High Vulnerabilities
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info | Patch Info |
|---|---|---|---|---|---|
| 10-Strike Software–Bandwidth Monitor | 10-Strike Bandwidth Monitor 3.9 contains a buffer overflow vulnerability that allows attackers to bypass SafeSEH, ASLR, and DEP protections through carefully crafted input. Attackers can exploit the vulnerability by sending a malicious payload to the application’s registration key input, enabling remote code execution and launching arbitrary system commands. | 2026-01-30 | 9.8 | CVE-2020-37043 | ExploitDB-48570 Product Webpage VulnCheck Advisory: 10-Strike Bandwidth Monitor 3.9 – Buffer Overflow |
| 10-Strike Software–Network Inventory Explorer | 10-Strike Network Inventory Explorer 8.65 contains a buffer overflow vulnerability in exception handling that allows remote attackers to execute arbitrary code. Attackers can craft a malicious file with 209 bytes of padding and a specially constructed Structured Exception Handler to trigger code execution. | 2026-01-28 | 9.8 | CVE-2020-36961 | ExploitDB-49134 10-Strike Network Inventory Explorer Vendor Homepage VulnCheck Advisory: 10-Strike Network Inventory Explorer 8.65 – Buffer Overflow (SEH) |
| 10-Strike–Bandwidth Monitor | 10-Strike Bandwidth Monitor 3.9 contains an unquoted service path vulnerability in multiple services that allows local attackers to escalate privileges. Attackers can place a malicious executable in specific file path locations to achieve privilege escalation to SYSTEM during service startup. | 2026-01-29 | 7.8 | CVE-2020-37021 | ExploitDB-48591 Vendor Homepage VulnCheck Advisory: Bandwidth Monitor 3.9 – ‘Svc10StrikeBandMontitor’ Unquoted Service Path |
| Acer–Global Registration Service | Acer Global Registration Service 1.0.0.3 contains an unquoted service path vulnerability in its service configuration that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:Program Files (x86)AcerRegistration to inject malicious executables that would run with elevated LocalSystem privileges during service startup. | 2026-01-27 | 7.8 | CVE-2020-36976 | ExploitDB-49142 Acer Official Homepage VulnCheck Advisory: Global Registration Service 1.0.0.3 – ‘GREGsvc.exe’ Unquoted Service Path |
| Ajenti Project–Ajenti | Ajenti 2.1.36 contains an authentication bypass vulnerability that allows remote attackers to execute arbitrary commands after successful login. Attackers can leverage the /api/terminal/create endpoint to send a netcat reverse shell payload targeting a specified IP and port. | 2026-01-29 | 9.8 | CVE-2020-37002 | ExploitDB-48929 Ajenti GitHub Repository VulnCheck Advisory: Ajenti 2.1.36 – Remote Code Execution |
| Akn Software Computer Import Export Industry and Trade Ltd.–QR Menu | Improper Access Control vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Authentication Abuse. This issue affects QR Menu: before s1.05.12. | 2026-01-29 | 8 | CVE-2025-7016 | https://www.usom.gov.tr/bildirim/tr-26-0006 |
| aliasrobotics–cai | Cybersecurity AI (CAI) is a framework for AI Security. In versions up to and including 0.5.10, the CAI (Cybersecurity AI) framework contains multiple argument injection vulnerabilities in its function tools. User-controlled input is passed directly to shell commands via `subprocess.Popen()` with `shell=True`, allowing attackers to execute arbitrary commands on the host system. The `find_file()` tool executes without requiring user approval because find is considered a “safe” pre-approved command. This means an attacker can achieve Remote Code Execution (RCE) by injecting malicious arguments (like -exec) into the args parameter, completely bypassing any human-in-the-loop safety mechanisms. Commit e22a1220f764e2d7cf9da6d6144926f53ca01cde contains a fix. | 2026-01-30 | 9.7 | CVE-2026-25130 | https://github.com/aliasrobotics/cai/security/advisories/GHSA-jfpc-wj3m-qw2m https://github.com/aliasrobotics/cai/commit/e22a1220f764e2d7cf9da6d6144926f53ca01cde https://github.com/aliasrobotics/cai/blob/559de8fcbc2b44f3b0360f35ffdc2bb975e7d7e4/src/cai/tools/reconnaissance/filesystem.py#L60 |
| amitkolloldey–e-learning PHP Script | e-Learning PHP Script 0.1.0 contains a SQL injection vulnerability in the search functionality that allows attackers to manipulate database queries through unvalidated user input. Attackers can inject malicious SQL code in the ‘search’ parameter to potentially extract, modify, or access sensitive database information. | 2026-01-30 | 8.2 | CVE-2020-37035 | ExploitDB-48629 Vendor Homepage VulnCheck Advisory: e-learning Php Script 0.1.0 – ‘search’ SQL Injection |
| ammarfaizi2–Tea LaTex | Tea LaTex 1.0 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary shell commands through the /api.php endpoint. Attackers can craft a malicious LaTeX payload with shell commands that are executed when processed by the application’s tex2png API action. | 2026-01-29 | 9.8 | CVE-2020-37012 | ExploitDB-48805 Vendor Homepage VulnCheck Advisory: Tea LaTex 1.0 – Remote Code Execution |
| Andrea Electronics–Andrea ST Filters Service | Andrea ST Filters Service 1.0.64.7 contains an unquoted service path vulnerability in its Windows service configuration. Local attackers can exploit the unquoted path to inject malicious code that will execute with elevated LocalSystem privileges during service startup. | 2026-01-30 | 7.8 | CVE-2020-37058 | ExploitDB-48396 Andrea Electronics Official Homepage VulnCheck Advisory: Andrea ST Filters Service 1.0.64.7 – Unquoted service path |
| Arcadia Technology, LLC–Crafty Controller | An input neutralization vulnerability in the File Operations API Endpoint component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal. | 2026-01-30 | 9.9 | CVE-2026-0963 | GitLab Issue #660 |
| Arcadia Technology, LLC–Crafty Controller | An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal. | 2026-01-30 | 8.2 | CVE-2026-0805 | GitLab Issue #650 |
| asc Applied Software Consultants, s.r.o.–asc Timetables | aSc TimeTables 2021.6.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting subject title fields with excessive data. Attackers can generate a 10,000-character buffer and paste it into the subject title to trigger application instability and potential crash. | 2026-01-28 | 7.5 | CVE-2020-36943 | ExploitDB-49147 Vendor Homepage Software Download Page VulnCheck Advisory: aSc TimeTables 2021.6.2 – Denial of Service |
| Ashkon Software–Simple Startup Manager | Simple Startup Manager 1.17 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting memory through the ‘File’ input parameter. Attackers can craft a malicious payload with 268 bytes to trigger code execution, bypassing DEP and overwriting memory addresses to launch calc.exe. | 2026-01-30 | 8.4 | CVE-2020-37031 | ExploitDB-48678 Product Webpage VulnCheck Advisory: Simple Startup Manager 1.17 – ‘File’ Local Buffer Overflow |
| Atheros–Coex Service Application | Atheros Coex Service Application 8.0.0.255 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path by placing malicious executables in the service path to gain elevated system privileges during service startup. | 2026-01-27 | 7.8 | CVE-2020-36979 | ExploitDB-49053 Vendor Homepage Software Download Link VulnCheck Advisory: Atheros Coex Service Application 8.0.0.255 -‘ZAtheros Bt&Wlan Coex Agent’ Unquoted Service Path |
| avalanche123–Cassandra Web | Cassandra Web 0.5.0 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating path traversal parameters. Attackers can exploit the disabled Rack::Protection module to read sensitive system files like /etc/passwd and retrieve Apache Cassandra database credentials. | 2026-01-27 | 7.5 | CVE-2020-36939 | ExploitDB-49362 Cassandra Web GitHub Repository Cassandra Web RubyGems Package VulnCheck Advisory: Cassandra Web 0.5.0 – Remote File Read |
| Avast–AVAST SecureLine | Avast SecureLine 5.5.522.0 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious code that would execute with LocalSystem account permissions during service startup. | 2026-02-01 | 7.8 | CVE-2020-37037 | ExploitDB-48249 Avast Official Homepage VulnCheck Advisory: AVAST SecureLine 5.5.522.0 – ‘SecureLine’ Unquoted Service Path |
| backstage–backstage | Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, when TechDocs is configured with `runIn: local`, a malicious actor who can submit or modify a repository’s `mkdocs.yml` file can execute arbitrary Python code on the TechDocs build server via MkDocs hooks configuration. @backstage/plugin-techdocs-node versions 1.13.11 and 1.14.1 contain a fix. The fix introduces an allowlist of supported MkDocs configuration keys. Unsupported configuration keys (including `hooks`) are now removed from `mkdocs.yml` before running the generator, with a warning logged to indicate which keys were removed. Users of `@techdocs/cli` should also upgrade to the latest version, which includes the fixed `@backstage/plugin-techdocs-node` dependency. Some workarounds are available. Configure TechDocs with `runIn: docker` instead of `runIn: local` to provide container isolation, though it does not fully mitigate the risk. Limit who can modify `mkdocs.yml` files in repositories that TechDocs processes; only allow trusted contributors. Implement PR review requirements for changes to `mkdocs.yml` files to detect malicious `hooks` configurations before they are merged. Use MkDocs < 1.4.0 (e.g., 1.3.1) which does not support hooks. Note: This may limit access to newer MkDocs features. Building documentation in CI/CD pipelines using `@techdocs/cli` does not mitigate this vulnerability, as the CLI uses the same vulnerable `@backstage/plugin-techdocs-node` package. | 2026-01-30 | 7.7 | CVE-2026-25153 | https://github.com/backstage/backstage/security/advisories/GHSA-6jr7-99pf-8vgf |
| Barcode-Ocr–BarcodeOCR | BarcodeOCR 19.3.6 contains an unquoted service path vulnerability that allows local attackers to execute code with elevated privileges during system startup. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will run with LocalSystem privileges. | 2026-01-29 | 7.8 | CVE-2020-37016 | ExploitDB-48740 BarcodeOCR Official Homepage VulnCheck Advisory: BarcodeOCR 19.3.6 – ‘BarcodeOCR’ Unquoted Service Path |
| BearshareOfficial–BearShare Lite | BearShare Lite 5.2.5 contains a buffer overflow vulnerability in the Advanced Search keywords input that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite the EIP register and execute shellcode by pasting malicious content into the search keywords field. | 2026-01-29 | 9.8 | CVE-2020-37010 | ExploitDB-48839 Official BearShare Homepage BearShare Lite 5.2.5 Download Page VulnCheck Advisory: BearShare Lite 5.2.5 – ‘Advanced Search’Buffer Overflow in (PoC) |
| Beckhoff Automation–Beckhoff.Device.Manager.XAR | A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within privileged processes. | 2026-01-27 | 8.8 | CVE-2025-41726 | https://certvde.com/de/advisories/VDE-2025-092 |
| Beckhoff Automation–Beckhoff.Device.Manager.XAR | A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access. | 2026-01-27 | 7.8 | CVE-2025-41727 | https://certvde.com/de/advisories/VDE-2025-092 |
| bentoml–BentoML | BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to version 1.4.34, BentoML’s `bentofile.yaml` configuration allows path traversal attacks through multiple file path fields (`description`, `docker.setup_script`, `docker.dockerfile_template`, `conda.environment_yml`). An attacker can craft a malicious bentofile that, when built by a victim, exfiltrates arbitrary files from the filesystem into the bento archive. This enables supply chain attacks where sensitive files (SSH keys, credentials, environment variables) are silently embedded in bentos and exposed when pushed to registries or deployed. Version 1.4.34 contains a patch for the issue. | 2026-01-26 | 7.4 | CVE-2026-24123 | https://github.com/bentoml/BentoML/security/advisories/GHSA-6r62-w2q3-48hf https://github.com/bentoml/BentoML/commit/84d08cfeb40c5f2ce71b3d3444bbaa0fb16b5ca4 https://github.com/bentoml/BentoML/releases/tag/v1.4.34 |
| bloompixel–TableMaster for Elementor Advanced Responsive Tables for Elementor | The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the ‘csv_url’ parameter. | 2026-01-28 | 7.2 | CVE-2025-14610 | https://www.wordfence.com/threat-intel/vulnerabilities/id/ef07d6b0-ccdb-4b33-817f-6d4b3ad96243?source=cve https://plugins.trac.wordpress.org/browser/tablemaster-for-elementor/trunk/modules/data-table/widgets/data-table.php#L446 https://plugins.trac.wordpress.org/browser/tablemaster-for-elementor/tags/1.3.6/modules/data-table/widgets/data-table.php#L446 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442158%40tablemaster-for-elementor&new=3442158%40tablemaster-for-elementor&sfp_email=&sfph_mail= |
| Broadcom–Symantec Web Security Services Agent | WSS Agent, prior to 9.8.5, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | 2026-01-28 | 7 | CVE-2025-13917 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36778 |
| C4illin–ConvertX | ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attacker can delete arbitrary files outside the intended uploads directory, limited only by the permissions of the server process. Version 0.17.0 fixes the issue. | 2026-01-27 | 8.1 | CVE-2026-24741 | https://github.com/C4illin/ConvertX/security/advisories/GHSA-w372-w6cr-45jp https://github.com/C4illin/ConvertX/commit/7a936bdc0463936463616381ca257b13babc5e77 |
| ChurchCRM–CRM | ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQL injection through the `PerID` parameter. Version 6.7.2 contains a patch for the issue. | 2026-01-30 | 8.8 | CVE-2026-24854 | https://github.com/ChurchCRM/CRM/security/advisories/GHSA-p3q7-q68q-h2gr http://github.com/ChurchCRM/CRM/commit/748f5084fc06c5e12463dc7fdd62d1d31fc08d38 |
| Cleanersoft Software–Free MP3 CD Ripper | Free MP3 CD Ripper 2.8 contains a stack buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting a malicious WAV file with oversized payload. Attackers can leverage a specially crafted exploit file with shellcode, SEH bypass, and egghunter technique to achieve remote code execution on vulnerable Windows systems. | 2026-01-29 | 9.8 | CVE-2020-37000 | ExploitDB-48696 Vendor Homepage VulnCheck Advisory: Free MP3 CD Ripper 2.8 – Stack Buffer Overflow (SEH + Egghunter) |
| code-projects–Online Examination System | A vulnerability was found in code-projects Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Page. Performing a manipulation of the argument User results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. | 2026-01-26 | 7.3 | CVE-2026-1422 | VDB-342838 | code-projects Online Examination System Login Page index.php sql injection VDB-342838 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736606 | code-projects Online Examination System 1 SQL Injection https://github.com/geo-chen/code-projects/blob/main/Online%20Examination%20System%20In%20PHP%20With%20Source%20Code.md#finding-2-sql-injection-on-login-page https://code-projects.org/ |
| code-projects–Online Music Site | A flaw has been found in code-projects Online Music Site 1.0. Affected by this issue is some unknown functionality of the file /Administrator/PHP/AdminDeleteUser.php. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. | 2026-01-26 | 7.3 | CVE-2026-1443 | VDB-342872 | code-projects Online Music Site AdminDeleteUser.php sql injection VDB-342872 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736967 | code-projects Online Music Site V1.0 SQL Injection https://github.com/Volije/cve/issues/1 https://code-projects.org/ |
| code-projects–Online Music Site | A weakness has been identified in code-projects Online Music Site 1.0. This affects an unknown function of the file /Administrator/PHP/AdminEditUser.php. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-28 | 7.3 | CVE-2026-1534 | VDB-343220 | code-projects Online Music Site AdminEditUser.php sql injection VDB-343220 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738705 | Code-Projects ONLINE MUSIC SITE V1.0 SQL injection https://github.com/yuji0903/silver-guide/issues/3 https://code-projects.org/ |
| code-projects–Online Music Site | A security vulnerability has been detected in code-projects Online Music Site 1.0. This impacts an unknown function of the file /Administrator/PHP/AdminReply.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. | 2026-01-28 | 7.3 | CVE-2026-1535 | VDB-343221 | code-projects Online Music Site AdminReply.php sql injection VDB-343221 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738706 | Code-Projects ONLINE MUSIC SITE V1.0 SQL injection https://github.com/yuji0903/silver-guide/issues/4 https://code-projects.org/ |
| Code::Blocks–Code::Blocks | Code Blocks 17.12 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious file name with Unicode characters. Attackers can trigger the vulnerability by pasting a specially crafted payload into the file name field during project creation, potentially executing system commands like calc.exe. | 2026-01-30 | 8.4 | CVE-2020-37040 | ExploitDB-48594 Code Blocks Official Website Code Blocks SourceForge Page VulnCheck Advisory: Code Blocks 17.12 – ‘File Name’ Local Buffer Overflow |
| Code::Blocks–Code::Blocks | Code Blocks 20.03 contains a denial of service vulnerability that allows attackers to crash the application by manipulating input in the FSymbols search field. Attackers can paste a large payload of 5000 repeated characters into the search field to trigger an application crash. | 2026-01-30 | 7.5 | CVE-2020-37038 | ExploitDB-48617 Code Blocks Official Homepage Code Blocks SourceForge Page VulnCheck Advisory: Code Blocks 20.03 – Denial Of Service |
| codexcube–Ultimate Project Manager CRM PRO | Ultimate Project Manager CRM PRO 2.0.5 contains a blind SQL injection vulnerability that allows attackers to extract usernames and password hashes from the tbl_users database table. Attackers can exploit the /frontend/get_article_suggestion/ endpoint by crafting malicious search parameters to progressively guess and retrieve user credentials through boolean-based inference techniques. | 2026-01-29 | 8.2 | CVE-2020-37004 | ExploitDB-48912 Ultimate Project Manager CRM PRO Vendor Homepage VulnCheck Advisory: Ultimate Project Manager CRM PRO 2.0.5 – SQLi Credentials Leakage |
| Codriapp Innovation and Software Technologies Inc.–HeyGarson | Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping. This issue affects HeyGarson: through 30012026. NOTE: The vendor was contacted several times to verifying fixing process but did not respond in any way. | 2026-01-30 | 8.2 | CVE-2025-1395 | https://www.usom.gov.tr/bildirim/tr-26-0009 |
| crm-now GmbH–berliCRM | berliCRM 1.0.24 contains a SQL injection vulnerability in the ‘src_record’ parameter that allows remote attackers to manipulate database queries. Attackers can inject malicious SQL code through a crafted POST request to the index.php endpoint to potentially extract or modify database information. | 2026-01-29 | 8.2 | CVE-2020-37006 | ExploitDB-48872 Vendor Homepage VulnCheck Advisory: berliCRM 1.0.24 – ‘src_record’ SQL Injection |
| Crystal Shard–http-protection | Crystal Shard http-protection 0.2.0 contains an IP spoofing vulnerability that allows attackers to bypass protection middleware by manipulating request headers. Attackers can hardcode consistent IP values across X-Forwarded-For, X-Client-IP, and X-Real-IP headers to circumvent security checks and gain unauthorized access. | 2026-01-30 | 9.8 | CVE-2020-37056 | ExploitDB-48533 HTTP Protection Crystal Shard Repository VulnCheck Advisory: Crystal Shard http-protection 0.2.0 – IP Spoofing Bypass |
| D-Link–DIR-615 | A vulnerability was detected in D-Link DIR-615 up to 4.10. This impacts an unknown function of the file /wiz_policy_3_machine.php of the component Web Management Interface. Performing a manipulation of the argument ipaddr results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | 2026-01-26 | 7.2 | CVE-2026-1448 | VDB-342880 | D-Link DIR-615 Web Management wiz_policy_3_machine.php os command injection VDB-342880 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #737006 | Dlink DIR615 Firmware v4.10 and earlier (DIR-615 Rev D) OS Command Injection https://pentagonal-time-3a7.notion.site/DIR-615-v4-10-2e7e5dd4c5a580a5aac5c8ce35933396?pvs=73 https://www.dlink.com/ |
| D-Link–DIR-615 | A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the file /set_temp_nodes.php of the component URL Filter. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. | 2026-01-28 | 7.2 | CVE-2026-1505 | VDB-343117 | D-Link DIR-615 URL Filter set_temp_nodes.php os command injection VDB-343117 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #737061 | Dlink DIR-615 v4.10 OS Command Injection https://pentagonal-time-3a7.notion.site/D-Link-DIR-615-2e7e5dd4c5a580109a14fdeb6f105cd6 https://www.dlink.com/ |
| D-Link–DIR-615 | A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file /adv_mac_filter.php of the component MAC Filter Configuration. This manipulation of the argument mac causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. | 2026-01-28 | 7.2 | CVE-2026-1506 | VDB-343118 | D-Link DIR-615 MAC Filter Configuration adv_mac_filter.php os command injection VDB-343118 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #737078 | Dlink DIR-615 v4.10 OS Command Injection https://pentagonal-time-3a7.notion.site/DIR-615-MAC_FILTER-2e7e5dd4c5a58091b027f50271cc7c6a https://www.dlink.com/ |
| Dassault Systmes–SOLIDWORKS eDrawings | A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file. | 2026-01-26 | 7.8 | CVE-2026-1283 | https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1283 |
| Dassault Systmes–SOLIDWORKS eDrawings | An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS 2025 through Release SOLIDWORKS 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file. | 2026-01-26 | 7.8 | CVE-2026-1284 | https://www.3ds.com/trust-center/security/security-advisories/cve-2026-1284 |
| Deepinstinct–Deep Instinct Windows Agent | Deep Instinct Windows Agent 1.2.29.0 contains an unquoted service path vulnerability in the DeepMgmtService that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in C:Program FilesHP Sure SenseDeepMgmtService.exe to inject malicious code that would execute with LocalSystem permissions during service startup. | 2026-02-01 | 7.8 | CVE-2020-37047 | ExploitDB-48174 Deep Instinct Official Homepage VulnCheck Advisory: Deep Instinct Windows Agent 1.2.29.0 – ‘DeepMgmtService’ Unquoted Service Path |
| Dell–CloudBoost Virtual Appliance | Dell CloudBoost Virtual Appliance, versions prior to 19.14.0.0, contains a Plaintext Storage of Password vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges. | 2026-01-27 | 7 | CVE-2026-21417 | https://www.dell.com/support/kbdoc/en-us/000419894/dsa-2026-025-security-update-for-dell-cloudboost-virtual-appliance-multiple-vulnerabilities |
| Dell–PremierColor | Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. | 2026-01-28 | 7.8 | CVE-2025-46691 | https://www.dell.com/support/kbdoc/en-us/000394670/dsa-2025-444?lang=en |
| Dell–Unity | Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges. | 2026-01-30 | 7.8 | CVE-2026-21418 | https://www.dell.com/support/kbdoc/en-us/000421197/dsa-2026-054-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities |
| Dell–UnityVSA | Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges. | 2026-01-30 | 7.8 | CVE-2026-22277 | https://www.dell.com/support/kbdoc/en-us/000421197/dsa-2026-054-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities |
| Delta Electronics–ASDA-Soft | ASDA-Soft Stack-based Buffer Overflow Vulnerability | 2026-01-27 | 7.8 | CVE-2026-1361 | https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2026-00003_ASDA-Soft%20Stack-based%20Buffer%20Overflow%20Vulnerability%20(CVE-2026-1361).pdf |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, some subscription endpoints lack proper checking for ownership before making changes. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available. | 2026-01-28 | 7.1 | CVE-2025-68479 | https://github.com/discourse/discourse/security/advisories/GHSA-6gjr-5897-m327 |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available. | 2026-01-28 | 7.6 | CVE-2025-68662 | https://github.com/discourse/discourse/security/advisories/GHSA-gcfp-rjfc-925c |
| dnnsoftware–Dnn.Platform | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, module title supports richtext which could include scripts that would execute in certain scenarios. Versions 9.13.10 and 10.2.0 contain a fix for the issue. | 2026-01-27 | 9.1 | CVE-2026-24838 | https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-w9pf-h6m6-v89h |
| dnnsoftware–Dnn.Platform | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will run for user in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue. | 2026-01-27 | 7.7 | CVE-2026-24833 | https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-9r3h-mpf8-25gj |
| dnnsoftware–Dnn.Platform | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include scripts that would run in the PersonaBar when displayed. Versions 9.13.10 and 10.2.0 contain a fix for the issue. | 2026-01-27 | 7.7 | CVE-2026-24836 | https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-2g5g-hcgh-q3rp |
| dnnsoftware–Dnn.Platform | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue. | 2026-01-27 | 7.7 | CVE-2026-24837 | https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-vm5q-8qww-h238 |
| Dokploy–dokploy | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy’s WebSocket endpoint `/docker-container-terminal`. The `containerId` and `activeWay` parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue. | 2026-01-28 | 9.9 | CVE-2026-24841 | https://github.com/Dokploy/dokploy/security/advisories/GHSA-vx6x-6559-x35r https://github.com/Dokploy/dokploy/commit/74e0bd5fe3ef7199f44fcd19c6f5a2f09b806d6f https://github.com/Dokploy/dokploy/blob/canary/apps/dokploy/server/wss/docker-container-terminal.ts |
| Dokploy–dokploy | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardcoded credential in the provided installation script (located at https://dokploy.com/install.sh, line 154) uses a hardcoded password when creating the database container. This means that nearly all Dokploy installations use the same database credentials and could be compromised. Version 0.26.6 contains a patch for the issue. | 2026-01-28 | 8 | CVE-2026-24840 | https://github.com/Dokploy/dokploy/security/advisories/GHSA-jr65-3j3w-gjmc https://github.com/Dokploy/dokploy/commit/b902c160a256ad345ac687c87eb092f1fab2c64d |
| Drive-Software–Atomic Alarm Clock x86 | Atomic Alarm Clock 6.3 contains a local privilege escalation vulnerability in its service configuration that allows attackers to execute arbitrary code with SYSTEM privileges. Attackers can exploit the unquoted service path by placing a malicious executable named ‘Program.exe’ to gain persistent system-level access. | 2026-01-30 | 7.8 | CVE-2020-37060 | ExploitDB-48352 Vendor Homepage VulnCheck Advisory: Atomic Alarm Clock x86 6.3 – ‘AtomicAlarmClock’ Unquoted Service Path |
| Dummysoftware–BacklinkSpeed | BacklinkSpeed 2.4 contains a buffer overflow vulnerability that allows attackers to corrupt the Structured Exception Handler (SEH) chain through malicious file import. Attackers can craft a specially designed payload file to overwrite SEH addresses, potentially executing arbitrary code and gaining control of the application. | 2026-01-29 | 9.8 | CVE-2020-36997 | ExploitDB-48726 Vendor Homepage Software Download Page VulnCheck Advisory: BacklinkSpeed 2.4 – Buffer Overflow PoC (SEH) |
| Eclipse Foundation–Eclipse Theia – Website | In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml used pull_request_target trigger while checking out and executing untrusted pull request code. This allowed any GitHub user to execute arbitrary code in the repository’s CI environment with access to repository secrets and a GITHUB_TOKEN with extensive write permissions (contents:write, packages:write, pages:write, actions:write). An attacker could exfiltrate secrets, publish malicious packages to the eclipse-theia organization, modify the official Theia website, and push malicious code to the repository. | 2026-01-30 | 10 | CVE-2026-1699 | https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/332 |
| Eclipse Foundation–Eclipse ThreadX | The vulnerability stems from an incorrect error-checking logic in the CreateCounter() function (in threadx/utility/rtos_compatibility_layers/OSEK/tx_osek.c) when handling the return value of osek_get_counter(). Specifically, the current code checks if cntr_id equals 0u to determine failure, but @osek_get_counter() actually returns E_OS_SYS_STACK (defined as 12U) when it fails. This mismatch causes the error branch to never execute even when the counter pool is exhausted. As a result, when the counter pool is depleted, the code proceeds to cast the error code (12U) to a pointer (OSEK_COUNTER *), creating a wild pointer. Subsequent writes to members of this pointer lead to writes to illegal memory addresses (e.g., 0x0000000C), which can trigger immediate HardFaults or silent memory corruption. This vulnerability poses significant risks, including potential denial-of-service attacks (via repeated calls to exhaust the counter pool) and unauthorized memory access. | 2026-01-27 | 7.8 | CVE-2026-0648 | https://github.com/eclipse-threadx/threadx/security/advisories/GHSA-xj75-fc68-h4rw |
| Elaniin–Elaniin CMS | Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. Attackers can bypass authentication by sending crafted email and password parameters with ‘=”or’ payload to login.php, granting unauthorized access to the system. | 2026-01-29 | 8.2 | CVE-2020-36999 | ExploitDB-48705 Vendor Homepage Elaniin CMS GitHub Repository VulnCheck Advisory: elaniin CMS 1.0 – Authentication Bypass |
| Elektraweb–EasyPMS | EasyPMS 1.0.0 contains an authentication bypass vulnerability that allows unprivileged users to manipulate SQL queries in JSON requests to access admin user information. Attackers can exploit weak input validation by injecting single quotes in ID parameters and modify admin user passwords without proper token authentication. | 2026-01-29 | 7.5 | CVE-2020-37008 | ExploitDB-48858 Vendor Homepage VulnCheck Advisory: EasyPMS 1.0.0 – Authentication Bypass |
| Enigmasoftware–SpyHunter | SpyHunter 4 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted service path by placing malicious executables in specific file system locations to gain elevated access during service startup. | 2026-02-01 | 7.8 | CVE-2020-37055 | ExploitDB-48172 Vendor Homepage VulnCheck Advisory: SpyHunter 4 – ‘SpyHunter 4 Service’ Unquoted Service Path |
| Epson–EPSON | EPSON 1.124 contains an unquoted service path vulnerability in the SENADB service that allows local attackers to execute code with elevated system privileges. Attackers can exploit the unquoted path in C:Program Files (x86)EPSON_P2BPrinter SoftwareStatus Monitor to inject malicious executables that will run with LocalSystem permissions. | 2026-01-28 | 7.8 | CVE-2020-36984 | ExploitDB-48965 EPSON Official Support Page VulnCheck Advisory: EPSON 1.124 – ‘seksmdb.exe’ Unquoted Service Path |
| Epson–EPSON EasyMP Network Projection | EPSON EasyMP Network Projection 2.81 contains an unquoted service path vulnerability in the EMP_NSWLSV service that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:Program Files (x86)EPSON ProjectorEasyMP Network Projection V2 to inject malicious code that would execute with LocalSystem privileges. | 2026-02-01 | 7.8 | CVE-2020-37064 | ExploitDB-48069 EPSON EasyMP Network Projection Support Page VulnCheck Advisory: EPSON EasyMP Network Projection 2.81 – ‘EMP_NSWLSV’ Unquoted Service Path |
| ErugoOSS–Erugo | Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue. | 2026-01-28 | 10 | CVE-2026-24897 | https://github.com/ErugoOSS/Erugo/security/advisories/GHSA-336w-hgpq-6369 https://github.com/ErugoOSS/Erugo/commit/256bc63831a0b5e9a94cb024a0724e0cd5fa5e38 https://github.com/ErugoOSS/Erugo/releases/tag/v0.2.15 |
| Filehorse–Motorola Device Manager | Motorola Device Manager 2.4.5 contains an unquoted service path vulnerability in the PST Service that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted path in ForwardDaemon.exe to inject malicious code that will execute with elevated system privileges during service startup. | 2026-01-27 | 7.8 | CVE-2020-36981 | ExploitDB-49011 Motorola Device Manager Download Page ExploitDB-49013 VulnCheck Advisory: Motorola Device Manager 2.4.5 – ‘ForwardDaemon.exe ‘ Unquoted Service Path |
| Filigran–OpenCTI | OpenCTI 3.3.1 is vulnerable to a directory traversal attack via the static/css endpoint. An unauthenticated attacker can read arbitrary files from the filesystem by sending crafted GET requests with path traversal sequences (e.g., ‘../’) in the URL. For example, requesting /static/css//../../../../../../../../etc/passwd returns the contents of /etc/passwd. This vulnerability was discovered by Raif Berkay Dincel and confirmed on Linux Mint and Windows 10. | 2026-01-30 | 7.5 | CVE-2020-37041 | ExploitDB-48595 OpenCTI Official Homepage OpenCTI GitHub Repository VulnCheck Advisory: OpenCTI 3.3.1 – Directory Traversal |
| Flexense Ltd.–SyncBreeze | SyncBreeze 10.0.28 contains a denial of service vulnerability in the login endpoint that allows remote attackers to crash the service. Attackers can send an oversized payload in the login request to overwhelm the application and potentially disrupt service availability. | 2026-01-27 | 7.5 | CVE-2020-36946 | ExploitDB-49291 Vendor Homepage VulnCheck Advisory: SyncBreeze 10.0.28 – ‘login’ Denial of Service |
