Export limit exceeded: 342091 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 17398 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 342091 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (342091 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-29828 2 Dootask, Kuaifan 2 Dootask, Dootask 2026-04-03 6.1 Medium
DooTask v1.6.27 has a Cross-Site Scripting (XSS) vulnerability in the /manage/project/<id> page via the input field projectDesc.
CVE-2025-15607 1 Tp-link 3 Archer Ax53, Archer Ax53 Firmware, Ax53 V1 2026-04-03 9.8 Critical
A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device.
CVE-2025-15608 1 Tp-link 3 Archer Ax53, Archer Ax53 Firmware, Ax53 V1 2026-04-03 9.8 Critical
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
CVE-2026-4533 2 Carmelo, Code-projects 2 Simple Food Order System, Simple Food Ordering System 2026-04-03 6.3 Medium
A vulnerability was detected in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file all-tickets.php. The manipulation of the argument Status results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
CVE-2026-33549 1 Spip 1 Spip 2026-04-03 6.7 Medium
SPIP 4.4.10 through 4.4.12 before 4.4.13 allows unintended privilege assignment (of administrator privileges) during the editing of an author data structure because of STATUT mishandling.
CVE-2026-4551 1 Tenda 2 F453, F453 Firmware 2026-04-03 8.8 High
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
CVE-2026-4552 1 Tenda 2 F453, F453 Firmware 2026-04-03 8.8 High
A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
CVE-2026-4553 1 Tenda 2 F453, F453 Firmware 2026-04-03 8.8 High
A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
CVE-2024-46878 1 Tiki 1 Tiki 2026-04-03 5.4 Medium
A Cross-Site Scripting (XSS) vulnerability exists in the page parameter of tiki-editpage.php in Tiki version 26.3 and earlier. This vulnerability allows attackers to execute arbitrary JavaScript code via a crafted payload, leading to potential access to sensitive information or unauthorized actions.
CVE-2024-46879 1 Tiki 1 Tiki 2026-04-03 5.4 Medium
A Reflected Cross-Site Scripting (XSS) vulnerability exists in the POST request data zipPath of tiki-admin_system.php in Tiki version 21.2. This vulnerability allows attackers to execute arbitrary JavaScript code via a crafted payload, leading to potential access to sensitive information or unauthorized actions.
CVE-2026-26830 2 Mooz, Pdf-image Project 2 Pdf-image, Pdf-image 2026-04-03 9.8 Critical
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec()
CVE-2025-70888 2 Mtrojnar, Osslsigncode Project 2 Osslsigncode, Osslsigncode 2026-04-03 9.8 Critical
An issue in mtrojnar Osslsigncode affected at v2.10 and before allows a remote attacker to escalate privileges via the osslsigncode.c component
CVE-2026-23306 1 Linux 1 Linux Kernel 2026-04-03 7.8 High
In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free in pm8001_queue_command() Commit e29c47fe8946 ("scsi: pm8001: Simplify pm8001_task_exec()") refactors pm8001_queue_command(), however it introduces a potential cause of a double free scenario when it changes the function to return -ENODEV in case of phy down/device gone state. In this path, pm8001_queue_command() updates task status and calls task_done to indicate to upper layer that the task has been handled. However, this also frees the underlying SAS task. A -ENODEV is then returned to the caller. When libsas sas_ata_qc_issue() receives this error value, it assumes the task wasn't handled/queued by LLDD and proceeds to clean up and free the task again, resulting in a double free. Since pm8001_queue_command() handles the SAS task in this case, it should return 0 to the caller indicating that the task has been handled.
CVE-2026-23317 1 Linux 1 Linux Kernel 2026-04-03 7.8 High
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions Before the referenced fixes these functions used a lookup function that returned a pointer. This was changed to another lookup function that returned an error code with the pointer becoming an out parameter. The error path when the lookup failed was not changed to reflect this change and the code continued to return the PTR_ERR of the now uninitialized pointer. This could cause the vmw_translate_ptr functions to return success when they actually failed causing further uninitialized and OOB accesses.
CVE-2026-1917 2 Budda, Drupal 2 Login Disable, Login Disable 2026-04-03 4.3 Medium
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Login Disable allows Functionality Bypass.This issue affects Login Disable: from 0.0.0 before 2.1.3.
CVE-2026-2348 2 Drupal, Wim-leers 2 Quick Edit, Quick Edit 2026-04-03 5.4 Medium
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Quick Edit allows Cross-Site Scripting (XSS).This issue affects Quick Edit: from 0.0.0 before 1.0.5, from 2.0.0 before 2.0.1.
CVE-2026-3214 2 Arnabdotorg, Drupal 2 Captcha, Captcha 2026-04-03 6.5 Medium
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CAPTCHA allows Functionality Bypass.This issue affects CAPTCHA: from 0.0.0 before 1.17.0, from 2.0.0 before 2.0.10.
CVE-2026-29934 2 Eddy8, Lightcms Project 2 Lightcms, Lightcms 2026-04-03 6.1 Medium
A reflected cross-site scripting (XSS) vulnerability in the /admin/menus component of Lightcms v2.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via modifying the referer value in the request header.
CVE-2026-29976 1 Zerbea 2 Hcxpcapngtool, Hcxtools 2026-04-03 6.2 Medium
Buffer Overflow vulnerability in ZerBea hcxpcapngtool v. 7.0.1-43-g2ee308e allows a local attacker to obtain sensitive information via the getradiotapfield() function
CVE-2026-29905 1 Getkirby 1 Kirby 2026-04-03 6.5 Medium
Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError.