available for this vulnerability.
Cisco
Denial Of Service
-
CVE-2026-20020
MEDIUM
CVSS 6.8
Insufficient input validation in Cisco Secure Firewall ASA and Secure FTD OSPF implementations allows adjacent attackers to trigger denial of service by sending malformed OSPF update packets that cause device reloads. Authentication bypass is possible if OSPF authentication is disabled, though knowing the secret key is required when authentication is enabled. No patch is currently available for this medium-severity vulnerability.
Cisco
Buffer Overflow
Denial Of Service
-
CVE-2026-20018
MEDIUM
CVSS 5.9
Unauthenticated remote attackers with admin credentials can exploit insufficient path validation in Cisco Secure Firewall Management Center and Threat Defense sftunnel functionality to write arbitrary files with root privileges on the underlying operating system. By crafting malicious directory paths during file synchronization, an attacker could create or overwrite critical system files. No patch is currently available for this vulnerability.
Cisco
-
CVE-2026-20017
MEDIUM
CVSS 6.0
Insufficient input validation in Cisco Secure FTD Software's CLI allows authenticated local administrators to execute arbitrary commands with root privileges by submitting specially crafted arguments to specific commands. An attacker with valid administrative credentials can exploit this to gain complete control over the underlying operating system. No patch is currently available.
Cisco
-
CVE-2026-20016
MEDIUM
CVSS 6.0
Cisco FXOS Software CLI feature for Cisco Secure Firewall ASA Software and Secure FTD Software contains a vulnerability that allows attackers to execute commands on the underlying operating system with root-level privileges (CVSS 6.0).
Cisco
-
CVE-2026-20015
MEDIUM
CVSS 5.8
Unauthenticated remote attackers can trigger a denial of service against Cisco Secure Firewall ASA and Secure FTD devices by sending specially crafted IKEv2 packets that trigger a memory leak in the IKEv2 parser. Exploitation exhausts system resources and forces manual device reboot to restore availability. No patch is currently available.
Cisco
Denial Of Service
-
CVE-2026-20013
MEDIUM
CVSS 5.8
Unauthenticated remote attackers can trigger denial-of-service conditions in Cisco Secure Firewall ASA and Secure FTD Software by sending specially crafted IKEv2 packets that cause memory exhaustion due to improper memory management. A successful attack forces manual device reloads and can degrade network services across connected systems. No patch is currently available for this vulnerability.
Cisco
Denial Of Service
-
CVE-2026-20009
MEDIUM
CVSS 5.3
Unauthenticated SSH authentication bypass in Cisco Secure Firewall ASA allows remote attackers to log in as arbitrary users by exploiting insufficient input validation during the SSH key authentication phase, requiring only knowledge of a valid username and its associated public key. This vulnerability enables attackers to execute arbitrary commands on affected ASA devices with the privileges of the compromised user account. No patch is currently available.
Cisco
Ssh
-
CVE-2026-20008
MEDIUM
CVSS 6.0
Insufficient input sanitization in select CLI commands on Cisco Secure Firewall ASA and FTD Software allows authenticated local administrators to execute arbitrary code as root by injecting malicious Lua code. An attacker with valid administrator credentials can craft specially formatted parameters to achieve code execution with elevated privileges. No patch is currently available.
Cisco
-
CVE-2026-20007
MEDIUM
CVSS 5.8
Snort rule bypass in Cisco Secure Firewall Threat Defense allows unauthenticated remote attackers to evade deep packet inspection through crafted traffic that exploits logic errors in inner and outer connection rule evaluation. An attacker can send specially crafted packets that trigger different Snort rules than intended, permitting malicious traffic through the firewall that should be blocked. No patch is currently available for this medium-severity vulnerability.
Cisco
-
CVE-2026-20006
MEDIUM
CVSS 5.8
Cisco Secure Firewall Threat Defense (FTD) Software is vulnerable to denial of service through improper TLS protocol implementation in the Snort 3 Detection Engine, allowing unauthenticated remote attackers to trigger unexpected restarts by sending crafted TLS packets. Successful exploitation causes the affected device to drop network traffic, creating a DoS condition affecting TLS versions prior to 1.3. No patch is currently available.
Cisco
Tls
Denial Of Service
-
CVE-2026-20005
MEDIUM
CVSS 5.8
Snort 3 Detection Engine contains a vulnerability that allows attackers to cause a denial of service (DoS) condition when the Snort 3 Detection Engine rest (CVSS 5.8).
