Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
9.8 CRITICAL
CVE-2018-25272 — ELBA5 5.8.0 Remote Code Execution via Database Access

ELBA5 5.8.0 contains a remote code execution vulnerability that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions. Attackers can connect to …

Remote | Authentication
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.9 MEDIUM
CVE-2018-25271 — Textpad 8.1.2 Denial of Service via Run Command

Textpad 8.1.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long buffer string through the Run command interface. Attacke…

textpad | Denial of Service
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
9.8 CRITICAL
CVE-2018-25270 — ThinkPHP 5.0.23 Remote Code Execution via invokefunction

ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through the routing parameter. Attackers can c…

thinkphp | Remote | Injection
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.1 MEDIUM
CVE-2018-25269 — ICEWARP 11.0.0.0 Cross-Site Scripting via Email HTML Injection

ICEWARP 11.0.0.0 contains a cross-site scripting vulnerability that allows attackers to inject malicious HTML elements into emails by embedding base64-encoded payloads in object and embed tags. Attac…

icewarp | Remote | Cross-Site Scripting
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.6 HIGH
CVE-2018-25268 — LanSpy 2.0.1.159 Local Buffer Overflow via Scan Field

LanSpy 2.0.1.159 contains a local buffer overflow vulnerability that allows attackers to overwrite the instruction pointer by supplying oversized input to the scan field. Attackers can craft a payloa…

| Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.9 MEDIUM
CVE-2018-25267 — UltraISO 9.7.1.3519 Buffer Overflow via Output FileName

UltraISO 9.7.1.3519 contains a local buffer overflow vulnerability in the Output FileName field of the Make CD/DVD Image dialog that allows attackers to overwrite SEH and SE handler records. Attacker…

ultraiso | Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.9 MEDIUM
CVE-2018-25266 — Angry IP Scanner 3.5.3 Denial of Service via Preferences Buffer Overflow

Angry IP Scanner 3.5.3 contains a buffer overflow vulnerability in the preferences dialog that allows local attackers to crash the application by supplying an excessively large string. Attackers can …

| Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.6 HIGH
CVE-2018-25265 — LanSpy 2.0.1.159 Local Buffer Overflow

LanSpy 2.0.1.159 contains a local buffer overflow vulnerability in the scan section that allows local attackers to execute arbitrary code by exploiting structured exception handling mechanisms. Attac…

| Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.9 MEDIUM
CVE-2018-25262 — Angry IP Scanner for Linux 3.5.3 Denial of Service

Angry IP Scanner for Linux 3.5.3 contains a denial of service vulnerability that allows local attackers to crash the application by supplying malformed input to the port selection field. Attackers ca…

| Denial of Service
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.6 HIGH
CVE-2018-25261 — Iperius Backup 5.8.1 Local Buffer Overflow SEH

Iperius Backup 5.8.1 contains a local buffer overflow vulnerability in the structured exception handling (SEH) mechanism that allows local attackers to execute arbitrary code by supplying a malicious…

| Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.6 HIGH
CVE-2018-25260 — MAGIX Music Editor 3.1 Buffer Overflow via SEH

MAGIX Music Editor 3.1 contains a buffer overflow vulnerability in the FreeDB Proxy Options dialog that allows local attackers to execute arbitrary code by exploiting structured exception handling. A…

| Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.6 HIGH
CVE-2018-25259 — Terminal Services Manager 3.1 Buffer Overflow SEH

Terminal Services Manager 3.1 contains a stack-based buffer overflow vulnerability in the computer names field that allows local attackers to execute arbitrary code by triggering structured exception…

terminal_services_manager | Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.5 HIGH
CVE-2026-35548 — Guardsix ODBC Enrichment Plugins SSRF and Credential Reuse Vulnerability

An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after m…

Remote | Server-Side Request Forgery
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
5.5 MEDIUM
CVE-2026-6862 — Efivar: efivar: denial of service due to stack overflow in device path node parsing

A flaw was found in libefiboot, a component of efivar. The device path node parser in libefiboot fails to validate that each node's Length field is at least 4 bytes, which is the minimum size for an …

| Denial of Service
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.1 MEDIUM
CVE-2026-6861 — Emacs: emacs: memory corruption vulnerability when processing svg css

A flaw was found in GNU Emacs. This vulnerability, a memory corruption issue, occurs when Emacs processes specially crafted SVG (Scalable Vector Graphics) CSS (Cascading Style Sheets) data. A local u…

| Memory Corruption
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.8 HIGH
CVE-2026-6859 — Instructlab: instructlab: arbitrary code execution due to hardcoded `trust_remote_code=tr…

A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code ex…

Remote | Supply Chain
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
9.6 CRITICAL
CVE-2026-6356 — CVE-2026-6356

A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitiv…

Remote | Authorization
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
6.5 MEDIUM
CVE-2026-6355 — CVE-2026-6355

A vulnerability in the web application allows unauthorized users to access and manipulate sensitive data across different tenants by exploiting insecure direct object references. This could lead to u…

Remote | Authorization
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
7.6 HIGH
CVE-2026-5750 — Insecure direct object reference (IDOR) vulnerability in Fullstep

An insecure direct object reference (IDOR) vulnerability in the Fullstep V5 registration process allows authenticated users to access data belonging to other registered users through various vulnerab…

fullstep | Remote | Authorization
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
8.7 HIGH
CVE-2026-5749 — Inadequate access control vulnerability in Fullstep

Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Succ…

fullstep | Remote | Authentication
Apr 22, 2026 Apr 22, 2026
Apr 22, 2026
Apr 22, 2026
Showing 20 of 6456 Results