Search

Search Results (326417 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59505 1 Microsoft 24 Windows, Windows 10, Windows 10 1607 and 21 more 2026-01-02 7.8 High
Double free in Windows Smart Card allows an authorized attacker to elevate privileges locally.
CVE-2025-59504 1 Microsoft 2 Azure Monitor, Azure Monitor Agent 2026-01-02 7.3 High
Heap-based buffer overflow in Azure Monitor Agent allows an unauthorized attacker to execute code locally.
CVE-2025-64656 1 Microsoft 2 Azure App Gateway, Azure Application Gateway 2026-01-02 9.4 Critical
Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-66953 1 Nardamiteq 2 Upc2, Upc2 Firmware 2026-01-02 8.8 High
CSRF vulnerability in narda miteq Uplink Power Contril Unit UPC2 v.1.17 allows a remote attacker to execute arbitrary code via the Web-based management interface and specifically the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints
CVE-2025-67073 1 Tenda 4 Ac10, Ac10 Firmware, Ac10v4 and 1 more 2026-01-02 9.8 Critical
A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.
CVE-2025-67074 1 Tenda 4 Ac10, Ac10 Firmware, Ac10v4 and 1 more 2026-01-02 6.5 Medium
A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serverName`) to /goform/AdvSetMacMtuWan.
CVE-2025-68935 1 Onlyoffice 1 Document Server 2026-01-02 6.4 Medium
ONLYOFFICE Docs before 9.2.1 allows XSS via the Font field for the Multilevel list settings window. This is related to DocumentServer.
CVE-2025-68936 1 Onlyoffice 1 Document Server 2026-01-02 6.4 Medium
ONLYOFFICE Docs before 9.2.1 allows XSS via the Color theme name. This is related to DocumentServer.
CVE-2025-68938 1 Gitea 1 Gitea 2026-01-02 4.3 Medium
Gitea before 1.25.2 mishandles authorization for deletion of releases.
CVE-2025-68939 1 Gitea 1 Gitea 2026-01-02 8.2 High
Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.
CVE-2025-68940 1 Gitea 1 Gitea 2026-01-02 3.1 Low
In Gitea before 1.22.5, branch deletion permissions are not adequately enforced after merging a pull request.
CVE-2025-68941 1 Gitea 1 Gitea 2026-01-02 4.9 Medium
Gitea before 1.22.3 mishandles access to a private resource upon receiving an API token with scope limited to public resources.
CVE-2025-68942 1 Gitea 1 Gitea 2026-01-02 5.4 Medium
Gitea before 1.22.2 allows XSS because the search input box (for creating tags and branches) is v-html instead of v-text.
CVE-2023-47467 1 Jeecg 1 Jeecg Boot 2026-01-02 6.5 Medium
Directory Traversal vulnerability in jeecg-boot v.3.6.0 allows a remote privileged attacker to obtain sensitive information via the file directory structure.
CVE-2023-1454 1 Jeecg 1 Jeecg Boot 2026-01-02 6.3 Medium
A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.
CVE-2025-68948 2 B3log, Siyuan 2 Siyuan, Siyuan 2026-01-02 8.1 High
SiYuan is self-hosted, open source personal knowledge management software. In versions 3.5.1 and prior, the SiYuan Note application utilizes a hardcoded cryptographic secret for its session store. This unsafe practice renders the session encryption ineffective. Since the sensitive AccessAuthCode is stored within the session cookie, an attacker who intercepts or obtains a user's encrypted session cookie (e.g., via session hijacking) can locally decrypt it using the public key. Once decrypted, the attacker can retrieve the AccessAuthCode in plain text and use it to authenticate or take over the session.
CVE-2025-66864 1 Gnu 1 Binutils 2026-01-02 5.5 Medium
An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.
CVE-2025-66580 1 Openagentplatform 1 Dive 2026-01-02 9.7 Critical
Dive is an open-source MCP Host Desktop Application that enables integration with function-calling LLMs. A critical Stored Cross-Site Scripting (XSS) vulnerability exists in versions prior to 0.11.1 in the Mermaid diagram rendering component. The application allows the execution of arbitrary JavaScript via `javascript:`. An attacker can exploit this to inject a malicious Model Context Protocol (MCP) server configuration, leading to Remote Code Execution (RCE) on the victim's machine when the node is clicked. Version 0.11.1 fixes the issue.
CVE-2025-66022 2 Factionsecurity, Owasp 2 Faction, Faction 2026-01-02 9.7 Critical
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
CVE-2025-15426 2026-01-02 7.3 High
A vulnerability was identified in jackying H-ui.admin up to 3.1. This affects an unknown function in the library /lib/webuploader/0.1.5/server/preview.php. The manipulation leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.