Cisco
Tls
Denial Of Service
-
CVE-2026-20003
MEDIUM
CVSS 4.9
SQL injection in Cisco Secure FMC REST API allows authenticated users with administrative roles to extract sensitive database contents and read operating system files. The vulnerability stems from insufficient input validation on user-supplied requests, requiring valid credentials but posing significant risk to organizations using affected systems. No patch is currently available.
Cisco
SQLi
-
CVE-2026-20001
MEDIUM
CVSS 6.5
SQL injection in Cisco Secure FMC REST API allows authenticated attackers with administrative privileges to read sensitive database contents and operating system files. The vulnerability stems from insufficient input validation on API endpoints and requires valid credentials (Administrator, Security Approver, Access Admin, or Network Admin roles) to exploit. No patch is currently available.
Cisco
SQLi
-
CVE-2026-3439
MEDIUM
CVSS 4.9
Authenticated users can trigger a stack-based buffer overflow in SonicOS certificate handling to cause denial of service against Sonicos firewalls. The vulnerability requires administrative privileges to exploit and results in firewall crashes rather than code execution. No patch is currently available.
Buffer Overflow
Stack Overflow
Denial Of Service
Sonicos
-
CVE-2026-3244
MEDIUM
CVSS 4.8
Concrete CMS versions below 9.4.8 contain a stored XSS vulnerability in the search block where unencoded page names and content are rendered in search results, allowing authenticated administrators to inject malicious JavaScript that executes for other users. Public exploit code exists for this vulnerability, which requires high privileges and user interaction to exploit. The vulnerability affects confidentiality and integrity but not availability.
XSS
Concrete Cms
-
CVE-2026-3242
MEDIUM
CVSS 4.8
Stored XSS in Concrete CMS versions before 9.4.8 allows authenticated administrators to inject malicious scripts through the Switch Language block, affecting any site where a rogue admin account exists. Public exploit code is available for this vulnerability. A patch is available in version 9.4.8 and later.
XSS
Concrete Cms
-
CVE-2026-3241
MEDIUM
CVSS 4.8
Stored XSS in Concrete CMS Legacy Form block below version 9.4.8 allows authenticated users with form creation permissions to inject malicious JavaScript into multiple-choice question options, which executes for all users viewing the affected form. Public exploit code exists for this vulnerability. Administrators should upgrade to version 9.4.8 or later to remediate the risk of session hijacking and data theft.
XSS
Concrete Cms
-
CVE-2026-3240
MEDIUM
CVSS 4.8
Stored XSS in Concrete CMS versions before 9.4.8 allows authenticated users with page editing permissions to inject malicious scripts through the Legacy form Question field, targeting high-privilege accounts. Public exploit code exists for this vulnerability, which requires user interaction to execute. A patch is available in version 9.4.8 and later.
XSS
Concrete Cms
-
CVE-2026-3125
MEDIUM
CVSS 6.5
The @opennextjs/cloudflare package is vulnerable to Server-Side Request Forgery (SSRF) through a path normalization bypass in the /cdn-cgi/image/ handler, where attackers can use backslash substitution to evade edge interception and trigger arbitrary remote URL fetches. This affects production deployments that rely on Cloudflare's edge to block such requests, allowing attackers to access internal resources or perform outbound requests to attacker-controlled servers. A patch is available.
SSRF
Opennext For Cloudflare
-
CVE-2026-3103
MEDIUM
CVSS 5.4
Data loss in Checkmk versions before 2.4.0p23, 2.3.0p43, and 2.2.0 results from a logic error in the remove_password() function that allows low-privileged users to delete sensitive information. An authenticated attacker can exploit this vulnerability to cause unintended data loss without requiring user interaction. No patch is currently available for affected deployments.
Authentication Bypass
Checkmk
-
CVE-2026-3058
MEDIUM
CVSS 4.3
The Seraphinite Accelerator WordPress plugin through version 2.28.14 fails to validate user permissions on the `seraph_accel_api` AJAX endpoint, allowing authenticated subscribers and above to access sensitive operational data including cache status and database state. An attacker with a basic WordPress account can exploit the missing capability checks in the `OnAdminApi_GetData()` function to enumerate system information without administrative rights. No patch is currently available for this information disclosure vulnerability.
WordPress
Information Disclosure
-
CVE-2026-3056
MEDIUM
CVSS 4.3
The Seraphinite Accelerator WordPress plugin through version 2.28.14 fails to properly validate user permissions on the LogClear AJAX function, allowing authenticated subscribers and higher-privileged users to delete the plugin's debug and operational logs. This capability bypass could enable attackers to cover their tracks or disrupt audit trails on affected WordPress installations. The vulnerability remains unpatched and has not been observed in active exploitation.
