Export limit exceeded: 347925 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (347925 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-37458 2026-05-04 N/A
Missing input validation in the MP_REACH_NLRI component of FRRouting (FRR) stable/10.0 to stable/10.6 allows authenticated attackers to cause a Denial of Service (DoS) via supplying a crafted UPDATE message.
CVE-2026-36365 2026-05-04 N/A
An issue in Lymphatus caesium-image-compressor All versions up to and including commit 02da2c6 allows a local attacker to execute arbitrary code via the shutdownMachine and putMachineToSleep functions in PostCompressionActions.cpp
CVE-2025-70071 2026-05-04 N/A
An issue in Assimp v.6.0.2 allows a remote attacker to cause a denial of service via the FBXParser.cpp, ParseVectorDataArray()
CVE-2026-6449 2026-05-04 5.3 Medium
The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Improper Authorization in all versions up to, and including, 2.1.2. This is due to a logical short-circuit flaw in authorization logic that causes token validation to be entirely skipped when a booking has a 'waiting' status. This makes it possible for unauthenticated attackers to approve any booking that is in 'waiting' status by sending a crafted request to the publicly-accessible admin-ajax endpoint.
CVE-2026-33857 1 Apache 1 Apache Http Server 2026-05-04 5.3 Medium
Out-of-bounds Read vulnerability in mod_proxy_ajp of Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.
CVE-2026-32650 1 Anviz 2 Anviz Crosschex Standard, Crosschex Standard 2026-05-04 7.5 High
Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access.
CVE-2026-40434 1 Anviz 2 Anviz Crosschex Standard, Crosschex Standard 2026-05-04 8.1 High
Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.
CVE-2026-24178 3 Apple, Linux, Nvidia 4 Macos, Linux Kernel, Flare Sdk and 1 more 2026-05-04 9.8 Critical
NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to privilege escalation, data tampering, information disclosure, code execution, and denial of service.
CVE-2026-24186 3 Apple, Linux, Nvidia 4 Macos, Linux Kernel, Flare Sdk and 1 more 2026-05-04 8.8 High
NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause deserialization of untrusted data by sending a malicious FOBS- encoded message. A successful exploit of this vulnerability might lead to code execution.
CVE-2026-24204 3 Apple, Linux, Nvidia 4 Macos, Linux Kernel, Flare Sdk and 1 more 2026-05-04 6.5 Medium
NVIDIA Flare SDK contains a vulnerability where an Attacker may cause an Improper Input Validation by path traversing. A successful exploit of this vulnerability may lead to information disclosure.
CVE-2026-34262 1 Sap 2 Hana Cockpit, Hana Database Explorer 2026-05-04 5 Medium
Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explorer
CVE-2026-31927 1 Anviz 3 Anviz Cx7 Firmware, Cx7, Cx7 Firmware 2026-05-04 4.9 Medium
Anviz CX7 Firmware is vulnerable to an authenticated CSV upload which allows path traversal to overwrite arbitrary files (e.g., /etc/shadow), enabling unauthorized SSH access when combined with debug‑setting changes
CVE-2026-32324 1 Anviz 3 Anviz Cx7 Firmware, Cx7, Cx7 Firmware 2026-05-04 7.7 High
Anviz CX7 Firmware is  vulnerable because the application embeds reusable certificate/key material, enabling decryption of MQTT traffic and potential interaction with device messaging channels at scale.
CVE-2026-32648 1 Anviz 6 Anviz Cx2 Lite Firmware, Anviz Cx7 Firmware, Cx2 Lite and 3 more 2026-05-04 5.3 Medium
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug configuration details (e.g., SSH/RTTY status), assisting attackers in reconnaissance against the device.
CVE-2026-33093 1 Anviz 3 Anviz Cx7 Firmware, Cx7, Cx7 Firmware 2026-05-04 5.3 Medium
Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures a photo with the front facing camera, exposing visual information about the deployment environment.
CVE-2026-33569 1 Anviz 6 Anviz Cx2 Lite Firmware, Anviz Cx7 Firmware, Cx2 Lite and 3 more 2026-05-04 6.5 Medium
Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling on‑path attackers to sniff credentials and session data, which can be used to compromise the device.
CVE-2026-35061 1 Anviz 3 Anviz Cx7 Firmware, Cx7, Cx7 Firmware 2026-05-04 5.3 Medium
Anviz CX7 Firmware is vulnerable to the most recently captured test photo that can be retrieved without authentication, revealing sensitive operational imagery.
CVE-2026-35546 1 Anviz 6 Anviz Cx2 Lite Firmware, Anviz Cx7 Firmware, Cx2 Lite and 3 more 2026-05-04 9.8 Critical
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell.
CVE-2026-24222 1 Nvidia 1 Nemoclaw 2026-05-04 8.6 High
NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environment variables not properly restricted during sandbox creation. A successful exploit of this vulnerability might lead to information disclosure.
CVE-2026-35682 1 Anviz 3 Anviz Cx2 Lite Firmware, Cx2 Lite, Cx2 Lite Firmware 2026-05-04 8.8 High
Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that enables arbitrary command execution (e.g., starting telnetd), resulting in root‑level access.