Logo
ShellCodeX
Tools • Events • News • Insights

🛡️ CVEs

All cybersecurity CVEs in one place.

100 results
MEDIUM

CVE-2013-20005

Published: 2026-03-16 Unknown Vendor
6.9

Qool CMS 2.0 RC2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious web pages. Attackers can forge POST requests to the /admin/adduser endpoint with parameters like username, password, email, and level to create root-level user accounts without user consent.

Exploitability
Impact
CWE-79
HIGH

CVE-2013-20006

Published: 2026-03-16 Unknown Vendor
8.7

Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users. Attackers can inject malicious JavaScript code through parameters like 'title', 'name', 'email', 'username', 'link', and 'task' in endpoints such as addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem to execute arbitrary scripts in administrator browsers.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2015-20113

Published: 2026-03-16 Exploit
6.9

Next Click Ventures RealtyScript 4.0.2 contains cross-site request forgery and persistent cross-site scripting vulnerabilities that allow attackers to perform administrative actions and inject malicious scripts. Attackers can craft malicious web pages that execute unauthorized actions when logged-in users visit them, or inject persistent scripts that execute in the application context.

Exploitability
Impact
CWE-352
MEDIUM

CVE-2015-20114

Published: 2026-03-16 Exploit
5.1

Next Click Ventures RealtyScript 4.0.2 contains a cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious input through multiple parameters that are not properly sanitized. Attackers can craft requests with injected script payloads in vulnerable parameters to execute code in users' browser sessions within the context of the affected application.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2015-20115

Published: 2026-03-16 Exploit
5.1

Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize file uploads, allowing attackers to store malicious scripts through the file POST parameter in admin/tools.php. Attackers can upload files containing JavaScript code that executes in the context of admin/tools.php when accessed by other users.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2015-20116

Published: 2026-03-16 Exploit
5.1

Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize CSV file uploads, allowing attackers to inject malicious scripts through filename parameters in multipart form data. Attackers can upload files with XSS payloads in the filename field to execute arbitrary JavaScript in users' browsers when the file is processed or displayed.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2015-20117

Published: 2026-03-16 Exploit
6.9

Next Click Ventures RealtyScript 4.0.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create unauthorized user accounts and administrative users by crafting malicious forms. Attackers can submit hidden form data to /admin/addusers.php and /admin/editadmins.php endpoints to register new users with arbitrary credentials and escalate privileges to SUPERUSER level.

Exploitability
Impact
CWE-352
MEDIUM

CVE-2015-20118

Published: 2026-03-16 Exploit
5.1

Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2015-20119

Published: 2026-03-16 Exploit
5.1

Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious HTML and iframe elements through the text parameter in the pages.php admin interface. Attackers can submit POST requests to the add page action with crafted iframe payloads in the text parameter to store malicious content that executes in the browsers of users viewing the affected pages.

Exploitability
Impact
CWE-79
HIGH

CVE-2015-20120

Published: 2026-03-16 Exploit
8.8

Next Click Ventures RealtyScript 4.0.2 contains multiple time-based blind SQL injection vulnerabilities that allow unauthenticated attackers to extract database information by injecting SQL code into application parameters. Attackers can craft requests with time-delay payloads to infer database contents character by character based on response timing differences.

Exploitability
Impact
CWE-89
HIGH

CVE-2015-20121

Published: 2026-03-16 Exploit
8.8

Next Click Ventures RealtyScript 4.0.2 contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting arbitrary SQL code through the GET parameter 'u_id' in /admin/users.php and the POST parameter 'agent[]' in /admin/mailer.php. Attackers can exploit time-based blind SQL injection techniques to extract sensitive database information or cause denial of service through sleep-based payloads.

Exploitability
Impact
CWE-89
CRITICAL

CVE-2016-20024

Published: 2026-03-16 Unknown Vendor
9.3

ZKTeco ZKTime.Net 3.0.1.6 contains an insecure file permissions vulnerability that allows unprivileged users to escalate privileges by modifying executable files. Attackers can exploit world-writable permissions on the ZKTimeNet3.0 directory and its contents to replace executable files with malicious binaries for privilege escalation.

