Search Results (1750 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-35071 1 Dell 2 Insightiq, Powerscale Insightiq 2026-05-12 8.2 High
Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.
CVE-2026-32687 1 Elixir-ecto 1 Postgrex 2026-05-12 N/A
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in elixir-ecto postgrex ('Elixir.Postgrex.Notifications' module) allows SQL Injection. The channel argument passed to 'Elixir.Postgrex.Notifications':listen/3 and 'Elixir.Postgrex.Notifications':unlisten/3 is interpolated directly into LISTEN "..." / UNLISTEN "..." SQL statements without escaping the " character. An attacker who can influence the channel name can inject a " to break out of the quoted identifier and append arbitrary SQL. Because the notifications connection uses the PostgreSQL simple query protocol, multi-statement payloads are accepted, allowing DDL and DML commands to be chained (e.g. ; DROP TABLE ...; --). The same unsanitized interpolation also occurs in handle_connect/1 when replaying LISTEN commands after a reconnect. This vulnerability is associated with program file lib/postgrex/notifications.ex and program routines 'Elixir.Postgrex.Notifications':listen/3, 'Elixir.Postgrex.Notifications':unlisten/3, 'Elixir.Postgrex.Notifications':handle_connect/1. This issue affects postgrex: from 0.16.0 before 0.22.2, from pkg:github/elixir-ecto/postgrex@266b530faf9bde094e31e0e4ab851f933fadc0f5 before 0.22.2.
CVE-2026-40361 1 Microsoft 7 365 Apps, Office 2019, Office 2021 and 4 more 2026-05-12 8.4 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2026-40374 1 Microsoft 1 Power Automate For Desktop 2026-05-12 6.5 Medium
Exposure of sensitive information to an unauthorized actor in Power Automate allows an authorized attacker to disclose information over a network.
CVE-2026-41712 1 Vmware 1 Spring Ai 2026-05-12 7.5 High
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
CVE-2026-41713 1 Vmware 1 Spring Ai 2026-05-12 8.2 High
A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior across conversation turns.
CVE-2026-8109 1 Ivanti 1 Endpoint Manager 2026-05-12 6.5 Medium
An exposed dangerous method on the Core Server of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to leak access credentials.
CVE-2026-8110 1 Ivanti 1 Endpoint Manager 2026-05-12 7.8 High
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
CVE-2026-8111 1 Ivanti 1 Endpoint Manager 2026-05-12 8.8 High
SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.
CVE-2026-35436 1 Microsoft 4 365 Apps, Office 2019, Office 2021 and 1 more 2026-05-12 8.8 High
Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-34663 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-12 5.5 Medium
Illustrator versions 29.8.6, 30.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to disclose sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-40420 1 Microsoft 4 365 Apps, Office 2019, Office 2021 and 1 more 2026-05-12 8.8 High
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-41613 1 Microsoft 1 Visual Studio Code 2026-05-12 8.8 High
Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network.
CVE-2026-5061 1 Hashicorp 1 Consul Template 2026-05-12 4.7 Medium
The consul-template library before version 0.42.0 is vulnerable to a sandbox path bypass in the file template helper that may allow reading an out-of-sandbox file. This vulnerability (CVE-2026-5061) is fixed in consul-template 0.42.0.
CVE-2025-12659 1 Siemens 1 Simcenter Femap 2026-05-12 N/A
The affected applications contains a memory corruption vulnerability while parsing specially crafted IPT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-27349, ZDI-CAN-27389)
CVE-2026-1185 1 Axis Communications Ab 1 Axis Os 2026-05-12 5.4 Medium
A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH.
CVE-2026-0541 1 Axis Communications Ab 1 Axis Os 2026-05-12 6.7 Medium
ACAP applications can gain elevated privileges due to improper input validation during the installation process, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE-2026-0804 1 Axis Communications Ab 1 Axis Os 2026-05-12 6.7 Medium
An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE-2026-45215 2 Saad Iqbal, Wordpress 2 Wp Easypay, Wordpress 2026-05-12 5.3 Medium
Insertion of Sensitive Information Into Sent Data vulnerability in Saad Iqbal WP EasyPay wp-easy-pay allows Retrieve Embedded Sensitive Data.This issue affects WP EasyPay: from n/a through <= 4.3.0.
CVE-2025-40833 2026-05-12 7.5 High
The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.