Search

Search Results (334984 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-36640 2 Microsoft, Tenable 2 Windows, Nessus Agent 2026-02-26 8.8 High
A vulnerability has been identified in the installation/uninstallation of the Nessus Agent Tray App on Windows Hosts which could lead to escalation of privileges.
CVE-2025-61731 2 Golang, Gotoolchain 2 Go, Cmd/go 2026-02-26 7.8 High
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.
CVE-2026-0403 1 Netgear 20 Rbe970, Rbe970 Firmware, Rbe971 and 17 more 2026-02-26 8.0 High
An insufficient input validation vulnerability in NETGEAR Orbi routers allows attackers connected to the router's LAN to execute OS command injections.
CVE-2025-15545 1 Tp-link 1 Archer Re605x 2026-02-26 N/A
The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
CVE-2026-0405 1 Netgear 50 Cbr750, Cbr750 Firmware, Nbr750 and 47 more 2026-02-26 7.8 High
An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.
CVE-2025-13399 1 Tp-link 1 Vx800v 2026-02-26 N/A
A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent attacker to brute force the weak AES key and decrypt intercepted traffic. Successful exploitation requires network proximity but no authentication, and may result in high impact to confidentiality, integrity, and availability of transmitted data.
CVE-2026-0406 1 Netgear 2 Xr1000v2, Xr1000v2 Firmware 2026-02-26 8.0 High
An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows attackers connected to the router's LAN to execute OS command injections.
CVE-2026-1457 1 Tp-link 1 Vigi C385 2026-02-26 N/A
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
CVE-2026-0407 1 Netgear 8 Ex2800, Ex2800 Firmware, Ex3110 and 5 more 2026-02-26 8.0 High
An insufficient authentication vulnerability in NETGEAR WiFi range extenders allows a network adjacent attacker with WiFi authentication or a physical Ethernet port connection to bypass the authentication process and access the admin panel.
CVE-2026-1281 1 Ivanti 1 Endpoint Manager Mobile 2026-02-26 9.8 Critical
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
CVE-2026-0408 1 Netgear 8 Ex2800, Ex2800 Firmware, Ex3110 and 5 more 2026-02-26 8.0 High
A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.
CVE-2026-1340 1 Ivanti 1 Endpoint Manager Mobile 2026-02-26 9.8 Critical
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
CVE-2026-0404 1 Netgear 24 Rbr750, Rbr750 Firmware, Rbr840 and 21 more 2026-02-26 8.0 High
An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allows network adjacent attackers authenticated over WiFi or on LAN to execute OS command injections on the router. DHCPv6 is not enabled by default.
CVE-2026-22277 1 Dell 2 Unity, Unityvsa Operating Environment 2026-02-26 7.8 High
Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
CVE-2025-64155 1 Fortinet 1 Fortisiem 2026-02-26 9.4 Critical
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.
CVE-2026-21418 1 Dell 1 Unity 2026-02-26 7.8 High
Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
CVE-2025-25249 1 Fortinet 3 Fortios, Fortisase, Fortiswitchmanager 2026-02-26 7.4 High
A heap-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows attacker to execute unauthorized code or commands via specially crafted packets
CVE-2025-62348 1 Salt Project 1 Salt 2026-02-26 7.8 High
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
CVE-2025-46685 1 Dell 1 Supportassist Os Recovery 2026-02-26 7.5 High
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
CVE-2025-62349 1 Salt Project 1 Salt 2026-02-26 6.2 Medium
Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.