| Forensit–ForensiTAppxService | ForensiT AppX Management Service 2.2.0.4 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious code that would execute with LocalSystem account permissions during service startup. | 2026-01-28 | 7.8 | CVE-2020-36989 | ExploitDB-48821 ForensiT Official Downloads Page VulnCheck Advisory: ForensiTAppxService 2.2.0.4 – ‘ForensiTAppxService.exe’ Unquoted Service Path |
| Fortinet–FortiProxy | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices. | 2026-01-27 | 9.4 | CVE-2026-24858 | https://fortiguard.fortinet.com/psirt/FG-IR-26-060 |
| Frigate3–Frigate Professional | Frigate Professional 3.36.0.9 contains a local buffer overflow vulnerability in the Pack File feature that allows attackers to execute arbitrary code by overflowing the ‘Archive To’ input field. Attackers can craft a malicious payload that overwrites the Structured Exception Handler (SEH) and uses an egghunter technique to execute a reverse shell payload. | 2026-01-29 | 8.4 | CVE-2020-37001 | ExploitDB-48688 Archived Vendor Homepage VulnCheck Advisory: Frigate Professional 3.36.0.9 – ‘Pack File’ Buffer Overflow (SEH Egghunter) |
| Gearboxcomputers–IP Watcher | IP Watcher 3.0.0.30 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated LocalSystem privileges during service startup. | 2026-01-28 | 7.8 | CVE-2020-36985 | ExploitDB-48968 Vendor Homepage VulnCheck Advisory: IP Watcher v3.0.0.30 – ‘PACService.exe’ Unquoted Service Path |
| Gearboxcomputers–Program Access Controller | Program Access Controller 1.2.0.0 contains an unquoted service path vulnerability in PACService.exe that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions. | 2026-01-28 | 7.8 | CVE-2020-36987 | ExploitDB-48966 Vendor Homepage VulnCheck Advisory: Program Access Controller v1.2.0.0 – ‘PACService.exe’ Unquoted Service Path |
| geraked–phpscript-sgh | Phpscript-sgh 0.1.0 contains a time-based blind SQL injection vulnerability in the admin interface that allows attackers to manipulate database queries through the ‘id’ parameter. Attackers can exploit this vulnerability by crafting malicious payloads that trigger time delays, enabling them to extract sensitive database information through conditional sleep techniques. | 2026-01-27 | 8.2 | CVE-2020-36951 | ExploitDB-49192 Vendor Homepage VulnCheck Advisory: Phpscript-sgh 0.1.0 – Time Based Blind SQL Injection |
| gerstrong–Commander-Genius | Out-of-bounds Write vulnerability in gerstrong Commander-Genius. This issue affects Commander-Genius: before Release refs/pull/358/merge. | 2026-01-27 | 7.5 | CVE-2026-24827 | https://github.com/gerstrong/Commander-Genius/pull/379 |
| Getoutline–Outline Service | Outline Service 1.3.3 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in C:Program Files (x86)Outline to inject malicious code that would execute with LocalSystem permissions during service startup. | 2026-01-30 | 7.8 | CVE-2020-37030 | ExploitDB-48414 Outline Service Official Homepage VulnCheck Advisory: Outline Service 1.3.3 – ‘Outline Service ‘ Unquoted Service Path |
| Getpopcorntime–Popcorn Time | Popcorn Time 6.2.1.14 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can insert malicious executables in Program Files (x86) or system root directories to be executed with SYSTEM-level permissions during service startup. | 2026-01-30 | 7.8 | CVE-2020-37059 | ExploitDB-48378 Popcorn Time Official Homepage VulnCheck Advisory: Popcorn Time 6.2 – ‘Update service’ Unquoted Service Path |
| Gila CMS–Gila CMS | Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers can inject PHP code in the User-Agent header with shell_exec() to run system commands by sending crafted requests to the admin endpoint. | 2026-01-27 | 9.8 | CVE-2021-47900 | ExploitDB-49412 Official Vendor Homepage Gila CMS GitHub Repository VulnCheck Advisory: Gila CMS < 2.0.0 – Remote Code Execution |
| Global Interactive Design Media Software Inc.–Content Management System (CMS) | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers. This issue affects Content Management System (CMS): through 21072025. | 2026-01-29 | 7.5 | CVE-2025-7713 | https://www.usom.gov.tr/bildirim/tr-26-0008 |
| Global Interactive Design Media Software Inc.–Content Management System (CMS) | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection. This issue affects Content Management System (CMS): through 21072025. | 2026-01-29 | 7.5 | CVE-2025-7714 | https://www.usom.gov.tr/bildirim/tr-26-0008 |
| GNOME–Fonts Viewer | Gnome Fonts Viewer 3.34.0 contains a heap corruption vulnerability that allows attackers to trigger an out-of-bounds write by crafting a malicious TTF font file. Attackers can generate a specially crafted TTF file with an oversized pattern to cause an infinite malloc() loop and potentially crash the gnome-font-viewer process. | 2026-01-29 | 7.5 | CVE-2020-37011 | ExploitDB-48803 Gnome Official Website Gnome Font Viewer App Webpage VulnCheck Advisory: Gnome Fonts Viewer 3.34.0 Heap Corruption |
| GnuPG–GnuPG | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT–kem=CMS handling. This can easily be leveraged for denial of service; however, there is also memory corruption that could lead to remote code execution. | 2026-01-27 | 8.1 | CVE-2026-24881 | https://www.openwall.com/lists/oss-security/2026/01/27/8 https://dev.gnupg.org/T8044 |
| GnuPG–GnuPG | In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys. | 2026-01-27 | 8.4 | CVE-2026-24882 | https://www.openwall.com/lists/oss-security/2026/01/27/8 https://dev.gnupg.org/T8045 |
| Grafana–grafana/grafana | The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization internal privilege escalation. | 2026-01-27 | 8.1 | CVE-2026-21721 | https://grafana.com/security/security-advisories/CVE-2026-21721 |
| Grafana–grafana/grafana-enterprise | Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the refresh sits in the 10-slot worker queue longer than three seconds, the handler times out and stops listening for the result, so that goroutine blocks forever trying to send on an unbuffered channel. Sustained traffic with random hashes keeps tripping this timeout, so goroutine count grows linearly, eventually exhausting memory and causing Grafana to crash on some systems. | 2026-01-27 | 7.5 | CVE-2026-21720 | https://grafana.com/security/security-advisories/CVE-2026-21720 |
| guelfoweb–knock | Knockpy 4.1.1 contains a CSV injection vulnerability that allows attackers to inject malicious formulas into CSV reports through unfiltered server headers. Attackers can manipulate server response headers to include spreadsheet formulas that will execute when the CSV is opened in spreadsheet applications. | 2026-01-27 | 9.8 | CVE-2020-36941 | ExploitDB-49342 Knockpy GitHub Repository VulnCheck Advisory: Knockpy 4.1.1 – CSV Injection |
| hayyatapps–Sell BTC Cryptocurrency Selling Calculator | The Sell BTC – Cryptocurrency Selling Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘orderform_data’ AJAX action in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in order records that will execute whenever an administrator accesses the Orders page in the admin dashboard. The vulnerability was partially patched in version 1.5. | 2026-01-31 | 7.2 | CVE-2025-14554 | https://www.wordfence.com/threat-intel/vulnerabilities/id/720be34d-3fe4-4395-a27b-d386f8612ba9?source=cve https://plugins.trac.wordpress.org/browser/sell-btc-by-hayyatapps/trunk/functions-admin.php#L39 https://plugins.trac.wordpress.org/browser/sell-btc-by-hayyatapps/trunk/functions/form_tab.php#L12 https://plugins.trac.wordpress.org/browser/sell-btc-by-hayyatapps/trunk/Pages/orders.php#L30 https://plugins.trac.wordpress.org/changeset/3433480/ https://plugins.trac.wordpress.org/changeset/3450361/ |
| HELLOWEB–HelloWeb | HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files. | 2026-01-30 | 7.5 | CVE-2020-37034 | ExploitDB-48659 Archived HelloWeb Vendor Homepage VulnCheck Advisory: HelloWeb 2.0 – Arbitrary File Download |
| Hewlett Packard Enterprise (HPE)–HPE Aruba Networking Fabric Composer | Insecure file operations in HPE Aruba Networking Fabric Composer’s backup functionality could allow authenticated attackers to achieve remote code execution. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system. | 2026-01-27 | 7.2 | CVE-2026-23592 | https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04996en_us&docLocale=en_US |
| Hewlett Packard Enterprise (HPE)–HPE Aruba Networking Fabric Composer | A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affected directory. | 2026-01-27 | 7.5 | CVE-2026-23593 | https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04996en_us&docLocale=en_US |
| HIKSEMI–HS-AFS-S1H1 | Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can execute arbitrary commands on the device by crafting specific messages. | 2026-01-30 | 7.2 | CVE-2026-22623 | https://www.hiksemitech.com/en/hiksemi/support/security-advisory.html |
| Hikvision–DS-3WAP521-SI | Some Hikvision Wireless Access Points are vulnerable to authenticated command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution. | 2026-01-30 | 7.2 | CVE-2026-0709 | https://www.hikvision.com/en/support/cybersecurity/security-advisory/command-execution-vulnerability-in-some-hikvision-wireless-access-point-products/ |
| Hisense TransTech–Smart Bus Management System | A flaw has been found in Hisense TransTech Smart Bus Management System up to 20260113. Affected is the function Page_Load of the file YZSoft/Forms/XForm/BM/BusComManagement/TireMng.aspx. Executing a manipulation of the argument key can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-26 | 7.3 | CVE-2026-1449 | VDB-342881 | Hisense TransTech Smart Bus Management System TireMng.aspx Page_Load sql injection VDB-342881 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #737032 | Hisense TransTech Hisense Smart Bus Management System 1.0 SQL Injection https://github.com/master-abc/cve/issues/15 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Windows 12.1.0 – 12.1.3 could allow a local user with filesystem access to escalate their privileges due to the use of an unquoted search path element. | 2026-01-30 | 8.4 | CVE-2025-36384 | https://www.ibm.com/support/pages/node/7257678 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 could allow an instance owner to execute malicious code that escalate their privileges to root due to execution of unnecessary privileges operated at a higher than minimum level. | 2026-01-30 | 7.2 | CVE-2025-36184 | https://www.ibm.com/support/pages/node/7257519 |
| IDT–IDT PC Audio | IDT PC Audio 1.0.6499.0 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted path in the STacSV service to inject malicious code that would execute with LocalSystem account permissions during service startup. | 2026-01-26 | 7.8 | CVE-2020-36959 | ExploitDB-49191 Software Download Link VulnCheck Advisory: IDT PC Audio 1.0.6499.0 – ‘STacSV’ Unquoted Service Path |
| iForwarder and upRedSun Technologies, LLC.–Port Forwarding Wizard | Port Forwarding Wizard 4.8.0 contains a buffer overflow vulnerability that allows local attackers to execute arbitrary code through a long request in the Register feature. Attackers can craft a malicious payload with an egg tag and overwrite SEH handlers to potentially execute shellcode on vulnerable Windows systems. | 2026-01-30 | 8.4 | CVE-2020-37025 | ExploitDB-48695 Vendor Homepage VulnCheck Advisory: Port Forwarding Wizard 4.8.0 – Buffer Overflow |
| ik80–YATinyWinFTP | YATinyWinFTP contains a denial of service vulnerability that allows attackers to crash the FTP service by sending a 272-byte buffer with a trailing space. Attackers can exploit the service by connecting and sending a malformed command that triggers a buffer overflow and service crash. | 2026-01-28 | 9.8 | CVE-2020-36964 | ExploitDB-49127 YATinyWinFTP GitHub Repository VulnCheck Advisory: YATinyWinFTP – Denial of Service |
| immich-app–immich | immich is a high performance self-hosted photo and video management solution. Prior to version 2.5.0, API keys can escalate their own permissions by calling the update endpoint, allowing a low-privilege API key to grant itself full administrative access to the system. Version 2.5.0 fixes the issue. | 2026-01-29 | 7.2 | CVE-2026-23896 | https://github.com/immich-app/immich/security/advisories/GHSA-237r-x578-h5mv |
| inc2734–Snow Monkey Forms | The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ‘generate_user_dirpath’ function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | 2026-01-28 | 9.8 | CVE-2026-1056 | https://www.wordfence.com/threat-intel/vulnerabilities/id/37a8642d-07f5-4b1b-8419-e30589089162?source=cve https://plugins.trac.wordpress.org/browser/snow-monkey-forms/tags/12.0.3/snow-monkey-forms.php#L186 https://plugins.trac.wordpress.org/browser/snow-monkey-forms/tags/12.0.3/App/Model/Directory.php#L58 https://plugins.trac.wordpress.org/browser/snow-monkey-forms/tags/12.0.3/App/Rest/Route/View.php#L189 https://plugins.trac.wordpress.org/changeset/3448278/ |
| infiniflow–ragflow | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a “Zip Slip” vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading to Remote Code Execution) via a malicious ZIP archive. The MinerUParser class retrieves and extracts ZIP files from an external source (mineru_server_url). The extraction logic in `_extract_zip_no_root` fails to sanitize filenames within the ZIP archive. Commit 64c75d558e4a17a4a48953b4c201526431d8338f contains a patch for the issue. | 2026-01-27 | 9.8 | CVE-2026-24770 | https://github.com/infiniflow/ragflow/security/advisories/GHSA-v7cf-w7gj-pgf4 https://github.com/infiniflow/ragflow/commit/64c75d558e4a17a4a48953b4c201526431d8338f |
| Inputdirector–Input Director | Input Director 1.4.3 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted path during system startup or reboot to inject and run malicious executables with LocalSystem permissions. | 2026-01-28 | 7.8 | CVE-2020-36990 | ExploitDB-48795 Input Director Official Homepage VulnCheck Advisory: Input Director 1.4.3 – ‘Input Director’ Unquoted Service Path |
| Insite Software–Infor Storefront B2B | Infor Storefront B2B 1.0 contains a SQL injection vulnerability that allows attackers to manipulate database queries through the ‘usr_name’ parameter in login requests. Attackers can exploit the vulnerability by injecting malicious SQL code into the ‘usr_name’ parameter to potentially extract or modify database information. | 2026-01-30 | 8.2 | CVE-2020-37033 | ExploitDB-48674 Archived Infor Storefront Homepage VulnCheck Advisory: Infor Storefront B2B 1.0 – ‘usr_name’ SQL Injection |
| Intelbras–Intelbras Router RF 301K | Intelbras Router RF 301K firmware version 1.1.2 contains an authentication bypass vulnerability that allows unauthenticated attackers to download router configuration files. Attackers can send a specific HTTP GET request to /cgi-bin/DownloadCfg/RouterCfm.cfg to retrieve sensitive router configuration without authentication. | 2026-01-28 | 7.5 | CVE-2020-36963 | ExploitDB-49126 Intelbras Official Homepage VulnCheck Advisory: Intelbras Router RF 301K 1.1.2 – Authentication Bypass |
| InternationalColorConsortium–iccDEV | iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Versions prior to 2.3.1.2 have an undefined behavior issue when floating-point NaN values are converted to unsigned short integer types during ICC profile XML parsing potentially corrupting memory structures and enabling arbitrary code execution. This vulnerability affects users of the iccDEV library who process ICC color profiles. ICC Profile Injection vulnerabilities arise when user-controllable input is incorporated into ICC profile data or other structured binary blobs in an unsafe manner. Version 2.3.1.2 contains a fix for the issue. No known workarounds are available. | 2026-01-28 | 7.8 | CVE-2026-24856 | https://github.com/InternationalColorConsortium/iccDEV/security/advisories/GHSA-w585-cv3v-c396 https://github.com/InternationalColorConsortium/iccDEV/issues/532 https://github.com/InternationalColorConsortium/iccDEV/pull/541 https://github.com/InternationalColorConsortium/iccDEV/commit/5e53a5d25923b7794ba44e390e9b35d391f2b9c1 |
| Iobit–IObit Uninstaller | IObit Uninstaller 10 Pro contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted service path in the IObit Uninstaller Service to insert malicious code that would execute with SYSTEM-level permissions during service startup. | 2026-01-26 | 7.8 | CVE-2020-36952 | ExploitDB-49371 IObit Official Homepage VulnCheck Advisory: IObit Uninstaller 10 Pro – Unquoted Service Path |
| Is-Daouda–is-Engine | Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine. This issue affects is-Engine: before 3.3.4. | 2026-01-27 | 7.5 | CVE-2026-24828 | https://github.com/Is-Daouda/is-Engine/pull/6 |
| isaacs–node-tar | node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue. | 2026-01-28 | 8.2 | CVE-2026-24842 | https://github.com/isaacs/node-tar/security/advisories/GHSA-34×7-hfp2-rc4v https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46 |
| Iskysoft–Iskysoft Application Framework Service | Iskysoft Application Framework Service 2.4.3.241 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that would be run with the service’s high-level system permissions. | 2026-02-01 | 7.8 | CVE-2020-37048 | ExploitDB-48171 Vendor Homepage VulnCheck Advisory: Iskysoft Application Framework Service 2.4.3.241 – ‘IsAppService’ Unquoted Service Path |
| itsourcecode–Directory Management System | A security vulnerability has been detected in itsourcecode Directory Management System 1.0. The affected element is an unknown function of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. | 2026-01-30 | 7.3 | CVE-2026-1688 | VDB-343482 | itsourcecode Directory Management System index.php sql injection VDB-343482 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #741283 | itsourcecode Directory Management System V1.0 SQL Injection https://github.com/jackhong1236/CVE_1/issues/1 https://itsourcecode.com/ |
| itsourcecode–School Management System | A weakness has been identified in itsourcecode School Management System 1.0. The affected element is an unknown function of the file /course/index.php. Executing a manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. | 2026-01-28 | 7.3 | CVE-2026-1545 | VDB-343229 | itsourcecode School Management System index.php sql injection VDB-343229 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739647 | itsourcecode School Management System V1.0 SQL Injection https://github.com/ltranquility/CVE/issues/33 https://itsourcecode.com/ |
| itsourcecode–School Management System | A vulnerability was determined in itsourcecode School Management System 1.0. This affects an unknown function of the file /ramonsys/inquiry/index.php. This manipulation of the argument txtsearch causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. | 2026-01-29 | 7.3 | CVE-2026-1589 | VDB-343352 | itsourcecode School Management System index.php sql injection VDB-343352 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740686 | itsourcecode School Management System v1.0 SQL Injection https://mega.nz/file/DQUWSY7Y#CLcuhD1KE2s0VtEvYqH_PDCyhpGS0HDo_MKj9sheUPA https://itsourcecode.com/ |
| itsourcecode–School Management System | A vulnerability was identified in itsourcecode School Management System 1.0. This impacts an unknown function of the file /ramonsys/faculty/index.php. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. | 2026-01-29 | 7.3 | CVE-2026-1590 | VDB-343353 | itsourcecode School Management System index.php sql injection VDB-343353 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740687 | itsourcecode School Management System v1.0 SQL Injection https://mega.nz/file/GYsm2Q7K#B7NUGX5Fy9iLYssM474U3zFsmZp_14v0n5Sp-5N95yI https://itsourcecode.com/ |
| itsourcecode–Society Management System | A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_expenses_query.php. Executing a manipulation of the argument detail can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-29 | 7.3 | CVE-2026-1593 | VDB-343355 | itsourcecode Society Management System edit_expenses_query.php sql injection VDB-343355 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740689 | itsourcecode Society Management System V1.0 SQL injection https://github.com/yyzq-wsx/for_cve/issues/3 https://itsourcecode.com/ |
| itsourcecode–Society Management System | A security vulnerability has been detected in itsourcecode Society Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/add_expenses.php. The manipulation of the argument detail leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. | 2026-01-29 | 7.3 | CVE-2026-1594 | VDB-343356 | itsourcecode Society Management System add_expenses.php sql injection VDB-343356 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740691 | itsourcecode Society Management System V1.0 SQL Injection https://github.com/yyzq-wsx/for_cve/issues/2 https://itsourcecode.com/ |
| itsourcecode–Society Management System | A vulnerability was detected in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_student_query.php. The manipulation of the argument student_id results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. | 2026-01-29 | 7.3 | CVE-2026-1595 | VDB-343357 | itsourcecode Society Management System edit_student_query.php sql injection VDB-343357 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740692 | itsourcecode Society Management System V1.0 SQL Injection https://github.com/yyzq-wsx/for_cve/issues/1 https://itsourcecode.com/ |
| itsourcecode–Student Management System | A security vulnerability has been detected in itsourcecode Student Management System 1.0. This issue affects some unknown processing of the file /enrollment/index.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. | 2026-01-30 | 7.3 | CVE-2026-1701 | VDB-343491 | itsourcecode Student Management System index.php sql injection VDB-343491 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #742024 | itsourcecode Student Management System V1.0 SQL Injection https://github.com/ltranquility/CVE/issues/34 https://itsourcecode.com/ |
| Ivanti–Endpoint Manager Mobile | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. | 2026-01-29 | 9.8 | CVE-2026-1281 | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 |
| Ivanti–Endpoint Manager Mobile | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. | 2026-01-29 | 9.8 | CVE-2026-1340 | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 |
| ixray-team–ixray-1.6-stcop | Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop. This issue affects ixray-1.6-stcop: before 1.3. | 2026-01-27 | 9.8 | CVE-2026-24832 | https://github.com/ixray-team/ixray-1.6-stcop/pull/257 |
| ixray-team–ixray-1.6-stcop | Loop with Unreachable Exit Condition (‘Infinite Loop’) vulnerability in ixray-team ixray-1.6-stcop. This issue affects ixray-1.6-stcop: before 1.3. | 2026-01-27 | 7.5 | CVE-2026-24831 | https://github.com/ixray-team/ixray-1.6-stcop/pull/248 |
| Juniper Networks–Session Smart Router | An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allows a network-based attacker to bypass authentication and take administrative control of the device. This issue affects Session Smart Router: * from 5.6.7 before 5.6.17, * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts, * from 6.2 before 6.2.8-lts, * from 6.3 before 6.3.3-r2; This issue affects Session Smart Conductor: * from 5.6.7 before 5.6.17, * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts, * from 6.2 before 6.2.8-lts, * from 6.3 before 6.3.3-r2; This issue affects WAN Assurance Managed Routers: * from 5.6.7 before 5.6.17, * from 6.0 before 6.0.8 (affected from 6.0.8), * from 6.1 before 6.1.12-lts, * from 6.2 before 6.2.8-lts, * from 6.3 before 6.3.3-r2. | 2026-01-27 | 9.8 | CVE-2025-21589 | https://supportportal.juniper.net/ https://support.juniper.net/support/eol/software/ssr/ https://kb.juniper.net/JSA94663 |
| K.soft–FTPDummy | FTPDummy 4.80 contains a local buffer overflow vulnerability in its preference file handling that allows attackers to execute arbitrary code. Attackers can craft a malicious preference file with carefully constructed shellcode to trigger a structured exception handler overwrite and execute system commands. | 2026-01-30 | 8.4 | CVE-2020-37029 | ExploitDB-48685 Official FTPDummy Software Homepage VulnCheck Advisory: FTPDummy 4.80 – Local Buffer Overflow |
| KiloView–Encoder Series E1 hardware Version 1.4 | A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product. | 2026-01-29 | 9.8 | CVE-2026-1453 | https://www.cisa.gov/news-events/ics-advisories/icsa-26-029-01 https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-029-01.json |
| Kite–Kite | Kite 1.2020.1119.0 contains an unquoted service path vulnerability in the KiteService Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in ‘C:Program FilesKiteKiteService.exe’ to inject malicious executables and escalate privileges on the system. | 2026-01-26 | 7.8 | CVE-2020-36958 | ExploitDB-49205 Vendor Homepage VulnCheck Advisory: Kite 1.2020.1119.0 – ‘KiteService’ Unquoted Service Path |
| Kludex–python-multipart | Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations. | 2026-01-27 | 8.6 | CVE-2026-24486 | https://github.com/Kludex/python-multipart/security/advisories/GHSA-wp53-j4wj-2cfg https://github.com/Kludex/python-multipart/commit/9433f4bbc9652bdde82bbe380984e32f8cfc89c4 https://github.com/Kludex/python-multipart/releases/tag/0.0.22 |
| Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co.–Online Exam and Assessment | Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment allows SQL Injection. This issue affects Online Exam and Assessment: through 30012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-30 | 8.6 | CVE-2025-4686 | https://www.usom.gov.tr/bildirim/tr-26-0010 |
| kohler–hotcrp | HotCRP is conference review software. HotCRP versions from October 2025 through January 2026 delivered documents of all types with inline Content-Disposition, causing them to be rendered in the user’s browser rather than downloaded. (The intended behavior was for only `text/plain`, `application/pdf`, `image/gif`, `image/jpeg`, and `image/png` to be delivered inline, though adding `save=0` to the document URL could request inline delivery for any document.) This made users who clicked a document link vulnerable to cross-site scripting attacks. An uploaded HTML or SVG document would run in the viewer’s browser with access to their HotCRP credentials, and Javascript in that document could eventually make arbitrary calls to HotCRP’s API. Malicious documents could be uploaded to submission fields with “file upload” or “attachment” type, or as attachments to comments. PDF upload fields were not vulnerable. A search of documents uploaded to hotcrp.com found no evidence of exploitation. The vulnerability was introduced in commit aa20ef288828b04550950cf67c831af8a525f508 (11 October 2025), present in development versions and v3.2, and fixed in commit 8933e86c9f384b356dc4c6e9e2814dee1074b323 and v3.2.1. Additionally, c3d88a7e18d52119c65df31c2cc994edd2beccc5 and v3.2.1 remove support for `save=0`. | 2026-01-30 | 7.3 | CVE-2026-25156 | https://github.com/kohler/hotcrp/security/advisories/GHSA-p88p-2f2p-2476 https://github.com/kohler/hotcrp/commit/8933e86c9f384b356dc4c6e9e2814dee1074b323 https://github.com/kohler/hotcrp/commit/aa20ef288828b04550950cf67c831af8a525f508 https://github.com/kohler/hotcrp/commit/c3d88a7e18d52119c65df31c2cc994edd2beccc5 |
| Koken–Koken CMS | Koken CMS 0.22.24 contains a file upload vulnerability that allows authenticated attackers to bypass file extension restrictions by renaming malicious PHP files. Attackers can upload PHP files with system command execution capabilities by manipulating the file upload request through a web proxy and changing the file extension. | 2026-01-30 | 8.8 | CVE-2020-37023 | ExploitDB-48706 Koken CMS Official Homepage Softaculous Koken CMS Software Page Researcher PoC VulnCheck Advisory: Koken CMS 0.22.24 – Arbitrary File Upload |
| kyverno–kyverno | Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have a critical authorization boundary bypass in namespaced Kyverno Policy apiCall. The resolved `urlPath` is executed using the Kyverno admission controller ServiceAccount, with no enforcement that the request is limited to the policy’s namespace. As a result, any authenticated user with permission to create a namespaced Policy can cause Kyverno to perform Kubernetes API requests using Kyverno’s admission controller identity, targeting any API path allowed by that ServiceAccount’s RBAC. This breaks namespace isolation by enabling cross-namespace reads (for example, ConfigMaps and, where permitted, Secrets) and allows cluster-scoped or cross-namespace writes (for example, creating ClusterPolicies) by controlling the urlPath through context variable substitution. Versions 1.16.3 and 1.15.3 contain a patch for the vulnerability. | 2026-01-27 | 10 | CVE-2026-22039 | https://github.com/kyverno/kyverno/security/advisories/GHSA-8p9x-46gm-qfx2 https://github.com/kyverno/kyverno/commit/e0ba4de4f1e0ca325066d5095db51aec45b1407b https://github.com/kyverno/kyverno/commit/eba60fa856c781bcb9c3be066061a3df03ae4e3e |
| kyverno–kyverno | Kyverno is a policy engine designed for cloud native platform engineering teams. Versions prior to 1.16.3 and 1.15.3 have unbounded memory consumption in Kyverno’s policy engine that allows users with policy creation privileges to cause denial of service by crafting policies that exponentially amplify string data through context variables. Versions 1.16.3 and 1.15.3 contain a patch for the vulnerability. | 2026-01-27 | 7.7 | CVE-2026-23881 | https://github.com/kyverno/kyverno/security/advisories/GHSA-r2rj-wwm5-x6mq https://github.com/kyverno/kyverno/commit/7a651be3a8c78dcabfbf4178b8d89026bf3b850f https://github.com/kyverno/kyverno/commit/f5617f60920568a301740485472bf704892175b7 |
| LibreNMS–LibreNMS | LibreNMS 1.46 contains an authenticated SQL injection vulnerability in the MAC accounting graph endpoint that allows remote attackers to extract database information. Attackers can exploit the vulnerability by manipulating the ‘sort’ parameter with crafted SQL injection techniques to retrieve sensitive database contents through time-based blind SQL injection. | 2026-01-27 | 7.1 | CVE-2020-36947 | ExploitDB-49246 LibreNMS Official Website LibreNMS GitHub Repository LibreNMS Community VulnCheck Advisory: LibreNMS 1.46 – MAC Accounting Graph Authenticated SQL Injection |
| loft-sh–loft | vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to access resources outside of it. However, the user still cannot access resources beyond what is accessible to the owner of the access key. Versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10 fix the vulnerability. Some other mitigations are available. Users can limit exposure by reviewing access keys which are scoped and ensuring any users with access to them have appropriate permissions set. Creating automation users with very limited permissions and using access keys for these automation users can be used as a temporary workaround where upgrading is not immediately possible but scoped access keys are needed. | 2026-01-29 | 9.1 | CVE-2026-22806 | https://github.com/loft-sh/loft/security/advisories/GHSA-c539-w4ch-7wxq |
| M.J.M Soft–Quick Player | Quick Player 1.3 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by crafting a malicious .m3l file with carefully constructed payload. Attackers can trigger the vulnerability by loading a specially crafted file through the application’s file loading mechanism, potentially enabling remote code execution. | 2026-01-30 | 9.8 | CVE-2020-37050 | ExploitDB-48564 Software Download Link Archived Researcher Blog Post Archived Researcher Video PoC VulnCheck Advisory: Quick Player 1.3 – ‘.m3l’ Buffer Overflow |
| maurosoria–dirsearch | Dirsearch 0.4.1 contains a CSV injection vulnerability when using the –csv-report flag that allows attackers to inject formulas through redirected endpoints. Attackers can craft malicious server redirects with comma-separated paths containing Excel formulas to manipulate the generated CSV report. | 2026-01-27 | 9.8 | CVE-2021-47901 | ExploitDB-49370 dirsearch GitHub Repository VulnCheck Advisory: dirsearch 0.4.1 – CSV Injection |
| MedDream–MedDream PACS Server | MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated privileges. | 2026-01-29 | 8.8 | CVE-2020-37009 | ExploitDB-48853 MedDream PACS Server Product Page VulnCheck Advisory: MedDream PACS Server 6.8.3.751 – Remote Code Execution |
| meshtastic–firmware | Meshtastic is an open source mesh networking solution. In the current Meshtastic architecture, a Node is identified by their NodeID, generated from the MAC address, rather than their public key. This aspect downgrades the security, specifically by abusing the HAM mode which doesn’t use encryption. An attacker can, as such, forge a NodeInfo on behalf of a victim node advertising that the HAM mode is enabled. This, in turn, will allow the other nodes on the mesh to accept the new information and overwriting the NodeDB. The other nodes will then only be able to send direct messages to the victim by using the shared channel key instead of the PKC. Additionally, because HAM mode by design doesn’t provide any confidentiality or authentication of information, the attacker could potentially also be able to change the Node details, like the full name, short code, etc. To keep the attack persistent, it is enough to regularly resend the forged NodeInfo, in particular right after the victim sends their own. A patch is available in version 2.7.6.834c3c5. | 2026-01-27 | 8.2 | CVE-2025-55292 | https://github.com/meshtastic/firmware/security/advisories/GHSA-45vg-3f35-7ch2 https://github.com/meshtastic/firmware/commit/e5e8683cdba133e726033101586c3235a8678893 |
