Common Vulnerabilities and Exposures (CVE)

CVE-2025-62501

Feb 26, 2026 15:04:25 UTC

SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) attack. This could enable unauthorized access if c...

CVE-2026-20947

Feb 26, 2026 15:04:24 UTC

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

CVE-2025-62673

Feb 26, 2026 15:04:24 UTC

Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tdpserver modules) allows adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing a malic...

CVE-2026-20843

Feb 26, 2026 15:04:24 UTC

Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.

CVE-2025-65079

Feb 26, 2026 15:04:24 UTC

A heap-based buffer overflow vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

CVE-2026-20848

Feb 26, 2026 15:04:24 UTC

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.

CVE-2025-65080

Feb 26, 2026 15:04:24 UTC

A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

CVE-2026-20849

Feb 26, 2026 15:04:24 UTC

Reliance on untrusted inputs in a security decision in Windows Kerberos allows an authorized attacker to elevate privileges over a network.

CVE-2025-65081

Feb 26, 2026 15:04:23 UTC

An out-of-bounds read vulnerability has been identified in the Postscript interpreter in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

CVE-2026-20853

Feb 26, 2026 15:04:23 UTC

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows WalletService allows an unauthorized attacker to elevate privileges locally.

CVE-2025-65077

Feb 26, 2026 15:04:23 UTC

A relative path traversal vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.

CVE-2026-20854

Feb 26, 2026 15:04:23 UTC

Use after free in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to execute code over a network.

CVE-2025-65078

Feb 26, 2026 15:04:23 UTC

An untrusted search path vulnerability has been identified in the Embedded Solutions Framework in various Lexmark devices. This vulnerability can be leveraged by an attacker to execute arbitrary code.

CVE-2026-21219

Feb 26, 2026 15:04:23 UTC

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.

CVE-2026-1861

Feb 26, 2026 15:04:22 UTC

Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)