WordPress
-
CVE-2026-2994
MEDIUM
CVSS 6.8
Concrete CMS versions below 9.4.8 contain a cross-site request forgery vulnerability in the Anti-Spam Allowlist Group Configuration that allows authenticated administrators to modify security settings without valid CSRF token validation. An attacker with administrative privileges can exploit this to bypass security controls by manipulating the group_id parameter before token verification occurs. Public exploit code exists for this vulnerability, and a patch is available.
CSRF
Concrete Cms
-
CVE-2026-2748
MEDIUM
CVSS 5.3
SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME certificates with whitespace characters in email addresses, enabling attackers to forge digital signatures and impersonate legitimate senders. This integrity bypass affects organizations relying on SEPPmail for secure email validation and could undermine trust in digitally signed communications. No patch is currently available for affected installations.
Authentication Bypass
Seppmail
-
CVE-2026-2746
MEDIUM
CVSS 5.3
Seppmail versions up to 15.0.1 is affected by improper verification of cryptographic signature (CVSS 5.3).
Information Disclosure
Seppmail
-
CVE-2026-2732
MEDIUM
CVSS 5.4
The Enable Media Replace plugin for WordPress through version 4.1.7 fails to properly validate user permissions in the RemoveBackGroundViewController::load function, allowing authenticated users with Author-level privileges to replace arbitrary attachments with background-removed versions. This integrity issue affects WordPress installations using the vulnerable plugin and requires user authentication to exploit. No patch is currently available.
WordPress
-
CVE-2026-2363
MEDIUM
CVSS 6.5
The WP-Members Membership Plugin for WordPress through version 3.5.5.1 contains a SQL injection vulnerability in the [wpmem_user_membership_posts] shortcode's 'order_by' parameter due to insufficient input escaping and query preparation. Authenticated attackers with Contributor-level access or higher can exploit this to execute arbitrary SQL queries and extract sensitive database information. No patch is currently available.
WordPress
SQLi
-
CVE-2026-2355
MEDIUM
CVSS 6.4
Stored XSS in My Calendar WordPress plugin (versions up to 3.7.3) allows authenticated contributors to inject malicious scripts via the template shortcode attribute, which bypasses sanitization through improper use of stripcslashes() at render time. When users access pages containing the injected shortcode, the malicious scripts execute in their browsers. No patch is currently available.
WordPress
XSS
-
CVE-2026-2292
MEDIUM
CVSS 4.4
Stored XSS in the Morkva UA Shipping WordPress plugin through version 1.7.9 allows authenticated administrators to inject malicious scripts into plugin settings that execute for all site visitors, affecting multi-site installations and sites with unfiltered_html disabled. The vulnerability stems from inadequate input sanitization and output escaping in the admin interface. Exploitation requires high-privilege administrator access and no patch is currently available.
WordPress
XSS
-
CVE-2026-2289
MEDIUM
CVSS 4.4
Stored XSS in WordPress Taskbuilder plugin versions up to 5.0.3 allows authenticated administrators to inject malicious scripts into admin settings that execute for other users, affecting multi-site installations or those with unfiltered_html disabled. The vulnerability stems from inadequate input sanitization and output escaping in the plugin's administrative interface. No patch is currently available.
WordPress
XSS
-
CVE-2026-1980
MEDIUM
CVSS 5.3
Unauthenticated attackers can extract sensitive customer data from WPBookit plugin versions 1.0.8 and earlier through an authorization bypass in the 'get_customer_list' endpoint, exposing names, emails, phone numbers, dates of birth, and gender information. This network-accessible vulnerability affects all WordPress installations running the vulnerable plugin without requiring authentication or user interaction. No patch is currently available.
WordPress
-
CVE-2026-1706
MEDIUM
CVSS 6.1
Reflected XSS in the All-in-One Video Gallery WordPress plugin through version 4.7.1 allows unauthenticated attackers to inject malicious scripts via the 'vi' parameter due to improper input validation. An attacker can craft a malicious link that, when clicked by a victim, executes arbitrary JavaScript in their browser session. No patch is currently available.
WordPress
XSS
-
CVE-2026-1674
MEDIUM
CVSS 6.5
Gutena Forms plugin for WordPress allows authenticated Contributor-level users to modify arbitrary site options through insufficient authorization checks in the save_gutena_forms_schema() function (versions up to 1.6.0), enabling attackers to alter critical settings such as user registration policies or inject malicious configurations. This integrity vulnerability could be exploited to disable site functionality or bypass security configurations without administrative credentials.