| Microsoft–Microsoft Office 2019 | Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally. | 2026-01-26 | 7.8 | CVE-2026-21509 | Microsoft Office Security Feature Bypass Vulnerability |
| midgetspy–Sickbeard | Sickbeard alpha contains a remote command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands through the extra scripts configuration. Attackers can set malicious commands in the extra scripts field and trigger processing to execute remote code on the vulnerable Sickbeard installation. | 2026-01-30 | 9.8 | CVE-2020-37027 | ExploitDB-48646 Archived Sickbeard Official Homepage Sickbeard GitHub Repository VulnCheck Advisory: Sickbeard 0.1 – Remote Command Injection |
| Mini-stream Software–RM Downloader | RM Downloader 2.50.60 contains a local buffer overflow vulnerability in the ‘Load’ parameter that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload with an egg hunter technique to bypass memory protections and execute commands like launching calc.exe. | 2026-01-30 | 8.4 | CVE-2020-37036 | ExploitDB-48628 Software v2.50.60 Archive Software Informer Product Page VulnCheck Advisory: RM Downloader 2.50.60 2006.06.23 – ‘Load’ Local Buffer Overflow |
| Minitool–MiniTool ShadowMaker | MiniTool ShadowMaker 3.2 contains an unquoted service path vulnerability in the MTAgentService that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in ‘C:Program FilesMiniTool ShadowMakerAgentService.exe’ to inject malicious executables and escalate privileges. | 2026-01-26 | 7.8 | CVE-2020-36953 | ExploitDB-49336 Vendor Homepage VulnCheck Advisory: MiniTool ShadowMaker 3.2 – ‘MTAgentService’ Unquoted Service Path |
| Mintplex-Labs–anything-llm | AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. Prior to version 1.10.0, a critical Path Traversal vulnerability in the DrupalWiki integration allows a malicious admin (or an attacker who can convince an admin to configure a malicious DrupalWiki URL) to write arbitrary files to the server. This can lead to Remote Code Execution (RCE) by overwriting configuration files or writing executable scripts. Version 1.10.0 fixes the issue. | 2026-01-26 | 7.2 | CVE-2026-24478 | https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-jp2f-99h9-7vjv |
| MobSF–Mobile-Security-Framework-MobSF | MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-site Scripting (XSS) vulnerability in MobSF’s Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim’s browser session by uploading a malicious APK. The `android:host` attribute from `<data android:scheme=”android_secret_code”>` elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover. Version 4.4.5 fixes the issue. | 2026-01-27 | 8.1 | CVE-2026-24490 | https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-8hf7-h89p-3pqj https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/2b08dd050e7685ee2a14fdbb454affab94129eae https://github.com/MobSF/Mobile-Security-Framework-MobSF/releases/tag/v4.4.5 |
| Motorola-Device-Manager–Motorola Device Manager | Motorola Device Manager 2.5.4 contains an unquoted service path vulnerability in the MotoHelperService.exe service that allows local users to potentially inject malicious code. Attackers can exploit the unquoted path in the service configuration to execute arbitrary code with elevated system privileges during service startup. | 2026-01-27 | 7.8 | CVE-2020-36982 | ExploitDB-49012 Motorola Device Manager Vendor Homepage VulnCheck Advisory: Motorola Device Manager 2.5.4 – ‘MotoHelperService.exe’ Unquoted Service Path |
| n8n–n8n | n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. | 2026-01-27 | 9.9 | CVE-2026-1470 | https://github.com/n8n-io/n8n/commit/aa4d1e5825829182afa0ad5b81f602638f55fa04 https://research.jfrog.com/vulnerabilities/n8n-expression-node-rce/ |
| NaturalIntelligence–fast-xml-parser | fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `�` or `�`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue. | 2026-01-30 | 7.5 | CVE-2026-25128 | https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-37qj-frw5-hhjh https://github.com/NaturalIntelligence/fast-xml-parser/commit/4e387f61c4a5cef792f6a2f42467013290bf95dc https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.3.4 |
| Naviwebs S.C.–Navigate CMS | Navigate CMS 2.8.7 contains an authenticated SQL injection vulnerability that allows attackers to leak database information by manipulating the ‘sidx’ parameter in comments. Attackers can exploit the vulnerability to extract user activation keys by using time-based blind SQL injection techniques, potentially enabling password reset for administrative accounts. | 2026-01-30 | 7.1 | CVE-2020-37053 | ExploitDB-48545 Navigate CMS Official Homepage Navigate CMS SourceForge Page VulnCheck Advisory: Navigate CMS 2.8.7 – ”sidx’ SQL Injection |
| NetPCLinker–NetPCLinker | NetPCLinker 1.0.0.0 contains a buffer overflow vulnerability in the Clients Control Panel DNS/IP field that allows attackers to execute arbitrary shellcode. Attackers can craft a malicious payload in the DNS/IP input to overwrite SEH handlers and execute shellcode when adding a new client. | 2026-01-30 | 9.8 | CVE-2019-25232 | ExploitDB-48680 NetPCLinker SourceForge Page VulnCheck Advisory: NetPCLinker 1.0.0.0 – Buffer Overflow |
| neutrinolabs–xrdp | xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems. | 2026-01-27 | 9.1 | CVE-2025-68670 | https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rwvg-gp87-gh6f https://github.com/neutrinolabs/xrdp/commit/488c8c7d4d189514a366cd8301b6e816c5218ffa https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.5 |
| Nidesoft Studio–Nidesoft DVD Ripper | Nidesoft DVD Ripper 5.2.18 contains a local buffer overflow vulnerability in the License Code registration parameter that allows attackers to execute arbitrary code. Attackers can craft a malicious payload and paste it into the License Code field to trigger a stack-based buffer overflow and execute shellcode. | 2026-01-30 | 8.4 | CVE-2020-37024 | ExploitDB-48687 Nidesoft DVD Ripper Software Download Page VulnCheck Advisory: Nidesoft DVD Ripper 5.2.18 – Local Buffer Overflow |
| Nidesoft–Nidesoft 3GP Video Converter | Nidesoft 3GP Video Converter 2.6.18 contains a local stack buffer overflow vulnerability in the license registration parameter. Attackers can craft a malicious payload and paste it into the ‘License Code’ field to execute arbitrary code on the system. | 2026-01-28 | 8.4 | CVE-2020-36971 | ExploitDB-49034 Archived Software Repository VulnCheck Advisory: Nidesoft 3GP Video Converter 2.6.18 – Local Stack Buffer Overflow |
| nmedia–Frontend File Manager Plugin | The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the ‘wpfm_send_file_in_email’ AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are sequential integers, attackers can enumerate all uploaded files on the site and exfiltrate sensitive data that was intended to be restricted to administrators only. | 2026-01-28 | 7.5 | CVE-2026-1280 | https://www.wordfence.com/threat-intel/vulnerabilities/id/e739e7d3-756a-4c93-9ca7-f7b9f9657033?source=cve https://plugins.trac.wordpress.org/browser/nmedia-user-file-uploader/trunk/inc/callback-functions.php#L98 https://plugins.trac.wordpress.org/browser/nmedia-user-file-uploader/tags/23.5/inc/callback-functions.php#L98 |
| nmedia–Simple User Registration | The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6.7 due to insufficient restriction on the ‘profile_save_field’ function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the ‘wp_capabilities’ parameter during a profile update. | 2026-01-28 | 8.8 | CVE-2026-0844 | https://www.wordfence.com/threat-intel/vulnerabilities/id/bb0e77e1-7e9f-4f7e-8953-c86ab0e5ae7a?source=cve https://plugins.trac.wordpress.org/browser/wp-registration/tags/6.7/inc/classes/class.profile.php#L401 https://plugins.trac.wordpress.org/browser/wp-registration/tags/6.7/inc/classes/class.user.php#L305 |
| nordvpn–nordvpn | Nord VPN 6.31.13.0 contains an unquoted service path vulnerability in its nordvpn-service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path during system startup or reboot to potentially run malicious code with LocalSystem permissions. | 2026-01-28 | 7.8 | CVE-2020-36992 | ExploitDB-48790 NordVPN Official Homepage VulnCheck Advisory: Nord VPN-6.31.13.0 – ‘nordvpn-service’ Unquoted Service Path |
| NVIDIA–GeForce | NVIDIA Display Driver for Windows contains a vulnerability where an attacker could trigger a use after free. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. | 2026-01-28 | 7.8 | CVE-2025-33217 | https://nvd.nist.gov/vuln/detail/CVE-2025-33217 https://www.cve.org/CVERecord?id=CVE-2025-33217 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 |
| NVIDIA–GeForce | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where an attacker could cause an integer overflow. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. | 2026-01-28 | 7.8 | CVE-2025-33218 | https://nvd.nist.gov/vuln/detail/CVE-2025-33218 https://www.cve.org/CVERecord?id=CVE-2025-33218 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 |
| NVIDIA–GeForce | NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. | 2026-01-28 | 7.8 | CVE-2025-33219 | https://nvd.nist.gov/vuln/detail/CVE-2025-33219 https://www.cve.org/CVERecord?id=CVE-2025-33219 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 |
| NVIDIA–GeForce | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. | 2026-01-28 | 7.8 | CVE-2025-33220 | https://nvd.nist.gov/vuln/detail/CVE-2025-33220 https://www.cve.org/CVERecord?id=CVE-2025-33220 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 |
| NVIDIA–NVIDIA runx | NVIDIA runx contains a vulnerability where an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | 2026-01-27 | 7.8 | CVE-2025-33234 | https://nvd.nist.gov/vuln/detail/CVE-2025-33234 https://www.cve.org/CVERecord?id=CVE-2025-33234 https://nvidia.custhelp.com/app/answers/detail/a_id/5764 |
| nyariv–SandboxJS | SandboxJS is a JavaScript sandboxing library. Versions prior to 0.8.26 have a sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`. The library attempts to sandbox code execution by replacing the global `Function` constructor with a safe, sandboxed version (`SandboxFunction`). This is handled in `utils.ts` by mapping `Function` to `sandboxFunction` within a map used for lookups. However, before version 0.8.26, the library did not include mappings for `AsyncFunction`, `GeneratorFunction`, and `AsyncGeneratorFunction`. These constructors are not global properties but can be accessed via the `.constructor` property of an instance (e.g., `(async () => {}).constructor`). In `executor.ts`, property access is handled. When code running inside the sandbox accesses `.constructor` on an async function (which the sandbox allows creating), the `executor` retrieves the property value. Since `AsyncFunction` was not in the safe-replacement map, the `executor` returns the actual native host `AsyncFunction` constructor. Constructors for functions in JavaScript (like `Function`, `AsyncFunction`) create functions that execute in the global scope. By obtaining the host `AsyncFunction` constructor, an attacker can create a new async function that executes entirely outside the sandbox context, bypassing all restrictions and gaining full access to the host environment (Remote Code Execution). Version 0.8.26 patches this vulnerability. | 2026-01-27 | 10 | CVE-2026-23830 | https://github.com/nyariv/SandboxJS/security/advisories/GHSA-wxhw-j4hc-fmq6 https://github.com/nyariv/SandboxJS/commit/345aee6566e47979dee5c337b925b141e7f78ccd |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, crafted DCERPC traffic can cause Suricata to expand a buffer w/o limits, leading to memory exhaustion and the process getting killed. While reported for DCERPC over UDP, it is believed that DCERPC over TCP and SMB are also vulnerable. DCERPC/TCP in the default configuration should not be vulnerable as the default stream depth is limited to 1MiB. Versions 8.0.3 and 7.0.14 contain a patch. Some workarounds are available. For DCERPC/UDP, disable the parser. For DCERPC/TCP, the `stream.reassembly.depth` setting will limit the amount of data that can be buffered. For DCERPC/SMB, the `stream.reassembly.depth` can be used as well, but is set to unlimited by default. Imposing a limit here may lead to loss of visibility in SMB. | 2026-01-27 | 7.5 | CVE-2026-22258 | https://github.com/OISF/suricata/security/advisories/GHSA-289c-h599-3xcx https://github.com/OISF/suricata/commit/39d8c302af3422a096b75474a4f295a754ec6a74 https://github.com/OISF/suricata/commit/f82a388d0283725cb76782cf64e8341cab370830 https://redmine.openinfosecfoundation.org/issues/8182 |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default). | 2026-01-27 | 7.5 | CVE-2026-22259 | https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9 https://github.com/OISF/suricata/commit/50cac2e2465ca211eabfa156623e585e9037bb7e https://github.com/OISF/suricata/commit/63225d5f8ef64cc65164c0bb1800730842d54942 https://redmine.openinfosecfoundation.org/issues/8181 |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, Suricata can crash with a stack overflow. Version 8.0.3 patches the issue. As a workaround, use default values for `request-body-limit` and `response-body-limit`. | 2026-01-27 | 7.5 | CVE-2026-22260 | https://github.com/OISF/suricata/security/advisories/GHSA-3gm8-84cm-5×22 https://github.com/OISF/suricata/commit/0dddac7278c8b9cf3c1e4c1c71e620a78ec1c185 https://redmine.openinfosecfoundation.org/issues/8185 |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. Prior to version 8.0.3 and 7.0.14, an unsigned integer overflow can lead to a heap use-after-free condition when generating excessive amounts of alerts for a single packet. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not run untrusted rulesets or run with less than 65536 signatures that can match on the same packet. | 2026-01-27 | 7.4 | CVE-2026-22264 | https://github.com/OISF/suricata/security/advisories/GHSA-mqr8-m3m4-2hw5 https://github.com/OISF/suricata/commit/549d7bf60616de8e54686a188196453b5b22f715 https://github.com/OISF/suricata/commit/5789a3d3760dbf33d93fc56c27bd9529e5bdc8f2 https://github.com/OISF/suricata/commit/ac1eb394181530430fb7262969f423a1bf8f209b https://redmine.openinfosecfoundation.org/issues/8190 |
| OpenClaw–OpenClaw | OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value. | 2026-02-01 | 8.8 | CVE-2026-25253 | https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq https://openclaw.ai/blog |
| openemr–openemr | OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request parameters (pubpid / pid) to reference another user’s record; the server accepts the modified IDs and applies the changes to that other user’s profile. This allows one user to alter another user’s profile data (name, contact info, etc.), and could enable account takeover. Version 7.0.4 fixes the issue. | 2026-01-27 | 8.8 | CVE-2025-67645 | https://github.com/openemr/openemr/security/advisories/GHSA-vjmv-cf46-gffv https://github.com/openemr/openemr/commit/e2a682ee71aac71a9f04ae566f4ffca10052bc4a |
| opf–openproject | OpenProject is an open-source, web-based project management software. To enable the real time collaboration on documents, OpenProject 17.0 introduced a synchronization server. The OpenPrioject backend generates an authentication token that is currently valid for 24 hours, encrypts it with a shared secret only known to the synchronization server. The frontend hands this encrypted token and the backend URL over to the synchronization server to check user’s ability to work on the document and perform intermittent saves while editing. The synchronization server does not properly validate the backend URL and sends a request with the decrypted authentication token to the endpoint that was given to the server. An attacker could use this vulnerability to decrypt a token that he intercepted by other means to gain an access token to interact with OpenProject on the victim’s behalf. This vulnerability was introduced with OpenProject 17.0.0 and was fixed in 17.0.2. As a workaround, disable the collaboration feature via Settings -> Documents -> Real time collaboration -> Disable. Additionally the `hocuspocus` container should also be disabled. | 2026-01-28 | 8.9 | CVE-2026-24772 | https://github.com/opf/openproject/security/advisories/GHSA-r854-p5qj-x974 |
| Pablosoftwaresolutions–Quick ‘n Easy FTP Service | Quick ‘n Easy FTP Service 3.2 contains an unquoted service path vulnerability that allows local attackers to execute arbitrary code during service startup. Attackers can exploit the misconfigured service binary path to inject malicious executables with elevated LocalSystem privileges during system boot or service restart. | 2026-01-27 | 7.8 | CVE-2020-36983 | ExploitDB-48983 Vendor Homepage Software Download Page VulnCheck Advisory: Quick ‘n Easy FTP Service 3.2 – Unquoted Service Path |
| patriksimek–vm2 | vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `Promise.prototype.then` `Promise.prototype.catch` callback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. In lib/setup-sandbox.js, the callback function of `localPromise.prototype.then` is sanitized, but `globalPromise.prototype.then` is not sanitized. The return value of async functions is `globalPromise` object. Version 3.10.2 fixes the issue. | 2026-01-26 | 9.8 | CVE-2026-22709 | https://github.com/patriksimek/vm2/security/advisories/GHSA-99p7-6v5w-7xg8 https://github.com/patriksimek/vm2/commit/4b009c2d4b1131c01810c1205e641d614c322a29 https://github.com/patriksimek/vm2/releases/tag/v3.10.2 |
| Pdf-Complete–PDF Complete | PDF Complete 3.5.310.2002 contains an unquoted service path vulnerability in its pdfsvc.exe service configuration. Attackers can exploit the unquoted path to inject and execute malicious code with elevated LocalSystem privileges. | 2026-01-26 | 7.8 | CVE-2020-36957 | ExploitDB-49226 PDF Complete Vendor Homepage VulnCheck Advisory: PDF Complete 3.5.310.2002 – ‘pdfsvc.exe’ Unquoted Service Path |
| PHPSUGAR–PHP Melody | PHP Melody version 3.0 contains a remote SQL injection vulnerability in the video edit module that allows authenticated attackers to inject malicious SQL commands. Attackers can exploit the unvalidated ‘vid’ parameter to execute arbitrary database queries and potentially compromise the web application and database management system. | 2026-02-01 | 8.1 | CVE-2021-47915 | Vulnerability Lab Advisory Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: PHP Melody 3.0 SQL Injection Vulnerability via Edit Video Parameter |
| PMB Services–PMB Services | PMB 5.6 contains a local file disclosure vulnerability in getgif.php that allows attackers to read arbitrary system files by manipulating the ‘chemin’ parameter. Attackers can exploit the unsanitized file path input to access sensitive files like /etc/passwd by sending crafted requests to the getgif.php endpoint. | 2026-01-28 | 8.4 | CVE-2020-36970 | ExploitDB-49054 Vendor Homepage Software Download Repository VulnCheck Advisory: PMB 5.6 – ‘chemin’ Local File Disclosure |
| polarnl–PolarLearn | PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `”x”`) as `direction`. Downstream (`VoteServer`) treats any non-`”up”` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability. | 2026-01-29 | 7.1 | CVE-2026-25126 | https://github.com/polarnl/PolarLearn/security/advisories/GHSA-ghpx-5w2p-p3qp https://github.com/polarnl/PolarLearn/commit/e6227d94d0e53e854f6a46480db8cd1051184d41 |
| Preyproject–Prey | Prey 1.9.6 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated privileges. Attackers can exploit the unquoted path in the CronService to insert malicious code that would execute during application startup or system reboot. | 2026-01-28 | 7.8 | CVE-2020-36986 | ExploitDB-48967 Vendor Homepage VulnCheck Advisory: Prey 1.9.6 – “CronService” Unquoted Service Path |
| ProjectSkyfire–SkyFire_548 | improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548. This issue affects SkyFire_548: before 5.4.8-stable5. | 2026-01-27 | 9.8 | CVE-2026-24872 | https://github.com/cadaver/turso3d/pull/11 |
| pytorch–pytorch | PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch’s `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(…, weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue. | 2026-01-27 | 8.8 | CVE-2026-24747 | https://github.com/pytorch/pytorch/security/advisories/GHSA-63cw-57p8-fm3p https://github.com/pytorch/pytorch/issues/163105 https://github.com/pytorch/pytorch/163122/commit/954dc5183ee9205cbe79876ad05dd2d9ae752139 https://github.com/pytorch/pytorch/releases/tag/v2.10.0 |
| Raimersoft–TapinRadio | TapinRadio 2.13.7 contains a denial of service vulnerability in the application proxy settings that allows attackers to crash the program by overflowing input fields. Attackers can paste a large buffer of 20,000 characters into the username and address fields to cause the application to become unresponsive and require reinstallation. | 2026-01-27 | 7.5 | CVE-2020-36949 | ExploitDB-49206 Vendor Homepage VulnCheck Advisory: TapinRadio 2.13.7 – Denial of Service |
| Ralim–IronOS | Integer Overflow or Wraparound vulnerability in Ralim IronOS. This issue affects IronOS: before v2.23-rc2. | 2026-01-27 | 9.8 | CVE-2026-24830 | https://github.com/Ralim/IronOS/pull/2083 |
| Realtek–Realtek Andrea RT Filters | Realtek Andrea RT Filters 1.0.64.7 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted path in ‘C:Program FilesIDTWDMAESTSr64.exe’ to inject malicious code that would execute during service startup or system reboot. | 2026-01-27 | 7.8 | CVE-2020-36974 | ExploitDB-49158 Realtek Official Homepage VulnCheck Advisory: Realtek Andrea RT Filters 1.0.64.7 – ‘AERTSr64.EXE’ Unquoted Service Path |
| Red Hat–OpenShift Serverless | A flaw was found in Undertow. Servlets using a method that calls HttpServletRequestImpl.getParameterNames() can cause an OutOfMemoryError when the client sends a request with large parameter names. This issue can be exploited by an unauthorized user to cause a remote denial-of-service (DoS) attack. | 2026-01-30 | 7.5 | CVE-2024-4027 | https://access.redhat.com/security/cve/CVE-2024-4027 RHBZ#2276410 |
| Red Hat–osim | The $uri$args concatenation in nginx configuration file present in Open Security Issue Management (OSIM) prior v2025.9.0 allows path traversal attacks via query parameters. | 2026-01-29 | 7.5 | CVE-2026-1616 | https://github.com/RedHatProductSecurity/osim/pull/615 |
| Red Hat–RHEL-9-CNV-4.19 | A flaw was found in KubeVirt Containerized Data Importer (CDI). This vulnerability allows a user to clone PersistentVolumeClaims (PVCs) from unauthorized namespaces, resulting in unauthorized access to data via the DataImportCron PVC source mechanism. | 2026-01-26 | 8.5 | CVE-2025-14459 | RHSA-2026:0950 https://access.redhat.com/security/cve/CVE-2025-14459 RHBZ#2420938 |
| Rinnegatamante–lpp-vita | Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita. This issue affects lpp-vita: before lpp-vita r6. | 2026-01-27 | 7.8 | CVE-2026-24873 | https://github.com/Rinnegatamante/lpp-vita/pull/82 |
| Ruijienetworks–Ruijie Networks Switch eWeb S29_RGOS | Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with ‘../’ sequences to retrieve system configuration files containing credentials and network settings. | 2026-01-29 | 7.5 | CVE-2020-37015 | ExploitDB-48755 Ruijie Networks Official Homepage Directory Traversal Vulnerability Source VulnCheck Advisory: Ruijie Networks Switch eWeb S29_RGOS 11.4 – Directory Traversal |
| runtipi–runtipi | Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system’s `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full Remote Code Execution (RCE) and host filesystem compromise the next time the instance is restarted by the operator. Version 4.7.2 fixes the vulnerability. | 2026-01-29 | 7.6 | CVE-2026-25116 | https://github.com/runtipi/runtipi/security/advisories/GHSA-mwg8-x997-cqw6 https://github.com/runtipi/runtipi/releases/tag/v4.7.2 |
| saadiqbal–New User Approve | The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to approve or deny user accounts, retrieve sensitive user information including emails and roles, and force logout of privileged users. | 2026-01-28 | 7.3 | CVE-2026-0832 | https://www.wordfence.com/threat-intel/vulnerabilities/id/f86a69ab-2fc5-4c84-872b-929dbec429cd?source=cve https://plugins.trac.wordpress.org/browser/new-user-approve/trunk/includes/end-points/mobile-api.php#L60 https://plugins.trac.wordpress.org/browser/new-user-approve/tags/3.2.1/includes/end-points/mobile-api.php#L60 https://plugins.trac.wordpress.org/browser/new-user-approve/trunk/includes/end-points/mobile-api.php#L24 https://plugins.trac.wordpress.org/browser/new-user-approve/tags/3.2.1/includes/end-points/mobile-api.php#L24 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3425140%40new-user-approve&new=3425140%40new-user-approve&sfp_email=&sfph_mail= https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442291%40new-user-approve&new=3442291%40new-user-approve&sfp_email=&sfph_mail= |
| Salt Project–Salt | Salt’s junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process. | 2026-01-30 | 7.8 | CVE-2025-62348 | Salt 3006.17 release notes (fix for CVE-2025-62348) |
| Sangfor–Operation and Maintenance Security Management System | A vulnerability has been found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. The impacted element is an unknown function of the file /fort/audit/get_clip_img of the component HTTP POST Request Handler. Such manipulation of the argument frame/dirno leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | 2026-01-26 | 7.3 | CVE-2026-1412 | VDB-342801 | Sangfor Operation and Maintenance Security Management System HTTP POST Request get_clip_img command injection VDB-342801 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736513 | Sangfor Operation and Maintenance Security Management System (OSM / è¿ç»´å®‰å…¨ç®¡ç†ç³»ç»Ÿ) v3.0.12 Command Injectiona https://github.com/LX-LX88/cve/issues/22 |
| Scille–parsec-cloud | Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled with its RustCrypto backend. In practice this means an attacker in a man-in-the-middle position would be able to provide weak order points to both parties in the Diffie-Hellman exchange, resulting in a high probability to for both parties to obtain the same shared key (hence leading to a successful SAS code exchange, misleading both parties into thinking no MITM has occurred) which is also known by the attacker. Note only Parsec web is impacted (as Parsec desktop uses `libparsec_crypto` with the libsodium backend). Version 3.6.0 of Parsec patches the issue. | 2026-01-29 | 8.3 | CVE-2025-62514 | https://github.com/Scille/parsec-cloud/security/advisories/GHSA-hrc9-gm58-pgj9 https://github.com/Scille/parsec-cloud/commit/197bb6387b49fec872b5e4a04dcdb82b3d2995b2 https://github.com/Scille/parsec-cloud/blob/e7c5cdbc4234f606ccf3ab2be7e9edc22db16feb/libparsec/crates/crypto/src/rustcrypto/private.rs#L136-L138 https://github.com/dalek-cryptography/curve25519-dalek/blob/8c53a8f10b146a2fd65069437e3576e49b390e7a/curve25519-dalek/src/montgomery.rs#L132-L146 https://github.com/dalek-cryptography/curve25519-dalek/blob/8c53a8f10b146a2fd65069437e3576e49b390e7a/x25519-dalek/src/x25519.rs#L364-L366 |
| script3–soroban-fixed-point-math | soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative. The logic assumed that if the intermediate product was negative, the final result must also be negative, neglecting the sign of $z$. This resulted in rounding being applied in the wrong direction for cases where both $x * y$ and $z$ were negative. The functions most at risk are `fixed_div_floor` and `fixed_div_ceil`, as they often use non-constant numbers as the divisor $z$ in `mulDiv`. This error is present in all signed `FixedPoint` and `SorobanFixedPoint` implementations, including `i64`, `i128`, and `I256`. Versions 1.3.1 and 1.4.1 contain a patch. No known workarounds for this issue are available. | 2026-01-27 | 7.5 | CVE-2026-24783 | https://github.com/script3/soroban-fixed-point-math/security/advisories/GHSA-x5m4-43jf-hh65 https://github.com/script3/soroban-fixed-point-math/commit/c9233f7094198a49ed66a4d75786a8a3755c936a https://github.com/script3/soroban-fixed-point-math/releases/tag/v1.3.1 https://github.com/script3/soroban-fixed-point-math/releases/tag/v1.4.1 |
| sebastianbergmann–phpunit | PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test. The vulnerability occurs when a `.coverage` file, which should not exist before test execution, is deserialized without the `allowed_classes` parameter restriction. An attacker with local file write access can place a malicious serialized object with a `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code coverage instrumentation enabled. This vulnerability requires local file write access to the location where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through CI/CD pipeline attacks, the local development environment, and/or compromised dependencies. Rather than just silently sanitizing the input via `[‘allowed_classes’ => false]`, the maintainer has chosen to make the anomalous state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition. Starting in versions in versions 12.5.8, 11.5.50, 10.5.62, 9.6.33, when a `.coverage` file is detected for a PHPT test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state. Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration, including ephemeral runners, code review enforcement, branch protection, artifact isolation, and access control. | 2026-01-27 | 7.8 | CVE-2026-24765 | https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-vvj3-c3rp-c85p https://github.com/sebastianbergmann/phpunit/commit/3141742e00620e2968d3d2e732d320de76685fda https://github.com/sebastianbergmann/phpunit/releases/tag/10.5.63 https://github.com/sebastianbergmann/phpunit/releases/tag/11.5.50 https://github.com/sebastianbergmann/phpunit/releases/tag/12.5.8 https://github.com/sebastianbergmann/phpunit/releases/tag/8.5.52 https://github.com/sebastianbergmann/phpunit/releases/tag/9.6.33 |
| Segurazo–SAntivirus IC | SAntivirus IC 10.0.21.61 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted executable path to inject malicious files in the service binary path, enabling privilege escalation to system-level permissions. | 2026-01-27 | 7.8 | CVE-2020-36980 | ExploitDB-49042 Vendor Homepage VulnCheck Advisory: SAntivirus IC 10.0.21.61 – ‘SAntivirusIC’ Unquoted Service Path |
| SEIKO EPSON Corp–Status Monitor 3 | EPSON Status Monitor 3 version 8.0 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. Attackers can leverage the unquoted path in ‘C:Program FilesCommon FilesEPSONEPW!3SSRPE_S60RPB.EXE’ to inject malicious executables and escalate privileges. | 2026-01-27 | 7.8 | CVE-2020-36975 | ExploitDB-49141 Official EPSON Corporate Homepage VulnCheck Advisory: EPSON Status Monitor 3 ‘EPSON_PM_RPCV4_06’ – Unquoted Service Path |
| shahrukhlinkgraph–Search Atlas SEO Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization | The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization plugin for WordPress is vulnerable to authentication bypass due to a missing capability check on the ‘generate_sso_url’ and ‘validate_sso_token’ functions in versions 2.4.4 to 2.5.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract the ‘nonce_token’ authentication value to log in to the first Administrator’s account. | 2026-01-28 | 8.8 | CVE-2025-14386 | https://www.wordfence.com/threat-intel/vulnerabilities/id/6f63d2c4-cbae-4177-8494-daca96449ecc?source=cve https://plugins.trac.wordpress.org/browser/metasync/tags/2.5.12/admin/class-metasync-admin.php#L1042 https://plugins.trac.wordpress.org/browser/metasync/tags/2.5.12/admin/class-metasync-admin.php#L851 https://plugins.trac.wordpress.org/browser/metasync/tags/2.5.12/admin/class-metasync-admin.php#L1141 |
| Sharemouse–ShareMouse | ShareMouse 5.0.43 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the insecure service path configuration by placing malicious executables in specific system directories to gain elevated access during service startup. | 2026-01-28 | 7.8 | CVE-2020-36991 | ExploitDB-48794 ShareMouse Official Vendor Homepage VulnCheck Advisory: ShareMouse 5.0.43 – ‘ShareMouse Service’ Unquoted Service Path |
| Simplephpscripts–Simple CMS | Simple CMS 2.1 contains a remote SQL injection vulnerability that allows privileged attackers to inject unfiltered SQL commands in the users module. Attackers can exploit unvalidated input parameters in the admin.php file to compromise the database management system and web application. | 2026-02-01 | 8.1 | CVE-2021-47918 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Simple CMS 2.1 SQL Injection Vulnerability via Users Module |
| smartdatasoft–SmartBlog | SmartBlog 2.0.1 contains a blind SQL injection vulnerability in the ‘id_post’ parameter of the details controller that allows attackers to extract database information. Attackers can systematically test and retrieve database contents by injecting crafted SQL queries that compare character-by-character of database information. | 2026-01-28 | 8.2 | CVE-2020-36972 | ExploitDB-48995 SmartBlog GitHub Repository VulnCheck Advisory: SmartBlog 2.0.1 – ‘id_post’ Blind SQL injection |