Exploitability
Impact
CWE-538
HIGH

CVE-2016-20025

Published: 2026-03-16 Unknown Vendor
8.7

ZKTeco ZKAccess Professional 3.5.3 contains an insecure file permissions vulnerability that allows authenticated users to escalate privileges by modifying executable files. Attackers can leverage the Modify permission granted to the Authenticated Users group to replace executable binaries with malicious code for privilege escalation.

Exploitability
Impact
CWE-552
CRITICAL

CVE-2016-20026

Published: 2026-03-16 Unknown Vendor
9.3

ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache Tomcat server that allow unauthenticated attackers to access the manager application. Attackers can authenticate with hardcoded credentials stored in tomcat-users.xml to upload malicious WAR archives containing JSP applications and execute arbitrary code with SYSTEM privileges.

Exploitability
Impact
CWE-798
MEDIUM

CVE-2016-20027

Published: 2026-03-16 Unknown Vendor
5.1

ZKTeco ZKBioSecurity 3.0 contains multiple reflected cross-site scripting vulnerabilities that allow attackers to execute arbitrary HTML and script code by injecting malicious payloads through unsanitized parameters in multiple scripts. Attackers can craft malicious URLs with XSS payloads in vulnerable parameters to execute scripts in a user's browser session within the context of the affected application.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2016-20028

Published: 2026-03-16 Unknown Vendor
5.3

ZKTeco ZKBioSecurity 3.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious websites. Attackers can craft HTTP requests that add superadmin accounts without validity checks, enabling unauthorized administrative access when authenticated users visit attacker-controlled pages.

Exploitability
Impact
CWE-352
MEDIUM

CVE-2016-20029

Published: 2026-03-16 Unknown Vendor
6.9

ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers to access arbitrary files by modifying file paths used to retrieve local resources. Attackers can manipulate path parameters to bypass access controls and retrieve sensitive information including configuration files, source code, and protected application resources.

Exploitability
Impact
CWE-276
CRITICAL

CVE-2016-20030

Published: 2026-03-16 Unknown Vendor
9.3

ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows unauthenticated attackers to discover valid usernames by submitting partial characters via the username parameter. Attackers can send requests to the authLoginAction!login.do script with varying username inputs to enumerate valid user accounts based on application responses.

Exploitability
Impact
CWE-551
MEDIUM

CVE-2016-20031

Published: 2026-03-16 Unknown Vendor
6.8

ZKTeco ZKBioSecurity 3.0 contains a local authorization bypass vulnerability in visLogin.jsp that allows attackers to authenticate without valid credentials by spoofing localhost requests. Attackers can exploit the EnvironmentUtil.getClientIp() method which treats IPv6 loopback address 0:0:0:0:0:0:0:1 as 127.0.0.1 and authenticates using the IP as username with hardcoded password 123456 to access sensitive information and perform unauthorized actions.

Exploitability
Impact
CWE-798
MEDIUM

CVE-2016-20032

Published: 2026-03-16 Unknown Vendor
5.1

ZKTeco ZKAccess Security System 5.3.1 contains a stored cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads through the 'holiday_name' and 'memo' POST parameters. Attackers can submit crafted requests with script code in these parameters to compromise user browser sessions and steal sensitive information.

Exploitability
Impact
CWE-79
HIGH

CVE-2016-20033

Published: 2026-03-16 Exploit
8.5

Wowza Streaming Engine 4.5.0 contains a local privilege escalation vulnerability that allows authenticated users to escalate privileges by replacing executable files due to improper file permissions granting full access to the Everyone group. Attackers can replace the nssm_x64.exe binary in the manager and engine service directories with malicious executables to execute code with LocalSystem privileges when services restart.

Exploitability
Impact
CWE-639
HIGH

CVE-2016-20034

Published: 2026-03-16 Exploit
8.7

Wowza Streaming Engine 4.5.0 contains a privilege escalation vulnerability that allows authenticated read-only users to elevate privileges to administrator by manipulating POST parameters. Attackers can send POST requests to the user edit endpoint with accessLevel set to 'admin' and advUser parameters set to 'true' and 'on' to gain administrative access.

