Search Results (11728 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-33117 1 Microsoft 1 Azure Sdk For Java 2026-05-13 9.1 Critical
Improper authentication in Azure SDK allows an unauthorized attacker to bypass a security feature over a network.
CVE-2026-28910 1 Apple 1 Macos 2026-05-13 3.3 Low
This issue was addressed with improved permissions checking. This issue is fixed in macOS Tahoe 26.4. A malicious app may be able to access arbitrary files.
CVE-2026-32684 1 Hikvision 1 Hik-connect App 2026-05-13 2.9 Low
The application does not impose strict enough restrictions on directory access permissions, posing a risk that other malicious applications could obtain sensitive information.
CVE-2026-42832 1 Microsoft 6 Excel, Excel For Android, Office Macos 2021 and 3 more 2026-05-13 7.7 High
Improper access control in Microsoft Office allows an unauthorized attacker to perform spoofing locally.
CVE-2026-44166 1 Pocketbase 1 Pocketbase 2026-05-13 N/A
Pocketbase is an open source web backend written in go. Prior to 0.22.42 and 0.37.4, in some situations, if an attacker knows the email address of the victim they can create and link an unverified PocketBase user in advance by authenticating with one of the OAuth2 app providers, e.g. "A". When the victim gets invited or decides to sign up to your app on their own with provider "B" (PocketBase OAuth2 auth requires to be with a different provider because we don't allow multiple OAuth2 accounts from the same provider to be associated to a single PocketBase user), the user created previously by the attacker will be autolinked, upgraded to "verified" and its old password reset. This vulnerability is fixed in 0.22.42 and 0.37.4.
CVE-2025-9988 2 Broadstreetads, Wordpress 2 Broadstreet, Wordpress 2026-05-13 4.3 Medium
The Broadstreet plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the create_advertiser AJAX action in all versions up to, and including, 1.53.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create advertisers.
CVE-2026-41101 1 Microsoft 2 Word, Word For Android 2026-05-13 7.1 High
Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally.
CVE-2026-41102 1 Microsoft 2 Powerpoint, Powerpoint For Android 2026-05-13 7.1 High
Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally.
CVE-2026-40381 1 Microsoft 1 Azure Connected Machine Agent 2026-05-13 7.8 High
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-34656 1 Adobe 1 Adobe Commerce 2026-05-13 4.3 Medium
Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized write access. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page.
CVE-2026-31785 1 Linux 1 Linux Kernel 2026-05-13 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: drm/xe/xe_pagefault: Disallow writes to read-only VMAs The page fault handler should reject write/atomic access to read only VMAs. Add code to handle this in xe_pagefault_service after the VMA lookup. v2: - Apply max line length (Matthew) (cherry picked from commit 714ee6754ac5fa3dc078856a196a6b124cd797a0)
CVE-2026-42303 1 Ethyca 1 Fides 2026-05-12 N/A
Fides is an open-source privacy engineering platform. From 2.75.0 to before 2.83.2, Fides deployments that enable both subject identity verification and duplicate privacy request detection are affected by a vulnerability in which an administrator can approve a privacy request whose identity was never verified. For erasure policies, this can result in unauthorized deletion of a data subject's records across every integration configured in the affected deployment. This vulnerability is fixed in 2.83.2.
CVE-2017-20238 1 Belden 1 Hirschmann Industrial Hivision 2026-05-12 7.1 High
Hirschmann Industrial HiVision versions 06.0.00 and 07.0.00 prior to 06.0.06 and 07.0.01 contains an improper authorization vulnerability that allows read-only users to gain write access to managed devices by bypassing access control mechanisms. Attackers can exploit alternative interfaces such as the web interface or SNMP browser to modify device configurations despite having restricted permissions.
CVE-2017-20235 1 Prosoft-technology 2 Icx35-hwc, Icx35-hwc Firmware 2026-05-12 9.1 Critical
ProSoft Technology ICX35-HWC version 1.3 and prior cellular gateways contain an authentication bypass vulnerability in the web user interface that allows unauthenticated attackers to gain access to administrative functions without valid credentials. Attackers can bypass the authentication mechanism in affected firmware versions to obtain full administrative access to device configuration and settings.
CVE-2017-20233 1 Belden 4 Hirschmann Hilcos Bat450, Hirschmann Hilcos Bat867, Hirschmann Hilcos Openbat and 1 more 2026-05-12 5.4 Medium
Hirschmann HiLCOS products OpenBAT, BAT450, WLC, BAT867 contains a firewall filtering vulnerability that fails to correctly filter IPv4 multicast and broadcast traffic when management IP address filtering is disabled, allowing configured filter rules to be bypassed. Attackers with network access can inject or observe multicast and broadcast packets that should have been blocked by the firewall.
CVE-2025-69691 1 Pfsense 1 Pfsense 2026-05-12 9.9 Critical
Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Supplier disputes this because the API call is only available to admins and they are intentionally allowed to execute PHP code.
CVE-2026-37709 2 Grokability, Snipeitapp 2 Snipe-it, Snipe-it 2026-05-12 9.8 Critical
Insecure Permissions vulnerability in grokability snipe-it v.8.4.0 and before and fixed after 2026-03-10 commit 676a9958 allows a remote attacker to execute arbitrary code via the app/Http/Controllers/Api/UploadedFilesController.php component
CVE-2026-31192 1 Raindrop 2 Bookmark Manager Web App, Raindrop 2026-05-12 6.5 Medium
Insufficient validation of Chrome extension identifiers in Raindrop.io Bookmark Manager Web App 5.6.76.0 allows attackers to obtain sensitive user data via a crafted request.
CVE-2026-6356 1 Augmentt 1 Augmentt 2026-05-12 9.6 Critical
A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitive information.
CVE-2026-40420 1 Microsoft 4 365 Apps, Office 2019, Office 2021 and 1 more 2026-05-12 8.8 High
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.