| SOCUSOFT–Photo to Video Converter Professional | Socusoft Photo to Video Converter Professional 8.07 contains a local buffer overflow vulnerability in the ‘Output Folder’ input field that allows attackers to execute arbitrary code. Attackers can craft a malicious payload and paste it into the output folder field to trigger a stack-based buffer overflow and potentially execute shellcode. | 2026-01-30 | 8.4 | CVE-2020-37028 | ExploitDB-48691 Archived Vendor Homepage VulnCheck Advisory: Socusoft Photo to Video Converter Professional 8.07 – ‘Output Folder’ Buffer Overflow |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. | 2026-01-28 | 9.8 | CVE-2025-40551 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40551 https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication. | 2026-01-28 | 9.8 | CVE-2025-40552 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40552 https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. | 2026-01-28 | 9.8 | CVE-2025-40553 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40553 https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk. | 2026-01-28 | 9.8 | CVE-2025-40554 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40554 https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality. | 2026-01-28 | 8.1 | CVE-2025-40536 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536 https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm |
| SolarWinds–Web Help Desk | SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions. | 2026-01-28 | 7.5 | CVE-2025-40537 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40537 https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm |
| Sonarqube–SonarQube | SonarQube 8.3.1 contains an unquoted service path vulnerability that allows local attackers to gain SYSTEM privileges by exploiting the service executable path. Attackers can replace the wrapper.exe in the service path with a malicious executable to execute code with highest system privileges during service restart. | 2026-01-29 | 7.8 | CVE-2020-37020 | ExploitDB-48677 SonarQube Official Homepage VulnCheck Advisory: SonarQube 8.3.1 – Unquoted Service Path |
| Squidex–squidex | Squidex is an open source headless content management system and content management hub. Versions of the application up to and including 7.21.0 allow users to define “Webhooks” as actions within the Rules engine. The url parameter in the webhook configuration does not appear to validate or restrict destination IP addresses. It accepts local addresses such as 127.0.0.1 or localhost. When a rule is triggered (Either manual trigger by manually calling the trigger endpoint or by a content update or any other triggers), the backend server executes an HTTP request to the user-supplied URL. Crucially, the server logs the full HTTP response in the rule execution log (lastDump field), which is accessible via the API. Which turns a “Blind” SSRF into a “Full Read” SSRF. As of time of publication, no patched versions are available. | 2026-01-27 | 9.1 | CVE-2026-24736 | https://github.com/Squidex/squidex/security/advisories/GHSA-wxg2-953m-fg2w |
| sunnygkp10–Online-Exam-System | Online-Exam-System 2015 contains a time-based blind SQL injection vulnerability in the feedback form that allows attackers to extract database password hashes. Attackers can exploit the ‘feed.php’ endpoint by crafting malicious payload requests that use time delays to systematically enumerate user password characters. | 2026-01-30 | 8.2 | CVE-2020-37051 | ExploitDB-48560 Software Repository VulnCheck Advisory: Online-Exam-System 2015 – ‘feedback’ SQL Injection |
| sunnygkp10–Online-Exam-System | Online-Exam-System 2015 contains a SQL injection vulnerability in the feedback module that allows attackers to manipulate database queries through the ‘fid’ parameter. Attackers can inject malicious SQL code into the ‘fid’ parameter to potentially extract, modify, or delete database information. | 2026-01-30 | 8.2 | CVE-2020-37057 | ExploitDB-48529 Software Repository VulnCheck Advisory: Online-Exam-System 2015 – ‘fid’ SQL Injection |
| Techraft–Digital Multivendor Marketplace Online Store | Mult-E-Cart Ultimate 2.4 contains multiple SQL injection vulnerabilities in inventory, customer, vendor, and order modules. Remote attackers with privileged vendor or admin roles can exploit the ‘id’ parameter to execute malicious SQL commands and compromise the database management system. | 2026-02-01 | 8.1 | CVE-2021-47909 | Vulnerability Lab Advisory Product Homepage Product Homepage VulnCheck Advisory: Mult-E-Cart Ultimate 2.4 SQL Injection via Vulnerable ID Parameters |
| telnet-lite–Mocha Telnet Lite for iOS | Mocha Telnet Lite for iOS 4.2 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the user configuration input. Attackers can overwrite the ‘User’ field with 350 bytes of repeated characters to trigger an application crash and prevent normal functionality. | 2026-01-29 | 7.5 | CVE-2020-36995 | ExploitDB-48728 Official App Store Page for Mocha Telnet Lite VulnCheck Advisory: Mocha Telnet Lite for iOS 4.2 – ‘User’ Denial of Service |
| Tenda–AC21 | A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. | 2026-01-29 | 8.8 | CVE-2026-1637 | VDB-343416 | Tenda AC21 AdvSetMacMtuWan fromAdvSetMacMtuWan stack-based overflow VDB-343416 | CTI Indicators (IOB, IOC, IOA) Submit #740865 | Tenda AC21 V16.03.08.16 Buffer Overflow https://github.com/LX-LX88/cve/issues/25 https://www.tenda.com.cn/ |
| Tenda–AC23 | A flaw has been found in Tenda AC23 16.03.07.52. This impacts an unknown function of the file /goform/WifiExtraSet. This manipulation of the argument wpapsk_crypto causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. | 2026-01-26 | 8.8 | CVE-2026-1420 | VDB-342836 | Tenda AC23 WifiExtraSet buffer overflow VDB-342836 | CTI Indicators (IOB, IOC, IOA) Submit #736559 | Tenda AC23 V16.03.07.52 Buffer Overflow https://github.com/xyh4ck/iot_poc/blob/main/Tenda%20AC23_Buffer_Overflow_WifiExtraSet/Tenda%20AC23_Buffer_Overflow_WifiExtraSet.md https://github.com/xyh4ck/iot_poc/blob/main/Tenda%20AC23_Buffer_Overflow_WifiExtraSet/Tenda%20AC23_Buffer_Overflow_WifiExtraSet.md#poc https://www.tenda.com.cn/ |
| Tenda–AX12 Pro V2 | A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unknown functionality of the component Telnet Service. Performing a manipulation results in hard-coded credentials. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used. | 2026-01-29 | 8.1 | CVE-2026-1610 | VDB-343378 | Tenda AX12 Pro V2 Telnet Service hard-coded credentials VDB-343378 | CTI Indicators (IOB, IOC, TTP) Submit #740766 | Tenda AX12 pro V2 V16.03.49.24_cn Hard-coded Credentials https://github.com/QIU-DIE/CVE/issues/49 https://www.tenda.com.cn/ |
| Tenda–HG10 | A weakness has been identified in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. Impacted is an unknown function of the file /boaform/formSamba of the component Boa Webserver. Executing a manipulation of the argument serverString can lead to command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-30 | 7.3 | CVE-2026-1687 | VDB-343481 | Tenda HG10 Boa Webserver formSamba command injection VDB-343481 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #741281 | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSamba-serverString-command.md https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSamba-serverString-command.md#poc https://www.tenda.com.cn/ |
| Tenda–HG10 | A vulnerability was detected in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. The impacted element is the function checkUserFromLanOrWan of the file /boaform/admin/formLogin of the component Login Interface. The manipulation of the argument Host results in command injection. The attack can be launched remotely. The exploit is now public and may be used. | 2026-01-30 | 7.3 | CVE-2026-1689 | VDB-343483 | Tenda HG10 Login formLogin checkUserFromLanOrWan command injection VDB-343483 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #741411 | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formLogin-Host-command.md#poc https://www.tenda.com.cn/ |
| Tendenci–Tendenci | Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads like ‘=10+20+cmd|’ /C calc’!A0′ in the message field to trigger arbitrary command execution when the CSV is opened in spreadsheet applications. | 2026-01-28 | 9.8 | CVE-2020-36962 | ExploitDB-49145 Official Vendor Homepage Tendenci GitHub Repository VulnCheck Advisory: Tendenci 12.3.1 – CSV/ Formula Injection |
| Testa–Testa Online Test Management System | Testa Online Test Management System 3.4.7 contains a SQL injection vulnerability that allows attackers to manipulate database queries through the ‘q’ search parameter. Attackers can inject malicious SQL code in the search field to extract database information, potentially accessing sensitive user or system data. | 2026-01-27 | 8.2 | CVE-2021-47902 | ExploitDB-49194 Archived Vendor Homepage VulnCheck Advisory: Testa Online Test Management System 3.4.7 – ‘q’ SQL Injection |
| themrdemonized–xray-monolith | Access of Resource Using Incompatible Type (‘Type Confusion’) vulnerability in themrdemonized xray-monolith. This issue affects xray-monolith: before 2025.12.30. | 2026-01-27 | 9.1 | CVE-2026-24874 | https://github.com/themrdemonized/xray-monolith/pull/399 |
| tigroumeow–AI Engine The Chatbot and AI Framework for WordPress | The AI Engine – The Chatbot and AI Framework for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `rest_helpers_update_media_metadata` function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on the affected site’s server which may make remote code execution possible. The attacker can upload a benign image file, then use the `update_media_metadata` endpoint to rename it to a PHP file, creating an executable PHP file in the uploads directory. | 2026-01-28 | 7.2 | CVE-2026-1400 | https://www.wordfence.com/threat-intel/vulnerabilities/id/d5227269-4406-4fcf-af37-f1db0af857d6?source=cve https://plugins.trac.wordpress.org/browser/ai-engine/tags/3.3.0/classes/rest.php#L1104 https://plugins.trac.wordpress.org/browser/ai-engine/tags/3.3.0/classes/rest.php#L1141 https://plugins.trac.wordpress.org/changeset/3447500/ai-engine/trunk/classes/rest.php |
| Tildeslash Ltd.–M/Monit | M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update endpoint with a crafted payload to grant administrative access to a standard user account. | 2026-01-28 | 8.8 | CVE-2020-36969 | ExploitDB-49080 M/Monit Official Vendor Homepage VulnCheck Advisory: M/Monit 3.7.4 – Privilege Escalation |
| TimeClock Software–TimeClock Software | TimeClock Software 1.01 contains an authenticated time-based SQL injection vulnerability that allows attackers to enumerate valid usernames by manipulating the ‘notes’ parameter. Attackers can inject conditional time delays in the add_entry.php endpoint to determine user existence by measuring response time differences. | 2026-01-29 | 7.1 | CVE-2020-37005 | ExploitDB-48874 Archived Product Homepage VulnCheck Advisory: TimeClock Software 1.01 Authenticated Time-Based SQL Injection |
| Totolink–A3600R | A security flaw has been discovered in Totolink A3600R 5.9c.4959. This issue affects the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. Performing a manipulation of the argument apcliSsid results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. | 2026-01-30 | 8.8 | CVE-2026-1686 | VDB-343480 | Totolink A3600R app.so setAppEasyWizardConfig buffer overflow VDB-343480 | CTI Indicators (IOB, IOC, IOA) Submit #740888 | TOTOLINK A3600R V5.9c.4959 Buffer Overflow https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A3600R/4959-apcliSsid-setAppEasyWizardConfig.md https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/ToTolink/A3600R/4959-apcliSsid-setAppEasyWizardConfig.md#poc https://www.totolink.net/ |
| TrustTunnel–TrustTunnel | TrustTunnel is an open-source VPN protocol with a server-side request forgery and and private network restriction bypass in versions prior to 0.9.114. In `tcp_forwarder.rs`, SSRF protection for `allow_private_network_connections = false` was only applied in the `TcpDestination::HostName(peer)` path. The `TcpDestination::Address(peer) => peer` path proceeded to `TcpStream::connect()` without equivalent checks (for example `is_global_ip`, `is_loopback`), allowing loopback/private targets to be reached by supplying a numeric IP. The vulnerability is fixed in version 0.9.114. | 2026-01-29 | 7.1 | CVE-2026-24902 | https://github.com/TrustTunnel/TrustTunnel/security/advisories/GHSA-hgr9-frvw-5r76 https://github.com/TrustTunnel/TrustTunnel/commit/734bb5cf103b72390a95c853cbf91e699cc01bc0 |
| TryGhost–Ghost | Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim’s permissions, potentially leading to account takeover. Ghost Portal versions 2.29.1 through 2.51.4 and 2.52.0 through 2.57.0 were vulnerable to this issue. Ghost automatically loads the latest patch of the members Portal component via CDN. For Ghost 5.x users, upgrading to v5.121.0 or later fixes the vulnerability. v5.121.0 loads Portal v2.51.5, which contains the patch. For Ghost 6.x users, upgrading to v6.15.0 or later fixes the vulnerability. v6.15.0 loads Portal v2.57.1, which contains the patch. For Ghost installations using a customized or self-hosted version of Portal, it will be necessary to manually rebuild from or update to the latest patch version. | 2026-01-27 | 8.8 | CVE-2026-24778 | https://github.com/TryGhost/Ghost/security/advisories/GHSA-gv6q-2m97-882h https://github.com/TryGhost/Ghost/commit/da858e640e88e69c1773a7b7ecdc2008fa143849 |
| Tucows Inc.–Audio Playback Recorder | Audio Playback Recorder 3.2.2 contains a local buffer overflow vulnerability in the eject and registration parameters that allows attackers to execute arbitrary code. Attackers can craft malicious payloads and overwrite Structured Exception Handler (SEH) to execute shellcode when pasting specially crafted input into the application’s input fields. | 2026-01-29 | 8.4 | CVE-2020-37013 | ExploitDB-48796 Archived Researcher Proof of Concept Video Product Software Archive VulnCheck Advisory: Audio Playback Recorder 3.2.2 – Local Buffer Overflow (SEH) |
| Tucows–Easy CD & DVD Cover Creator | Easy CD & DVD Cover Creator 4.13 contains a buffer overflow vulnerability in the serial number input field that allows attackers to crash the application. Attackers can generate a 6000-byte payload and paste it into the serial number field to trigger an application crash. | 2026-01-27 | 9.8 | CVE-2020-36940 | ExploitDB-49337 VulnCheck Advisory: Easy CD & DVD Cover Creator 4.13 – Denial of Service |
| Ubiquiti, Inc.–AirControl | AirControl 1.4.2 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through malicious Java expression injection. Attackers can exploit the /.seam endpoint by crafting a specially constructed URL with embedded Java expressions to run commands with the application’s system privileges. | 2026-01-30 | 9.8 | CVE-2020-37052 | ExploitDB-48541 Vendor Homepage VulnCheck Advisory: AirControl 1.4.2 – PreAuth Remote Code Execution |
| Veritas–NetBackup | Veritas NetBackup 7.0 contains an unquoted service path vulnerability in the NetBackup INET Daemon service that allows local users to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:Program FilesVeritasNetBackupbinbpinetd.exe to inject malicious code that would execute with elevated LocalSystem privileges. | 2026-02-01 | 7.8 | CVE-2020-37045 | ExploitDB-48227 Veritas Official Homepage VulnCheck Advisory: NetBackup 7.0 – ‘NetBackup INET Daemon’ Unquoted Service Path |
| VeryPDF.com, Inc.–docPrint Pro | docPrint Pro 8.0 contains a local buffer overflow vulnerability in the ‘Add URL’ input field that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious payload that triggers a structured exception handler (SEH) overwrite to execute shellcode and gain remote system access. | 2026-01-28 | 8.4 | CVE-2020-36965 | ExploitDB-49100 Vendor Homepage VulnCheck Advisory: docPrint Pro 8.0 – ‘Add URL’ Buffer Overflow (SEH Egghunter) |
| VestaCP–VestaCP | VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attackers can exploit insufficient token validation to access user accounts and perform unauthorized login requests without proper administrative permissions. | 2026-01-27 | 9.8 | CVE-2020-36948 | ExploitDB-49219 VestaCP Official Homepage Vulnerability Lab Advisory Benjamin Kunz Mejri Profile VulnCheck Advisory: VestaCP 0.9.8-26 – ‘LoginAs’ Insufficient Session Validation |
| VictorAlagwu–CMSsite | Victor CMS 1.0 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the profile image upload feature. Attackers can upload a PHP shell to the /img directory and execute system commands by accessing the uploaded file via web browser. | 2026-01-27 | 8.8 | CVE-2020-36942 | ExploitDB-49310 Victor CMS Project Repository VulnCheck Advisory: Victor CMS 1.0 – File Upload To RCE |
| vllm-project–vllm | vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.14.1, a Server-Side Request Forgery (SSRF) vulnerability exists in the `MediaConnector` class within the vLLM project’s multimodal feature set. The load_from_url and load_from_url_async methods obtain and process media from URLs provided by users, using different Python parsing libraries when restricting the target host. These two parsing libraries have different interpretations of backslashes, which allows the host name restriction to be bypassed. This allows an attacker to coerce the vLLM server into making arbitrary requests to internal network resources. This vulnerability is particularly critical in containerized environments like `llm-d`, where a compromised vLLM pod could be used to scan the internal network, interact with other pods, and potentially cause denial of service or access sensitive data. For example, an attacker could make the vLLM pod send malicious requests to an internal `llm-d` management endpoint, leading to system instability by falsely reporting metrics like the KV cache state. Version 0.14.1 contains a patch for the issue. | 2026-01-27 | 7.1 | CVE-2026-24779 | https://github.com/vllm-project/vllm/security/advisories/GHSA-qh4c-xf7m-gxfc https://github.com/vllm-project/vllm/pull/32746 https://github.com/vllm-project/vllm/commit/f46d576c54fb8aeec5fc70560e850bed38ef17d7 |
| WEBDAMN.COM–WebDamn User Registration & Login System with User Panel | WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating email credentials. Attackers can inject the payload ‘<email>’ OR ‘1’=’1′ in both username and password fields to gain unauthorized access to the user panel. | 2026-01-28 | 8.2 | CVE-2020-36945 | ExploitDB-49170 Vendor Homepage Software Product Page VulnCheck Advisory: WebDamn User Registration & Login System with User Panel – SQLi Auth Bypass |
| Weird Solutions–DHCP Turbo | DHCP Turbo 4.61298 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code by exploiting the service binary path. Attackers can place malicious executables in the service path to gain elevated privileges when the service starts. | 2026-02-01 | 7.8 | CVE-2020-37062 | ExploitDB-48080 Vendor Homepage VulnCheck Advisory: DHCP Turbo 4.6.1298- ‘DHCP Turbo 4’ Unquoted Service Path |
| Weird-Solutions–BOOTP Turbo | BOOTP Turbo 2.0.1214 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted executable path to inject malicious code that will be executed when the service starts with LocalSystem permissions. | 2026-02-01 | 7.8 | CVE-2020-37061 | ExploitDB-48078 Vendor Homepage VulnCheck Advisory: BOOTP Turbo 2.0.1214 – ‘BOOTP Turbo’ Unquoted Service Path |
| Weird-Solutions–TFTP Turbo | TFTP Turbo 4.6.1273 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will be launched with LocalSystem permissions. | 2026-02-01 | 7.8 | CVE-2020-37063 | ExploitDB-48085 Vendor Homepage VulnCheck Advisory: TFTP Turbo 4.6.1273 – ‘TFTP Turbo 4’ Unquoted Service Path |
| WellChoose–Single Sign-On Portal System | Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server. | 2026-01-26 | 8.8 | CVE-2026-1427 | https://www.twcert.org.tw/tw/cp-132-10654-23f40-1.html https://www.twcert.org.tw/en/cp-139-10655-59160-2.html |
| WellChoose–Single Sign-On Portal System | Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server. | 2026-01-26 | 8.8 | CVE-2026-1428 | https://www.twcert.org.tw/tw/cp-132-10654-23f40-1.html https://www.twcert.org.tw/en/cp-139-10655-59160-2.html |
| Wibu–CodeMeter | CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CodeMeter Runtime Server service to inject malicious code that would execute with LocalSystem permissions. | 2026-01-29 | 7.8 | CVE-2020-37017 | ExploitDB-48735 CodeMeter Runtime Product Homepage VulnCheck Advisory: CodeMeter 6.60 – ‘CodeMeter.exe’ Unquoted Service Path |
| WinAVR–WinAVR | WinAVR version 20100110 contains an insecure permissions vulnerability that allows authenticated users to modify system files and executables. Attackers can leverage the overly permissive access controls to potentially modify critical DLLs and executable files in the WinAVR installation directory. | 2026-01-27 | 8.8 | CVE-2020-36938 | ExploitDB-49379 WinAVR Official Project Homepage VulnCheck Advisory: WinAVR Version 20100110 – Insecure Folder Permissions |
| WinFrigate–Frigate 2 | Frigate 2.02 contains a denial of service vulnerability that allows attackers to crash the application by sending oversized input to the command line interface. Attackers can generate a payload of 8000 repeated characters and paste it into the application’s command line field to trigger an application crash. | 2026-01-30 | 7.5 | CVE-2020-37039 | ExploitDB-48613 Archived Vendor Homepage VulnCheck Advisory: Frigate 2.02 – Denial Of Service |
| WinFrigate–Frigate 3 Professional | Frigate Professional 3.36.0.9 contains a local buffer overflow vulnerability in the ‘Find Computer’ feature that allows attackers to execute arbitrary code by overflowing the computer name input field. Attackers can craft a malicious payload that triggers a buffer overflow, enabling code execution and launching calculator as a proof of concept. | 2026-01-30 | 8.4 | CVE-2020-37042 | ExploitDB-48579 Archived Vendor Homepage VulnCheck Advisory: Frigate Professional 3.36.0.9 – ‘Find Computer’ Local Buffer Overflow |
| WinFrigate–Frigate 3 Professional | Frigate 3.36.0.9 contains a local buffer overflow vulnerability in the Command Line input field that allows attackers to execute arbitrary code. Attackers can craft a malicious payload to overflow the buffer, bypass DEP, and execute commands like launching calc.exe through a specially crafted input sequence. | 2026-01-30 | 8.4 | CVE-2020-37049 | ExploitDB-48563 Archived Vendor Homepage VulnCheck Advisory: Frigate 3.36.0.9 – ‘Command Line’ Local Buffer Overflow |
| Wing FTP Server–Wing FTP Server | Wing FTP Server 6.3.8 contains a remote code execution vulnerability in its Lua-based web console that allows authenticated users to execute system commands. Attackers can leverage the console to send POST requests with malicious commands that trigger operating system execution through the os.execute() function. | 2026-01-30 | 8.8 | CVE-2020-37032 | ExploitDB-48676 Wing FTP Server Official Homepage VulnCheck Advisory: Wing FTP Server 6.3.8 – Remote Code Execution |
| Wondershare–Wondershare Driver Install Service help | Wondershare Driver Install Service contains an unquoted service path vulnerability in the ElevationService executable that allows local attackers to potentially inject malicious code. Attackers can exploit the unquoted path to replace the service binary with a malicious executable, enabling privilege escalation to LocalSystem account. | 2026-01-27 | 7.8 | CVE-2020-36977 | ExploitDB-49101 Vendor Homepage Software Product Page VulnCheck Advisory: Wondershare Driver Install Service help 10.7.1.321 – ‘ElevationService’ Unquote Service Path |
| wpcreatix–VidShop Shoppable Videos for WooCommerce | The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the ‘fields’ parameter in all versions up to, and including, 1.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2026-01-28 | 7.5 | CVE-2026-0702 | https://www.wordfence.com/threat-intel/vulnerabilities/id/a61d8d2a-742f-45f1-9146-f733b80ef195?source=cve https://plugins.trac.wordpress.org/browser/vidshop-for-woocommerce/trunk/includes/rest-api/v1/class-videos-controller.php#L224 https://plugins.trac.wordpress.org/browser/vidshop-for-woocommerce/trunk/includes/rest-api/v1/class-videos-controller.php#L297 https://plugins.trac.wordpress.org/browser/vidshop-for-woocommerce/trunk/includes/utils/class-query-builder.php#L778 https://plugins.trac.wordpress.org/changeset/3441106/ |
| yoyofr–modizer | Integer Overflow or Wraparound vulnerability in yoyofr modizer. This issue affects modizer: before 4.1.1. | 2026-01-27 | 7.8 | CVE-2026-24875 | https://github.com/yoyofr/modizer/pull/133 |
| zalando–skipper | Skipper is an HTTP router and reverse proxy for service composition. Prior to version 0.24.0, when running Skipper as an Ingress controller, users with permissions to create an Ingress and a Service of type ExternalName can create routes that enable them to use Skipper’s network access to reach internal services. Version 0.24.0 disables Kubernetes ExternalName by default. As a workaround, developers can allow list targets of an ExternalName and allow list via regular expressions. | 2026-01-26 | 8.1 | CVE-2026-24470 | https://github.com/zalando/skipper/security/advisories/GHSA-mxxc-p822-2hx9 https://github.com/zalando/skipper/commit/a4c87ce029a58eb8e1c2c1f93049194a39cf6219 https://kubernetes.io/docs/concepts/services-networking/service/#externalname |
| Zortam.com–Zortam Mp3 Media Studio | Zortam Mp3 Media Studio 27.60 contains a buffer overflow vulnerability in the library creation file selection process that allows remote code execution. Attackers can craft a malicious text file with shellcode to trigger a structured exception handler (SEH) overwrite and execute arbitrary commands on the target system. | 2026-01-28 | 9.8 | CVE-2020-36967 | ExploitDB-49084 Zortam Official Homepage Zortam Software Download Page VulnCheck Advisory: Zortam Mp3 Media Studio 27.60 – Remote Code Execution (SEH) |
Medium Vulnerabilities
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info | Patch Info |
|---|---|---|---|---|---|
| 2100 Technology–Official Document Management System | Official Document Management System developed by 2100 Technology has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to modify front-end code to read all official documents. | 2026-01-28 | 6.5 | CVE-2026-1514 | https://www.twcert.org.tw/tw/cp-132-10658-c5a07-1.html https://www.twcert.org.tw/en/cp-139-10659-264cd-2.html |
| Adikiss–Sistem Informasi Pengumuman Kelulusan Online | Sistem Informasi Pengumuman Kelulusan Online 1.0 contains a cross-site request forgery vulnerability that allows attackers to add unauthorized admin users through the tambahuser.php endpoint. Attackers can craft a malicious HTML form to submit admin credentials and create new administrative accounts without the victim’s consent. | 2026-01-30 | 5.3 | CVE-2020-37046 | ExploitDB-48571 Vendor Homepage Software Download Page VulnCheck Advisory: Sistem Informasi Pengumuman Kelulusan Online 1.0 – Cross-Site Request Forgery |
| ajay138–Knap Advanced PHP Login | Knap Advanced PHP Login 3.1.3 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script code in the name parameter. Attackers can exploit the vulnerability to execute arbitrary scripts in users and activity log backend modules, potentially leading to session hijacking and persistent phishing attacks. | 2026-02-01 | 6.4 | CVE-2022-50940 | Vulnerability Lab Advisory Laravel & Vue.js VulnCheck Advisory: Knap Advanced PHP Login 3.1.3 Persistent Cross-Site Scripting via Name Parameter |
| Akn Software Computer Import Export Industry and Trade Ltd.–QR Menu | Session Fixation vulnerability in Akın Software Computer Import Export Industry and Trade Ltd. QR Menu allows Session Fixation. This issue affects QR Menu: before s1.05.12. | 2026-01-29 | 5.7 | CVE-2025-7015 | https://www.usom.gov.tr/bildirim/tr-26-0006 |
| Author: Scott Ferreira–Free Photo & Video Vault – WiFi Transfer | Free Photo & Video Vault 0.0.2 contains a directory traversal web vulnerability that allows remote attackers to manipulate application path requests and access sensitive system files. Attackers can exploit the vulnerability without privileges to retrieve environment variables and access unauthorized system paths. | 2026-02-01 | 6.5 | CVE-2021-47921 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Free Photo & Video Vault 0.0.2 Directory Traversal Vulnerability via Web Request |
| ays-pro–Popup Box Create Countdown, Coupon, Video, Contact Form Popups | The Popup Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.1.1. This is due to a flawed nonce implementation in the ‘publish_unpublish_popupbox’ function that verifies a self-created nonce rather than one submitted in the request. This makes it possible for unauthenticated attackers to change the publish status of popups via a forged request, granted they can trick a site administrator into performing an action such as clicking a link. | 2026-01-31 | 4.3 | CVE-2026-1165 | https://www.wordfence.com/threat-intel/vulnerabilities/id/585a9eb4-f394-4cb2-9050-659171a994d9?source=cve https://plugins.trac.wordpress.org/browser/ays-popup-box/tags/6.1.0/admin/partials/ays-pb-admin-display.php#L22 https://plugins.trac.wordpress.org/browser/ays-popup-box/tags/6.1.0/includes/lists/class-ays-pb-list-table.php#L701 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3439514@ays-popup-box/tags/6.1.1/&new=3444612@ays-popup-box/tags/6.1.2/ |
| B&R Industrial Automation GmbH–Process Visualization Interface (PVI) | An Insertion of Sensitive Information into Log File vulnerability in B&R PVI client versions prior to 6.5 may be abused by an authenticated local attacker to gather credential information which is processed by the PVI client application. The logging function of the PVI client application is disabled by default and must be explicitly enabled by the user. | 2026-01-29 | 5 | CVE-2026-0936 | https://www.br-automation.com/fileadmin/SA26P001-2862434c.pdf |
| backstage–backstage | Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, a path traversal vulnerability in the TechDocs local generator allows attackers to read arbitrary files from the host filesystem when Backstage is configured with `techdocs.generator.runIn: local`. When processing documentation from untrusted sources, symlinks within the docs directory are followed by MkDocs during the build process. File contents are embedded into generated HTML and exposed to users who can view the documentation. This vulnerability is fixed in` @backstage/plugin-techdocs-node` versions 1.13.11 and 1.14.1. Some workarounds are available. Switch to `runIn: docker` in `app-config.yaml` and/or restrict write access to TechDocs source repositories to trusted users only. | 2026-01-30 | 5.3 | CVE-2026-25152 | https://github.com/backstage/backstage/security/advisories/GHSA-w669-jj7h-88m9 |
| Banco de Guayaquil–Banco Guayaquil | Banco Guayaquil 8.0.0 mobile iOS application contains a persistent cross-site scripting vulnerability in the TextBox Name Profile input. Attackers can inject malicious script code through a POST request that executes on application review without user interaction. | 2026-02-01 | 6.4 | CVE-2022-50952 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Banco Guayaquil 8.0.0 Mobile iOS Cross-Site Scripting via Profile Name Input |
| Bdtask–Bhojon All-In-One Restaurant Management System | A vulnerability was determined in Bdtask Bhojon All-In-One Restaurant Management System up to 20260116. The affected element is an unknown function of the file /hungry/placeorder of the component Checkout. Executing a manipulation of the argument orggrandTotal/vat/service_charge/grandtotal can lead to business logic errors. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 4.3 | CVE-2026-1599 | VDB-343361 | Bdtask Bhojon All-In-One Restaurant Management System Checkout placeorder logic error VDB-343361 | CTI Indicators (IOB, IOC, IOA) Submit #740740 | Bdtask Bhojon All-In-One Restaurant Management System latest Business Logic Errors https://github.com/4m3rr0r/PoCVulDb/issues/13 https://www.youtube.com/watch?v=n7xLBAOrKAU |
| Bdtask–Bhojon All-In-One Restaurant Management System | A vulnerability was identified in Bdtask Bhojon All-In-One Restaurant Management System up to 20260116. The impacted element is an unknown function of the file /hungry/addtocart of the component Add-to-Cart Submission Endpoint. The manipulation of the argument price/allprice leads to business logic errors. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 4.3 | CVE-2026-1600 | VDB-343362 | Bdtask Bhojon All-In-One Restaurant Management System Add-to-Cart Submission Endpoint addtocart logic error VDB-343362 | CTI Indicators (IOB, IOC, IOA) Submit #740741 | Bdtask Bhojon All-In-One Restaurant Management System latest Business Logic Errors https://github.com/4m3rr0r/PoCVulDb/issues/14 https://www.youtube.com/watch?v=UESZTjVS4Fs |
| Bdtask–SalesERP | A vulnerability has been found in Bdtask SalesERP up to 20260116. This issue affects some unknown processing of the component Administrative Endpoint. Such manipulation of the argument ci_session leads to improper authorization. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 6.3 | CVE-2026-1597 | VDB-343359 | Bdtask SalesERP Administrative Endpoint improper authorization VDB-343359 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740735 | Bdtask SalesERP — AI-Powered ERP Software For Small Business Unknown Broken Access Control / Privilege Escalation https://github.com/4m3rr0r/PoCVulDb/issues/11 https://www.youtube.com/watch?v=KSducixS3pk |
| Beckhoff Automation–Beckhoff.Device.Manager.XAR | A low privileged remote attacker may be able to disclose confidential information from the memory of a privileged process by sending specially crafted calls to the Device Manager web service that cause an out-of-bounds read operation under certain circumstances due to ASLR and thereby potentially copy confidential information into a response. | 2026-01-27 | 5.3 | CVE-2025-41728 | https://certvde.com/de/advisories/VDE-2025-092 |