Exploitability
Impact
CWE-352
MEDIUM

CVE-2016-20035

Published: 2026-03-16 Exploit
6.9

Wowza Streaming Engine 4.5.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by crafting malicious web pages. Attackers can trick logged-in administrators into visiting a malicious site that submits POST requests to the user edit endpoint to create new admin accounts with arbitrary credentials.

Exploitability
Impact
CWE-352
MEDIUM

CVE-2016-20036

Published: 2026-03-16 Exploit
5.1

Wowza Streaming Engine 4.5.0 contains multiple reflected cross-site scripting vulnerabilities in the enginemanager interface where input passed through various parameters is not properly sanitized before being returned to users. Attackers can inject malicious script code through parameters like appName, vhost, uiAppType, and wowzaCloudDestinationType in multiple endpoints to execute arbitrary HTML and JavaScript in a user's browser session.

Exploitability
Impact
CWE-79
HIGH

CVE-2017-20217

Published: 2026-03-16 Unknown Vendor
8.7

Serviio PRO 1.8 contains an information disclosure vulnerability due to improper access control enforcement in the Configuration REST API that allows unauthenticated attackers to access sensitive information. Remote attackers can send specially crafted requests to the REST API endpoints to retrieve potentially sensitive configuration data without authentication.

Exploitability
Impact
CWE-306
HIGH

CVE-2017-20218

Published: 2026-03-16 Unknown Vendor
8.5

Serviio PRO 1.8 contains an unquoted search path vulnerability in the Windows service that allows local users to execute arbitrary code with elevated privileges by placing malicious executables in the system root path. Additionally, improper directory permissions with full access for the Users group allow authenticated users to replace the executable file with arbitrary binaries, enabling privilege escalation during service startup or system reboot.

Exploitability
Impact
CWE-428
MEDIUM

CVE-2017-20219

Published: 2026-03-16 Unknown Vendor
5.1

Serviio PRO 1.8 DLNA Media Streaming Server contains a DOM-based cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads. Attackers can craft URLs with malicious input that is read from document.location and passed to document.write() in the mediabrowser component to execute code in a user's browser context.

Exploitability
Impact
CWE-79
HIGH

CVE-2017-20220

Published: 2026-03-16 Unknown Vendor
8.7

Serviio PRO 1.8 contains an improper access control vulnerability in the Configuration REST API that allows unauthenticated attackers to change the mediabrowser login password. Attackers can send specially crafted requests to the REST API endpoints to modify credentials without authentication.

Exploitability
Impact
CWE-306
MEDIUM

CVE-2017-20221

Published: 2026-03-16 Unknown Vendor
5.3

Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains a cross-site request forgery vulnerability that allows authenticated attackers to execute arbitrary system commands by exploiting missing request validation. Attackers can craft malicious web pages that perform administrative actions when visited by logged-in users, enabling command execution with router privileges.

Exploitability
Impact
CWE-352
HIGH

CVE-2017-20222

Published: 2026-03-16 Unknown Vendor
8.7

Telesquare SKT LTE Router SDT-CS3B1 software version 1.2.0 contains an unauthenticated remote reboot vulnerability that allows attackers to trigger device reboot without authentication. Attackers can send POST requests to the lte.cgi endpoint with the Command=Reboot parameter to cause denial of service by forcing the router to restart.

Exploitability
Impact
CWE-306
CRITICAL

CVE-2017-20223

Published: 2026-03-16 Unknown Vendor
9.3

Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization and access resources by manipulating user-supplied input parameters. Attackers can directly reference objects in the system to retrieve sensitive information and access functionalities without proper access controls.

Exploitability
Impact
CWE-639
CRITICAL

CVE-2017-20224

Published: 2026-03-16 Unknown Vendor
9.3

Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious content by exploiting enabled WebDAV HTTP methods. Attackers can use PUT, DELETE, MKCOL, MOVE, COPY, and PROPPATCH methods to upload executable code, delete files, or manipulate server content for remote code execution or denial of service.