WordPress
-
CVE-2026-1651
MEDIUM
CVSS 6.5
SQL injection in the Email Subscribers by Icegram Express WordPress plugin through version 5.9.16 allows authenticated administrators to execute arbitrary database queries via the 'workflow_ids' parameter due to insufficient input escaping. An attacker with admin-level access could exploit this to extract sensitive information from the database. No patch is currently available for this vulnerability.
WordPress
SQLi
-
CVE-2026-1236
MEDIUM
CVSS 6.4
Envira Gallery for WordPress (WordPress plugin) is affected by cross-site scripting (xss) (CVSS 6.4).
WordPress
XSS
-
CVE-2025-70342
MEDIUM
CVSS 6.6
erase-install prior to v40.4 commit 2c31239 writes swiftDialog credential output to a hardcoded path /var/tmp/dialog.json. This allows an unauthenticated attacker to intercept admin credentials entered during reinstall/erase operations via creating a named pipe. [CVSS 6.6 MEDIUM]
Privilege Escalation
Erase Install
-
CVE-2025-66168
MEDIUM
CVSS 5.4
Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets. [CVSS 5.4 MEDIUM]
Apache
Integer Overflow
Buffer Overflow
-
CVE-2025-62879
MEDIUM
CVSS 6.8
Rancher Backup And Restore Operator is affected by insertion of sensitive information into log file (CVSS 6.8).
Information Disclosure
Rancher Backup And Restore Operator
Suse
-
CVE-2025-59787
MEDIUM
CVSS 6.5
2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts. [CVSS 6.5 MEDIUM]
Information Disclosure
Access Commander
-
CVE-2025-41257
MEDIUM
CVSS 4.8
Suprema’s BioStar 2 in version 2.9.11.6 allows users to set new password without providing the current one. Exploiting this flaw combined with other vulnerabilities can lead to unauthorized account access and potential system compromise. [CVSS 4.8 MEDIUM]
Code Injection
-
CVE-2025-40896
MEDIUM
CVSS 6.5
The server certificate was not verified when an Arc agent connected to a Guardian or CMC. A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. [CVSS 6.5 MEDIUM]
Authentication Bypass
Arc
-
CVE-2025-40895
MEDIUM
CVSS 4.8
A Stored HTML Injection vulnerability was discovered in the CMC's Sensor Map functionality due to improper validation on connected Guardians' properties. [CVSS 4.8 MEDIUM]
XSS
Information Disclosure
Open Redirect
Cmc
-
CVE-2025-40894
MEDIUM
CVSS 4.4
A Stored HTML Injection vulnerability was discovered in the Alerted Nodes Dashboard functionality due to improper validation on an input parameter. A malicious authenticated user with the required privileges could edit a node label to inject HTML tags. [CVSS 4.4 MEDIUM]
XSS
Information Disclosure
Open Redirect
Cmc
Guardian
-
CVE-2025-12801
MEDIUM
CVSS 6.5
A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the
privileges assigned to it in the /etc/exports file at mount time. [CVSS 6.5 MEDIUM]
Privilege Escalation
-
CVE-2019-25502
MEDIUM
CVSS 6.1
Simple Job Script contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the job_type_value parameter in the jobs endpoint. [CVSS 6.1 MEDIUM]
XSS
Simplejobscript
-
CVE-2026-28427
None
OpenDeck is Linux software for your Elgato Stream Deck. versions up to 2.8.1 is affected by path traversal.
Linux
Path Traversal
-
CVE-2026-24732
None
Files or Directories Accessible to External Parties, Incorrect Permission Assignment for Critical Resource vulnerability in Hallo Welt!
Mediawiki
-
CVE-2026-22760
LOW
CVSS 3.3
Device Management Agent versions up to 26.02 is affected by improper check for unusual or exceptional conditions (CVSS 3.3).
Denial Of Service
-
CVE-2026-21422
LOW
CVSS 3.4
Dell PowerScale OneFS, versions 9.10.0.0 through 9.10.1.5 and versions 9.11.0.0 through 9.12.0.1, contains an external control of system or configuration setting vulnerability. [CVSS 3.4 LOW]
Authentication Bypass
Dell
-
CVE-2026-2297
None
The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire.
Python
-
CVE-2025-68467
LOW
CVSS 3.4
Dark Reader is an accessibility browser extension that makes web pages colors dark. The dynamic dark mode feature of the extension works by analyzing the colors of web pages found in CSS style sheet files. [CVSS 3.4 LOW]
Node.js
Google
Information Disclosure
Chrome
-
CVE-2025-66024
None
The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping. An attacker with permissions to create or edit blog posts can inject malicious J...
XSS
Privilege Escalation