9.4

CVSS3.1

CVE-2025-64155 -

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unaut…

📅 Published: Jan. 13, 2026, 4:32 p.m. 🔄 Last Modified: Feb. 26, 2026, 3:04 p.m.

9.1

CVSS3.1

CVE-2025-25176 - GPU DDK - GPU Register value contents leaked from secure workloads to non-secure world

Intermediate register values of secure workloads can be exfiltrated in workloads scheduled from applications running in the non-secure environment of a platform.

📅 Published: Jan. 13, 2026, 4:27 p.m. 🔄 Last Modified: Jan. 30, 2026, 6:37 p.m.

6.6

CVSS3.1

CVE-2025-46684 -

Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Tampering.

📅 Published: Jan. 13, 2026, 4:19 p.m. 🔄 Last Modified: Feb. 13, 2026, 9:02 p.m.

4.8

CVSS4.0

CVE-2026-0404 - Insufficient input validation in NETGEAR Orbi routers

An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allows network adjacent attackers authenticated over WiFi or on LAN to execute OS command injections on the router. DHCPv6 is not enabled by default.

📅 Published: Jan. 13, 2026, 4:01 p.m. 🔄 Last Modified: April 18, 2026, 6:45 a.m.

6.1

CVSS4.0

CVE-2026-0408 - Path traversal vulnerability in Netgear WiFi Range Extenders

A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.

📅 Published: Jan. 13, 2026, 4:01 p.m. 🔄 Last Modified: April 18, 2026, 6:45 a.m.

6.1

CVSS4.0

CVE-2026-0407 - Authentication bypass in NETGEAR WiFi Range Extenders via network adjacent attacks

An insufficient authentication vulnerability in NETGEAR WiFi range extenders allows a network adjacent attacker with WiFi authentication or a physical Ethernet port connection to bypass the authentication process and access the admin panel.

📅 Published: Jan. 13, 2026, 4:01 p.m. 🔄 Last Modified: April 18, 2026, 4:30 p.m.

6.1

CVSS4.0

CVE-2026-0406 - Insufficient input validation in NETGEAR Nighthawk router XR1000v2

An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows attackers connected to the router's LAN to execute OS command injections.

📅 Published: Jan. 13, 2026, 4 p.m. 🔄 Last Modified: April 18, 2026, 6:45 a.m.

6.1

CVSS4.0

CVE-2026-0405 - Authentication Bypass in NETGEAR Orbi Devices

An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.

📅 Published: Jan. 13, 2026, 4 p.m. 🔄 Last Modified: April 18, 2026, 7:15 p.m.

1.1

CVSS4.0

CVE-2026-0403 - Insufficient input validation in NETGEAR Orbi routers

An insufficient input validation vulnerability in NETGEAR Orbi routers allows attackers connected to the router's LAN to execute OS command injections.

📅 Published: Jan. 13, 2026, 4 p.m. 🔄 Last Modified: April 18, 2026, 4:30 p.m.

5.5

CVSS3.1

CVE-2025-71095 - net: stmmac: fix the crash issue for zero copy XDP_TX action

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix the crash issue for zero copy XDP_TX action There is a crash issue when running zero copy XDP_TX action, the crash log is shown below. [ 216.122464] Unable to handle kernel paging request at virtual address fff…

📅 Published: Jan. 13, 2026, 3:34 p.m. 🔄 Last Modified: March 25, 2026, 5:28 p.m.
Total resulsts: 349182
Page 2170 of 34,919
« previous page » next page
Filters