Exploitability
Impact
CWE-434
MEDIUM

CVE-2025-10461

Published: 2026-03-16 Unknown Vendor
5.3

Global file reads caused by improper URL checks in webserver in Softing Industrial Automation GmbH smartLinks on docker (filesystem modules) allows file access. This issue affects smartLink SW-HT: through 1.42 smartLink SW-PN: through 1.03.

Exploitability
Impact
CWE-20
HIGH

CVE-2025-10685

Published: 2026-03-16 Unknown Vendor
7.7

Heap-based buffer overflow vulnerability in Softing Industrial Automation GmbH smartLink SW-PN and smartLink SW-HT (Webserver modules) allows overflow buffers.This issue affects: smartLink SW-PN: through 1.03 smartLink SW-HT: through 1.42

Exploitability
Impact
CWE-122
HIGH

CVE-2025-11500

Published: 2026-03-16 Unknown Vendor
8.7

Tinycontrol devices such as tcPDU and LAN Controllers LK3.5, LK3.9 and LK4 have two separate authentication mechanisms - one solely for interface management and one for protecting all other server resources. When the latter is turned off (which is a default setting), an unauthenticated attacker on the local network can obtain usernames and encoded passwords for interface management portal by inspecting the HTTP response of the server when visiting the login page, which contains a JSON file with these details. Both normal and admin users credentials are exposed.  This issue has been fixed in firmware versions: 1.36 (for tcPDU), 1.67 (for LK3.5 - hardware versions: 3.5, 3.6, 3.7 and 3.8), 1.75 (for LK3.9 - hardware version 3.9) and 1.38 (for LK4 - hardware version 4.0).

Exploitability
Impact
CWE-201 CWE-261
MEDIUM

CVE-2025-12736

Published: 2026-03-16 Vendor Advisory
6.5

in OpenHarmony v5.0.3 and prior versions allow a local attacker case sensitive information leak through use of uninitialized resource.

Exploitability
Impact
CWE-908
MEDIUM

CVE-2025-13212

Published: 2026-03-16 Vendor Advisory
5.3

IBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated user to cause a denial of service in the email service due to improper control of interaction frequency.

Exploitability
Impact
CWE-799
LOW

CVE-2025-13459

Published: 2026-03-16 Vendor Advisory
2.7

IBM Aspera Console 3.3.0 through 3.4.8 could allow a privileged user to cause a denial of service due to improper enforcement of behavioral workflow.

Exploitability
Impact
CWE-841
MEDIUM

CVE-2025-13460

Published: 2026-03-16 Vendor Advisory
5.3

IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate usernames due to an observable response discrepancy.

Exploitability
Impact
CWE-204
N/A

CVE-2025-14287

Published: 2026-03-16 Unknown Vendor

A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names into shell commands without proper sanitization, which are then executed using `os.system()`. This allows attackers to execute arbitrary commands by supplying malicious input through the `--container` parameter of the CLI. The issue affects environments where MLflow is used, including development setups, CI/CD pipelines, and cloud deployments.

Exploitability
Impact
CWE-94
N/A

CVE-2025-15060

Published: 2026-03-16 Unknown Vendor

claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of claude-hovercraft. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the executeClaudeCode method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27785.

Exploitability
Impact
CWE-78
HIGH

CVE-2025-15540

Published: 2026-03-16 Third Party Advisory
8.6

"Functions" module in Raytha CMS allows privileged users to write custom code to add functionality to application. Due to a lack of sandboxing or access restrictions, JavaScript code executed through Raytha’s “functions” feature can instantiate .NET components and perform arbitrary operations within the application’s hosting environment. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-94
MEDIUM

CVE-2025-15552

Published: 2026-03-16 Unknown Vendor
6.0

Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Exploitability
Impact
CWE-613
MEDIUM

CVE-2025-15553

Published: 2026-03-16 Unknown Vendor
6.0

Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password.

Exploitability
Impact
CWE-613
MEDIUM

CVE-2025-15554

Published: 2026-03-16 Third Party Advisory
6.0

Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords.

