Search

Search Results (342737 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-21378 2026-04-07 7.8 High
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.
CVE-2026-21376 2026-04-07 7.8 High
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.
CVE-2026-21375 1 Qualcomm 1 Snapdragon 2026-04-07 7.8 High
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.
CVE-2026-21374 2026-04-07 7.8 High
Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.
CVE-2026-21373 2026-04-07 7.8 High
Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.
CVE-2026-21372 2026-04-07 7.8 High
Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.
CVE-2026-21371 1 Qualcomm 1 Snapdragon 2026-04-07 7.8 High
Memory Corruption when retrieving output buffer with insufficient size validation.
CVE-2025-47400 1 Qualcomm 1 Snapdragon 2026-04-07 7.1 High
Cryptographic issue while copying data to a destination buffer without validating its size.
CVE-2025-47389 2026-04-07 7.8 High
Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.
CVE-2025-47392 2026-04-07 8.8 High
Memory corruption when decoding corrupted satellite data files with invalid signature offsets.
CVE-2026-29047 1 Glpi-project 1 Glpi 2026-04-07 7.2 High
GLPI is a free asset and IT management software package. From 10.0.0 to before 10.0.24 and 11.0.6, an authenticated user can perform a SQL injection via the logs export feature. This vulnerability is fixed in 10.0.24 and 11.0.6.
CVE-2026-26263 1 Glpi-project 1 Glpi 2026-04-07 8.1 High
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6.
CVE-2026-26027 1 Glpi-project 1 Glpi 2026-04-07 7.5 High
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store an XSS payload through the inventory endpoint. This vulnerability is fixed in 11.0.6.
CVE-2026-26026 1 Glpi-project 1 Glpi 2026-04-07 9.1 Critical
GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.
CVE-2026-25932 1 Glpi-project 1 Glpi 2026-04-07 7.2 High
GLPI is a Free Asset and IT Management Software package. From 0.60 to before 10.0.24, an authenticated technician user can store an XSS payload in a supplier fields. This vulnerability is fixed in 10.0.24.
CVE-2026-3524 1 Mattermost 1 Mattermost 2026-04-07 8.3 High
Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API requests to the plugin's endpoints. Mattermost Advisory ID: MMSA-2026-00621
CVE-2026-35616 1 Fortinet 1 Forticlientems 2026-04-07 9.1 Critical
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
CVE-2026-5719 2026-04-07 6.3 Medium
A flaw has been found in itsourcecode Construction Management System 1.0. This affects an unknown function of the file /borrowedtool.php. Executing a manipulation of the argument code can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used.
CVE-2026-31838 1 Istio 1 Istio 2026-04-07 5.3 Medium
Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.
CVE-2026-5649 1 Code-projects 1 Online Application System For Admission 2026-04-07 6.3 Medium
A vulnerability has been found in code-projects Online Application System for Admission 1.0. This issue affects some unknown processing of the file /enrollment/admsnform.php of the component Endpoint. Such manipulation leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.