| Beetel–777VR1 | A vulnerability was detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. Impacted is an unknown function of the component UART Interface. The manipulation results in missing authentication. An attack on the physical device is feasible. This attack is characterized by high complexity. The exploitability is considered difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-26 | 6.4 | CVE-2026-1410 | VDB-342799 | Beetel 777VR1 UART missing authentication VDB-342799 | CTI Indicators (IOB, IOC) Submit #739433 | Beetel Beetel 777VR1 Broadband Router Firmware Versions: V01.00.09 / V01.00.09_55 CWE-306” Missing Authentication for Critical Function https://gist.github.com/raghav20232023/96a6b13ab00c493d21362e744627ea9f |
| Beetel–777VR1 | A flaw has been found in Beetel 777VR1 up to 01.00.09/01.00.09_55. The affected element is an unknown function of the component UART Interface. This manipulation causes improper access controls. It is feasible to perform the attack on the physical device. The complexity of an attack is rather high. The exploitability is described as difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-26 | 6.1 | CVE-2026-1411 | VDB-342800 | Beetel 777VR1 UART access control VDB-342800 | CTI Indicators (IOB, IOC, TTP) Submit #740674 | Beetel Beetel 777VR1 Broadband Router Firmware Versions: V01.00.09 / V01.00.09_55 CWE-284” Improper Access Control https://gist.github.com/raghav20232023/ea6adcd6d1eca35683570a1094164bd3 |
| bfintal–Interactions Create Interactive Experiences in the Block Editor | The Interactions – Create Interactive Experiences in the Block Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event selectors in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2025-12709 | https://www.wordfence.com/threat-intel/vulnerabilities/id/ab97f125-3a4a-4293-b218-07586c1c021c?source=cve https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3448073%40interactions&new=3448073%40interactions |
| birkir–prime | birkir prime <= 0.4.0.beta.0 contains a cross-site request forgery vulnerability in its GraphQL endpoint that allows attackers to exploit GET-based query requests. Attackers can craft malicious GET requests to trigger unauthorized actions against privileged users by manipulating GraphQL query parameters. | 2026-01-29 | 5.3 | CVE-2025-15550 | GitHub Issue #547 VulnCheck Advisory: birkir prime <= 0.4.0.beta.0 – Cross-Site Request Forgery in GraphQL |
| bobthecow–psysh | PsySH is a runtime developer console, interactive debugger, and REPL for PHP. Prior to versions 0.11.23 and 0.12.19, PsySH automatically loads and executes a `.psysh.php` file from the Current Working Directory (CWD) on startup. If an attacker can write to a directory that a victim later uses as their CWD when launching PsySH, the attacker can trigger arbitrary code execution in the victim’s context. When the victim runs PsySH with elevated privileges (e.g., root), this results in local privilege escalation. This is a CWD configuration poisoning issue leading to arbitrary code execution in the victim user’s context. If a privileged user (e.g., root, a CI runner, or an ops/debug account) launches PsySH with CWD set to an attacker-writable directory containing a malicious `.psysh.php`, the attacker can execute commands with that privileged user’s permissions, resulting in local privilege escalation. Downstream consumers that embed PsySH inherit this risk. For example, Laravel Tinker (`php artisan tinker`) uses PsySH. If a privileged user runs Tinker while their shell is in an attacker-writable directory, the `.psysh.php` auto-load behavior can be abused in the same way to execute attacker-controlled code under the victim’s privileges. Versions 0.11.23 and 0.12.19 patch the issue. | 2026-01-30 | 6.7 | CVE-2026-25129 | https://github.com/bobthecow/psysh/security/advisories/GHSA-4486-gxhx-5mg7 https://github.com/bobthecow/psysh/releases/tag/v0.11.23 https://github.com/bobthecow/psysh/releases/tag/v0.12.19 |
| bolo-solo–bolo-solo | A vulnerability has been found in bolo-solo up to 2.6.4. This impacts the function importMarkdownsSync of the file src/main/java/org/b3log/solo/bolo/prop/BackupService.java of the component SnakeYAML. Such manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | 2026-01-30 | 6.3 | CVE-2026-1691 | VDB-343485 | bolo-solo SnakeYAML BackupService.java importMarkdownsSync deserialization VDB-343485 | CTI Indicators (IOB, IOC, IOA) Submit #741899 | bolo-solo V2.6.4 SnakeYAML deserialization vulnerability https://github.com/bolo-blog/bolo-solo/issues/325 https://github.com/bolo-blog/bolo-solo/issues/325#issue-3828755519 |
| bplugins–Document Embedder Embed PDFs, Word, Excel, and Other Files | The Document Embedder – Embed PDFs, Word, Excel, and Other Files plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.4. This is due to the plugin not verifying that a user has permission to access the requested resource in the ‘bplde_save_document_library’, ‘bplde_get_single’, and ‘bplde_delete_document_library’ AJAX actions. This makes it possible for authenticated attackers, with Author-level access and above, to read, modify, and delete Document Library entries created by other users, including administrators, via the ‘id’ parameter. | 2026-01-28 | 5.3 | CVE-2026-1389 | https://www.wordfence.com/threat-intel/vulnerabilities/id/59d14f6c-6286-454c-8629-96a0c2de943c?source=cve https://plugins.trac.wordpress.org/browser/document-emberdder/tags/2.0.3/includes/DocumentLibrary/Init-DocumentLibrary.php#L66 https://plugins.trac.wordpress.org/browser/document-emberdder/tags/2.0.3/includes/DocumentLibrary/Init-DocumentLibrary.php#L103 https://plugins.trac.wordpress.org/browser/document-emberdder/tags/2.0.3/includes/DocumentLibrary/Init-DocumentLibrary.php#L159 https://plugins.trac.wordpress.org/browser/document-emberdder/tags/2.0.5/includes/DocumentLibrary/Init-DocumentLibrary.php |
| Broadcom–Symantec Endpoint Protection Windows Client | Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | 2026-01-28 | 6.7 | CVE-2025-13918 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36774 |
| Broadcom–Symantec Endpoint Protection Windows Client | Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry. | 2026-01-28 | 4.4 | CVE-2025-13919 | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36774 |
| Brother Industries, Ltd.–Multiple MFPs | Hidden functionality issue exists in multiple MFPs provided by Brother Industries, Ltd., which may allow an attacker to obtain the logs of the affected product and obtain sensitive information within the logs. | 2026-01-29 | 5.3 | CVE-2025-55704 | https://faq.brother.co.jp/app/answers/detail/a_id/13716 https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2026-0001.pdf https://jvn.jp/en/vu/JVNVU92878805/ |
| Bun–Bun | In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by a non-npm package in the case of a matching name (for file, link, git, or github). | 2026-01-27 | 5.9 | CVE-2026-24910 | https://www.scworld.com/news/six-javascript-zero-day-bugs-lead-to-fears-of-supply-chain-attack https://bun.com/blog/bun-v1.3.5 https://www.koi.ai/blog/packagegate-6-zero-days-in-js-package-managers-but-npm-wont-act |
| chainguard-dev–malcontent | malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls. | 2026-01-29 | 6.5 | CVE-2026-24845 | https://github.com/chainguard-dev/malcontent/security/advisories/GHSA-9m43-p3cx-w8j5 https://github.com/chainguard-dev/malcontent/commit/538ed00cdc639d687a4bd1e843a2be0428a3b3e7 |
| chainguard-dev–malcontent | malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 1.8.0 and prior to version 1.20.3, malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The `handleSymlink` function received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory. Version 1.20.3 introduces fixes that swap handleSymlink arguments, validate symlink location, and validate symlink targets that resolve within an extraction directory. | 2026-01-29 | 5.5 | CVE-2026-24846 | https://github.com/chainguard-dev/malcontent/security/advisories/GHSA-923j-vrcg-hxwh https://github.com/chainguard-dev/malcontent/commit/259fca5abc004f3ab238895463ef280a87f30e96 https://github.com/chainguard-dev/malcontent/commit/a7dd8a5328ddbaf235568437813efa7591e00017 |
| chrisnowak–Change WP URL | The Change WP URL plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the ‘change-wp-url’ page. This makes it possible for unauthenticated attackers to change the WP Login URL via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2026-01-28 | 4.3 | CVE-2026-1398 | https://www.wordfence.com/threat-intel/vulnerabilities/id/f5dead05-5960-4ccb-89c2-c8bb0cd9c9e9?source=cve https://plugins.trac.wordpress.org/browser/change-wp-url/trunk/change-wp-url.php#L18 https://plugins.trac.wordpress.org/browser/change-wp-url/tags/1.0/change-wp-url.php#L18 https://plugins.trac.wordpress.org/browser/change-wp-url/trunk/change-wp-url.php#L85 https://plugins.trac.wordpress.org/browser/change-wp-url/tags/1.0/change-wp-url.php#L85 |
| code-projects–Online Examination System | A vulnerability was determined in code-projects Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /admin_pic.php. Executing a manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. | 2026-01-26 | 6.3 | CVE-2026-1423 | VDB-342839 | code-projects Online Examination System admin_pic.php unrestricted upload VDB-342839 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736607 | code-projects Online Examination System 1 Unrestricted Upload https://github.com/geo-chen/code-projects/blob/main/Online%20Examination%20System%20In%20PHP%20With%20Source%20Code.md#finding-3-remote-code-execution-via-unsafe-file-upload https://code-projects.org/ |
| code-projects–Online Music Site | A security flaw has been discovered in code-projects Online Music Site 1.0. The impacted element is an unknown function of the file /Administrator/PHP/AdminAddCategory.php. The manipulation results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. | 2026-01-28 | 4.7 | CVE-2026-1533 | VDB-343219 | code-projects Online Music Site AdminAddCategory.php sql injection VDB-343219 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738704 | Code-Projects ONLINE MUSIC SITE V1.0 SQL injection https://github.com/yuji0903/silver-guide/issues/2 https://code-projects.org/ |
| codeccoop–Forms Bridge Infinite integrations | The Forms Bridge – Infinite integrations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ shortcode attribute in the ‘financoop_campaign’ shortcode in all versions up to, and including, 4.2.5. This is due to insufficient input sanitization and output escaping on the user-supplied ‘id’ parameter in the forms_bridge_financoop_shortcode_error function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2026-1244 | https://www.wordfence.com/threat-intel/vulnerabilities/id/3e047822-5766-4e7f-be89-f4a15f0e6d51?source=cve https://plugins.trac.wordpress.org/browser/forms-bridge/trunk/addons/financoop/shortcodes.php#L389 https://plugins.trac.wordpress.org/browser/forms-bridge/tags/4.2.3/addons/financoop/shortcodes.php#L389 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3446693%40forms-bridge&new=3446693%40forms-bridge&sfp_email=&sfph_mail=#file1 |
| codepeople–Appointment Hour Booking Booking Calendar | The Appointment Hour Booking – Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form field configuration parameters in all versions up to, and including, 1.5.60 due to insufficient input sanitization and output escaping on the ‘Min length/characters’ and ‘Max length/characters’ field configuration values. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the form builder interface. This only affects multi-site installations and installations where unfiltered_html has been disabled. | 2026-01-28 | 4.4 | CVE-2026-1083 | https://www.wordfence.com/threat-intel/vulnerabilities/id/a5cb1fea-134f-4c81-8f2f-76ee42df7f77?source=cve https://plugins.trac.wordpress.org/browser/appointment-hour-booking/trunk/js/fields-admin/01_fbuilder.ftext.js#L64 https://plugins.trac.wordpress.org/browser/appointment-hour-booking/tags/1.5.57/js/fields-admin/01_fbuilder.ftext.js#L64 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442650%40appointment-hour-booking&new=3442650%40appointment-hour-booking&sfp_email=&sfph_mail= |
| CriticalGears–PayPal PRO Payment Terminal | Multiple payment terminal versions contain non-persistent cross-site scripting vulnerabilities in billing and payment information input fields. Attackers can inject malicious script code through vulnerable parameters to manipulate client-side requests and potentially execute session hijacking or phishing attacks. | 2026-02-01 | 6.4 | CVE-2021-47885 | Vulnerability Lab Advisory Product Homepage Product Homepage Product Homepage VulnCheck Advisory: Payment Terminal Multiple Versions Non-Persistent Cross-Site Scripting |
| crmperks–Database for Contact Form 7, WPforms, Elementor forms | The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing the CSV export endpoint with an export key that is exposed in publicly accessible page source code. The vulnerability is created because while the shortcode properly filters displayed entries by user, the CSV export handler completely bypasses this filtering and exports all entries regardless of user permissions. | 2026-01-28 | 5.3 | CVE-2026-0825 | https://www.wordfence.com/threat-intel/vulnerabilities/id/4048ae11-fece-42aa-baf3-c636c4875635?source=cve https://plugins.trac.wordpress.org/browser/contact-form-entries/trunk/contact-form-entries.php#L76 https://plugins.trac.wordpress.org/browser/contact-form-entries/tags/1.4.5/contact-form-entries.php#L76 https://plugins.trac.wordpress.org/browser/contact-form-entries/trunk/contact-form-entries.php#L301 https://plugins.trac.wordpress.org/browser/contact-form-entries/trunk/templates/leads-table.php#L10 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442962%40contact-form-entries&new=3442962%40contact-form-entries&sfp_email=&sfph_mail= |
| D-Link–DCS700l | A weakness has been identified in D-Link DCS700l 1.03.09. Affected is an unknown function of the file /setDayNightMode of the component Web Form Handler. Executing a manipulation of the argument LightSensorControl can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-26 | 4.7 | CVE-2026-1419 | VDB-342815 | D-Link DCS700l Web Form setDayNightMode command injection VDB-342815 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736554 | D-Link DCS700l v1.03.09 Command Injection https://tzh00203.notion.site/D-Link-DCS700l-v1-03-09-Command-Injection-Vulnerability-in-LightSensorControl-Parameter-2e6b5c52018a80ada0f6d7e72efd7a45?source=copy_link https://www.dlink.com/ |
| D-Link–DIR-823X | A security flaw has been discovered in D-Link DIR-823X 250416. Impacted is the function sub_41E2A0 of the file /goform/set_mode. Performing a manipulation of the argument lan_gateway results in os command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. | 2026-01-28 | 6.3 | CVE-2026-1544 | VDB-343228 | D-Link DIR-823X set_mode sub_41E2A0 os command injection VDB-343228 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739155 | D-Link DIR-823X 250416 OS Command Injection https://github.com/master-abc/cve/issues/16 https://www.dlink.com/ |
| D-Link–DWR-M961 | A flaw has been found in D-Link DWR-M961 1.1.47. This vulnerability affects the function sub_419920 of the file /boafrm/formLtefotaUpgradeQuectel. This manipulation of the argument fota_url causes command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. | 2026-01-29 | 6.3 | CVE-2026-1596 | VDB-343358 | D-Link DWR-M961 formLtefotaUpgradeQuectel sub_419920 command injection VDB-343358 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740693 | D-Link DWR-M961 V1.1.47 Command Injection https://github.com/QIU-DIE/CVE/issues/48 https://www.dlink.com/ |
| D-Link–DWR-M961 | A security vulnerability has been detected in D-Link DWR-M961 1.1.47. The affected element is an unknown function of the file /boafrm/formLtefotaUpgradeFibocom. Such manipulation of the argument fota_url leads to command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. | 2026-01-29 | 6.3 | CVE-2026-1624 | VDB-343383 | D-Link DWR-M961 formLtefotaUpgradeFibocom command injection VDB-343383 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740770 | D-Link DWR-M961 V1.1.47 Command Injection https://github.com/QIU-DIE/CVE/issues/50 https://www.dlink.com/ |
| D-Link–DWR-M961 | A vulnerability was detected in D-Link DWR-M961 1.1.47. The impacted element is the function sub_4250E0 of the file /boafrm/formSmsManage of the component SMS Message. Performing a manipulation of the argument action_value results in command injection. The attack may be initiated remotely. The exploit is now public and may be used. | 2026-01-29 | 6.3 | CVE-2026-1625 | VDB-343384 | D-Link DWR-M961 SMS Message formSmsManage sub_4250E0 command injection VDB-343384 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740792 | D-Link DW V1.1.47 Command Injection https://github.com/QIU-DIE/CVE/issues/51 https://www.dlink.com/ |
| dcooney–Ajax Load More Infinite Scroll, Load More, & Lazy Load | The Ajax Load More – Infinite Scroll, Load More, & Lazy Load plugin for WordPress is vulnerable to unauthorized access of data due to incorrect authorization on the parse_custom_args() function in all versions up to, and including, 7.8.1. This makes it possible for unauthenticated attackers to expose the titles and excerpts of private, draft, pending, scheduled, and trashed posts. | 2026-01-31 | 5.3 | CVE-2025-15525 | https://www.wordfence.com/threat-intel/vulnerabilities/id/d01f4e67-a463-4973-97b1-41a64398686a?source=cve https://plugins.trac.wordpress.org/browser/ajax-load-more/tags/7.8.1/core/classes/class-alm-queryargs.php#L500 |
| Dell–OpenManage Network Integration | Dell OpenManage Network Integration, versions prior to 3.9, contains an Improper Authentication vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure. | 2026-01-29 | 4.3 | CVE-2026-22764 | https://www.dell.com/support/kbdoc/en-us/000420893/dsa-2026-045-security-update-for-dell-openmanage-network-integration-omni-vulnerabilities |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, non-admin moderators with the `moderators_change_post_ownership` setting enabled can change ownership of posts in private messages and restricted categories they cannot access, then export their data to view the content. This is a broken access control vulnerability affecting sites that grant moderators post ownership transfer permissions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. The patch adds visibility checks for both the topic and posts before allowing ownership transfer. As a workaround, disable the `moderators_change_post_ownership` site setting to prevent non-admin moderators from using the post ownership transfer feature. | 2026-01-28 | 6.9 | CVE-2025-68933 | https://github.com/discourse/discourse/security/advisories/GHSA-hpxv-mw7v-fqg2 |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, authenticated users can submit crafted payloads to /drafts.json that cause O(n^2) processing in Base62.decode, tying up workers for 35-60 seconds per request. This affects all users as the shared worker pool becomes exhausted. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. Lowering the max_draft_length site setting reduces attack surface but does not fully mitigate the issue, as payloads under the limit can still trigger the slow code path. | 2026-01-28 | 6.5 | CVE-2025-68934 | https://github.com/discourse/discourse/security/advisories/GHSA-vwjh-vrx9-9849 |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, moderators can convert some personal messages to public topics when they shouldn’t have access. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. As a workaround, site admin can temporarily revoke the moderation role from untrusted moderators or remove the moderator group from the “personal message enabled groups” site setting until the Discourse instance has been upgraded to a version that has been patched. | 2026-01-28 | 6.5 | CVE-2026-21865 | https://github.com/discourse/discourse/security/advisories/GHSA-4777-wrv5-3g39 |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, non-admin moderators can view sensitive information in staff action logs that should be restricted to administrators only. The exposed information includes webhook payload URLs and secrets, API key details, site setting changes, private message content, restricted category names and structures, and private chat channel titles. This allows moderators to bypass intended access controls and extract confidential data by monitoring the staff action logs. With leaked webhook secrets, an attacker could potentially spoof webhook events to integrated services. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. As a workaround, site administrators should review and limit moderator appointments to fully trusted users. There is no configuration-based workaround to prevent this access. | 2026-01-28 | 6.5 | CVE-2026-24742 | https://github.com/discourse/discourse/security/advisories/GHSA-hwjv-9gqj-m7h6 |
| discourse–discourse | Discourse is an open source discussion platform. A vulnerability present in versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 affects anyone who uses S3 for uploads. While scripts may be executed, they will only be run in the context of the S3/CDN domain, with no site credentials. Versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 fix the issue. As a workaround, disallow html or xml files for uploads in authorized_extensions. For existing html xml uploads, site owners can consider deleting them. | 2026-01-28 | 4.6 | CVE-2025-66488 | https://github.com/discourse/discourse/security/advisories/GHSA-68jp-3934-62rx |
| discourse–discourse | Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have a content-security-policy-mitigated cross-site scriptinv vulnerability on the Discourse Math plugin when using its KaTeX variant. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. As a workaround, the Discourse Math plugin can be disabled, or the Mathjax provider can be used instead of KaTeX. | 2026-01-28 | 4.6 | CVE-2025-67723 | https://github.com/discourse/discourse/security/advisories/GHSA-955h-m28g-5379 |
| discourse–discourse | Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application level denial of service vulnerabilityin the username change functionality at try.discourse.org. The vulnerability allows attackers to cause noticeable server delays and resource exhaustion by sending large JSON payloads to the username preference endpoint PUT /u//preferences/username, resulting in degraded performance for other users and endpoints. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available. | 2026-01-28 | 4.3 | CVE-2025-68659 | https://github.com/discourse/discourse/security/advisories/GHSA-rmp6-c9rq-6q7p |
| dnnsoftware–Dnn.Platform | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a content editor could inject scripts in module headers/footers that would run for other users. Versions 9.13.10 and 10.2.0 contain a fix for the issue. | 2026-01-27 | 6.8 | CVE-2026-24784 | https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-jjwg-4948-6wxp |
| Dokploy–dokploy | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, the Dokploy web interface is vulnerable to Clickjacking attacks due to missing frame-busting headers. This allows attackers to embed Dokploy pages in malicious iframes and trick authenticated users into performing unintended actions. Version 0.26.6 patches the issue. | 2026-01-28 | 4.7 | CVE-2026-24839 | https://github.com/Dokploy/dokploy/security/advisories/GHSA-c94j-8wgf-2q9q https://github.com/Dokploy/dokploy/pull/3500 https://github.com/Dokploy/dokploy/commit/9714695d5a78fe24496f989ab81807ba04699df8 |
| Dolibarr–Dolibarr | Dolibarr 11.0.3 contains a persistent cross-site scripting vulnerability in LDAP synchronization settings that allows attackers to inject malicious scripts through multiple parameters. Attackers can exploit the host, slave, and port parameters in /dolibarr/admin/ldap.php to execute arbitrary JavaScript and potentially steal user cookie information. | 2026-01-30 | 6.4 | CVE-2020-36966 | ExploitDB-48504 Official Dolibarr Product Homepage VulnCheck Advisory: Dolibarr 11.0.3 – ‘ldap.php’ – Persistent Cross-Site Scripting |
| Eclipse Foundation–Eclipse ThreadX – USBX | The function _ux_host_class_storage_media_mount() is responsible for mounting partitions on a USB mass storage device. When it encounters an extended partition entry in the partition table, it recursively calls itself to mount the next logical partition. This recursion occurs in _ux_host_class_storage_partition_read(), which parses up to four partition entries. If an extended partition is found (with type UX_HOST_CLASS_STORAGE_PARTITION_EXTENDED or EXTENDED_LBA_MAPPED), the code invokes: _ux_host_class_storage_media_mount(storage, sector + _ux_utility_long_get(…)); There is no limit on the recursion depth or tracking of visited sectors. As a result, a malicious or malformed disk image can include cyclic or excessively deep chains of extended partitions, causing the function to recurse until stack overflow occurs. | 2026-01-27 | 4.2 | CVE-2025-55095 | https://github.com/eclipse-threadx/usbx/security/advisories/GHSA-qfmp-wch9-rpv2 |
| Esri–ArcGIS Pro | There is a Cross Site Scripting issue in Esri ArcGIS Pro versions 3.6.0 and earlier. A local attacker could supply malicious strings into ArcGIS Pro which may execute when a specific dialog is opened. This issue is fixed in ArcGIS Pro 3.6.1. | 2026-01-26 | 5 | CVE-2026-1446 | https://www.esri.com/arcgis-blog/products/arcgis-pro/administration/arcgis-pro-3-6-1-patch |
| EVerest–everest-core | EVerest is an EV charging software stack. In versions up to and including 2025.12.1, it is possible to bypass the sequence state verification including authentication, and send requests that transition to forbidden states relative to the current one, thereby updating the current context with illegitimate data.cThanks to the modular design of EVerest, authorization is handled in a separate module and EVSEManager Charger internal state machine cannot transition out of the `WaitingForAuthentication` state through ISO 15118-2 communication. From this state, it was however possible through ISO 15118-2 messages which are published to the MQTT server to trick it into preparing to charge, and even to prepare to send current. The final requirement to actually send current to the EV was the closure of the contactors, which does not appear to be possible without leaving the `WaitingForAuthentication` state and leveraging ISO 15118-2 messages. As of time of publication, no fixed versions are available. | 2026-01-26 | 4.3 | CVE-2026-24003 | https://github.com/EVerest/everest-core/security/advisories/GHSA-9vv5-67cv-9crq https://github.com/EVerest/everest-core/blob/main/modules/EVSE/EvseV2G/iso_server.cpp#L44 |
| Filigran–OpenCTI | OpenCTI 3.3.1 is vulnerable to a reflected cross-site scripting (XSS) attack via the /graphql endpoint. An attacker can inject arbitrary JavaScript code by sending a crafted GET request with a malicious payload in the query string, leading to execution of JavaScript in the victim’s browser. For example, a request to /graphql?’”–></style></scRipt><scRipt>alert(‘Raif_Berkay’)</scRipt> will trigger an alert. This vulnerability was discovered by Raif Berkay Dincel and confirmed on Linux Mint and Windows 10. | 2026-01-30 | 5.4 | CVE-2020-37044 | ExploitDB-48595 OpenCTI Official Homepage OpenCTI GitHub Repository VulnCheck Advisory: OpenCTI 3.3.1 – Cross Site Scripting |
| forma–E-Learning Suite | Forma.lms The E-Learning Suite 2.3.0.2 contains a persistent cross-site scripting vulnerability in multiple course and profile parameters. Attackers can inject malicious scripts in course code, name, description fields, and email parameter to execute arbitrary JavaScript without proper input sanitization. | 2026-01-30 | 6.4 | CVE-2020-36998 | ExploitDB-48478 Vendor Homepage Software Download Link VulnCheck Advisory: forma.lms The E-Learning Suite 2.3.0.2 – Persistent Cross-Site Scripting |
| Formalms–Forma LMS | Forma LMS 2.3 contains a stored cross-site scripting vulnerability that allows attackers to inject malicious scripts into user profile first and last name fields. Attackers can craft scripts like ‘<script>alert(document.cookie)</script>’ to execute arbitrary JavaScript when the profile is viewed by other users. | 2026-01-26 | 6.4 | CVE-2020-36960 | ExploitDB-49197 Official Product Website VulnCheck Advisory: Forma LMS 2.3 – ‘First & Last Name’ Stored Cross-Site Scripting |
| Free5GC–SMF | A flaw has been found in Free5GC SMF up to 4.1.0. Affected is the function HandlePfcpAssociationReleaseRequest of the file internal/pfcp/handler/handler.go of the component PFCP UDP Endpoint. Executing a manipulation can lead to null pointer dereference. The attack may be launched remotely. The exploit has been published and may be used. A patch should be applied to remediate this issue. | 2026-01-30 | 5.3 | CVE-2026-1682 | VDB-343475 | Free5GC SMF PFCP UDP Endpoint handler.go HandlePfcpAssociationReleaseRequest null pointer dereference VDB-343475 | CTI Indicators (IOB, IOC, IOA) Submit #739508 | free5gc SMF v4.1.0 Denial of Service https://github.com/free5gc/free5gc/issues/794 https://github.com/free5gc/free5gc/issues/794#issuecomment-3761063382 https://github.com/free5gc/free5gc/issues/794#issue-3811888505 https://github.com/free5gc/smf/pull/188 |
| Free5GC–SMF | A vulnerability has been found in Free5GC SMF up to 4.1.0. Affected by this vulnerability is the function HandlePfcpSessionReportRequest of the file internal/pfcp/handler/handler.go of the component PFCP. The manipulation leads to denial of service. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. To fix this issue, it is recommended to deploy a patch. | 2026-01-30 | 5.3 | CVE-2026-1683 | VDB-343476 | Free5GC SMF PFCP handler.go HandlePfcpSessionReportRequest denial of service VDB-343476 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739653 | free5gc SMF v4.1.0 Denial of Service Submit #739654 | free5gc SMF v4.1.0 Denial of Service (Duplicate) https://github.com/free5gc/free5gc/issues/804 https://github.com/free5gc/free5gc/issues/804#issue-3816086696 https://github.com/free5gc/smf/pull/188 |
| Free5GC–SMF | A vulnerability was found in Free5GC SMF up to 4.1.0. Affected by this issue is the function HandleReports of the file /internal/context/pfcp_reports.go of the component PFCP UDP Endpoint. The manipulation results in denial of service. The attack can be executed remotely. It is advisable to implement a patch to correct this issue. | 2026-01-30 | 5.3 | CVE-2026-1684 | VDB-343477 | Free5GC SMF PFCP UDP Endpoint pfcp_reports.go HandleReports denial of service VDB-343477 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739655 | free5gc SMF v4.1.0 Denial of Service Submit #739656 | free5gc SMF v4.1.0 Denial of Service (Duplicate) https://github.com/free5gc/free5gc/issues/806 https://github.com/free5gc/smf/pull/188 |
| Froxlor–Froxlor Froxlor Server Management Panel | Froxlor Server Management Panel 0.10.16 contains a persistent cross-site scripting vulnerability in customer registration input fields. Attackers can inject malicious scripts through username, name, and firstname parameters to execute code when administrators view customer traffic modules. | 2026-01-27 | 6.4 | CVE-2020-36978 | ExploitDB-49063 Official Froxlor Homepage Froxlor Download Page Vulnerability Lab Advisory Vulnerability Lab Profile Researcher Profile VulnCheck Advisory: Froxlor Froxlor Server Management Panel 0.10.16 – Persistent Cross-Site Scripting |
| Getgrav–Grav CMS Admin Plugin | Grav CMS 1.6.30 with Admin Plugin 1.9.18 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the page title field. Attackers can create a new page with a malicious script in the title, which will be executed when the page is viewed in the admin panel or on the site. | 2026-01-26 | 6.4 | CVE-2020-36955 | ExploitDB-49264 Grav CMS Official Homepage VulnCheck Advisory: Grav CMS 1.6.30 Admin Plugin 1.9.18 – ‘Page Title’ Persistent Cross-Site Scripting |
| gi-docgen–gi-docgen | A flaw was found in the gi-docgen. This vulnerability allows arbitrary JavaScript execution in the context of the page – enabling DOM access, session cookie theft and other client-side attacks – via a crafted URL that supplies a malicious value to the q GET parameter (reflected DOM XSS). | 2026-01-26 | 6.1 | CVE-2025-11687 | https://access.redhat.com/security/cve/CVE-2025-11687 RHBZ#2403536 https://gitlab.gnome.org/GNOME/gi-docgen/-/issues/228 |
| GitoxideLabs–gitoxide | A flaw was found in gix-date. The `gix_date::parse::TimeBuf::as_str` function can generate strings containing invalid non-UTF8 characters. This issue violates the internal safety invariants of the `TimeBuf` component, leading to undefined behavior when these malformed strings are subsequently processed. This could potentially result in application instability or other unforeseen consequences. | 2026-01-26 | 6.8 | CVE-2026-0810 | https://access.redhat.com/security/cve/CVE-2026-0810 RHBZ#2427057 https://crates.io/crates/gix-date https://github.com/GitoxideLabs/gitoxide/issues/2305 https://rustsec.org/advisories/RUSTSEC-2025-0140.html |
