Search

Search Results (348758 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-42227 1 N8n 1 N8n 2026-05-06 6.5 Medium
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with a valid API key scoped to variable:list could read variables from projects they are not a member of by supplying an arbitrary projectId query parameter to the public API variables endpoint. The handler queried the variables repository directly without enforcing project membership checks, bypassing the authorization-aware service layer used by the internal enterprise controller. If variables were misused to store sensitive information such as credentials or tokens, they should be rotated immediately. This issue only affects licensed enterprise or team deployments with multiple projects and the variables feature enabled. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2025-20204 1 Cisco 1 Identity Services Engine 2026-05-06 4.8 Medium
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.  These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.
CVE-2025-20205 1 Cisco 1 Identity Services Engine 2026-05-06 4.8 Medium
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.  These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.
CVE-2026-42228 1 N8n 1 N8n 2026-05-06 6.5 Medium
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the /chat WebSocket endpoint used by the Chat Trigger node's Hosted Chat feature did not verify that an incoming connection was authorized to interact with the target execution. An unauthenticated remote attacker who could identify a valid execution ID for a workflow in a waiting state could attach to that execution, receive the pending prompt intended for the legitimate user, and submit arbitrary input to resume or influence downstream workflow behavior. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2026-42233 1 N8n 1 N8n 2026-05-06 9.8 Critical
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the Oracle Database node's select operation allowed user-controlled input passed into the Limit field via expressions to be interpolated directly into the SQL query without sanitization or parameterization. In workflows where external input is passed into the Limit field (e.g., from a webhook), an attacker could inject arbitrary SQL and exfiltrate data from the connected Oracle database. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2026-42234 1 N8n 1 N8n 2026-05-06 8.8 High
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows containing a Python Code Node could escape the sandbox and achieve arbitrary code execution on the task runner container. This issue only affects instances where the Python Task Runner is enabled. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2026-42235 1 N8n 1 N8n 2026-05-06 9.6 Critical
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an unauthenticated attacker could register a malicious MCP OAuth client with a crafted client_name. If a victim user authorized the OAuth consent dialog and a second user subsequently revoked that access, a toast notification would render the injected script. Clicking the link would execute arbitrary JavaScript in the victim's authenticated n8n browser session, enabling credential and session token theft, workflow manipulation, or privilege escalation. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2026-43869 1 Apache 1 Thrift 2026-05-06 7.3 High
Improper Validation of Certificate with Host Mismatch vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
CVE-2026-43868 1 Apache 1 Thrift 2026-05-06 5.3 Medium
Memory Allocation with Excessive Size Value vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
CVE-2026-43870 1 Apache 1 Thrift 2026-05-06 7.3 High
Origin Validation Error, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'), Uncontrolled Resource Consumption vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
CVE-2026-20945 1 Microsoft 5 Sharepoint Enterprise Server 2016, Sharepoint Server, Sharepoint Server 2016 and 2 more 2026-05-06 4.6 Medium
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.
CVE-2025-47401 1 Qualcomm 491 Ar8035, Ar8035 Firmware, Cologne and 488 more 2026-05-06 6.5 Medium
Transient DOS when processing target power rate tables during channel configuration.
CVE-2025-47403 1 Qualcomm 515 Ar8035, Ar8035 Firmware, Cologne and 512 more 2026-05-06 6.5 Medium
Transient DOS when processing a malformed Fast Transition response frame with an invalid header structure during wireless roaming.
CVE-2025-47404 1 Qualcomm 377 215 Mobile, 215 Mobile Firmware, 5g Fixed Wireless Access and 374 more 2026-05-06 6.5 Medium
Memory corruption when dynamically changing the size of a previously allocated buffer while its contents are being modified.
CVE-2025-47405 1 Qualcomm 33 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 30 more 2026-05-06 7.8 High
Memory corruption when processing camera sensor input/output control codes with invalid output buffers.
CVE-2025-47408 1 Qualcomm 41 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6900 and 38 more 2026-05-06 7.8 High
Memory corruption when another driver calls an IOCTL with invalid input/output buffer.
CVE-2025-47406 1 Qualcomm 63 Cologne, Cologne Firmware, Fastconnect 6700 and 60 more 2026-05-06 6.1 Medium
Information Disclosure while processing IOCTL handler callbacks without verifying buffer size.
CVE-2025-47407 1 Qualcomm 201 Cq7790, Cq7790 Firmware, Cq8725s and 198 more 2026-05-06 7.8 High
Memory corruption while creating a process on the digital signal processor due to allocation failure at the kernel level.
CVE-2026-24082 1 Qualcomm 353 Ar8031, Ar8031 Firmware, Ar8035 and 350 more 2026-05-06 7.8 High
Memory Corruption when copying data from a freed source while executing performance counter deselect operation.
CVE-2026-25266 1 Qualcomm 49 Cologne, Cologne Firmware, Fastconnect 6900 and 46 more 2026-05-06 5.5 Medium
Memory corruption while processing IOCTL command when device is in power-save state.