Export limit exceeded: 338237 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (338237 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-23226 1 Linux 1 Linux Kernel 2026-03-13 7.8 High
In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load/xa_store/xa_erase accesses.
CVE-2026-22216 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 6.5 Medium
wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allows unauthenticated attackers to subscribe arbitrary email addresses to post notifications by sending POST requests to the wpdAddSubscription handler in class.WpdiscuzHelperAjax.php. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses and generate unwanted notification emails to victim accounts.
CVE-2026-22215 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 4.3 Medium
wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability in the getFollowsPage() function that allows attackers to trigger unauthorized actions without nonce validation. Attackers can craft malicious requests to enumerate follow relationships and manipulate user follow data by exploiting the missing CSRF protection in the follows page handler.
CVE-2026-22209 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 5.5 Medium
wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers.
CVE-2026-22203 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 4.9 Medium
wpDiscuz before 7.6.47 contains an information disclosure vulnerability that allows administrators to inadvertently expose OAuth secrets by exporting plugin options as JSON. Attackers can obtain exported files containing plaintext API secrets like fbAppSecret, googleClientSecret, twitterAppSecret, and other social login credentials from support tickets, backups, or version control repositories.
CVE-2026-22201 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 5.3 Medium
wpDiscuz before 7.6.47 contains an IP spoofing vulnerability in the getIP() function that allows attackers to bypass IP-based rate limiting and ban enforcement by trusting untrusted HTTP headers. Attackers can set HTTP_CLIENT_IP or HTTP_X_FORWARDED_FOR headers to spoof their IP address and circumvent security controls.
CVE-2026-22199 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 5.3 Medium
wpDiscuz before 7.6.47 contains a vote manipulation vulnerability that allows attackers to manipulate comment votes by obtaining fresh nonces and bypassing rate limiting through client-controlled headers. Attackers can vary User-Agent headers to reset rate limits, request nonces from the unauthenticated wpdGetNonce endpoint, and vote multiple times using IP rotation or reverse proxy header manipulation.
CVE-2026-22193 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 8.1 High
wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.
CVE-2026-22192 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 6.1 Medium
wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by importing a crafted options file with unescaped customCss field values. Attackers can supply a malicious JSON import file containing script payloads in the customCss parameter that execute on every page when rendered through the options handler without proper sanitization.
CVE-2026-22191 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 6.5 Medium
wpDiscuz before 7.6.47 contains a shortcode injection vulnerability that allows attackers to execute arbitrary shortcodes by including them in comment content sent via email notifications. Attackers can inject shortcodes like [contact-form-7] or [user_meta] in comments, which are executed server-side when the WpdiscuzHelperEmail class processes notifications through do_shortcode() before wp_mail().
CVE-2026-22183 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 6.1 Medium
wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerability in the inline comment preview functionality that allows authenticated users to inject malicious scripts by submitting comments with unescaped content. Attackers with unfiltered_html capabilities can inject JavaScript directly through comment content rendered in the AJAX response from the getLastInlineComments() function in class.WpdiscuzHelperAjax.php without proper HTML escaping.
CVE-2026-22182 2 Gvectors, Wordpress 2 Wpdiscuz, Wordpress 2026-03-13 7.5 High
wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax.php endpoint with arbitrary postId and comment_id parameters to flood subscribers with notifications, as the handler lacks nonce verification, authentication checks, and rate limiting.
CVE-2026-0653 1 Tp-link 3 Tapo C260, Tapo C260 Firmware, Tapo C260 V1 2026-03-13 6.5 Medium
On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
CVE-2026-0651 1 Tp-link 3 Tapo C260, Tapo C260 Firmware, Tapo C260 V1 2026-03-13 7.8 High
On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
CVE-2025-70245 2 D-link, Dlink 3 Dir-513, Dir-513, Dir-513 Firmware 2026-03-13 7.5 High
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWizardSelectMode.
CVE-2025-69621 1 Android-tools 1 Comic Book Reader 2026-03-13 8.1 High
An arbitrary file overwrite vulnerability in the file import process of Comic Book Reader v1.0.95 allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.
CVE-2025-69619 1 Zipperapp 2 My Teditor, My Text Editor 2026-03-13 5.5 Medium
A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.
CVE-2025-69618 2 Coto, Coto.world 2 Tarot, Astro & Healing, Coto 2026-03-13 8.1 High
An arbitrary file overwrite vulnerability in the file import process of Tarot, Astro & Healing v11.4.0 allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.
CVE-2025-66956 1 Asseco 1 See Live 2026-03-13 9.9 Critical
Insecure Access Control in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows remote attackers to access and execute attachments via a computable URL.
CVE-2025-43533 1 Apple 8 Ios, Ipados, Iphone Os and 5 more 2026-03-13 5.7 Medium
Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in watchOS 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. A malicious HID device may cause an unexpected process crash.