| Goautodial–GOautodial | GOautodial 4.0 contains a persistent cross-site scripting vulnerability that allows authenticated agents to inject malicious scripts through message subjects. Attackers can craft messages with embedded JavaScript that will execute when an administrator reads the message, potentially stealing session cookies or executing client-side attacks. | 2026-01-29 | 6.4 | CVE-2020-37018 | ExploitDB-48690 Official Vendor Homepage VulnCheck Advisory: GOautodial 4.0 – Persistent Cross-Site Scripting |
| GPAc–GPAC | A security vulnerability has been detected in GPAC up to 2.4.0. This affects the function gf_text_import_srt_bifs of the file src/scene_manager/text_to_bifs.c of the component SRT Subtitle Import. Such manipulation leads to out-of-bounds write. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. The name of the patch is 10c73b82cf0e367383d091db38566a0e4fe71772. It is best practice to apply a patch to resolve this issue. | 2026-01-26 | 5.3 | CVE-2026-1418 | VDB-342807 | GPAC SRT Subtitle Import text_to_bifs.c gf_text_import_srt_bifs out-of-bounds write VDB-342807 | CTI Indicators (IOB, IOC, IOA) Submit #736544 | gpac v2.4.0 Out-of-bounds Write https://github.com/gpac/gpac/issues/3425 https://github.com/gpac/gpac/issues/3425#issue-3801961068 https://github.com/enocknt/gpac/commit/10c73b82cf0e367383d091db38566a0e4fe71772 |
| GuidoNeele–PDW File Browser | PDW File Browser version 1.3 contains stored and reflected cross-site scripting vulnerabilities that allow authenticated attackers to inject malicious scripts through file rename and path parameters. Attackers can craft malicious URLs or rename files with XSS payloads to execute arbitrary JavaScript in victims’ browsers when they access the file browser. | 2026-01-28 | 5.4 | CVE-2020-36988 | ExploitDB-48947 PDW File Browser GitHub Repository VulnCheck Advisory: PDW File Browser <= v1.3 – Cross-Site Scripting (XSS) |
| halfdata–Stripe Green Downloads | Stripe Green Downloads WordPress Plugin 2.03 contains a persistent cross-site scripting vulnerability allowing remote attackers to inject malicious scripts in button label fields. Attackers can exploit input parameters to execute arbitrary scripts, potentially leading to session hijacking and application module manipulation. | 2026-02-01 | 6.4 | CVE-2022-50797 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Stripe Green Downloads WordPress Plugin 2.03 Persistent XSS via Settings |
| HappyHackingSpace–gakido | Gakido is a Python HTTP client focused on browser impersonation and anti-bot evasion. A vulnerability was discovered in Gakido prior to version 0.1.1 that allowed HTTP header injection through CRLF (Carriage Return Line Feed) sequences in user-supplied header values and names. When making HTTP requests with user-controlled header values containing `rn` (CRLF), `n` (LF), or `x00` (null byte) characters, an attacker could inject arbitrary HTTP headers into the request. The fix in version 0.1.1 adds a `_sanitize_header()` function that strips `r`, `n`, and `x00` characters from both header names and values before they are included in HTTP requests. | 2026-01-27 | 5.3 | CVE-2026-24489 | https://github.com/HappyHackingSpace/gakido/security/advisories/GHSA-gcgx-chcp-hxp9 https://github.com/HappyHackingSpace/gakido/commit/369c67e67c63da510c8a9ab021e54a92ccf1f788 https://github.com/HappyHackingSpace/gakido/releases/tag/v0.1.1-1bc6019 |
| HCLSoftware–BigFix Compliance | A sensitive information disclosure in HCL BigFix Compliance allows a remote attacker to access files under the WEB-INF directory, which may contain Java class files and configuration information, leading to unauthorized access to application internals. | 2026-01-28 | 5.3 | CVE-2023-37525 | https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0128385 |
| HIKSEMI–HS-AFS-S1H1 | Due to inadequate access control, authenticated users of certain HIKSEMI NAS products can manipulate other users’ file resources without proper authorization. | 2026-01-30 | 4.3 | CVE-2026-22624 | https://www.hiksemitech.com/en/hiksemi/support/security-advisory.html |
| HIKSEMI–HS-AFS-S1H1 | Improper handling of filenames in certain HIKSEMI NAS products may lead to the exposure of sensitive system files. | 2026-01-30 | 4.6 | CVE-2026-22625 | https://www.hiksemitech.com/en/hiksemi/support/security-advisory.html |
| HIKSEMI–HS-AFS-S1H1 | Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can cause abnormal device behavior by crafting specific messages. | 2026-01-30 | 4.9 | CVE-2026-22626 | https://www.hiksemitech.com/en/hiksemi/support/security-advisory.html |
| honojs–hono | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Cache Middleware contains an information disclosure vulnerability caused by improper handling of HTTP cache control directives. The middleware does not respect standard cache control headers such as `Cache-Control: private` or `Cache-Control: no-store`, which may result in private or authenticated responses being cached and subsequently exposed to unauthorized users. Version 4.11.7 has a patch for the issue. | 2026-01-27 | 5.3 | CVE-2026-24472 | https://github.com/honojs/hono/security/advisories/GHSA-6wqw-2p9w-4vw4 https://github.com/honojs/hono/commit/12c511745b3f1e7a3f863a23ce5f921c7fa805d1 https://github.com/honojs/hono/releases/tag/v4.11.7 |
| honojs–hono | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, IP Restriction Middleware in Hono is vulnerable to an IP address validation bypass. The `IPV4_REGEX` pattern and `convertIPv4ToBinary` function in `src/utils/ipaddr.ts` do not properly validate that IPv4 octet values are within the valid range of 0-255, allowing attackers to craft malformed IP addresses that bypass IP-based access controls. Version 4.11.7 contains a patch for the issue. | 2026-01-27 | 4.8 | CVE-2026-24398 | https://github.com/honojs/hono/security/advisories/GHSA-r354-f388-2fhh https://github.com/honojs/hono/commit/edbf6eea8e6c26a3937518d4ed91d8666edeec37 https://github.com/honojs/hono/releases/tag/v4.11.7 |
| honojs–hono | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, a Cross-Site Scripting (XSS) vulnerability exists in the `ErrorBoundary` component of the hono/jsx library. Under certain usage patterns, untrusted user-controlled strings may be rendered as raw HTML, allowing arbitrary script execution in the victim’s browser. Version 4.11.7 patches the issue. | 2026-01-27 | 4.7 | CVE-2026-24771 | https://github.com/honojs/hono/security/advisories/GHSA-9r54-q6cx-xmh5 https://github.com/honojs/hono/commit/2cf60046d730df9fd0aba85178f3ecfe8212d990 |
| hu_chao–imwptip | The imwptip plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin’s settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2026-01-28 | 4.3 | CVE-2026-1377 | https://www.wordfence.com/threat-intel/vulnerabilities/id/0fe987f0-6887-4ad1-a748-eb987bb574fa?source=cve https://plugins.trac.wordpress.org/browser/imwptip/trunk/classes/imwptipadmin.php#L11 https://plugins.trac.wordpress.org/browser/imwptip/tags/1.1/classes/imwptipadmin.php#L11 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 is vulnerable to a denial of service as the server may crash when an authenticated user creates a specially crafted query. | 2026-01-30 | 6.5 | CVE-2025-2668 | https://www.ibm.com/support/pages/node/7257518 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow an authenticated user to cause a denial of service using a specially crafted SQL statement including XML that performs uncontrolled recursion. | 2026-01-30 | 6.5 | CVE-2025-36001 | https://www.ibm.com/support/pages/node/7257616 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow an unauthenticated user to cause a denial of service due to excessive use of a global variable. | 2026-01-30 | 6.5 | CVE-2025-36009 | https://www.ibm.com/support/pages/node/7257623 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 is vulnerable to a denial of service as a trap may occur when selecting from certain types of tables. | 2026-01-30 | 6.5 | CVE-2025-36070 | https://www.ibm.com/support/pages/node/7257624 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow an authenticated user to cause a denial of service due to improper allocation of resources. | 2026-01-30 | 6.5 | CVE-2025-36098 | https://www.ibm.com/support/pages/node/7257629 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow a local user to cause a denial of service when copying large table containing XML data due to improper allocation of system resources. | 2026-01-30 | 6.2 | CVE-2025-36123 | https://www.ibm.com/support/pages/node/7257627 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic. | 2026-01-30 | 6.2 | CVE-2025-36353 | https://www.ibm.com/support/pages/node/7257632 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 under specific configuration of cataloged remote storage aliases could allow an authenticated user to execute unauthorized commands due to an authorization bypass vulnerability using a user-controlled key. | 2026-01-30 | 6.8 | CVE-2025-36365 | https://www.ibm.com/support/pages/node/7257665 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic. | 2026-01-30 | 6.5 | CVE-2025-36366 | https://www.ibm.com/support/pages/node/7257681 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 – 11.5.9 could allow an authenticated user to cause a denial of service when given specially crafted query. | 2026-01-30 | 6.5 | CVE-2025-36387 | https://www.ibm.com/support/pages/node/7257690 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic. | 2026-01-30 | 6.5 | CVE-2025-36407 | https://www.ibm.com/support/pages/node/7257692 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 12.1.0 – 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic. | 2026-01-30 | 6.5 | CVE-2025-36423 | https://www.ibm.com/support/pages/node/7257694 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic. | 2026-01-30 | 6.5 | CVE-2025-36424 | https://www.ibm.com/support/pages/node/7257695 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow a local user to cause a denial of service due to improper neutralization of special elements in data query logic. | 2026-01-30 | 6.5 | CVE-2025-36427 | https://www.ibm.com/support/pages/node/7257696 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query with XML columns. | 2026-01-30 | 6.5 | CVE-2025-36442 | https://www.ibm.com/support/pages/node/7257698 |
| IBM–Db2 for Linux, UNIX and Windows | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5.0 – 11.5.9 and 12.1.0 – 12.1.3 could allow an authenticated user to cause a denial of service due to improper neutralization of special elements in data query logic when the RPSCAN feature is enabled. | 2026-01-30 | 5.3 | CVE-2025-36428 | https://www.ibm.com/support/pages/node/7257697 |
| igniterealtime–Openfire | Openfire 4.6.0 contains a stored cross-site scripting vulnerability in the nodejs plugin that allows attackers to inject malicious scripts through the ‘path’ parameter. Attackers can craft a payload with script tags to execute arbitrary JavaScript in the context of administrative users viewing the nodejs configuration page. | 2026-01-26 | 6.4 | CVE-2020-36956 | ExploitDB-49229 Openfire GitHub Repository Openfire Software Downloads VulnCheck Advisory: Openfire 4.6.0 – ‘path’ Stored XSS |
| iJason-Liu–Books_Manager | A vulnerability was found in iJason-Liu Books_Manager up to 298ba736387ca37810466349af13a0fdf828e99c. This vulnerability affects unknown code of the file controllers/books_center/upload_bookCover.php. Performing a manipulation of the argument book_cover results in unrestricted upload. The attack may be initiated remotely. The exploit has been made public and could be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. | 2026-01-26 | 4.7 | CVE-2026-1445 | VDB-342874 | iJason-Liu Books_Manager upload_bookCover.php unrestricted upload VDB-342874 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736971 | https://github.com/iJason-Liu/Books_Manager Books_Manager 1.0 File Upload https://blog.y1fan.work/2026/01/13/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0getshell/ |
| ilias.de–ILIAS Learning Management System | ILIAS Learning Management System 4.3 contains a server-side request forgery vulnerability that allows attackers to read local files through portfolio PDF export functionality. Attackers can inject a script that uses XMLHttpRequest to retrieve local file contents when the portfolio is exported to PDF. | 2026-01-28 | 4 | CVE-2020-36944 | ExploitDB-49148 ILIAS Official Vendor Homepage ILIAS GitHub Repository VulnCheck Advisory: ILIAS Learning Management System 4.3 – SSRF |
| Inciga–Inciga Web | Inciga Web 2.8.2 contains a client-side cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through the icinga.min.js file. Attackers can exploit the EventListener.handleEvent method to execute arbitrary scripts, potentially leading to session hijacking and non-persistent phishing attacks. | 2026-02-01 | 5.4 | CVE-2022-50942 | Vulnerability Lab Advisory Product Homepage Product Homepage VulnCheck Advisory: Inciga Web 2.8.2 Client-Side Cross-Site Scripting via EventListener |
| InternationalColorConsortium–iccDEV | iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, a heap buffer over-read when the strlen() function attempts to read a non-null-terminated buffer potentially leaking heap memory contents and causing application termination. This vulnerability affects users of the iccDEV library who process ICC color profiles. ICC Profile Injection vulnerabilities arise when user-controllable input is incorporated into ICC profile data or other structured binary blobs in an unsafe manner. Version 2.3.1.2 contains a fix for the issue. No known workarounds are available. | 2026-01-28 | 6.1 | CVE-2026-24852 | https://github.com/InternationalColorConsortium/iccDEV/security/advisories/GHSA-q8g2-mp32-3j7f https://github.com/InternationalColorConsortium/iccDEV/pull/540 https://github.com/InternationalColorConsortium/iccDEV/commit/3092499cd4d0775f4a716b999899f9c26f9bc614 |
| Is-Daouda–is-Engine | Out-of-bounds Write, Heap-based Buffer Overflow vulnerability in Is-Daouda is-Engine. This issue affects is-Engine: before 3.3.4. | 2026-01-27 | 6.5 | CVE-2026-24829 | https://github.com/Is-Daouda/is-Engine/pull/7 |
| itsourcecode–School Management System | A weakness has been identified in itsourcecode School Management System 1.0. This affects an unknown part of the file /ramonsys/course/controller.php. Executing a manipulation of the argument ID can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-28 | 6.3 | CVE-2026-1551 | VDB-343247 | itsourcecode School Management System controller.php sql injection VDB-343247 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740644 | itsourcecode School Management System V1.0 SQL Injection Submit #740680 | itsourcecode School Management System v1.0 SQL Injection (Duplicate) https://mega.nz/file/6cVwiA5A#BVwaxWlfeQCkkpHnuxPiMDZVb5qcYrsI6ftqdm_8mGk https://itsourcecode.com/ |
| iulia-cazan–Easy Replace Image | The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.5.2. This is due to missing capability checks on the `image_replacement_from_url` function that is hooked to the `eri_from_url` AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to replace arbitrary image attachments on the site with images from external URLs, potentially enabling site defacement, phishing attacks, or content manipulation. | 2026-01-28 | 5.3 | CVE-2026-1298 | https://www.wordfence.com/threat-intel/vulnerabilities/id/27332c13-c25f-47ec-980d-035fc35ce553?source=cve https://plugins.trac.wordpress.org/browser/easy-replace-image/trunk/easy-replace-image.php#L961 https://plugins.trac.wordpress.org/browser/easy-replace-image/tags/3.5.2/easy-replace-image.php#L961 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3447984%40easy-replace-image&new=3447984%40easy-replace-image&sfp_email=&sfph_mail= |
| jdwebdesigner–Affiliate Pro | Affiliate Pro 1.7 contains multiple reflected cross-site scripting vulnerabilities in the index module’s input fields. Attackers can inject malicious scripts through fullname, username, and email parameters to execute client-side attacks and manipulate browser requests. | 2026-02-01 | 5.4 | CVE-2021-47911 | Vulnerability Lab Advisory Product Homepage Product Homepage VulnCheck Advisory: Affiliate Pro 1.7 Reflected Cross-Site Scripting via Index Module |
| Jirafeau project–Jirafeau | Jirafeau normally prevents browser preview for text files due to the possibility that for example SVG and HTML documents could be exploited for cross site scripting. This was done by storing the MIME type of a file and allowing only browser preview for MIME types beginning with image (except for image/svg+xml, see CVE-2022-30110, CVE-2024-12326 and CVE-2025-7066), video and audio. However, it was possible to bypass this check by sending a manipulated HTTP request with an invalid MIME type like image. When doing the preview, the browser tries to automatically detect the MIME type resulting in detecting SVG and possibly executing JavaScript code. To prevent this, MIME sniffing is disabled by sending the HTTP header X-Content-Type-Options: nosniff. | 2026-01-28 | 6.1 | CVE-2026-1466 | https://gitlab.com/jirafeau/Jirafeau/-/commit/747afb20bfcff14bb67e40e7035d47a6311ba3e1 https://www.cve.org/CVERecord?id=CVE-2022-30110 https://www.cve.org/CVERecord?id=CVE-2024-12326 https://www.cve.org/CVERecord?id=CVE-2025-7066 |
| jishenghua–jshERP | A security vulnerability has been detected in jishenghua jshERP up to 3.6. The impacted element is the function getBillItemByParam of the file /jshERP-boot/depotItem/importItemExcel of the component com.jsh.erp.datasource.mappers.DepotItemMapperEx. The manipulation of the argument barCodes leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. | 2026-01-28 | 6.3 | CVE-2026-1546 | VDB-343230 | jishenghua jshERP com.jsh.erp.datasource.mappers.DepotItemMapperEx importItemExcel getBillItemByParam sql injection VDB-343230 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739688 | https://github.com/jishenghua/jshERP jshERP v3.6 SQL Injection https://github.com/jishenghua/jshERP/issues/145 https://github.com/jishenghua/jshERP/issues/145#issue-3816930151 https://github.com/jishenghua/jshERP/ |
| jishenghua–jshERP | A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. | 2026-01-28 | 4.3 | CVE-2026-1549 | VDB-343245 | jishenghua jshERP PluginController uploadPluginConfigFile path traversal VDB-343245 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739805 | https://github.com/jishenghua/jshERP jshERP v3.6 Path Traversal https://github.com/jishenghua/jshERP/issues/146 https://github.com/jishenghua/jshERP/issues/146#issue-3817997461 https://github.com/jishenghua/jshERP/ |
| Laravel Holdings Inc.–Laravel Nova | Laravel Nova 3.7.0 contains a denial of service vulnerability that allows authenticated users to crash the application by manipulating the ‘range’ parameter. Attackers can send simultaneous requests with an extremely high range value to overwhelm and crash the server. | 2026-01-27 | 6.5 | CVE-2020-36950 | ExploitDB-49198 Laravel Nova Official Homepage Laravel Nova Releases Page VulnCheck Advisory: Laravel Nova 3.7.0 – ‘range’ DoS |
| libexpat project–libexpat | In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation. | 2026-01-30 | 6.9 | CVE-2026-25210 | https://github.com/libexpat/libexpat/pull/1075 https://github.com/libexpat/libexpat/pull/1075/commits/9c2d990389e6abe2e44527eeaa8b39f16fe859c7 |
| Limesurvey–LimeSurvey | LimeSurvey 4.3.10 contains a stored cross-site scripting vulnerability in the Survey Menu functionality of the administration panel. Attackers can inject malicious SVG scripts through the Surveymenu[title] and Surveymenu[parent_id] parameters to execute arbitrary JavaScript in administrative contexts. | 2026-01-28 | 6.4 | CVE-2020-36993 | ExploitDB-48762 LimeSurvey Official Website LimeSurvey Patch Commit VulnCheck Advisory: LimeSurvey <= 4.3.10 – ‘Survey Menu’ Persistent Cross-Site Scripting |
| linknacional–Link Invoice Payment for WooCommerce | The Link Invoice Payment for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the createPartialPayment and cancelPartialPayment functions in all versions up to, and including, 2.8.0. This makes it possible for unauthenticated attackers to create partial payments on any order or cancel any existing partial payment via ID enumeration. | 2026-01-27 | 5.3 | CVE-2025-14971 | https://www.wordfence.com/threat-intel/vulnerabilities/id/96a8fc8b-6f0a-486c-89d1-7211b4ca31bd?source=cve https://plugins.trac.wordpress.org/browser/invoice-payment-for-woocommerce/tags/2.8.0/Includes/WcPaymentInvoiceEndpoint.php#L19 https://plugins.trac.wordpress.org/browser/invoice-payment-for-woocommerce/tags/2.8.0/Includes/WcPaymentInvoiceEndpoint.php#L179 |
| litonice13–WP Adminify White Label WordPress, Admin Menu Editor, Login Customizer | The WP Adminify plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.7.7 via the /wp-json/adminify/v1/get-addons-list REST API endpoint. The endpoint is registered with permission_callback set to __return_true, allowing unauthenticated attackers to retrieve the complete list of available addons, their installation status, version numbers, and download URLs. | 2026-01-28 | 5.3 | CVE-2026-1060 | https://www.wordfence.com/threat-intel/vulnerabilities/id/7ecb4f95-346e-49b3-859f-44f28a72f065?source=cve https://plugins.trac.wordpress.org/browser/adminify/tags/4.0.6.1/Libs/Addons.php#L54 https://plugins.trac.wordpress.org/changeset/3442928/ |
| localsend–localsend | LocalSend is a free, open-source app that allows users to share files and messages with nearby devices over their local network without needing an internet connection. In versions up to and including 1.17.0, when a user initiates a “Share via Link” session, the LocalSend application starts a local HTTP server to host the selected files. The client-side logic for this web interface is contained in `app/assets/web/main.js`. Note that at [0], the `handleFilesDisplay` function constructs the HTML for the file list by iterating over the files received from the server. Commit 8f3cec85aa29b2b13fed9b2f8e499e1ac9b0504c contains a patch. | 2026-01-30 | 6.1 | CVE-2026-25154 | https://github.com/localsend/localsend/security/advisories/GHSA-34v6-52hh-x4r4 https://github.com/localsend/localsend/commit/8f3cec85aa29b2b13fed9b2f8e499e1ac9b0504c |
| lxicon–Bitcoin Donate Button | The Bitcoin Donate Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the settings page. This makes it possible for unauthenticated attackers to modify the plugin’s settings, including donation addresses and display configurations, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2026-01-28 | 4.3 | CVE-2026-1380 | https://www.wordfence.com/threat-intel/vulnerabilities/id/3c973dd9-cfa3-4f06-a25a-c2786e3dca4d?source=cve https://plugins.trac.wordpress.org/browser/bitcoin-donate-button/trunk/btcbutton.php#L1 https://plugins.trac.wordpress.org/browser/bitcoin-donate-button/tags/1.0/btcbutton.php#L1 |
| mamunreza–Vzaar Media Management | The Vzaar Media Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on the $_SERVER[‘PHP_SELF’] variable. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2026-01-28 | 5.3 | CVE-2026-1391 | https://www.wordfence.com/threat-intel/vulnerabilities/id/398a75b1-6470-44b3-aaea-d5e8b10db115?source=cve https://plugins.trac.wordpress.org/browser/vzaar-media-management/trunk/admin/vzaar-media-upload.php#L103 https://plugins.trac.wordpress.org/browser/vzaar-media-management/tags/1.2/admin/vzaar-media-upload.php#L103 |
| mapstructure–mapstructure | A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. This vulnerability allows information disclosure through detailed error messages that may leak sensitive input values via malformed user-supplied data processed in security-critical contexts. | 2026-01-26 | 5.3 | CVE-2025-11065 | https://access.redhat.com/security/cve/CVE-2025-11065 RHBZ#2391829 https://github.com/go-viper/mapstructure/commit/742921c9ba2854d27baa64272487fc5075d2c39c https://github.com/go-viper/mapstructure/security/advisories/GHSA-2464-8j7c-4cjm |
| metagauss–RegistrationMagic Custom Registration Forms, User Registration, Payment, and User Login | The RegistrationMagic plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 6.0.7.4. This is due to missing nonce verification and capability checks on the rm_set_otp AJAX action handler. This makes it possible for unauthenticated attackers to modify arbitrary plugin settings, including reCAPTCHA keys, security settings, and frontend menu titles. | 2026-01-28 | 5.3 | CVE-2026-1054 | https://www.wordfence.com/threat-intel/vulnerabilities/id/daf4d246-85f3-48b3-985f-982fea4772f1?source=cve https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/6.0.6.9/admin/controllers/class_rm_options_controller.php#L209 https://plugins.trac.wordpress.org/changeset/3444777/ |
| michalc–PDW File Browser | PDW File Browser 1.3 contains a remote code execution vulnerability that allows authenticated users to upload and rename webshell files to arbitrary web server locations. Attackers can upload a .txt webshell, rename it to .php, and move it to accessible directories using double-encoded path traversal techniques. | 2026-01-28 | 6.5 | CVE-2020-36973 | ExploitDB-48987 PDW File Browser GitHub Repository VulnCheck Advisory: PDW File Browser 1.3 – Remote Code Execution |
| microsoft–maker.js | Maker.js is a 2D vector line drawing and shape modeling for CNC and laser cutters. In versions up to and including 0.19.1, the `makerjs.extendObject` function copies properties from source objects without proper validation, potentially exposing applications to security risks. The function lacks `hasOwnProperty()` checks and does not filter dangerous keys, allowing inherited properties and potentially malicious properties to be copied to target objects. A patch is available in commit 85e0f12bd868974b891601a141974f929dec36b8, which is expected to be part of version 0.19.2. | 2026-01-28 | 6.5 | CVE-2026-24888 | https://github.com/microsoft/maker.js/security/advisories/GHSA-2cp6-34r9-54xx https://github.com/microsoft/maker.js/commit/85e0f12bd868974b891601a141974f929dec36b8 https://github.com/microsoft/maker.js/blob/98cffa82a372ff942194c925a12a311253587167/packages/maker.js/src/core/maker.ts#L232-L241 |
| midgetspy–Sickbeard | Sickbeard alpha contains a cross-site request forgery vulnerability that allows attackers to disable authentication by submitting crafted configuration parameters. Attackers can trick users into submitting a malicious form that clears web username and password, effectively removing authentication protection. | 2026-01-30 | 5.3 | CVE-2020-37026 | ExploitDB-48712 Archived Sickbeard Official Homepage Sickbeard GitHub Repository VulnCheck Advisory: Sickbeard 0.1 – Cross-Site Request Forgery |
| migaweb–Simple calendar for Elementor | The Simple calendar for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.6.6. This is due to missing capability checks on the `miga_ajax_editor_cal_delete` function that is hooked to the `miga_editor_cal_delete` AJAX action with both authenticated and unauthenticated access enabled. This makes it possible for unauthenticated attackers to delete arbitrary calendar entries by sending a request with a valid nonce and the calendar entry ID. | 2026-01-28 | 5.3 | CVE-2026-1310 | https://www.wordfence.com/threat-intel/vulnerabilities/id/e537c56d-7c5e-4f21-b266-ef3d1a87caf2?source=cve https://plugins.trac.wordpress.org/browser/simple-calendar-for-elementor/trunk/widget/includes/backend_functions.php#L3 https://plugins.trac.wordpress.org/browser/simple-calendar-for-elementor/tags/1.6.6/widget/includes/backend_functions.php#L3 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3444617%40simple-calendar-for-elementor&new=3444617%40simple-calendar-for-elementor&sfp_email=&sfph_mail= |
| miles99–WP Google Ad Manager Plugin | The WP Google Ad Manager Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | 2026-01-28 | 4.4 | CVE-2026-1399 | https://www.wordfence.com/threat-intel/vulnerabilities/id/f3185d82-a785-4165-8469-abc0be38f852?source=cve https://plugins.trac.wordpress.org/browser/wp-google-ad-manager-plugin/trunk/WP-Google-Ad-Manager.php#L194 https://plugins.trac.wordpress.org/browser/wp-google-ad-manager-plugin/tags/1.1.0/WP-Google-Ad-Manager.php#L194 |
| MongoDB–Mongo-c-driver | User-controlled chunkSize metadata from MongoDB lacks appropriate validation allowing malformed GridFS metadata to overflow the bounding container. | 2026-01-27 | 6.5 | CVE-2025-14911 | https://jira.mongodb.org/browse/CDRIVER-6125 |
| MrPlugins–BootCommerce | BootCommerce 3.2.1 contains persistent input validation vulnerabilities that allow remote attackers to inject malicious script code through guest order checkout input fields. Attackers can exploit unvalidated input parameters to execute arbitrary scripts, potentially leading to session hijacking, phishing attacks, and application module manipulation. | 2026-02-01 | 6.4 | CVE-2022-50941 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: BootCommerce 3.2.1 Persistent Cross-Site Scripting via Order Checkout |
| Naviwebs S.C.–Navigate CMS | Navigate CMS 2.8.7 contains a cross-site request forgery vulnerability that allows attackers to upload malicious extensions through a crafted HTML page. Attackers can trick authenticated administrators into executing arbitrary file uploads by leveraging the extension upload functionality without additional validation. | 2026-01-30 | 4.3 | CVE-2020-37054 | ExploitDB-48548 Navigate CMS Official Homepage Navigate CMS SourceForge Page VulnCheck Advisory: Navigate CMS 2.8.7 – Cross-Site Request Forgery |
| nebojsadabic–Target Video Easy Publish | The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder_img’ parameter in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2025-8072 | https://www.wordfence.com/threat-intel/vulnerabilities/id/26e16dd3-66bc-4174-acc1-ee22713ae979?source=cve https://plugins.trac.wordpress.org/browser/brid-video-easy-publish/tags/3.8.6/lib/BridShortcode.php#L204 https://wordpress.org/plugins/brid-video-easy-publish/#developers https://plugins.trac.wordpress.org/changeset/3437514/brid-video-easy-publish/trunk/lib/BridShortcode.php |
| NetArt Media–Easy Cart Shopping Cart | Easy Cart Shopping Cart 2021 contains a non-persistent cross-site scripting vulnerability in the search module’s keyword parameter. Remote attackers can inject malicious script code through the search input to compromise user sessions and manipulate application content. | 2026-02-01 | 6.4 | CVE-2021-47856 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Easy Cart Shopping Cart 2021 Cross-Site Scripting via Search Parameter |
| nocodb–nocodb | NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an authenticated user with org-level-creator permissions can exploit prototype pollution in the `/api/v2/meta/connection/test` endpoint, causing all database write operations to fail application-wide until server restart. While the pollution technically bypasses SUPER_ADMIN authorization checks, no practical privileged actions can be performed because database operations fail immediately after pollution. Version 0.301.0 patches the issue. | 2026-01-28 | 4.9 | CVE-2026-24766 | https://github.com/nocodb/nocodb/security/advisories/GHSA-95ff-46g6-6gw9 |
| nocodb–nocodb | NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, a blind Server-Side Request Forgery (SSRF) vulnerability exists in the `uploadViaURL` functionality due to an unprotected `HEAD` request. While the subsequent file retrieval logic correctly enforces SSRF protections, the initial metadata request executes without validation. This allows limited outbound requests to arbitrary URLs before SSRF controls are applied. Version 0.301.0 contains a patch for the issue. | 2026-01-28 | 4.9 | CVE-2026-24767 | https://github.com/nocodb/nocodb/security/advisories/GHSA-xr7v-j379-34v9 |
| NVIDIA–GeForce | NVIDIA HD Audio Driver for Windows contains a vulnerability where an attacker could exploit a NULL pointer dereference issue. A successful exploit of this vulnerability might lead to a denial of service. | 2026-01-28 | 5.5 | CVE-2025-33237 | https://nvd.nist.gov/vuln/detail/CVE-2025-33237 https://www.cve.org/CVERecord?id=CVE-2025-33237 https://nvidia.custhelp.com/app/answers/detail/a_id/5747 |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. While saving a dataset a stack buffer is used to prepare the data. Prior to versions 8.0.3 and 7.0.14, if the data in the dataset is too large, this can result in a stack overflow. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not use rules with datasets `save` nor `state` options. | 2026-01-27 | 5.9 | CVE-2026-22262 | https://github.com/OISF/suricata/security/advisories/GHSA-9qg5-2gwh-xp86 https://github.com/OISF/suricata/commit/0eff24213763c2aa2bb0957901d5dc1e18414dbf https://github.com/OISF/suricata/commit/27a2180bceaa3477419c78c54fce364398d011f1 https://github.com/OISF/suricata/commit/32609e6896f9079c175665a94005417cec7637eb https://github.com/OISF/suricata/commit/32a1b9ae6aa80a60c073897e38a2ac6ea0f64521 https://github.com/OISF/suricata/commit/d6bc718e303ecbec5999066b8bc88eeeca743658 https://github.com/OISF/suricata/commit/d767dfadcd166f82683757818b9e46943326ac90 https://redmine.openinfosecfoundation.org/issues/8110 |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. Starting in version 8.0.0 and prior to version 8.0.3, inefficiency in http1 headers parsing can lead to slowdown over multiple packets. Version 8.0.3 patches the issue. No known workarounds are available. | 2026-01-27 | 5.3 | CVE-2026-22263 | https://github.com/OISF/suricata/security/advisories/GHSA-rwc5-hxj6-hwx7 https://github.com/OISF/suricata/commit/018a377f74e3eb2b042c6f783ad9043060923428 https://redmine.openinfosecfoundation.org/issues/8201 |
