Newest CVEs

IDDescriptionSeverity
CVE-2025-70956A State Pollution vulnerability was discovered in the TON Virtual Machine (TVM) before v2025.04. The issue exists in the RUNVM instruction logic (VmState::run_child_vm), which is responsible for initializing child virtual machines. The operation moves critical resources (specifically libraries and log) from the parent state to a new child state in a non-atomic manner. If an Out-of-Gas (OOG) exception occurs after resources are moved but before the state transition is finalized, the parent VM retains a corrupted state where these resources are emptied/invalid. Because RUNVM supports gas isolation, the parent VM continues execution with this corrupted state, leading to unexpected behavior or denial of service within the contract's context.
high
CVE-2025-70955A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) before v2024.10. The vulnerability stems from the improper handling of vmstate and continuation jump instructions, which allow for continuous dynamic tail calls. An attacker can exploit this by crafting a smart contract with deeply nested jump logic. Even within permissible gas limits, this nested execution exhausts the host process's stack space, causing the validator node to crash. This results in a Denial of Service (DoS) for the TON blockchain network.
high
CVE-2025-70954A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network.
high
CVE-2025-70866LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and user authentication guards share the same user provider without role-based access control verification.
high
CVE-2025-69633A SQL Injection vulnerability in the Advanced Popup Creator (advancedpopupcreator) module for PrestaShop 1.1.26 through 1.2.6 (Fixed in version 1.2.7) allows remote unauthenticated attackers to execute arbitrary SQL queries via the fromController parameter in the popup controller. The parameter is passed unsanitized to SQL queries in classes/AdvancedPopup.php (getPopups() and updateVisits() functions).
critical
CVE-2025-15157The Starfish Review Generation & Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'srm_restore_options_defaults' function in all versions up to, and including, 3.1.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
high
CVE-2026-26335Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.
critical
CVE-2026-26334Calero VeraSMART versions prior to 2026 R1 contain hardcoded static AES encryption keys within Veramark.Framework.dll (Veramark.Core.Config class). These keys are used to encrypt the password of the service account stored in C:\\VeraSMART Data\\app.settings. An attacker with local access to the system can extract the hardcoded keys from the Veramark.Framework.dll module and decrypt the stored credentials. The recovered credentials can then be used to authenticate to the Windows host, potentially resulting in local privilege escalation depending on the privileges of the configured service account.
high
CVE-2026-26333Calero VeraSMART versions prior to 2022 R1 expose an unauthenticated .NET Remoting HTTP service on TCP port 8001. The service publishes default ObjectURIs (including EndeavorServer.rem and RemoteFileReceiver.rem) and permits the use of SOAP and binary formatters with TypeFilterLevel set to Full. An unauthenticated remote attacker can invoke the exposed remoting endpoints to perform arbitrary file read and write operations via the WebClient class. This allows retrieval of sensitive files such as WebRoot\\web.config, which may disclose IIS machineKey validation and decryption keys. An attacker can use these keys to generate a malicious ASP.NET ViewState payload and achieve remote code execution within the IIS application context. Additionally, supplying a UNC path can trigger outbound SMB authentication from the service account, potentially exposing NTLMv2 hashes for relay or offline cracking.
critical
CVE-2025-68128Rejected reason: reserved but not needed
No Score
CVE-2025-68127Rejected reason: reserved but not needed
No Score
CVE-2025-68126Rejected reason: reserved but not needed
No Score
CVE-2025-68125Rejected reason: reserved but not needed
No Score
CVE-2025-68124Rejected reason: reserved but not needed
No Score
CVE-2025-58184Rejected reason: reserved but not needed
No Score
CVE-2025-58182Rejected reason: reserved but not needed
No Score
CVE-2025-47915Rejected reason: reserved but not needed
No Score
CVE-2024-34157Rejected reason: reserved but not needed
No Score
CVE-2024-34154Rejected reason: reserved but not needed
No Score
CVE-2023-45291Rejected reason: reserved but not needed
No Score
CVE-2026-26269Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
high
CVE-2026-26264BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.5.0rc4 and 1.4.3rc2, a malformed WriteProperty request can trigger a length underflow in the BACnet stack, leading to an out‑of‑bounds read and a crash (DoS). The issue is in wp.c within wp_decode_service_request. When decoding the optional priority context tag, the code passes apdu_len - apdu_size to bacnet_unsigned_context_decode without validating that apdu_size <= apdu_len. If a truncated APDU reaches this path, apdu_len - apdu_size underflows, resulting in a large size being used for decoding and an out‑of‑bounds read. This vulnerability is fixed in 1.5.0rc4 and 1.4.3rc2.
high
CVE-2026-2441Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
high
CVE-2026-26208ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.
high
CVE-2026-26190Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.
critical
CVE-2026-26187lakeFS is an open-source tool that transforms object storage into a Git-like repositories. Prior to 1.77.0, the local block adapter (pkg/block/local/adapter.go) allows authenticated users to read and write files outside their designated storage boundaries. The verifyRelPath function used strings.HasPrefix() to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names. Also, the adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces. Fixed in version v1.77.0.
high
CVE-2026-25991Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, there is a Blind Server-Side Request Forgery (SSRF) vulnerability in the Cookmate recipe import feature of Tandoor Recipes. The application fails to validate the destination URL after following HTTP redirects, allowing any authenticated user (including standard users without administrative privileges) to force the server to connect to arbitrary internal or external resources. The vulnerability lies in cookbook/integration/cookmate.py, within the Cookmate integration class. This vulnerability can be leveraged to scan internal network ports, access cloud instance metadata (e.g., AWS/GCP Metadata Service), or disclose the server's real IP address. This vulnerability is fixed in 2.5.1.
high
CVE-2026-25964Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.5.1, a Path Traversal vulnerability in the RecipeImport workflow of Tandoor Recipes allows authenticated users with import permissions to read arbitrary files on the server. This vulnerability stems from a lack of input validation in the file_path parameter and insufficient checks in the Local storage backend, enabling an attacker to bypass storage directory restrictions and access sensitive system files (e.g., /etc/passwd) or application configuration files (e.g., settings.py), potentially leading to full system compromise. This vulnerability is fixed in 2.5.1.
medium
CVE-2026-21878BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.5.0.rc3, a vulnerability has been discovered in BACnet Stack's file writing functionality where there is no validation of user-provided file paths, allowing attackers to write files to arbitrary directories. This affects apps/readfile/main.c and ports/posix/bacfile-posix.c. This vulnerability is fixed in 1.5.0.rc3.
high
CVE-2025-36552Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36545Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36542Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36538Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36534Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36532Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36526Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36524Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36523Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36517Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35997Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35993Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35976Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35962Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35961Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35960Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32734Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32733Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32090Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32085Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32082Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score