Exploitability
Impact
CWE-525
HIGH

CVE-2025-15587

Published: 2026-03-16 Unknown Vendor
8.6

Tinycontrol devices such as tcPDU and LAN Controllers LK3.5, LK3.9 and LK4 allow a low privileged user to read an administrator's password by directly accessing a specific resource inaccessible via a graphical interface. This issue has been fixed in firmware versions: 1.36 (for tcPDU), 1.67 (for LK3.5 - hardware versions: 3.5, 3.6, 3.7 and 3.8), 1.75 (for LK3.9 - hardware version 3.9) and 1.38 (for LK4 - hardware version 4.0).

Exploitability
Impact
CWE-425
MEDIUM

CVE-2025-25277

Published: 2026-03-16 Vendor Advisory
6.3

in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through using incompatible type. This vulnerability can be exploited only in restricted scenarios.

Exploitability
Impact
CWE-843
LOW

CVE-2025-26474

Published: 2026-03-16 Vendor Advisory
3.3

in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information improper input. This vulnerability can be exploited only in restricted scenarios.

Exploitability
Impact
CWE-20
MEDIUM

CVE-2025-41432

Published: 2026-03-16 Vendor Advisory
5.5

in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.

Exploitability
Impact
CWE-787
MEDIUM

CVE-2025-52458

Published: 2026-03-16 Vendor Advisory
5.5

in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.

Exploitability
Impact
CWE-787
MEDIUM

CVE-2025-52637

Published: 2026-03-16 Vendor Advisory
4.5

HCL AION is affected by a vulnerability where certain offering configurations may permit execution of potentially harmful SQL queries. Improper validation or restrictions on query execution could expose the system to unintended database interactions or limited information exposure under specific conditions.

Exploitability
Impact
CWE-89
MEDIUM

CVE-2025-52638

Published: 2026-03-16 Vendor Advisory
5.6

HCL AION is affected by a vulnerability where generated containers may execute binaries with root-level privileges. Running containers with root privileges may increase the potential security risk, as it grants elevated permissions within the container environment. Aligning container configurations with security best practices requires minimizing privileges and avoiding root-level execution wherever possible.

Exploitability
Impact
CWE-345
MEDIUM

CVE-2025-52648

Published: 2026-03-16 Vendor Advisory
4.8

HCL AION is affected by a vulnerability where offering images are not digitally signed. Lack of image signing may allow the use of unverified or tampered images, potentially leading to security risks such as integrity compromise or unintended behavior in the system

Exploitability
Impact
CWE-347
HIGH

CVE-2025-54920

Published: 2026-03-16 Issue Tracking
8.8

This issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue. Summary Apache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an attacker with access to the Spark event logs directory to inject malicious JSON payloads that trigger deserialization of arbitrary classes, enabling command execution on the host running the Spark History Server. Details The vulnerability arises because the Spark History Server uses Jackson polymorphic deserialization with @JsonTypeInfo.Id.CLASS on SparkListenerEvent objects, allowing an attacker to specify arbitrary class names in the event JSON. This behavior permits instantiating unintended classes, such as org.apache.hive.jdbc.HiveConnection, which can perform network calls or other malicious actions during deserialization. The attacker can exploit this by injecting crafted JSON content into the Spark event log files, which the History Server then deserializes on startup or when loading event logs. For example, the attacker can force the History Server to open a JDBC connection to a remote attacker-controlled server, demonstrating remote command injection capability. Proof of Concept: 1. Run Spark with event logging enabled, writing to a writable directory (spark-logs). 2. Inject the following JSON at the beginning of an event log file: { "Event": "org.apache.hive.jdbc.HiveConnection", "uri": "jdbc:hive2://<IP>:<PORT>/", "info": { "hive.metastore.uris": "thrift://<IP>:<PORT>" } } 3. Start the Spark History Server with logs pointing to the modified directory. 4. The Spark History Server initiates a JDBC connection to the attacker’s server, confirming the injection. Impact An attacker with write access to Spark event logs can execute arbitrary code on the server running the History Server, potentially compromising the entire system.

