Search Results (5137 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-40020 2 Dovecot, Open-xchange 3 Dovecot, Dovecot, Ox Dovecot Pro 2026-05-18 3.1 Low
Attacker can use the IMAP SETACL command to inject the anyone permission to user's dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users. The impact is limited to being able to spam folders to other users, no unexpected access is gained. Install to fixed version. No publicly available exploits are known.
CVE-2026-33377 1 Grafana 1 Grafana 2026-05-18 7.1 High
An Editor can overwrite a dashboard not owned by them to acquire admin on that specific dashboard. The user must have write access to the dashboard to escalate privilege.
CVE-2026-37526 2 Automotivelinux, Linuxfoundation 2 App-framework-binder, Automotive Grade Linux 2026-05-18 7.8 High
AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without authentication via the abstract Unix socket @urn:AGL:afs:supervision:socket. The on_supervision_call function in src/afb-supervision.c dispatches all 8 commands without any credential verification. The abstract socket has no DAC protection, as acknowledged in the official CAUTION comment in src/afs-supervision.h. This allows a low-privileged local process to kill the daemon (DoS via Exit command), execute arbitrary API calls (via Do command), close arbitrary user sessions (via Sclose command), or leak the entire global configuration (via Config command). The vulnerability was introduced in commit b8c9d5de384efcfa53ebdb3f0053d7b3723777e1 on 2017-06-29.
CVE-2026-8586 1 Google 1 Chrome 2026-05-18 5.5 Medium
Inappropriate implementation in Chromoting in Google Chrome prior to 148.0.7778.168 allowed a local attacker to bypass discretionary access control via a malicious file. (Chromium security severity: Medium)
CVE-2026-8758 2 Metasoft, Metasoft 2 Metacrm, Metacrm 2026-05-18 7.3 High
A vulnerability was determined in Metasoft 美特软件 MetaCRM up to 6.4.0 Beta06. This impacts an unknown function of the file /common/jsp/upload3.jsp. Executing a manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2026-36738 1 U-speed 1 Ac1200 Gigabit Wi-fi Router 2026-05-17 6.8 Medium
U-SPEED AC1200 Gigabit Wi-Fi Router (Model: T18-21K) V1.0 is vulnerable to Incorrect Access Control. The device exposes a UART interface that lacks authentication, authorization, or access control mechanisms. An attacker with physical access to the UART pins can connect to the interface and gain unrestricted access to device functionality.
CVE-2025-67437 1 Medical Management System 1 Medical Management System 2026-05-17 6.5 Medium
Medical Management System a81df1ce700a9662cb136b27af47f4cbde64156b is vulnerable to Insecure Permissions, which allows arbitrary user password reset.
CVE-2025-0040 1 Amd 4 Ryzen 7040 Series Mobile Processors With Radeon Graphics, Ryzen 8000 Series Desktop Processors, Ryzen 8040 Series Mobile Processors With Radeon Graphics and 1 more 2026-05-17 N/A
Improper access control between the Joint Test Action Group (JTAG) and Advanced Extensible Interface (AXI) could allow an attacker with physical access to read or overwrite the contents of cross-chip debug (XCD) registers potentially resulting in loss of data integrity or confidentiality.
CVE-2026-41101 1 Microsoft 2 Word, Word For Android 2026-05-16 7.1 High
Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally.
CVE-2026-41100 1 Microsoft 3 365 Copilot, 365 Copilot Android, 365 Copilot Android 2026-05-16 4.4 Medium
Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally.
CVE-2026-44478 1 Hoppscotch 1 Hoppscotch 2026-05-15 7.5 High
hoppscotch is an open source API development ecosystem. The fix for CVE-2026-28215 in version 2026.2.0 addresses the unauthenticated POST /v1/onboarding/config endpoint by checking onboardingCompleted and canReRunOnboarding before allowing config overwrites. However, GET /v1/onboarding/config still leaks all infrastructure secrets in plaintext to unauthenticated users when the ONBOARDING_RECOVERY_TOKEN stored in the database is an empty string. This vulnerability is fixed in 2026.4.0.
CVE-2026-41086 1 Microsoft 2 Azure Portal Windows Admin Center, Windows Admin Center 2026-05-15 8.8 High
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
CVE-2026-44277 1 Fortinet 1 Fortiauthenticator 2026-05-15 9.1 Critical
A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via <insert attack vector here>
CVE-2026-44874 2 Arubanetworks, Hpe 2 Arubaos, Arubaos 2026-05-15 4.9 Medium
A vulnerability exists in the web-based management interface of an AOS-10 Gateway that could allow an authenticated remote attacker to access sensitive files on the underlying operating system. Successful exploitation of this vulnerability could result in the disclosure of confidential system information, potentially enabling further attacks against the affected device.
CVE-2024-36323 1 Amd 6 Instinct Mi300a, Instinct Mi300x, Instinct Mi308x and 3 more 2026-05-15 N/A
Improper isolation of VCN-JPEG HW register space could allow a malicious Guest Virtual Machine (VM) or a process to perform unauthorized access to the register space of the JPEG cores assigned a victim VM/process, potentially gaining arbitrary read/write access to the victim VM/process data.
CVE-2026-45392 1 Cribl 1 Cribl Stream 2026-05-15 9.8 Critical
Reserved. Details will be published at disclosure.
CVE-2026-44007 2 Patriksimek, Vm2 Project 2 Vm2, Vm2 2026-05-15 9.1 Critical
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is created with nesting: true, sandbox code can unconditionally require('vm2') regardless of the outer VM's require configuration — including require: false. With access to vm2, the sandbox constructs a new inner NodeVM with its own unrestricted require settings and executes arbitrary OS commands on the host. Any application that runs untrusted code inside a NodeVM with nesting: true is fully compromised. This vulnerability is fixed in 3.11.1.
CVE-2026-33381 1 Grafana 1 Grafana 2026-05-14 5.9 Medium
When a user's access to mint tokens for a service account is revoked, it is sometimes still possible to do so for a few seconds after the event. The user will eventually lose access to do this.
CVE-2026-32209 1 Microsoft 30 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 27 more 2026-05-14 4.4 Medium
Improper access control in Windows Filtering Platform (WFP) allows an authorized attacker to bypass a security feature locally.
CVE-2026-33834 1 Microsoft 30 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 27 more 2026-05-14 7.8 High
Improper access control in Windows Event Logging Service allows an authorized attacker to elevate privileges locally.