| Open5GS–Open5GS | A security flaw has been discovered in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_bearer_resource_failure_indication of the file src/sgwc/s5c-handler.c of the component SGWC. Performing a manipulation results in denial of service. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 69b53add90a9479d7960b822fc60601d659c328b. It is recommended to apply a patch to fix this issue. | 2026-01-28 | 5.3 | CVE-2026-1521 | VDB-343192 | Open5GS SGWC s5c-handler.c denial of service VDB-343192 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738370 | Open5GS SGWC v2.7.6 Denial of Service https://github.com/open5gs/open5gs/issues/4268 https://github.com/open5gs/open5gs/issues/4268#event-21989483261 https://github.com/open5gs/open5gs/issues/4268#issue-3795012861 https://github.com/open5gs/open5gs/commit/69b53add90a9479d7960b822fc60601d659c328b |
| Open5GS–Open5GS | A weakness has been identified in Open5GS up to 2.7.6. This vulnerability affects the function sgwc_s5c_handle_modify_bearer_response of the file src/sgwc/s5c-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This patch is called b19cf6a. Applying a patch is advised to resolve this issue. The issue report is flagged as already-fixed. | 2026-01-28 | 5.3 | CVE-2026-1522 | VDB-343193 | Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service VDB-343193 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738371 | Open5GS SGWC v2.7.6 Denial of Service https://github.com/open5gs/open5gs/issues/4266 https://github.com/open5gs/open5gs/issues/4266#event-21968568116 https://github.com/open5gs/open5gs/issues/4266#issue-3794991595 https://github.com/open5gs/open5gs/commit/b19cf6a |
| Open5GS–Open5GS | A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed. | 2026-01-29 | 5.3 | CVE-2026-1586 | VDB-343349 | Open5GS SGWC s11-handler.c ogs_gtp2_f_teid_to_ip denial of service VDB-343349 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738375 | Open5GS SGWC v2.7.6 Denial of Service https://github.com/open5gs/open5gs/issues/4273 https://github.com/open5gs/open5gs/issues/4273#event-21968643659 https://github.com/open5gs/open5gs/issues/4273#issue-3796030721 |
| Open5GS–Open5GS | A vulnerability has been found in Open5GS up to 2.7.6. The affected element is the function sgwc_s11_handle_modify_bearer_request of the file /sgwc/s11-handler.c of the component SGWC. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Applying a patch is the recommended action to fix this issue. The issue report is flagged as already-fixed. | 2026-01-29 | 5.3 | CVE-2026-1587 | VDB-343350 | Open5GS SGWC s11-handler.c sgwc_s11_handle_modify_bearer_request denial of service VDB-343350 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738376 | Open5GS SGWC v2.7.6 Denial of Service https://github.com/open5gs/open5gs/issues/4272 https://github.com/open5gs/open5gs/issues/4272#event-21968635948 https://github.com/open5gs/open5gs/issues/4272#issue-3795156752 |
| OpenZ–OpenZ ERP | OpenZ ERP 3.6.60 contains a persistent cross-site scripting vulnerability in the Employee module’s name and description parameters. Attackers can inject malicious scripts through POST requests to , enabling session hijacking and manipulation of application modules. | 2026-01-30 | 6.4 | CVE-2020-37022 | ExploitDB-48450 OpenZ Official Website OpenZ Download Page Vulnerability Lab Advisory VulnCheck Advisory: OpenZ ERP 3.6.60 – Persistent Cross-Site Scripting |
| opf–openproject | OpenProject is an open-source, web-based project management software. In the new editor for collaborative documents based on BlockNote, OpenProject maintainers added a custom extension in OpenProject version 17.0.0 that allows to mention OpenProject work packages in the document. To show work package details, the editor loads details about the work package via the OpenProject API. For this API call, the extension to the BlockNote editor did not properly validate the given work package ID to be only a number. This allowed an attacker to generate a document with relative links that upon opening could make arbitrary `GET` requests to any URL within the OpenProject instance. This issue was patched in version version 0.0.22 of op-blocknote-extensions, which was shipped with OpenProject 17.0.2. If users cannot update immediately to version 17.0.2 of OpenProject, administrators can disable collaborative document editing in Settings -> Documents -> Real time collaboration -> Disable. | 2026-01-28 | 6.3 | CVE-2026-24775 | https://github.com/opf/openproject/security/advisories/GHSA-35c6-x276-2pvc https://github.com/opf/op-blocknote-extensions/releases/tag/v0.0.22 |
| Orchardcore–Orchard Core | Orchard Core RC1 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious scripts through blog post creation. Attackers can create blog posts with embedded JavaScript in the MarkdownBodyPart.Source parameter to execute arbitrary scripts in victim browsers. | 2026-01-30 | 6.4 | CVE-2020-37019 | ExploitDB-48456 Orchard Core Official Website Orchard Core GitHub Repository GitHub Issue #5802 VulnCheck Advisory: Orchard Core RC1 – Persistent Cross-Site Scripting |
| Php-Fusion–PHPFusion | PHPFusion 9.03.50 contains a persistent cross-site scripting vulnerability in the print.php page that fails to properly sanitize user-submitted message content. Attackers can inject malicious JavaScript through forum messages that will execute when the print page is generated, allowing script execution in victim browsers. | 2026-01-30 | 6.4 | CVE-2020-36996 | ExploitDB-48497 PHPFusion Official Homepage PHPFusion Download Page VulnCheck Advisory: PHPFusion 9.03.50 – Persistent Cross-Site Scripting |
| PHPGurukul–Hospital Management System | A security flaw has been discovered in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /hms/hospital/docappsystem/adminviews.py of the component Admin Dashboard Page. Performing a manipulation results in improper authorization. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. | 2026-01-28 | 6.3 | CVE-2026-1550 | VDB-343246 | PHPGurukul Hospital Management System Admin Dashboard adminviews.py improper authorization VDB-343246 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739837 | PHPGurukul Hospital Management System v1.0 Missing Authorization https://github.com/rsecroot/Hospital-Management-System/blob/main/Broken%20Access%20Control.md https://phpgurukul.com/ |
| PHPGurukul–News Portal | A vulnerability was identified in PHPGurukul News Portal 1.0. This affects an unknown part of the component Profile Pic Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. | 2026-01-26 | 4.7 | CVE-2026-1424 | VDB-342840 | PHPGurukul News Portal Profile Pic unrestricted upload VDB-342840 | CTI Indicators (IOB, IOC, TTP) Submit #736637 | PHPGurukul News Portal v1.0 Cross Site Scripting https://github.com/rsecroot/News-Portal/blob/main/Cross%20Site%20Scripting.md https://phpgurukul.com/ |
| PHPSUGAR–PHP Melody | PHP Melody version 3.0 contains multiple non-persistent cross-site scripting vulnerabilities in categories, import, and user import files. Attackers can inject malicious scripts through unvalidated parameters to execute client-side attacks and potentially hijack user sessions. | 2026-02-01 | 6.4 | CVE-2021-47912 | Vulnerability Lab Advisory Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: PHP Melody 3.0 Non-Persistent Cross-Site Scripting via Multiple Parameters |
| PHPSUGAR–PHP Melody | PHP Melody 3.0 contains a persistent cross-site scripting vulnerability in the video editor that allows privileged users to inject malicious scripts. Attackers can exploit the WYSIWYG editor to execute persistent scripts, potentially leading to session hijacking and application manipulation. | 2026-02-01 | 6.4 | CVE-2021-47913 | Vulnerability Lab Advisory Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: PHP Melody 3.0 Persistent Cross-Site Scripting via Video Editor |
| PHPSUGAR–PHP Melody | PHP Melody version 3.0 contains a persistent cross-site scripting vulnerability in the edit-video.php submitted parameter that allows remote attackers to inject malicious script code. Attackers can exploit this vulnerability to execute arbitrary JavaScript, potentially leading to session hijacking, persistent phishing, and manipulation of application modules. | 2026-02-01 | 6.4 | CVE-2021-47914 | Vulnerability Lab Advisory Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: PHP Melody 3.0 Persistent XSS Vulnerability via Edit Video Parameter |
| pnpm–pnpm | pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm’s binary fetcher allows malicious packages to write files outside the intended extraction directory. The vulnerability has two attack vectors: (1) Malicious ZIP entries containing `../` or absolute paths that escape the extraction root via AdmZip’s `extractAllTo`, and (2) The `BinaryResolution.prefix` field is concatenated into the extraction path without validation, allowing a crafted prefix like `../../evil` to redirect extracted files outside `targetDir`. The issue impacts all pnpm users who install packages with binary assets, users who configure custom Node.js binary locations and CI/CD pipelines that auto-install binary dependencies. It can lead to overwriting config files, scripts, or other sensitive files leading to RCE. Version 10.28.1 contains a patch. | 2026-01-26 | 6.5 | CVE-2026-23888 | https://github.com/pnpm/pnpm/security/advisories/GHSA-6pfh-p556-v868 https://github.com/pnpm/pnpm/commit/5c382f0ca3b7cc49963b94677426e66539dcb3f5 https://github.com/pnpm/pnpm/releases/tag/v10.28.1 |
| pnpm–pnpm | pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm’s tarball extraction allows malicious packages to write files outside the package directory on Windows. The path normalization only checks for `./` but not `.`. On Windows, backslashes are directory separators, enabling path traversal. This vulnerability is Windows-only. This issue impacts Windows pnpm users and Windows CI/CD pipelines (GitHub Actions Windows runners, Azure DevOps). It can lead to overwriting `.npmrc`, build configs, or other files. Version 10.28.1 contains a patch. | 2026-01-26 | 6.5 | CVE-2026-23889 | https://github.com/pnpm/pnpm/security/advisories/GHSA-6×96-7vc8-cm3p https://github.com/pnpm/pnpm/commit/6ca07ffbe6fc0e8b8cdc968f228903ba0886f7c0 https://github.com/pnpm/pnpm/releases/tag/v10.28.1 |
| pnpm–pnpm | pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm’s bin linking allows malicious npm packages to create executable shims or symlinks outside of `node_modules/.bin`. Bin names starting with `@` bypass validation, and after scope normalization, path traversal sequences like `../../` remain intact. This issue affects all pnpm users who install npm packages and CI/CD pipelines using pnpm. It can lead to overwriting config files, scripts, or other sensitive files. Version 10.28.1 contains a patch. | 2026-01-26 | 6.5 | CVE-2026-23890 | https://github.com/pnpm/pnpm/security/advisories/GHSA-xpqm-wm3m-f34h https://github.com/pnpm/pnpm/commit/8afbb1598445d37985d91fda18abb4795ae5062d https://github.com/pnpm/pnpm/releases/tag/v10.28.1 |
| presstigers–Simple Folio | The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_simple_folio_item_client_name’ and ‘_simple_folio_item_link’ meta fields in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2025-14039 | https://www.wordfence.com/threat-intel/vulnerabilities/id/c32a71d6-d61c-4f6f-9d35-70140235af7c?source=cve https://plugins.trac.wordpress.org/browser/simple-folio/trunk/templates/single-simple-folio.php#L70 https://plugins.trac.wordpress.org/browser/simple-folio/tags/1.1.1/templates/single-simple-folio.php#L70 https://plugins.trac.wordpress.org/browser/simple-folio/trunk/templates/single-simple-folio.php#L76 https://plugins.trac.wordpress.org/browser/simple-folio/tags/1.1.1/templates/single-simple-folio.php#L76 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442515%40simple-folio&new=3442515%40simple-folio&sfp_email=&sfph_mail= |
| Product Owner: Webile–Webile | Webile 1.0.1 contains a directory traversal vulnerability that allows remote attackers to manipulate file system paths without authentication. Attackers can exploit path manipulation to access sensitive system directories and potentially compromise the mobile device’s local file system. | 2026-02-01 | 6.5 | CVE-2022-50950 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Webile 1.0.1 Directory Traversal Vulnerability via Web Application |
| psmplugins–SupportCandy Helpdesk & Customer Support Ticket System | The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to SQL Injection via the Number-type custom field filter in all versions up to, and including, 3.4.4. This is due to insufficient escaping on the user-supplied operand value when using the equals operator and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above (customers), to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | 2026-01-31 | 6.5 | CVE-2026-0683 | https://www.wordfence.com/threat-intel/vulnerabilities/id/a7856d0f-bc7d-436c-968c-631fd6a686ab?source=cve https://plugins.trac.wordpress.org/browser/supportcandy/tags/3.4.4/includes/admin/tickets/class-wpsc-ticket-list.php#L1265 https://plugins.trac.wordpress.org/browser/supportcandy/tags/3.4.4/includes/admin/tickets/class-wpsc-ticket-list.php#L1288 https://plugins.trac.wordpress.org/browser/supportcandy/tags/3.4.4/includes/custom-field-types/class-wpsc-cf-number.php#L371 https://plugins.trac.wordpress.org/changeset/3448376/ |
| psmplugins–SupportCandy Helpdesk & Customer Support Ticket System | The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.4.4 via the ‘add_reply’ function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to steal file attachments uploaded by other users by specifying arbitrary attachment IDs in the ‘description_attachments’ parameter, re-associating those files to their own tickets and removing access from the original owners. | 2026-01-31 | 5.4 | CVE-2026-1251 | https://www.wordfence.com/threat-intel/vulnerabilities/id/89df3005-0967-474f-8a4e-3b23273dd1a2?source=cve https://plugins.trac.wordpress.org/browser/supportcandy/trunk/includes/admin/tickets/class-wpsc-individual-ticket.php#L1603 https://plugins.trac.wordpress.org/changeset/3448376/ |
| pymumu–SmartDNS | A security flaw has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The patch is identified as 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is advised to resolve this issue. | 2026-01-26 | 5.6 | CVE-2026-1425 | VDB-342841 | pymumu SmartDNS SVBC Record dns.c _dns_decode_SVCB_HTTPS stack-based overflow VDB-342841 | CTI Indicators (IOB, IOC, IOA) Submit #736827 | pymumu smartdns 47.1 Stack-based Buffer Overflow https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8 |
| QlikTech International AB–QlikView | QlikView 12.50.20000.0 contains a denial of service vulnerability in the FTP server address input field that allows local attackers to crash the application. Attackers can paste a 300-character buffer into the FTP server address field to trigger an application crash and prevent normal functionality. | 2026-01-29 | 6.2 | CVE-2020-36994 | ExploitDB-48732 Vendor Homepage VulnCheck Advisory: QlikView 12.50.20000.0 – ‘FTP Server Address’ Denial of Service |
| QR Menu Pro Smart Menu Systems–Menu Panel | Authorization Bypass Through User-Controlled Key vulnerability in QR Menu Pro Smart Menu Systems Menu Panel allows Exploitation of Trusted Identifiers. This issue affects Menu Panel: through 29012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 5.7 | CVE-2025-7013 | https://www.usom.gov.tr/bildirim/tr-26-0007 |
| QR Menu Pro Smart Menu Systems–Menu Panel | Session Fixation vulnerability in QR Menu Pro Smart Menu Systems Menu Panel allows Session Hijacking. This issue affects Menu Panel: through 29012026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 5.7 | CVE-2025-7014 | https://www.usom.gov.tr/bildirim/tr-26-0007 |
| QWE Labs–QWE DL | QWE DL 2.0.1 mobile web application contains a persistent input validation vulnerability allowing remote attackers to inject malicious script code through path parameter manipulation. Attackers can exploit the vulnerability to execute persistent cross-site scripting attacks, potentially leading to session hijacking and application module manipulation. | 2026-02-01 | 6.4 | CVE-2023-54343 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: QWE DL 2.0.1 Persistent XSS Vulnerability via Path Parameter |
| recooty–Recooty Job Widget (Old Dashboard) | The Recooty – Job Widget (Old Dashboard) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing nonce validation on the recooty_save_maybe() function. This makes it possible for unauthenticated attackers to update the recooty_key option and inject malicious content into iframe src attributes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2026-01-28 | 4.3 | CVE-2025-14616 | https://www.wordfence.com/threat-intel/vulnerabilities/id/eb14f084-6f36-4702-8a28-b62811739407?source=cve https://plugins.trac.wordpress.org/browser/recooty/trunk/admin/init.php#L72 https://plugins.trac.wordpress.org/browser/recooty/tags/1.0.4/admin/init.php#L72 https://plugins.trac.wordpress.org/browser/recooty/trunk/init.php#L41 https://plugins.trac.wordpress.org/browser/recooty/tags/1.0.4/init.php#L41 |
| Red Hat–Red Hat build of Quarkus | A flaw was found in Hibernate Reactive. When an HTTP endpoint is exposed to perform database operations, a remote client can prematurely close the HTTP connection. This action may lead to leaking connections from the database connection pool, potentially causing a Denial of Service (DoS) by exhausting available database connections. | 2026-01-26 | 4.3 | CVE-2025-14969 | https://access.redhat.com/security/cve/CVE-2025-14969 RHBZ#2423822 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services. | 2026-01-27 | 5.8 | CVE-2026-1467 | https://access.redhat.com/security/cve/CVE-2026-1467 RHBZ#2433174 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable. | 2026-01-27 | 5.4 | CVE-2026-1489 | https://access.redhat.com/security/cve/CVE-2026-1489 RHBZ#2433348 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction. | 2026-01-28 | 5.8 | CVE-2026-1536 | https://access.redhat.com/security/cve/CVE-2026-1536 RHBZ#2433834 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data. | 2026-01-28 | 5.8 | CVE-2026-1539 | https://access.redhat.com/security/cve/CVE-2026-1539 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks. | 2026-01-26 | 4 | CVE-2025-9820 | https://access.redhat.com/security/cve/CVE-2025-9820 RHBZ#2392528 https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5 https://gitlab.com/gnutls/gnutls/-/issues/1732 https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably. | 2026-01-27 | 4.2 | CVE-2026-1484 | https://access.redhat.com/security/cve/CVE-2026-1484 RHBZ#2433259 |
| Red Hat–Red Hat OpenShift Virtualization 4 | A flaw was found in kubevirt. A user within a virtual machine (VM), if the guest agent is active, can exploit this by causing the agent to report an excessive number of network interfaces. This action can overwhelm the system’s ability to store VM configuration updates, effectively blocking changes to the Virtual Machine Instance (VMI). This allows the VM user to restrict the VM administrator’s ability to manage the VM, leading to a denial of service for administrative operations. | 2026-01-26 | 6.4 | CVE-2025-14525 | https://access.redhat.com/security/cve/CVE-2025-14525 RHBZ#2421360 |
| rupantorpay–Rupantorpay | The Rupantorpay plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_webhook() function in all versions up to, and including, 2.0.0. This makes it possible for unauthenticated attackers to modify WooCommerce order statuses by sending crafted requests to the WooCommerce API endpoint. | 2026-01-28 | 5.3 | CVE-2025-15511 | https://www.wordfence.com/threat-intel/vulnerabilities/id/1b21bdfd-42ec-43fe-b581-04276b86c50b?source=cve https://plugins.trac.wordpress.org/browser/rupantorpay/tags/2.0.0/includes/class-wc-rupantorpay-gateway.php#L172 |
| RustCrypto–signatures | The ML-DSA crate is a Rust implementation of the Module-Lattice-Based Digital Signature Standard (ML-DSA). Starting in version 0.0.4 and prior to version 0.1.0-rc.4, the ML-DSA signature verification implementation in the RustCrypto `ml-dsa` crate incorrectly accepts signatures with repeated (duplicate) hint indices. According to the ML-DSA specification (FIPS 204 / RFC 9881), hint indices within each polynomial must be **strictly increasing**. The current implementation uses a non-strict monotonic check (`<=` instead of `<`), allowing duplicate indices. This is a regression bug. The original implementation was correct, but a commit in version 0.0.4 inadvertently changed the strict `<` comparison to `<=`, introducing the vulnerability. Version 0.1.0-rc.4 fixes the issue. | 2026-01-28 | 5.3 | CVE-2026-24850 | https://github.com/RustCrypto/signatures/security/advisories/GHSA-5x2r-hc65-25f9 https://github.com/RustCrypto/signatures/issues/894 https://github.com/RustCrypto/signatures/pull/895 https://github.com/RustCrypto/signatures/commit/400961412be2e2ab787942cf30e0a9b66b37a54a https://github.com/RustCrypto/signatures/commit/b01c3b73dd08d0094e089aa234f78b6089ec1f38 https://csrc.nist.gov/pubs/fips/204/final https://datatracker.ietf.org/doc/html/rfc9881 https://github.com/C2SP/wycheproof https://github.com/C2SP/wycheproof/blob/master/testvectors_v1/mldsa_44_verify_test.json https://github.com/C2SP/wycheproof/blob/master/testvectors_v1/mldsa_65_verify_test.json https://github.com/C2SP/wycheproof/blob/master/testvectors_v1/mldsa_87_verify_test.json |
| salihciftci–Liman | Liman 0.7 contains a cross-site request forgery vulnerability that allows attackers to manipulate user account settings without proper request validation. Attackers can craft malicious HTML forms to change user passwords or modify account information by tricking logged-in users into submitting unauthorized requests. | 2026-01-29 | 5.3 | CVE-2020-37007 | ExploitDB-48869 Archived Liman GitHub Repository VulnCheck Advisory: Liman 0.7 – Cross-Site Request Forgery (Change Password) |
| Salt Project–Salt | Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues. | 2026-01-30 | 6.2 | CVE-2025-62349 | Salt 3006.17 release notes (fix and minimum_auth_version) Salt 3007.9 release notes (fix and minimum_auth_version) |
| Sangfor–Operation and Maintenance Security Management System | A vulnerability was found in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function portValidate of the file /fort/ip_and_port/port_validate of the component HTTP POST Request Handler. Performing a manipulation of the argument port results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used. | 2026-01-26 | 6.3 | CVE-2026-1413 | VDB-342802 | Sangfor Operation and Maintenance Security Management System HTTP POST Request port_validate portValidate command injection VDB-342802 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736522 | Sangfor Operation and Maintenance Security Management System (OSM / è¿ç»´å®‰å…¨ç®¡ç†ç³»ç»Ÿ) v3.0.12 Command Injection https://github.com/LX-LX88/cve/issues/23 |
| Sangfor–Operation and Maintenance Security Management System | A vulnerability was determined in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This impacts the function getInformation of the file /equipment/get_Information of the component HTTP POST Request Handler. Executing a manipulation of the argument fortEquipmentIp can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. | 2026-01-26 | 6.3 | CVE-2026-1414 | VDB-342803 | Sangfor Operation and Maintenance Security Management System HTTP POST Request get_Information getInformation command injection VDB-342803 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736524 | Sangfor Operation and Maintenance Security Management System (OSM / è¿ç»´å®‰å…¨ç®¡ç†ç³»ç»Ÿ) v3.0.12 Command Injection https://github.com/LX-LX88/cve/issues/24 |
| SAP_SE–SAP Fiori App (Intercompany Balance Reconciliation) | SAP Fiori App Intercompany Balance Reconciliation does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has low impact on confidentiality, integrity and availability are not impacted. | 2026-01-27 | 4.3 | CVE-2026-23683 | https://me.sap.com/notes/3122486 https://url.sap/sapsecuritypatchday |
| Sellacious–Sellacious eCommerce | Sellacious eCommerce 4.6 contains a persistent cross-site scripting vulnerability in the Manage Your Addresses module that allows attackers to inject malicious scripts. Attackers can exploit multiple address input fields like full name, company, and address to execute persistent script code that can hijack user sessions and manipulate application modules. | 2026-01-30 | 6.4 | CVE-2020-37003 | ExploitDB-48467 Official Sellacious eCommerce Homepage Sellacious Product Details Vulnerability Lab Advisory VulnCheck Advisory: Sellacious eCommerce 4.6 – Persistent Cross-Site Scripting |
| SEMCMS–SEMCMS | A security vulnerability has been detected in SEMCMS 5.0. This vulnerability affects unknown code of the file /SEMCMS_Info.php. The manipulation of the argument searchml leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 6.3 | CVE-2026-1552 | VDB-343248 | SEMCMS SEMCMS_Info.php sql injection VDB-343248 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740549 | SEMCMS SEMCMS 外贸网站php多è¯è¨€ç‰ˆ V5.0 SQL Injection https://github.com/Sqli22/Sqli/issues/4 |
| seomantis–SEO Links Interlinking | The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘google_error’ parameter in all versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2026-01-28 | 6.1 | CVE-2025-14063 | https://www.wordfence.com/threat-intel/vulnerabilities/id/d71143d6-d477-4a63-8f99-f4cc8a590536?source=cve https://wordpress.org/plugins/seo-links-interlinking/ https://plugins.trac.wordpress.org/browser/seo-links-interlinking/trunk/scdata.php#L504 https://plugins.trac.wordpress.org/browser/seo-links-interlinking/tags/1.7.5/scdata.php#L504 https://plugins.trac.wordpress.org/browser/seo-links-interlinking/trunk/scdata.php#L512 https://plugins.trac.wordpress.org/browser/seo-links-interlinking/tags/1.7.5/scdata.php#L512 |
| Simplephpscripts–Simple CMS | Simple CMS 2.1 contains a persistent cross-site scripting vulnerability in user input parameters that allows remote attackers to inject malicious script code. Attackers can exploit the newUser and editUser modules to inject persistent scripts that execute on user list preview, potentially leading to session hijacking and application manipulation. | 2026-02-01 | 6.4 | CVE-2021-47917 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Simple CMS 2.1 Persistent Cross-Site Scripting via User Input Parameters |
| Simplephpscripts–Simple CMS | Simple CMS 2.1 contains a non-persistent cross-site scripting vulnerability in the preview.php file’s id parameter. Attackers can inject malicious script code through a GET request to execute arbitrary scripts and potentially hijack user sessions or perform phishing attacks. | 2026-02-01 | 6.4 | CVE-2021-47919 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Simple CMS 2.1 Non-Persistent Cross-Site Scripting via Preview Parameter |
| smarterDroid–WiFi File Transfer | WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server’s input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions. | 2026-02-01 | 6.4 | CVE-2022-50951 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: WiFi File Transfer 1.0.8 Persistent XSS via Web Server Input Validation |
| SourceCodester–Pet Grooming Management Software | A vulnerability was detected in SourceCodester Pet Grooming Management Software 1.0. Impacted is an unknown function of the file /admin/operation/user.php of the component User Management. Performing a manipulation of the argument group_id results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. | 2026-01-30 | 6.3 | CVE-2026-1702 | VDB-343492 | SourceCodester Pet Grooming Management Software User Management user.php improper authorization VDB-343492 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #742226 | SourceCodester Pet grooming management software 1.0 Improper Access Controls https://github.com/Asim-QAZi/Improper-Access-Control—in-Pet-Grooming-Management-Software https://www.sourcecodester.com/ |
| stellar–rs-soroban-sdk | soroban-sdk is a Rust SDK for Soroban contracts. Arithmetic overflow can be triggered in the `Bytes::slice`, `Vec::slice`, and `Prng::gen_range` (for `u64`) methods in the `soroban-sdk` in versions up to and including `25.0.1`, `23.5.1`, and `25.0.2`. Contracts that pass user-controlled or computed range bounds to `Bytes::slice`, `Vec::slice`, or `Prng::gen_range` may silently operate on incorrect data ranges or generate random numbers from an unintended range, potentially resulting in corrupted contract state. Note that the best practice when using the `soroban-sdk` and building Soroban contracts is to always enable `overflow-checks = true`. The `stellar contract init` tool that prepares the boiler plate for a Soroban contract, as well as all examples and docs, encourage the use of configuring `overflow-checks = true` on `release` profiles so that these arithmetic operations fail rather than silently wrap. Contracts are only impacted if they use `overflow-checks = false` either explicitly or implicitly. It is anticipated the majority of contracts could not be impacted because the best practice encouraged by tooling is to enable `overflow-checks`. The fix available in `25.0.1`, `23.5.1`, and `25.0.2` replaces bare arithmetic with `checked_add` / `checked_sub`, ensuring overflow traps regardless of the `overflow-checks` profile setting. As a workaround, contract workspaces can be configured with a profile available in the GitHub Securtity Advisory to enable overflow checks on the arithmetic operations. This is the best practice when developing Soroban contracts, and the default if using the contract boilerplate generated using `stellar contract init`. Alternatively, contracts can validate range bounds before passing them to `slice` or `gen_range` to ensure the conversions cannot overflow. | 2026-01-28 | 5.3 | CVE-2026-24889 | https://github.com/stellar/rs-soroban-sdk/security/advisories/GHSA-96xm-fv9w-pf3f https://github.com/stellar/rs-soroban-sdk/pull/1703 https://github.com/stellar/rs-soroban-sdk/commit/3890521426d71bb4d892b21f5a283a1e836cfa38 https://github.com/stellar/rs-soroban-sdk/commit/59fcef437260ed4da42d1efb357137a5c166c02e https://github.com/stellar/rs-soroban-sdk/commit/c2757c6d774dbb28b34a0b77ffe282e59f0f8462 https://github.com/stellar/rs-soroban-sdk/releases/tag/v22.0.9 https://github.com/stellar/rs-soroban-sdk/releases/tag/v23.5.1 https://github.com/stellar/rs-soroban-sdk/releases/tag/v25.0.2 |
| supercleanse–Stripe Payments by Buy Now Plus Best WordPress Stripe Credit Card Payments Plugin | The Buy Now Plus – Buy Now buttons for Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘buynowplus’ shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on shortcode attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2026-1295 | https://www.wordfence.com/threat-intel/vulnerabilities/id/87d228bb-eb5b-44ca-91f7-ada730635a3f?source=cve https://plugins.trac.wordpress.org/browser/buy-now-plus/tags/1.0.2/class-bnp-buttons.php#L17 https://plugins.trac.wordpress.org/browser/buy-now-plus/tags/1.0.2/class-bnp-buttons.php#L36 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3444416%40buy-now-plus&new=3444416%40buy-now-plus&sfp_email=&sfph_mail= |
| symfony–symfony | Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Prior to versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5, the Symfony Process component did not correctly treat some characters (notably `=`) as “special” when escaping arguments on Windows. When PHP is executed from an MSYS2-based environment (e.g. Git Bash) and Symfony Process spawns native Windows executables, MSYS2’s argument/path conversion can mis-handle unquoted arguments containing these characters. This can cause the spawned process to receive corrupted/truncated arguments compared to what Symfony intended. If an application (or tooling such as Composer scripts) uses Symfony Process to invoke file-management commands (e.g. `rmdir`, `del`, etc.) with a path argument containing `=`, the MSYS2 conversion layer may alter the argument at runtime. In affected setups this can result in operations being performed on an unintended path, up to and including deletion of the contents of a broader directory or drive. The issue is particularly relevant when untrusted input can influence process arguments (directly or indirectly, e.g. via repository paths, extracted archive paths, temporary directories, or user-controlled configuration). Versions 5.4.51, 6.4.33, 7.3.11, 7.4.5, and 8.0.5 contains a patch for the issue. Some workarounds are available. Avoid running PHP/one’s own tooling from MSYS2-based shells on Windows; prefer cmd.exe or PowerShell for workflows that spawn native executables. Avoid passing paths containing `=` (and similar MSYS2-sensitive characters) to Symfony Process when operating under Git Bash/MSYS2. Where applicable, configure MSYS2 to disable or restrict argument conversion (e.g. via `MSYS2_ARG_CONV_EXCL`), understanding this may affect other tooling behavior. | 2026-01-28 | 6.3 | CVE-2026-24739 | https://github.com/symfony/symfony/security/advisories/GHSA-r39x-jcww-82v6 https://github.com/symfony/symfony/issues/62921 https://github.com/symfony/symfony/pull/63164 https://github.com/symfony/symfony/commit/35203939050e5abd3caf2202113b00cab5d379b3 https://github.com/symfony/symfony/commit/ec154f6f95f8c60f831998ec4d246a857e9d179b |
| Tanium–Asset | Tanium addressed a SQL injection vulnerability in Asset. | 2026-01-28 | 6.3 | CVE-2025-15344 | TAN-2025-035 |
