8.5
CVE-2026-0654 - Command injection on TP-Link Deco BE25
Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted input to be executed as part of an OS command. An authenticated adjacent attacker may execute arbitrary commands via crafted configuration file, impacting confidentiality, integrity and availabilitโฆ
6.9
CVE-2026-0655 - Path Traversal on TP-Link Deco BE25
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-Link Deco BE25 v1.0 (web modules) allows authenticated adjacent attacker to read arbitrary files or cause denial of service.ย ย This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.
7.5
CVE-2026-3180 - Contest Gallery <= 28.1.4 - Unauthenticated SQL Injection
The Contest Gallery โ Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the โcgLostPasswordEmailโ and the โcgl_mailโ parameter in all versions up to, and including, 28.1.4 due to insufficient escaping on the user supplied parameter โฆ
8.8
CVE-2026-3132 - Master Addons for Elementor Premium <= 2.1.3 - Authenticated (Subscriber+) Remote Code Execution viโฆ
The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.3 via the 'JLTMA_Widget_Admin::render_preview'. This is due to missing capability check. This makes it possible for authenticated attackers, with Subscriber-โฆ
7.8
CVE-2026-21385 - Integer Overflow or Wraparound in Graphics
Memory corruption while using alignments for memory allocation.
7.8
CVE-2025-59603 - Out-of-bounds Write in Computer Vision
Memory Corruption when processing invalid user address with nonstandard buffer address.
7.8
CVE-2025-59600 - Buffer Over-read in Graphics
Memory Corruption when adding user-supplied data without checking available buffer space.
7.8
CVE-2025-47386 - Use After Free in Automotive Audio
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.
7.8
CVE-2025-47385 - Improper Access Control for Register Interface in SCE-Mink
Memory Corruption when accessing trusted execution environment without proper privilege check.
6.5
CVE-2025-47384 - Reachable Assertion in FW
Transient DOS when MAC configures config id greater than supported maximum value.