Exploitability
Impact
CWE-502
MEDIUM

CVE-2025-69236

Published: 2026-03-16 Third Party Advisory
5.1

Raytha CMS is vulnerable to Stored XSS via FieldValues[1].Value parameter in post editing functionality. Authenticated attacker with permissions to edit posts can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2025-69237

Published: 2026-03-16 Third Party Advisory
5.1

Raytha CMS is vulnerable to Stored XSS via FieldValues[0].Value parameter in page creation functionality. Authenticated attacker with permissions to create content can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2025-69238

Published: 2026-03-16 Third Party Advisory
6.9

Raytha CMS is vulnerable to Cross-Site Request Forgery across multiple endpoints. Attacker can craft special website, which when visited by the authenticated victim, will automatically send POST request to the endpoint (e. x. deletion of the data) without enforcing token verification.  This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-352
MEDIUM

CVE-2025-69239

Published: 2026-03-16 Third Party Advisory
5.1

Raytha CMS is vulnerable to Server-Side Request Forgery in the “Themes - Import from URL” feature. It allows an attacker with high privileges to provide the URL for redirecting server-side HTTP request. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-918
HIGH

CVE-2025-69240

Published: 2026-03-16 Third Party Advisory
7.5

Raytha CMS allows an attacker to spoof `X-Forwarded-Host` or `Host` headers to attacker controlled domain. The attacker (who knows the victim's email address) can force the server to send an email with password reset link pointing to the domain from spoofed header. When victim clicks the link, browser sends request to the attacker’s domain with the token in the path allowing the attacker to capture the token. This allows the attacker to reset victim's password and take over the victim's account. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-348
MEDIUM

CVE-2025-69241

Published: 2026-03-16 Third Party Advisory
5.3

Raytha CMS is vulnerable to Stored XSS via FirstName and LastName parameters in profile editing functionality. Authenticated attacker can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2025-69242

Published: 2026-03-16 Third Party Advisory
5.1

Raytha CMS is vulnerable to reflected XSS via the backToListUrl parameter. An attacker can craft a malicious URL which, when opened by authenticated victim, results in arbitrary JavaScript execution in the victim’s browser. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2025-69243

Published: 2026-03-16 Third Party Advisory
6.9

Raytha CMS is vulnerable to User Enumeration in password reset functionality. Difference in messages could allow an attacker to determine if the login is valid or not, enabling a brute force attack with valid logins. This issue was fixed in version 1.5.0.

Exploitability
Impact
CWE-204
MEDIUM

CVE-2025-69245

Published: 2026-03-16 Third Party Advisory
5.1

Raytha CMS is vulnerable to Reflected XSS via returnUrl parameter in logon functionality. An attacker can craft a malicious URL which, when opened by the authenticated victim, results in arbitrary JavaScript execution in the victim’s browser. This issue was fixed in 1.4.6.

Exploitability
Impact
CWE-79
MEDIUM

CVE-2025-69246

Published: 2026-03-16 Third Party Advisory
6.9

Raytha CMS does not have any brute force protection mechanism implemented. It allows an attacker to send multiple automated logon requests without triggering lockout, throttling, or step-up challenges. This issue was fixed in version 1.4.6.

Exploitability
Impact
CWE-307
MEDIUM

CVE-2025-6969

Published: 2026-03-16 Vendor Advisory
5.0

in OpenHarmony v5.1.0 and prior versions allow a local attacker cause DOS through improper input.

Exploitability
Impact
CWE-20
LOW

CVE-2025-71264

Published: 2026-03-16 Mailing List
3.7

Mumble before 1.6.870 is prone to an out-of-bounds array access, which may result in denial of service (client crash).

Exploitability
Impact
CWE-125
MEDIUM

CVE-2026-0385

Published: 2026-03-16 Vendor Advisory
5.0

Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

Exploitability
Impact
CWE-451 CWE-290
LOW

CVE-2026-0639

Published: 2026-03-16 Vendor Advisory
3.3

in OpenHarmony v6.0 and prior versions allow a local attacker case DOS through missing release of memory.

Exploitability
Impact
CWE-401
LOW

CVE-2026-0849

Published: 2026-03-16 Exploit
3.8

Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.

