Search

Search Results (345456 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-13025 1 Mozilla 1 Firefox 2026-04-20 7.5 High
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 145 and Thunderbird 145.
CVE-2025-13026 1 Mozilla 1 Firefox 2026-04-20 9.8 Critical
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 145 and Thunderbird 145.
CVE-2025-13018 1 Mozilla 2 Firefox, Firefox Esr 2026-04-20 8.1 High
Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
CVE-2025-7711 2 Techlabpro1, Wordpress 2 Classified Listing Plugin, Wordpress 2026-04-20 5.4 Medium
The The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
CVE-2025-6251 2 Wordpress, Wproyal 2 Wordpress, Royal Elementor Addons And Templates 2026-04-20 6.4 Medium
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via $item['field_id'] in all versions up to, and including, 1.7.1036 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2026-39808 1 Fortinet 3 Fortisandbox, Fortisandbox Paas, Fortisandboxpaas 2026-04-20 9.1 Critical
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>
CVE-2026-39813 1 Fortinet 2 Fortisandbox, Fortisandboxcloud 2026-04-20 9.1 Critical
A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow attacker to escalation of privilege via <insert attack vector here>
CVE-2026-33093 1 Anviz 1 Anviz Cx7 Firmware 2026-04-20 5.3 Medium
Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures a photo with the front facing camera, exposing visual information about the deployment environment.
CVE-2026-32324 1 Anviz 1 Anviz Cx7 Firmware 2026-04-20 7.7 High
Anviz CX7 Firmware is  vulnerable because the application embeds reusable certificate/key material, enabling decryption of MQTT traffic and potential interaction with device messaging channels at scale.
CVE-2026-32650 1 Anviz 1 Anviz Crosschex Standard 2026-04-20 7.5 High
Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access.
CVE-2026-35682 1 Anviz 1 Anviz Cx2 Lite Firmware 2026-04-20 8.8 High
Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that enables arbitrary command execution (e.g., starting telnetd), resulting in root‑level access.
CVE-2026-31927 1 Anviz 1 Anviz Cx7 Firmware 2026-04-20 4.9 Medium
Anviz CX7 Firmware is vulnerable to an authenticated CSV upload which allows path traversal to overwrite arbitrary files (e.g., /etc/shadow), enabling unauthorized SSH access when combined with debug‑setting changes
CVE-2026-35546 1 Anviz 2 Anviz Cx2 Lite Firmware, Anviz Cx7 Firmware 2026-04-20 9.8 Critical
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell.
CVE-2026-40066 1 Anviz 2 Anviz Cx2 Lite Firmware, Anviz Cx7 Firmware 2026-04-20 8.8 High
Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can be uploaded. The device unpacks and executes a script resulting in unauthenticated remote code execution.
CVE-2026-40461 1 Anviz 2 Anviz Cx2 Lite Firmware, Anviz Cx7 Firmware 2026-04-20 7.5 High
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug settings (e.g., enabling SSH), allowing unauthorized state changes that can facilitate later compromise.
CVE-2026-41253 1 Iterm2 1 Iterm2 2026-04-20 6.9 Medium
In iTerm2 through 3.6.9, displaying a .txt file can cause code execution via DCS 2000p and OSC 135 data, if the working directory contains a malicious file whose name is valid output from the conductor encoding path, such as a pathname with an initial ace/c+ substring, aka "hypothetical in-band signaling abuse." This occurs because iTerm2 accepts the SSH conductor protocol from terminal output that does not originate from a legitimate conductor session.
CVE-2026-32962 1 Silextechnology 2 Amc Manager, Sd-330ac 2026-04-20 5.3 Medium
SD-330AC and AMC Manager provided by silex technology, Inc. contain a missing authentication for critical function issue. The device configuration may be altered without authentication.
CVE-2026-32957 1 Silextechnology 2 Amc Manager, Sd-330ac 2026-04-20 5.3 Medium
SD-330AC and AMC Manager provided by silex technology, Inc. contain a missing authentication for critical function issue on firmware maintenance. Arbitrary file may be uploaded on the device without authentication.
CVE-2026-32961 1 Silextechnology 2 Amc Manager, Sd-330ac 2026-04-20 5.3 Medium
SD-330AC and AMC Manager provided by silex technology, Inc. contain a heap-based buffer overflow vulnerability in packet data processing of sx_smpd. Processing a crafted packet may cause a temporary denial-of-service (DoS) condition.
CVE-2026-5958 1 Gnu 1 Sed 2026-04-20 N/A
When sed is invoked with both -i (in-place edit) and --follow-symlinks, the function open_next_file() performs two separate, non-atomic filesystem operations on the same path: 1. resolves symlink to its target and stores the resolved path for determining when output is written, 2. opens the original symlink path (not the resolved one) to read the file. Between these two calls there is a race window. If an attacker atomically replaces the symlink with a different target during that window, sed will: read content from the new (attacker-chosen) symlink target and write the processed result to the path recorded in step 1. This can lead to arbitrary file overwrite with attacker-controlled content in the context of the sed process. This issue was fixed in version 4.10.