Search

Search Results (326653 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-43531 1 Apple 9 Ios, Ipados, Iphone Os and 6 more 2026-01-07 3.1 Low
A race condition was addressed with improved state handling. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-43501 2 Apple, Webkitgtk 8 Ios, Ipados, Iphone Os and 5 more 2026-01-07 4.3 Medium
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
CVE-2025-14325 1 Mozilla 3 Firefox, Firefox Esr, Thunderbird 2026-01-07 7.3 High
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.
CVE-2025-14023 2 Apple, Linecorp 2 Ios, Line 2026-01-07 3.1 Low
LINE client for iOS prior to 15.19 allows UI spoofing due to inconsistencies between the navigation state and the in-app browser's user interface, which could create confusion about the trust context of displayed pages or interactive elements under specific conditions.
CVE-2025-14022 2 Apple, Linecorp 2 Ios, Line 2026-01-07 7.7 High
LINE client for iOS prior to 15.4 allows man-in-the-middle attacks due to improper SSL/TLS certificate validation in an integrated financial SDK. The SDK interfered with the application's network processing, causing server certificate verification to be disabled for a significant portion of network traffic, which could allow a network-adjacent attacker to intercept or modify encrypted communications.
CVE-2025-13947 1 Redhat 7 Enterprise Linux, Rhel Aus, Rhel E4s and 4 more 2026-01-07 7.4 High
A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.
CVE-2025-47348 1 Qualcomm 1 Snapdragon 2026-01-07 7.8 High
Memory corruption while processing identity credential operations in the trusted application.
CVE-2025-13837 1 Python 1 Cpython 2026-01-07 5.9 Medium
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
CVE-2025-47356 1 Qualcomm 1 Snapdragon 2026-01-07 7.8 High
Memory Corruption when multiple threads concurrently access and modify shared resources.
CVE-2025-47369 1 Qualcomm 1 Snapdragon 2026-01-07 5.5 Medium
Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.
CVE-2025-47380 1 Qualcomm 1 Snapdragon 2026-01-07 7.8 High
Memory corruption while preprocessing IOCTLs in sensors.
CVE-2025-47388 1 Qualcomm 1 Snapdragon 2026-01-07 7.8 High
Memory corruption while passing pages to DSP with an unaligned starting address.
CVE-2025-47393 1 Qualcomm 1 Snapdragon 2026-01-07 7.8 High
Memory corruption when accessing resources in kernel driver.
CVE-2025-47394 1 Qualcomm 1 Snapdragon 2026-01-07 7.8 High
Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.
CVE-2025-47395 1 Qualcomm 1 Snapdragon 2026-01-07 6.5 Medium
Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.
CVE-2025-47396 2026-01-07 7.8 High
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
CVE-2025-12648 1 Wordpress 1 Wordpress 2026-01-07 5.3 Medium
The WP-Members Membership Plugin for WordPress is vulnerable to unauthorized file access in versions up to, and including, 3.5.4.4. This is due to storing user-uploaded files in predictable directories (wp-content/uploads/wpmembers/user_files/<user_id>/) without implementing proper access controls beyond basic directory listing protection (.htaccess with Options -Indexes). This makes it possible for unauthenticated attackers to directly access and download sensitive documents uploaded by site users via direct URL access, granted they can guess or enumerate user IDs and filenames.
CVE-2025-14891 2 Ivole, Wordpress 2 Customer Reviews For Woocommerce, Wordpress 2026-01-07 6.4 Medium
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'displayName' parameter in all versions up to, and including, 5.93.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with customer-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. While it is possible to invoke the AJAX action without authentication, the attacker would need to know a valid form ID, which requires them to place an order. This vulnerability can be exploited by unauthenticated attackers if guest checkout is enabled. However, the form ID still needs to be obtained through placing an order.
CVE-2025-14059 3 Roxnor, Woocommerce, Wordpress 3 Emailkit, Woocommerce, Wordpress 2026-01-07 6.5 Medium
The EmailKit plugin for WordPress is vulnerable to Arbitrary File Read via Path Traversal in all versions up to, and including, 1.6.1. This is due to missing path validation in the create_template REST API endpoint where user-controlled input from the emailkit-editor-template parameter is passed directly to file_get_contents() without sanitization. This makes it possible for authenticated attackers with Author-level permissions or higher to read arbitrary files on the server, including sensitive configuration files like /etc/passwd and wp-config.php, via the REST API. The file contents are stored in post meta and can be exfiltrated through MetForm's email confirmation feature.
CVE-2025-14468 1 Wordpress 1 Wordpress 2026-01-07 4.3 Medium
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to inverted nonce verification logic in the amp_theme_ajaxcomments AJAX handler, which rejects requests with VALID nonces and accepts requests with MISSING or INVALID nonces. This makes it possible for unauthenticated attackers to submit comments on behalf of logged-in users via a forged request granted they can trick a user into performing an action such as clicking on a link, and the plugin's template mode is enabled.