Exploitability
Impact
CWE-120
MEDIUM

CVE-2026-0977

Published: 2026-03-16 Vendor Advisory
5.1

IBM CICS Transaction Gateway for Multiplatforms 9.3 and 10.1 could allow a user to transfer or view files due to improper access controls.

Exploitability
Impact
CWE-284 NVD-CWE-Other
MEDIUM

CVE-2026-1870

Published: 2026-03-16 Unknown Vendor
5.3

The Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing validation checks on the 'thim-ekit/archive-course/get-courses' REST endpoint callback function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to disclose private or draft LearnPress course content by supplying post_status in the params_url payload.

Exploitability
Impact
CWE-862
MEDIUM

CVE-2026-1883

Published: 2026-03-16 Unknown Vendor
4.3

The Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the delete_folders() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders created by other users.

Exploitability
Impact
CWE-639
HIGH

CVE-2026-1947

Published: 2026-03-16 Unknown Vendor
7.5

The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 9.1.9 via the submit_nex_form() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to to overwrite arbitrary form entries via the 'nf_set_entry_update_id' parameter.

Exploitability
Impact
CWE-639
MEDIUM

CVE-2026-1948

Published: 2026-03-16 Unknown Vendor
4.3

The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_license() function in all versions up to, and including, 9.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to to deactivate the plugin license.

Exploitability
Impact
CWE-862
MEDIUM

CVE-2026-20988

Published: 2026-03-16 Vendor Advisory
6.8

Improper verification of intent by broadcast receiver in Settings prior to SMR Mar-2026 Release 1 allows local attacker to launch arbitrary activity with Settings privilege. User interaction is required for triggering this vulnerability.

Exploitability
Impact
NVD-CWE-Other
MEDIUM

CVE-2026-20989

Published: 2026-03-16 Vendor Advisory
5.1

Improper verification of cryptographic signature in Font Settings prior to SMR Mar-2026 Release 1 allows physical attackers to use custom font.

Exploitability
Impact
CWE-347
HIGH

CVE-2026-20990

Published: 2026-03-16 Vendor Advisory
8.4

Improper export of android application components in Secure Folder prior to SMR Mar-2026 Release 1 allows local attackers to launch arbitrary activity with Secure Folder privilege.

Exploitability
Impact
NVD-CWE-Other
MEDIUM

CVE-2026-20991

Published: 2026-03-16 Vendor Advisory
6.7

Improper privilege management in ThemeManager prior to SMR Mar-2026 Release 1 allows local privileged attackers to reuse trial contents.

Exploitability
Impact
NVD-CWE-noinfo
MEDIUM

CVE-2026-20992

Published: 2026-03-16 Vendor Advisory
4.8

Improper authorization in Settings prior to SMR Mar-2026 Release 1 allows local attacker to disable configuring the background data usage of application.

Exploitability
Impact
CWE-863
MEDIUM

CVE-2026-20993

Published: 2026-03-16 Vendor Advisory
4.8

Improper export of android application components in Samsung Assistant prior to version 9.3.10.7 allows local attacker to access saved information.

Exploitability
Impact
NVD-CWE-Other
HIGH

CVE-2026-20994

Published: 2026-03-16 Unknown Vendor
7.0

URL redirection in Samsung Account prior to version 15.5.01.1 allows remote attackers to potentially get access token.

Exploitability
Impact
MEDIUM

CVE-2026-20995

Published: 2026-03-16 Vendor Advisory
5.3

Exposure of sensitive functionality to an unauthorized actor in Smart Switch prior to version 3.7.69.15 allows remote attackers to set a specific configuration.

Exploitability
Impact
CWE-306
HIGH

CVE-2026-20996

Published: 2026-03-16 Vendor Advisory
7.1

Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.69.15 allows remote attackers to configure a downgraded scheme for authentication.

Exploitability
Impact
CWE-327
MEDIUM

CVE-2026-20997

Published: 2026-03-16 Vendor Advisory
5.3

Improper verification of cryptographic signature in Smart Switch prior to version 3.7.69.15 allows remote attackers to potentially bypass authentication.

