Search

Search Results (335665 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-47383 2026-03-03 7.2 High
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.
CVE-2025-47376 2026-03-03 7.8 High
Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.
CVE-2025-47377 2026-03-03 7.8 High
Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.
CVE-2025-59603 2026-03-03 7.8 High
Memory Corruption when processing invalid user address with nonstandard buffer address.
CVE-2025-47379 2026-03-03 7.8 High
Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.
CVE-2025-47381 2026-03-03 7.8 High
Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs.
CVE-2025-47385 2026-03-03 7.8 High
Memory Corruption when accessing trusted execution environment without proper privilege check.
CVE-2025-47386 2026-03-03 7.8 High
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.
CVE-2026-23600 2026-03-03 N/A
A remote authentication bypass vulnerability  exists in HPE AutoPass License Server (APLS).
CVE-2026-20430 2 Mediatek, Openwrt 7 Mt6890, Mt7915, Mt7916 and 4 more 2026-03-03 8.8 High
In wlan AP FW, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00467553; Issue ID: MSV-5151.
CVE-2026-20434 1 Mediatek 99 Lr12a, Lr13, Mt2735 and 96 more 2026-03-03 7.5 High
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY00782946; Issue ID: MSV-4135.
CVE-2024-3727 1 Redhat 18 Acm, Advanced Cluster Security, Ansible Automation Platform and 15 more 2026-03-03 8.3 High
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
CVE-2024-1139 1 Redhat 2 Acm, Openshift 2026-03-03 7.7 High
A credentials leak vulnerability was found in the cluster monitoring operator in OCP. This issue may allow a remote attacker who has basic login credentials to check the pod manifest to discover a repository pull secret.
CVE-2026-1585 1 Canon 1 Ij Scan Utility 2026-03-03 6.7 Medium
An unquoted Windows service executable path vulnerability in IJ Scan Utility for Windows versions 1.1.2 through 1.5.0 may allow a local attacker to execute a malicious file with the privileges of the affected service.
CVE-2026-27149 1 Discourse 1 Discourse 2026-03-03 6.5 Medium
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, SQL injection in PM tag filtering (`list_private_messages_tag`) allows bypassing tag filter conditions, potentially disclosing unauthorized private message metadata. Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
CVE-2026-27150 1 Discourse 1 Discourse 2026-03-03 3.8 Low
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, missing `validate_before_create` authorization in Data Explorer's `QueryGroupBookmarkable` allows any logged-in user to create bookmarks for query groups they don't have access to, enabling metadata disclosure via bookmark reminder notifications. Versions 2025.12.2, 2026.1.1, and 2026.2.0 fix this issue and also make sure `validate_before_create` throws NotImplementedError in BaseBookmarkable if not implemented, to prevent similar issues in the future. No known workarounds are available.
CVE-2026-27151 1 Discourse 1 Discourse 2026-03-03 2.7 Low
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, the `move_posts` action only checked `can_move_posts?` on the source topic but never validated write permissions on the destination topic. This allowed TL4 users and category group moderators to move posts into topics in categories where they lack posting privileges (e.g., read-only categories or categories with group-restricted write access). Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
CVE-2026-27162 1 Discourse 1 Discourse 2026-03-03 4.9 Medium
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, `posts_nearby` was checking topic access but then returning all posts regardless of type, including whispers that should only be visible to whisperers. Use `Post.secured(guardian)` to properly filter post types based on user permissions. Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
CVE-2026-27152 1 Discourse 1 Discourse 2026-03-03 3.8 Low
Discourse is an open source discussion platform. Prior to versions 2025.12.2, 2026.1.1, and 2026.2.0, DM communication-preference bypass when adding members via `Chat::AddUsersToChannel` — a user could add targets who have blocked/ignored/muted them to an existing DM channel, bypassing per-recipient PM restrictions that are enforced during DM channel creation. Versions 2025.12.2, 2026.1.1, and 2026.2.0 patch the issue. No known workarounds are available.
CVE-2026-27449 1 Umbraco 1 Umbraco Forms 2026-03-03 7.5 High
Umbraco Engage is a business intelligence platform. A vulnerability has been identified in Umbraco Engage prior to versions 16.2.1 and 17.1.1 where certain API endpoints are exposed without enforcing authentication or authorization checks. The affected endpoints can be accessed directly over the network without requiring a valid session or user credentials. By supplying a user-controlled identifier parameter (e.g., ?id=), an attacker can retrieve sensitive data associated with arbitrary records. Because no access control validation is performed, the endpoints are vulnerable to enumeration attacks, allowing attackers to iterate over identifiers and extract data at scale. An unauthenticated attacker can retrieve sensitive Engage-related data by directly querying the affected API endpoints. The vulnerability allows arbitrary record access through predictable or enumerable identifiers. The confidentiality impact is considered high. No direct integrity or availability impact has been identified. The scope of exposed data depends on the deployment but may include analytics data, tracking data, customer-related information, or other Engage-managed content. The vulnerability affects both v16 and v17. Patches have already been released. Users are advised to update to 16.2.1 or 17.1.1. No known workarounds are available.