Search Results (44263 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-47405 1 Qualcomm 33 Fastconnect 6900, Fastconnect 6900 Firmware, Fastconnect 7800 and 30 more 2026-05-06 7.8 High
Memory corruption when processing camera sensor input/output control codes with invalid output buffers.
CVE-2025-47408 1 Qualcomm 41 Fastconnect 6200, Fastconnect 6200 Firmware, Fastconnect 6900 and 38 more 2026-05-06 7.8 High
Memory corruption when another driver calls an IOCTL with invalid input/output buffer.
CVE-2025-47406 1 Qualcomm 63 Cologne, Cologne Firmware, Fastconnect 6700 and 60 more 2026-05-06 6.1 Medium
Information Disclosure while processing IOCTL handler callbacks without verifying buffer size.
CVE-2026-7851 2 D-link, Dlink 3 Di-8100, Di-8100, Di-8100 Firmware 2026-05-06 7.2 High
A vulnerability was identified in D-Link DI-8100 16.07.26A1. This affects the function sprintf of the file yyxz.asp. The manipulation of the argument ID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
CVE-2026-7853 2 D-link, Dlink 3 Di-8100, Di-8100, Di-8100 Firmware 2026-05-06 9.8 Critical
A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
CVE-2026-7854 2 D-link, Dlink 3 Di-8100, Di-8100, Di-8100 Firmware 2026-05-06 9.8 Critical
A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
CVE-2026-7855 2 D-link, Dlink 3 Di-8100, Di-8100, Di-8100 Firmware 2026-05-06 8.8 High
A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
CVE-2026-7856 2 D-link, Dlink 3 Di-8100, Di-8100, Di-8100 Firmware 2026-05-06 7.2 High
A flaw has been found in D-Link DI-8100 16.07.26A1. This affects an unknown part of the file /url_member.asp of the component Web Management Interface. Executing a manipulation of the argument Name can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
CVE-2026-7857 2 D-link, Dlink 3 Di-8100, Di-8100, Di-8100 Firmware 2026-05-06 7.2 High
A vulnerability has been found in D-Link DI-8100 16.07.26A1. This vulnerability affects the function sprintf of the file /user_group.asp of the component CGI Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2026-42232 1 N8n 1 N8n 2026-05-06 8.8 High
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated user with permission to create or modify workflows could achieve global prototype pollution via the XML Node leading to RCE when combined with other nodes exploiting the prototype pollution. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2026-42231 1 N8n 1 N8n 2026-05-06 8.8 High
n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.
CVE-2024-10270 1 Redhat 4 Build Keycloak, Jboss Enterprise Application Platform, Jbosseapxp and 1 more 2026-05-06 6.5 Medium
A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.
CVE-2026-7572 1 Velocidex 1 Velociraptor 2026-05-06 4.4 Medium
An off-by-one error (CWE-193) in the ConsumeUnit16Array and ConsumeUnit64Array functions in Velocidex Velociraptor before version 0.76.5 on Windows and Linux allows a local attacker to cause a Denial of Service (DoS) via a process crash by providing a specially crafted .evtx file to the parse_evtx VQL plugin.
CVE-2026-25243 1 Redis 1 Redis 2026-05-06 8.8 High
Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.
CVE-2025-12464 1 Redhat 2 Enterprise Linux, Openshift 2026-05-06 6.2 Medium
A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.
CVE-2026-6420 1 Redhat 1 Enterprise Linux 2026-05-06 6.3 Medium
A flaw was found in Keylime. An attacker with root access on an enrolled monitored machine, where the Keylime agent runs, can exploit a vulnerability in the Keylime verifier. The verifier uses a hardcoded challenge nonce for Trusted Platform Module (TPM) quote attestation instead of a cryptographically random value. This allows the attacker to stockpile valid TPM quotes and replay them to evade detection after compromising the system. This issue affects only the push model deployment.
CVE-2026-42077 1 Evomap 1 Evolver 2026-05-06 5.2 Medium
Evolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a prototype pollution vulnerability in the mailbox store module allows attackers to modify the behavior of all JavaScript objects by injecting malicious properties into Object.prototype. The vulnerability exists in the _applyUpdate() and _updateRecord() functions which use Object.assign() to merge user-controlled data without filtering dangerous keys like __proto__, constructor, or prototype. This issue has been patched in version 1.69.3.
CVE-2026-32203 3 Apple, Linux, Microsoft 7 Macos, Linux Kernel, .net and 4 more 2026-05-06 7.5 High
Stack-based buffer overflow in .NET and Visual Studio allows an unauthorized attacker to deny service over a network.
CVE-2025-70034 1 Mscdex 1 Ssh2 2026-05-06 7.5 High
An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19) was discovered in mscdex ssh2 v1.17.0.
CVE-2026-34956 1 Redhat 7 Enterprise Linux, Fast Datapath, Openshift and 4 more 2026-05-06 5.9 Medium
A flaw was found in Open vSwitch. When Open vSwitch is configured with a conntrack flow using FTP helpers over the userspace datapath, a remote attacker can send a specially crafted FTP stream with an EPASV command exceeding 255 characters. This heap access error can lead to a crash, resulting in a Denial of Service (DoS) for the affected system.