Search

Search Results (345573 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-12540 2 Sharethis, Wordpress 2 Dashboard For Google Analytics, Wordpress 2026-04-21 4.7 Medium
The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.4. This is due to the Google Analytics client_ID and client_secret being stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to craft a link to the sharethis.com server, which will share an authorization token for Google Analytics with a malicious website, if the attacker can trick an administrator logged into the website and Google Analytics to click the link.
CVE-2026-6746 1 Mozilla 1 Firefox 2026-04-21 N/A
Use-after-free in the DOM: Core & HTML component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
CVE-2026-6748 1 Mozilla 1 Firefox 2026-04-21 N/A
Uninitialized memory in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
CVE-2026-6749 1 Mozilla 1 Firefox 2026-04-21 N/A
Information disclosure due to uninitialized memory in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
CVE-2026-6750 1 Mozilla 1 Firefox 2026-04-21 N/A
Privilege escalation in the Graphics: WebRender component. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
CVE-2026-6763 1 Mozilla 1 Firefox 2026-04-21 N/A
Mitigation bypass in the File Handling component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
CVE-2026-6765 1 Mozilla 1 Firefox 2026-04-21 N/A
Information disclosure in the Form Autofill component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
CVE-2026-6767 1 Mozilla 1 Firefox 2026-04-21 N/A
Other issue in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
CVE-2026-6776 1 Mozilla 1 Firefox 2026-04-21 7.8 High
Incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox 150 and Firefox ESR 140.10.
CVE-2026-6779 1 Mozilla 1 Firefox 2026-04-21 N/A
Other issue in the JavaScript Engine component. This vulnerability was fixed in Firefox 150.
CVE-2026-6781 1 Mozilla 1 Firefox 2026-04-21 N/A
Denial-of-service in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150.
CVE-2026-6783 1 Mozilla 1 Firefox 2026-04-21 N/A
Incorrect boundary conditions, integer overflow in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 150.
CVE-2025-10354 1 Semantic-mediawiki 1 Semantic Mediawiki 2026-04-21 N/A
Cross-Site Scripting (XSS) vulnerability reflected in Semantic MediaWiki. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL using the '/index.php/Speciaal:GefacetteerdZoeken' endpoint parameter. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
CVE-2026-3298 1 Python 1 Cpython 2026-04-21 N/A
The method "sock_recvfrom_into()" of "asyncio.ProacterEventLoop" (Windows only) was missing a boundary check for the data buffer when using nbytes parameter. This allowed for an out-of-bounds buffer write if data was larger than the buffer size. Non-Windows platforms are not affected.
CVE-2026-40498 1 Freescout Helpdesk 1 Freescout 2026-04-21 N/A
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can access diagnostic and system tools that should be restricted to administrators. The /system/cron endpoint relies on a static MD5 hash derived from the APP_KEY, which is exposed in the response and logs. Accessing these endpoints reveals sensitive server information (Full Path Disclosure), process IDs, and allows for Resource Exhaustion (DoS) by triggering heavy background tasks repeatedly without any rate limiting. The cron hash is generated using md5(APP_KEY . 'web_cron_hash'). Since this hash is often transmitted via GET requests, it is susceptible to exposure in server logs, browser history, and proxy logs. Furthermore, the lack of rate limiting on these endpoints allows for automated resource exhaustion (DoS) and brute-force attempts. Version 1.8.213 fixes the issue.
CVE-2017-9791 1 Apache 1 Struts 2026-04-21 9.8 Critical
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
CVE-2017-9805 3 Apache, Cisco, Netapp 7 Struts, Digital Media Manager, Hosted Collaboration Solution and 4 more 2026-04-21 8.1 High
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
CVE-2026-21732 1 Imaginationtech 2 Ddk, Graphics Ddk 2026-04-21 9.6 Critical
A web page that contains unusual GPU shader code is loaded into the GPU compiler process and can trigger a write out-of-bounds write crash in the GPU shader compiler library. On certain platforms, when the compiler process has system privileges this could enable further exploits on the device. An edge case using a very large value in switch statements in GPU shader code can cause a segmentation fault in the GPU shader compiler due to an out-of-bounds write access.
CVE-2026-22163 1 Imaginationtech 2 Ddk, Graphics Ddk 2026-04-21 7.8 High
Requires malware code to misuse the DDK kernel module IOCTL interface. Such code can use the interface in an unsupported way that allows subversion of the GPU to perform writes to arbitrary physical memory pages. The product utilises a shared resource in a concurrent manner but does not attempt to synchronise access to the resource.
CVE-2019-25568 2 Memuplay, Microvirt 2 Memu Play, Memu 2026-04-21 9.8 Critical
Memu Play 6.0.7 contains an insecure file permissions vulnerability that allows low-privilege users to escalate privileges by replacing the MemuService.exe executable. Attackers can rename and overwrite MemuService.exe in the installation directory with a malicious executable, which executes with system-level privileges when the service restarts after a computer reboot.