Exploitability
Impact
CWE-347
HIGH

CVE-2026-20998

Published: 2026-03-16 Vendor Advisory
7.1

Improper authentication in Smart Switch prior to version 3.7.69.15 allows remote attackers to bypass authentication.

Exploitability
Impact
NVD-CWE-noinfo
HIGH

CVE-2026-20999

Published: 2026-03-16 Vendor Advisory
7.1

Authentication bypass by replay in Smart Switch prior to version 3.7.69.15 allows remote attackers to trigger privileged functions.

Exploitability
Impact
CWE-294
HIGH

CVE-2026-21000

Published: 2026-03-16 Vendor Advisory
7.0

Improper access control in Galaxy Store prior to version 4.6.03.8 allows local attacker to create file with Galaxy Store privilege.

Exploitability
Impact
CWE-22
MEDIUM

CVE-2026-21001

Published: 2026-03-16 Vendor Advisory
5.9

Path traversal in Galaxy Store prior to version 4.6.03.8 allows local attacker to create file with Galaxy Store privilege.

Exploitability
Impact
CWE-22
MEDIUM

CVE-2026-21002

Published: 2026-03-16 Vendor Advisory
5.9

Improper verification of cryptographic signature in Galaxy Store prior to version 4.6.03.8 allows local attacker to install arbitrary application.

Exploitability
Impact
CWE-347
MEDIUM

CVE-2026-21004

Published: 2026-03-16 Vendor Advisory
6.9

Improper authentication in Smart Switch prior to version 3.7.69.15 allows adjacent attackers to trigger a denial of service.

Exploitability
Impact
CWE-287 NVD-CWE-noinfo
HIGH

CVE-2026-21005

Published: 2026-03-16 Vendor Advisory
7.1

Path traversal in Smart Switch prior to version 3.7.69.15 allows adjacent attackers to overwrite arbitrary files with Smart Switch privilege.

Exploitability
Impact
CWE-22
HIGH

CVE-2026-24458

Published: 2026-03-16 Vendor Advisory
7.5

Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly handle very long passwords, which allows an attacker to overload the server CPU and memory via executing login attempts with multi-megabyte passwords. Mattermost Advisory ID: MMSA-2026-00587

Exploitability
Impact
CWE-770
HIGH

CVE-2026-25083

Published: 2026-03-16 Unknown Vendor
8.7

GROWI OpenAI thread/message API endpoints do not perform authorization. Affected are v7.4.5 and earlier versions. A logged-in user who knows a shared AI assistant's identifier may view and/or tamper the other user's threads/messages.

Exploitability
Impact
CWE-862
MEDIUM

CVE-2026-25780

Published: 2026-03-16 Vendor Advisory
4.3

Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to bound memory allocation when processing DOC files which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted DOC file.. Mattermost Advisory ID: MMSA-2026-00581

Exploitability
Impact
CWE-789
MEDIUM

CVE-2026-25783

Published: 2026-03-16 Vendor Advisory
4.3

Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate User-Agent header tokens which allows an authenticated attacker to cause a request panic via a specially crafted User-Agent header. Mattermost Advisory ID: MMSA-2026-00586

Exploitability
Impact
CWE-1287
HIGH

CVE-2026-26133

Published: 2026-03-16 Vendor Advisory
7.1

AI command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Exploitability
Impact
CWE-77 CWE-77
MEDIUM

CVE-2026-26246

Published: 2026-03-16 Vendor Advisory
4.3

Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to bound memory allocation when processing PSD image files which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted PSD file. Mattermost Advisory ID: MMSA-2026-00572

Exploitability
Impact
CWE-789
HIGH

CVE-2026-28519

Published: 2026-03-16 Product
8.7

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.

Exploitability
Impact
CWE-122
HIGH

CVE-2026-28520

Published: 2026-03-16 Product
8.6

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.

Exploitability
Impact
CWE-193
HIGH

CVE-2026-28521

Published: 2026-03-16 Product
7.0

arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-bounds memory access that may result in information disclosure or a denial-of-service condition.

Exploitability
Impact
CWE-125