Export limit exceeded: 329854 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 329854 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (329854 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-3814 2026-03-09 8.8 High
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
CVE-2026-3813 2026-03-09 6.3 Medium
A vulnerability was identified in opencc JFlow up to 5badc00db382d7cb82dad231e6a866b18e0addfe. Affected by this vulnerability is the function Calculate of the file src/main/java/bp/wf/httphandler/WF_CCForm.java. Such manipulation leads to injection. The attack may be performed from remote. The exploit is publicly available and might be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
CVE-2026-24713 2026-03-09 N/A
Improper Input Validation vulnerability in Apache IoTDB. This issue affects Apache IoTDB: from 1.0.0 before 1.3.7, from 2.0.0 before 2.0.7. Users are recommended to upgrade to version 1.3.7 or 2.0.7, which fixes the issue.
CVE-2026-24015 2026-03-09 N/A
A vulnerability in Apache IoTDB. This issue affects Apache IoTDB: from 1.0.0 before 1.3.7, from 2.0.0 before 2.0.7. Users are recommended to upgrade to version 1.3.7 or 2.0.7, which fixes the issue.
CVE-2025-33022 2026-03-09 N/A
The reporter agreed to not assign CVE ID
CVE-2026-2603 2 Keycloak, Redhat 2 Keycloak, Build Keycloak 2026-03-09 8.1 High
No description is available for this CVE.
CVE-2026-3632 1 Libsoup 1 Libsoup 2026-03-09 3.9 Low
No description is available for this CVE.
CVE-2026-3633 1 Libsoup 1 Libsoup 2026-03-09 3.9 Low
No description is available for this CVE.
CVE-2026-3634 1 Libsoup 1 Libsoup 2026-03-09 3.9 Low
No description is available for this CVE.
CVE-2025-47373 1 Qualcomm 377 Ar8035, Ar8035 Firmware, Cologne and 374 more 2026-03-09 7.8 High
Memory Corruption when accessing buffers with invalid length during TA invocation.
CVE-2025-47375 1 Qualcomm 339 Ar8031, Ar8031 Firmware, Ar8035 and 336 more 2026-03-09 7.8 High
Memory corruption while handling different IOCTL calls from the user-space simultaneously.
CVE-2025-47386 1 Qualcomm 341 Ar8031, Ar8031 Firmware, Ar8035 and 338 more 2026-03-09 7.8 High
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.
CVE-2025-69653 1 Bellard 1 Quickjs 2026-03-09 N/A
A crafted JavaScript input can trigger an internal assertion failure in QuickJS release 2025-09-13, fixed in commit 1dbba8a88eaa40d15a8a9b70bb1a0b8fb5b552e6 (2025-12-11), in file gc_decref_child in quickjs.c, when executed with the qjs interpreter using the -m option. This leads to an abort (SIGABRT) during garbage collection and causes a denial-of-service.
CVE-2025-69650 1 Gnu 1 Binutils 2026-03-09 3.3 Low
GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service.
CVE-2025-69654 1 Bellard 1 Quickjs 2026-03-09 N/A
A crafted JavaScript input executed with the QuickJS release 2025-09-13, fixed in commit fcd33c1afa7b3028531f53cd1190a3877454f6b3 (2025-12-11),`qjs` interpreter using the `-m` option and a low memory limit can cause an out-of-memory condition followed by an assertion failure in JS_FreeRuntime (list_empty(&rt->gc_obj_list)) during runtime cleanup. Although the engine reports an OOM error, it subsequently aborts with SIGABRT because the GC object list is not fully released. This results in a denial of service.
CVE-2026-29068 1 Pjsip 1 Pjproject 2026-03-09 9.8 Critical
PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, there is a stack buffer overflow vulnerability when pjmedia-codec parses an RTP payload contain more frames than the caller-provided frames can hold. This issue has been patched in version 2.17.
CVE-2026-28799 1 Pjsip 1 Pjproject 2026-03-09 7.5 High
PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap use-after-free vulnerability exists in PJSIP's event subscription framework (evsub.c) that is triggered during presence unsubscription (SUBSCRIBE with Expires=0). This issue has been patched in version 2.17.
CVE-2026-28800 1 Natroteam 1 Natromacro 2026-03-09 6.4 Medium
Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, anyone with Discord Remote Control set up in a non-private channel gives access to any user with the permission to send message in said channel access to do anything on their computer. This includes keyboard and mouse inputs and full file access. This issue has been patched in version 1.1.0.
CVE-2026-28801 1 Natroteam 1 Natromacro 2026-03-09 6.6 Medium
Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, any ahk code contained inside of a pattern or path file is executed by the macro. Since users commonly share path/pattern files, an attacker could share a file containing malicious code, which is then executed by the program. This code can operate in silence alongside the pattern, running in the background to do whatever the attacker pleases. This issue has been patched in version 1.1.0.
CVE-2026-29059 1 Windmill-labs 1 Windmill 2026-03-09 N/A
Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})". The filename parameter is concatenated into a file path without sanitization, allowing an attacker to read arbitrary files on the server using ../ sequences. This issue has been patched in version 1.603.3.