| Tanium–Discover | Tanium addressed an uncontrolled resource consumption vulnerability in Discover. | 2026-01-26 | 4.9 | CVE-2026-1224 | TAN-2026-001 |
| Tanium–Tanium Server | Tanium addressed an improper access controls vulnerability in Tanium Server. | 2026-01-30 | 4.3 | CVE-2025-15322 | TAN-2025-028 |
| TeamViewer–DEX | A vulnerability in TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information. | 2026-01-29 | 6.5 | CVE-2026-23564 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| TeamViewer–DEX | A vulnerability in TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause the NomadBranch.exe process to terminate via crafted requests. This can result in a denial-of-service condition of the Content Distribution Service. | 2026-01-29 | 6.5 | CVE-2026-23565 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| TeamViewer–DEX | A vulnerability in TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to inject, tamper with, or forge log entries in Nomad Branch.log via crafted data sent to the UDP network handler. This can impact log integrity and nonrepudiation. | 2026-01-29 | 6.5 | CVE-2026-23566 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| TeamViewer–DEX | An integer underflow in the UDP command handler of the TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to trigger a heap-based buffer overflow and cause a denial-of-service (service crash) via specially crafted UDP packets. | 2026-01-29 | 6.5 | CVE-2026-23567 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| TeamViewer–DEX | An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows a remote attacker to leak stack memory and cause a denial of service via a crafted request. The leaked stack memory could be used to bypass ASLR remotely and facilitate exploitation of other vulnerabilities on the affected system. | 2026-01-29 | 6.5 | CVE-2026-23569 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| TeamViewer–DEX | A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation. | 2026-01-29 | 6.5 | CVE-2026-23570 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| TeamViewer–DEX | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected. | 2026-01-29 | 6.8 | CVE-2026-23571 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/ |
| TeamViewer–DEX | Improper Link Resolution Before File Access (invoked by 1E Explorer TachyonCore DeleteFileByPath instruction) in TeamViewer DEX – 1E Client before version 26.1 on Windows allows a low privileged local attacker to delete protected system files via a crafted RPC control junction or symlink that is followed when the delete instruction executes. | 2026-01-29 | 5.7 | CVE-2026-23563 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/ |
| TeamViewer–DEX | An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) – Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause information disclosure or denial-of-service via a special crafted packet. The leaked memory could be used to bypass ASLR and facilitate further exploitation. | 2026-01-29 | 5.4 | CVE-2026-23568 | https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ |
| Tenda–AC21 | A security flaw has been discovered in Tenda AC21 1.1.1.1/1.dmzip/16.03.08.16. The impacted element is the function mDMZSetCfg of the file /goform/mDMZSetCfg. The manipulation of the argument dmzIp results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. | 2026-01-29 | 6.3 | CVE-2026-1638 | VDB-343417 | Tenda AC21 mDMZSetCfg command injection VDB-343417 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740871 | Tenda AC21 V16.03.08.16 Command Injection https://github.com/LX-LX88/cve/issues/26 https://www.tenda.com.cn/ |
| Tenda–HG10 | A flaw has been found in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. This affects the function system of the file /boaform/formSysCmd. This manipulation of the argument sysCmd causes command injection. The attack may be initiated remotely. The exploit has been published and may be used. | 2026-01-30 | 4.7 | CVE-2026-1690 | VDB-343484 | Tenda HG10 formSysCmd system command injection VDB-343484 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #741425 | Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon Command Injection https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSysCmd-sysCmd-command.md https://github.com/SunnyYANGyaya/cuicuishark-sheep-fishIOT/blob/main/Tenda/HG10/formSysCmd-sysCmd-command.md#poc https://www.tenda.com.cn/ |
| theupdateframework–go-tuf | go-tuf is a Go implementation of The Update Framework (TUF). go-tuf’s TAP 4 Multirepo Client uses the map file repository name string (`repoName`) as a filesystem path component when selecting the local metadata cache directory. Starting in version 2.0.0 and prior to version 2.4.1, if an application accepts a map file from an untrusted source, an attacker can supply a `repoName` containing traversal (e.g., `../escaped-repo`) and cause go-tuf to create directories and write the root metadata file outside the intended `LocalMetadataDir` cache base, within the running process’s filesystem permissions. Version 2.4.1 contains a patch. | 2026-01-27 | 4.7 | CVE-2026-24686 | https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-jqc5-w2xx-5vq4 https://github.com/theupdateframework/go-tuf/commit/d361e2ea24e427581343dee5c7a32b485d79fcc0 |
| thewebfosters-thewebfosters | Ultimate POS 4.4 contains a persistent cross-site scripting vulnerability in the product name parameter that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability through product add or edit functions to execute arbitrary JavaScript and potentially hijack user sessions. | 2026-02-01 | 6.4 | CVE-2021-47908 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: Ultimate POS 4.4 Persistent Cross-Site Scripting via Product Name |
| tigroumeow–AI Engine The Chatbot and AI Framework for WordPress | The AI Engine plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.3.2 via the ‘get_audio’ function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services, if “Public API” is enabled in the plugin settings, and ‘allow_url_fopen’ is set to ‘On’ on the server. | 2026-01-27 | 6.4 | CVE-2026-0746 | https://www.wordfence.com/threat-intel/vulnerabilities/id/cbba866d-93dd-4ef5-9670-ab958f61f06e?source=cve https://plugins.trac.wordpress.org/browser/ai-engine/tags/3.3.1/classes/engines/chatml.php#L946 https://plugins.trac.wordpress.org/changeset/3447500/ai-engine/trunk/classes/engines/chatml.php |
| Tildeslash Ltd.–M/Monit | M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and /api/1/admin/users/get endpoints to extract MD5 password hashes for all users. | 2026-01-28 | 6.5 | CVE-2020-36968 | ExploitDB-49081 M/Monit Official Vendor Homepage VulnCheck Advisory: M/Monit 3.7.4 – Password Disclosure |
| Totolink–A7000R | A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. | 2026-01-28 | 6.3 | CVE-2026-1547 | VDB-343231 | Totolink A7000R cstecgi.cgi setUnloadUserData command injection VDB-343231 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739713 | TOTOLINK A7000R V4.1cu.4154 Command Injection https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md#poc https://www.totolink.net/ |
| Totolink–A7000R | A flaw has been found in Totolink A7000R 4.1cu.4154. This impacts the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument url causes command injection. The attack can be initiated remotely. The exploit has been published and may be used. | 2026-01-28 | 6.3 | CVE-2026-1548 | VDB-343232 | Totolink A7000R cstecgi.cgi CloudACMunualUpdateUserdata command injection VDB-343232 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #739715 | TOTOLINK A7000R V4.1cu.4154 Command Injection https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/02_RCE_CloudACMunualUpdateUserdata_RCE.md https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/02_RCE_CloudACMunualUpdateUserdata_RCE.md#poc https://www.totolink.net/ |
| Totolink–A7000R | A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-29 | 6.3 | CVE-2026-1601 | VDB-343373 | Totolink A7000R cstecgi.cgi setUploadUserData command injection VDB-343373 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740760 | TOTOLINK A7000R V4.1cu.4154 Command Injection https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/03_RCE_setUploadUserData_RCE.md https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/03_RCE_setUploadUserData_RCE.md#poc https://www.totolink.net/ |
| Totolink–A7000R | A weakness has been identified in Totolink A7000R 4.1cu.4154. Impacted is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument FileName causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-29 | 6.3 | CVE-2026-1623 | VDB-343382 | Totolink A7000R cstecgi.cgi setUpgradeFW command injection VDB-343382 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740767 | TOTOLINK A7000R V4.1cu.4154 Command Injection https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/04_RCE_setUpgradeFW_RCE.md https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/04_RCE_setUpgradeFW_RCE.md#poc https://www.totolink.net/ |
| TrustTunnel–TrustTunnel | TrustTunnel is an open-source VPN protocol with a rule bypass issue in versions prior to 0.9.115. In `tls_listener.rs`, `TlsListener::listen()` peeks 1024 bytes and calls `extract_client_random(…)`. If `parse_tls_plaintext` fails (for example, a fragmented/partial ClientHello split across TCP writes), `extract_client_random` returns `None`. In `rules.rs`, `RulesEngine::evaluate` only evaluates `client_random_prefix` when `client_random` is `Some(…)`. As a result, when extraction fails (`client_random == None`), any rule that relies on `client_random_prefix` matching is skipped and evaluation falls through to later rules. As an important semantics note: `client_random_prefix` is a match condition only. It does not mean “block non-matching prefixes” by itself. A rule with `client_random_prefix = …` triggers its `action` only when the prefix matches (and the field is available to evaluate). Non-matches (or `None`) simply do not match that rule and continue to fall through. The vulnerability is fixed in version 0.9.115. | 2026-01-29 | 5.3 | CVE-2026-24904 | https://github.com/TrustTunnel/TrustTunnel/security/advisories/GHSA-fqh7-r5gf-3r87 https://github.com/TrustTunnel/TrustTunnel/commit/aa5060145506952b9431b0ed3edb52bb6c08d9a6 |
| Tryton–Tryton | Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces. | 2026-01-30 | 6.4 | CVE-2020-37014 | ExploitDB-48466 Official Tryton Homepage Tryton Download Page Vulnerability Lab Advisory VulnCheck Advisory: Tryton 5.4 – Persistent Cross-Site Scripting |
| vercel–next | A denial of service vulnerability exists in self-hosted Next.js applications that have `remotePatterns` configured for the Image Optimizer. The image optimization endpoint (`/_next/image`) loads external images entirely into memory without enforcing a maximum size limit, allowing an attacker to cause out-of-memory conditions by requesting optimization of arbitrarily large images. This vulnerability requires that `remotePatterns` is configured to allow image optimization from external domains and that the attacker can serve or control a large image on an allowed domain. Strongly consider upgrading to 15.5.10 or 16.1.5 to reduce risk and prevent availability issues in Next applications. | 2026-01-26 | 5.9 | CVE-2025-59471 | https://github.com/vercel/next.js/security/advisories/GHSA-9g9p-9gw9-jx7f |
| vercel–next | A denial of service vulnerability exists in Next.js versions with Partial Prerendering (PPR) enabled when running in minimal mode. The PPR resume endpoint accepts unauthenticated POST requests with the `Next-Resume: 1` header and processes attacker-controlled postponed state data. Two closely related vulnerabilities allow an attacker to crash the server process through memory exhaustion: 1. **Unbounded request body buffering**: The server buffers the entire POST request body into memory using `Buffer.concat()` without enforcing any size limit, allowing arbitrarily large payloads to exhaust available memory. 2. **Unbounded decompression (zipbomb)**: The resume data cache is decompressed using `inflateSync()` without limiting the decompressed output size. A small compressed payload can expand to hundreds of megabytes or gigabytes, causing memory exhaustion. Both attack vectors result in a fatal V8 out-of-memory error (`FATAL ERROR: Reached heap limit Allocation failed – JavaScript heap out of memory`) causing the Node.js process to terminate. The zipbomb variant is particularly dangerous as it can bypass reverse proxy request size limits while still causing large memory allocation on the server. To be affected you must have an application running with `experimental.ppr: true` or `cacheComponents: true` configured along with the NEXT_PRIVATE_MINIMAL_MODE=1 environment variable. Strongly consider upgrading to 15.6.0-canary.61 or 16.1.5 to reduce risk and prevent availability issues in Next applications. | 2026-01-26 | 5.9 | CVE-2025-59472 | https://github.com/vercel/next.js/security/advisories/GHSA-5f7q-jpqc-wp7h |
| vinod-dalvi–Ivory Search WordPress Search Plugin | The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | 2026-01-28 | 4.4 | CVE-2026-1053 | https://www.wordfence.com/threat-intel/vulnerabilities/id/cdc5ef6a-32d8-4c4b-b459-d9b543b56898?source=cve https://plugins.svn.wordpress.org/add-search-to-menu/tags/5.5.13/public/class-is-public.php https://plugins.trac.wordpress.org/browser/add-search-to-menu/tags/5.5.13/public/class-is-public.php#L204 https://plugins.trac.wordpress.org/browser/add-search-to-menu/tags/5.5.13/public/class-is-public.php#L249 https://plugins.trac.wordpress.org/browser/add-search-to-menu/tags/5.5.13/public/partials/is-ajax-results.php#L148 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3444659%40add-search-to-menu&new=3444659%40add-search-to-menu&sfp_email=&sfph_mail= |
| vlt–vlt | vlt before 1.0.0-rc.10 mishandles path sanitization for tar, leading to path traversal during extraction. | 2026-01-27 | 5.9 | CVE-2026-24909 | https://www.scworld.com/news/six-javascript-zero-day-bugs-lead-to-fears-of-supply-chain-attack https://github.com/vltpkg/vltpkg/releases/tag/v1.0.0-rc.10 https://github.com/vltpkg/vltpkg/pull/1334 https://www.koi.ai/blog/packagegate-6-zero-days-in-js-package-managers-but-npm-wont-act |
| webaways–NEX-Forms Ultimate Forms Plugin for WordPress | The NEX-Forms – Ultimate Forms Plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the NF5_Export_Forms class constructor in all versions up to, and including, 9.1.8. This makes it possible for unauthenticated attackers to export form configurations, that may include sensitive data, such as email addresses, PayPal API credentials, and third-party integration keys by enumerating the nex_forms_Id parameter. | 2026-01-31 | 5.3 | CVE-2025-15510 | https://www.wordfence.com/threat-intel/vulnerabilities/id/ddfa5a3d-fef2-4049-915c-51c3e28153bf?source=cve https://plugins.trac.wordpress.org/browser/nex-forms-express-wp-form-builder/tags/9.1.7/includes/classes/class.export.php#L11 |
| webguyio–Stop Spammers Classic | The Stop Spammers Classic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2026.1. This is due to missing nonce validation in the ss_addtoallowlist class. This makes it possible for unauthenticated attackers to add arbitrary email addresses to the spam allowlist via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The vulnerability was partially patched in version 2026.1. | 2026-01-28 | 4.3 | CVE-2025-14795 | https://www.wordfence.com/threat-intel/vulnerabilities/id/5d6f38d7-a769-422d-ae3f-565cb1cc8a73?source=cve https://plugins.trac.wordpress.org/browser/stop-spammer-registrations-plugin/tags/2025.4/classes/ss_addtoallowlist.php#L21 https://plugins.trac.wordpress.org/changeset/3436357/ https://plugins.trac.wordpress.org/changeset/3440788/ |
| WebMO, LLC–WebMO Job Manager | WebMO Job Manager 20.0 contains a cross-site scripting vulnerability in search parameters that allows remote attackers to inject malicious script code. Attackers can exploit the filterSearch and filterSearchType parameters to perform non-persistent attacks including session hijacking and external redirects. | 2026-02-01 | 5.4 | CVE-2021-47920 | Vulnerability Lab Advisory Product Homepage VulnCheck Advisory: WebMO Job Manager 20.0 Cross-Site Scripting via Search Parameters |
| WellChoose–Single Sign-On Portal System | Single Sign-On Portal System developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing authenticated remote attackers to execute arbitrary JavaScript codes in user’s browser through phishing attacks. | 2026-01-26 | 5.4 | CVE-2026-1429 | https://www.twcert.org.tw/tw/cp-132-10654-23f40-1.html https://www.twcert.org.tw/en/cp-139-10655-59160-2.html |
| withstudiocms–studiocms | StudioCMS is a server-side-rendered, Astro native, headless content management system. Versions prior to 0.2.0 contain a Broken Object Level Authorization (BOLA) vulnerability in the Content Management feature that allows users with the “Visitor” role to access draft content created by Editor/Admin/Owner users. Version 0.2.0 patches the issue. | 2026-01-27 | 6.5 | CVE-2026-24134 | https://github.com/withstudiocms/studiocms/security/advisories/GHSA-8cw6-53m5-4932 https://github.com/withstudiocms/studiocms/commit/efc10bee20db090fdd75463622c30dda390c50ad https://github.com/withstudiocms/studiocms/releases/tag/studiocms%400.2.0 |
| wpbits–WPBITS Addons For Elementor Page Builder | The WPBITS Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widget parameters in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping when dynamic content is enabled. This makes it possible for authenticated attackers with contributor-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2025-9082 | https://www.wordfence.com/threat-intel/vulnerabilities/id/99b47856-502e-4e9d-b0ea-62c57509b46a?source=cve https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/image_compare.php#L607 https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/tooltip.php#L860 https://plugins.trac.wordpress.org/browser/wpbits-addons-for-elementor/trunk/includes/widgets/text_rotator.php#L369 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3442812%40wpbits-addons-for-elementor&new=3442812%40wpbits-addons-for-elementor&sfp_email=&sfph_mail= |
| wpblockart–BlockArt Blocks Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library | The BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the BlockArt Counter in all versions up to, and including, 2.2.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2026-01-28 | 6.4 | CVE-2025-14283 | https://www.wordfence.com/threat-intel/vulnerabilities/id/d9526a8b-fefe-4ca6-871f-1ead3f498679?source=cve https://plugins.trac.wordpress.org/browser/blockart-blocks/trunk/dist/counter.js |
| wpchill–Passster Password Protect Pages and Content | The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘content_protector’ shortcode in all versions up to, and including, 4.2.24. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 4.2.21. | 2026-01-28 | 6.4 | CVE-2025-14865 | https://www.wordfence.com/threat-intel/vulnerabilities/id/4ea939f5-8b56-44be-bd20-b69e9ded5970?source=cve https://plugins.trac.wordpress.org/browser/content-protector/tags/4.2.20/inc/class-ps-public.php#L136 https://plugins.trac.wordpress.org/changeset/3422595/ https://plugins.trac.wordpress.org/changeset/3439532/ |
| wpcodefactory–Order Minimum/Maximum Amount Limits for WooCommerce | The Order Minimum/Maximum Amount Limits for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 4.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | 2026-01-28 | 4.4 | CVE-2026-1381 | https://www.wordfence.com/threat-intel/vulnerabilities/id/3f54f117-0dde-49f9-8014-7650bc1a00ac?source=cve https://plugins.trac.wordpress.org/browser/order-minimum-amount-for-woocommerce/trunk/includes/settings/class-alg-wc-oma-settings-general.php https://plugins.trac.wordpress.org/browser/order-minimum-amount-for-woocommerce/trunk/includes/class-alg-wc-oma-core.php#L86 https://plugins.trac.wordpress.org/browser/order-minimum-amount-for-woocommerce/tags/4.6.8/includes/class-alg-wc-oma-core.php#L86 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3447432%40order-minimum-amount-for-woocommerce&new=3447432%40order-minimum-amount-for-woocommerce&sfp_email=&sfph_mail= |
| wpdevelop–Booking Calendar | The Booking Calendar plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the wpbc_ajax_WPBC_FLEXTIMELINE_NAV() function in all versions up to, and including, 10.14.13. This makes it possible for unauthenticated attackers to retrieve booking information including customer names, phones and emails. | 2026-01-31 | 5.3 | CVE-2026-1431 | https://www.wordfence.com/threat-intel/vulnerabilities/id/0bd92f91-d9b1-4f6f-ac1a-477950ea2e80?source=cve https://plugins.trac.wordpress.org/browser/booking/tags/10.14.13/core/lib/wpbc-ajax.php#L25 |
| Xeroneit–Xeroneit Library Management System | Xeroneit Library Management System 3.1 contains a stored cross-site scripting vulnerability in the Book Category feature that allows administrators to inject malicious scripts. Attackers can insert a payload in the Category Name field to execute arbitrary JavaScript code when the page is loaded. | 2026-01-26 | 6.4 | CVE-2020-36954 | ExploitDB-49292 Vendor Homepage Software Product Page VulnCheck Advisory: Xeroneit Library Management System 3.1 – “Add Book Category ” Stored XSS |
| zephyrproject-rtos–Zephyr | A flaw in Zephyr’s network stack allows an IPv4 packet containing ICMP type 128 to be misclassified as an ICMPv6 Echo Request. This results in an out-of-bounds memory read and creates a potential information-leak vulnerability in the networking subsystem. | 2026-01-30 | 6.5 | CVE-2025-12899 | https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c2vg-hj83-c2vg |
| Zhong Bang–CRMEB | A security flaw has been discovered in Zhong Bang CRMEB up to 5.6.3. This vulnerability affects unknown code of the file crmeb/app/api/controller/v1/CrontabController.php of the component crontab Endpoint. The manipulation results in missing authorization. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-02-01 | 5.3 | CVE-2026-1734 | VDB-343633 | Zhong Bang CRMEB crontab Endpoint CrontabController.php authorization VDB-343633 | CTI Indicators (IOB, IOC, IOA) Submit #736619 | Zhongbang CRMEB v5.6.3 Missing Authorization https://github.com/foeCat/CVE/blob/main/CRMEB/crontab_unauthorized_access.md https://github.com/foeCat/CVE/blob/main/CRMEB/crontab_unauthorized_access.md#proof-of-concept |
| Zhong Bang–CRMEB | A vulnerability was identified in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/tidyOrder of the file /api/store_integral/order/detail/:uni. The manipulation of the argument order_id leads to improper authorization. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-02-01 | 4.3 | CVE-2026-1733 | VDB-343632 | Zhong Bang CRMEB :uni tidyOrder improper authorization VDB-343632 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736558 | Zhongbang CRMEB v5.6.3 Improper Access Controls https://github.com/foeCat/CVE/blob/main/CRMEB/integral_order_detail_idor.md https://github.com/foeCat/CVE/blob/main/CRMEB/integral_order_detail_idor.md#%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0 |
| Zohocorp–ManageEngine OpManager | Zohocorp ManageEngine OpManager, NetFlow Analyzer, and OpUtils versions prior to 128582 are affected by a stored cross-site scripting vulnerability in the Subnet Details. | 2026-01-30 | 4.6 | CVE-2025-9226 | https://www.manageengine.com/itom/advisory/cve-2025-9226.html |
Low Vulnerabilities
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info | Patch Info |
|---|---|---|---|---|---|
| Bdtask–Bhojon All-In-One Restaurant Management System | A vulnerability was found in Bdtask Bhojon All-In-One Restaurant Management System up to 20260116. Impacted is an unknown function of the file /dashboard/home/profile of the component User Information Module. Performing a manipulation of the argument fullname results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-29 | 3.5 | CVE-2026-1598 | VDB-343360 | Bdtask Bhojon All-In-One Restaurant Management System User Information profile cross site scripting VDB-343360 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740738 | Bdtask Bhojon All-In-One Restaurant Management System Latest Stored Cross-Site Scripting https://github.com/4m3rr0r/PoCVulDb/issues/12 |
| Brother Industries, Ltd.–Multiple MFPs | Multiple MFPs provided by Brother Industries, Ltd. does not properly validate server certificates, which may allow a man-in-the-middle attacker to replace the set of root certificates used by the product with a set of arbitrary certificates. | 2026-01-29 | 3.7 | CVE-2025-53869 | https://faq.brother.co.jp/app/answers/detail/a_id/13716 https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2026-0001.pdf https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2026-000001 https://jvn.jp/en/vu/JVNVU92878805/ |
| code-projects–Online Examination System | A vulnerability has been found in code-projects Online Examination System 1.0. Affected is an unknown function of the component Add Pages. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. | 2026-01-26 | 3.5 | CVE-2026-1421 | VDB-342837 | code-projects Online Examination System Add Pages cross site scripting VDB-342837 | CTI Indicators (IOB, IOC, TTP) Submit #736605 | code-projects Online Examination System 1 Cross Site Scripting https://github.com/geo-chen/code-projects/blob/main/Online%20Examination%20System%20In%20PHP%20With%20Source%20Code.md#finding-1-stored-xss-in-all-add-pages https://code-projects.org/ |
| D-Link–DCS-700L | A vulnerability was identified in D-Link DCS-700L 1.03.09. The affected element is the function uploadmusic of the file /setUploadMusic of the component Music File Upload Service. The manipulation of the argument UploadMusic leads to path traversal. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. | 2026-01-28 | 2.4 | CVE-2026-1532 | VDB-343218 | D-Link DCS-700L Music File Upload Service setUploadMusic uploadmusic path traversal VDB-343218 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #738693 | D-Link DCS700l v1.03.09 Absolute Path Traversal https://tzh00203.notion.site/D-Link-DCS700l-v1-03-09-Path-Traversal-Vulnerability-in-Music-File-Upload-2e8b5c52018a80369553f07ab91aabe2?source=copy_link https://www.dlink.com/ |
| D-Link–DIR-823X | A vulnerability was identified in D-Link DIR-823X 250416. This vulnerability affects the function sub_40AC74 of the component Login. Such manipulation leads to improper restriction of excessive authentication attempts. The attack may be performed from remote. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used. | 2026-01-30 | 3.7 | CVE-2026-1685 | VDB-343479 | D-Link DIR-823X Login sub_40AC74 excessive authentication VDB-343479 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740886 | D-Link dir-823X 250416 A logical flaw in the authentication mechanism exists https://github.com/master-abc/cve/issues/17 https://www.dlink.com/ |
| D-Link–DSL-6641K | A vulnerability was detected in D-Link DSL-6641K N8.TR069.20131126. Affected by this issue is the function ad_virtual_server_vdsl of the component Web Interface. Performing a manipulation of the argument Name results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. | 2026-01-30 | 2.4 | CVE-2026-1705 | VDB-343510 | D-Link DSL-6641K Web ad_virtual_server_vdsl cross site scripting VDB-343510 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #742421 | D-Link DSL6641K version N8.TR069.20131126 Cross Site Scripting https://tzh00203.notion.site/D-Link-DSL6641K-version-N8-TR069-20131126-XSS-via-ad_virtual_server_vdsl-Configuration-2eeb5c52018a805d97adfb23dfec39c9?source=copy_link https://www.dlink.com/ |
| GnuPG–GnuPG | In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash). | 2026-01-27 | 3.7 | CVE-2026-24883 | https://www.openwall.com/lists/oss-security/2026/01/27/8 https://dev.gnupg.org/T8049 |
| GPAC–GPAC | A vulnerability was identified in GPAC up to 2.4.0. Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c. The manipulation of the argument Name leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is af951b892dfbaaa38336ba2eba6d6a42c25810fd. To fix this issue, it is recommended to deploy a patch. | 2026-01-26 | 3.3 | CVE-2026-1415 | VDB-342804 | GPAC media_export.c gf_media_export_webvtt_metadata null pointer dereference VDB-342804 | CTI Indicators (IOB, IOC, IOA) Submit #736541 | gpac v2.4.0 NULL Pointer Dereference https://github.com/gpac/gpac/issues/3428 https://github.com/gpac/gpac/issues/3428#issue-3802223345 https://github.com/enocknt/gpac/commit/af951b892dfbaaa38336ba2eba6d6a42c25810fd |
| GPAC–GPAC | A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue. | 2026-01-26 | 3.3 | CVE-2026-1416 | VDB-342805 | GPAC filedump.c DumpMovieInfo null pointer dereference VDB-342805 | CTI Indicators (IOB, IOC, IOA) Submit #736542 | gpac v2.4.0 NULL Pointer Dereference https://github.com/gpac/gpac/issues/3427 https://github.com/gpac/gpac/issues/3427#issue-3802197432 https://github.com/enocknt/gpac/commit/d45c264c20addf0c1cc05124ede33f8ffa800e68 |
| GPAC–GPAC | A weakness has been identified in GPAC up to 2.4.0. Affected by this issue is the function dump_isom_rtp of the file applications/mp4box/filedump.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. Patch name: f96bd57c3ccdcde4335a0be28cd3e8fe296993de. Applying a patch is the recommended action to fix this issue. | 2026-01-26 | 3.3 | CVE-2026-1417 | VDB-342806 | GPAC filedump.c dump_isom_rtp null pointer dereference VDB-342806 | CTI Indicators (IOB, IOC, IOA) Submit #736543 | gpac v2.4.0 NULL Pointer Dereference https://github.com/gpac/gpac/issues/3426 https://github.com/gpac/gpac/issues/3426#issue-3802172856 https://github.com/enocknt/gpac/commit/f96bd57c3ccdcde4335a0be28cd3e8fe296993de |
| iJason-Liu–Books_Manager | A vulnerability has been found in iJason-Liu Books_Manager up to 298ba736387ca37810466349af13a0fdf828e99c. This affects an unknown part of the file controllers/books_center/add_book_check.php. Such manipulation of the argument mark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. | 2026-01-26 | 2.4 | CVE-2026-1444 | VDB-342873 | iJason-Liu Books_Manager add_book_check.php cross site scripting VDB-342873 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #736968 | https://github.com/iJason-Liu/Books_Manager Books_Manager 1.0 Stored XSS https://blog.y1fan.work/2026/01/13/%E5%AD%98%E5%82%A8%E5%9E%8Bxss/ |
| ixray-team–ixray-1.6-stcop | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ixray-team ixray-1.6-stcop. This issue affects ixray-1.6-stcop: before 1.3. | 2026-01-27 | 3.7 | CVE-2026-24870 | https://github.com/ixray-team/ixray-1.6-stcop/pull/258 |
| jishenghua–jshERP | A vulnerability was found in jishenghua jshERP up to 3.6. The impacted element is the function install of the file /jshERP-boot/plugin/installByPath of the component com.gitee.starblues.integration.operator.DefaultPluginOperator. The manipulation of the argument path results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. | 2026-01-29 | 2.7 | CVE-2026-1588 | VDB-343351 | jishenghua jshERP installByPath install path traversal VDB-343351 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #740649 | https://github.com/jishenghua/jshERP jshERP v3.6 Path Traversal https://github.com/jishenghua/jshERP/issues/147 https://github.com/jishenghua/jshERP/ |
| llamastack–Llama Stack | Llama Stack (aka llama-stack) before 0.4.0rc3 does not censor the pgvector password in the initialization log. | 2026-01-30 | 3.2 | CVE-2026-25211 | https://github.com/llamastack/llama-stack/pull/4439 https://github.com/llamastack/llama-stack/compare/v0.4.0rc2…v0.4.0rc3 |
| MoonshotAI–kimi-agent-sdk | Kimi Agent SDK is a set of libraries that expose the Kimi Code (Kimi CLI) agent runtime in applications. The vsix-publish.js and ovsx-publish.js scripts pass filenames to execSync() as shell command strings. Prior to version 0.1.6, filenames containing shell metacharacters like $(cmd) could execute arbitrary commands. Note: This vulnerability exists only in the repository’s development scripts. The published VSCode extension does not include these files and end users are not affected. This is fixed in version 0.1.6 by replacing execSync with execFileSync using array arguments. As a workaround, ensure .vsix files in the project directory have safe filenames before running publish scripts. | 2026-01-29 | 2.9 | CVE-2026-25046 | https://github.com/MoonshotAI/kimi-agent-sdk/security/advisories/GHSA-mv58-gxx5-8hj3 |
| OISF–suricata | Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, various inefficiencies in xff handling, especially for alerts not triggered in a tx, can lead to severe slowdowns. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, disable XFF support in the eve configuration. The setting is disabled by default. | 2026-01-27 | 3.7 | CVE-2026-22261 | https://github.com/OISF/suricata/security/advisories/GHSA-5jvg-5j3p-34cf https://github.com/OISF/suricata/commit/3f0725b34c7871c2de4346c8af872f10f4501e44 https://github.com/OISF/suricata/commit/af246ae7ab1b70c09f83c0619b253095ccc18667 https://redmine.openinfosecfoundation.org/issues/8156 |
| projectworlds–House Rental and Property Listing | A weakness has been identified in projectworlds House Rental and Property Listing 1.0. This vulnerability affects unknown code of the file /app/sms.php. This manipulation of the argument Message causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. | 2026-01-30 | 3.5 | CVE-2026-1700 | VDB-343490 | projectworlds House Rental and Property Listing sms.php cross site scripting VDB-343490 | CTI Indicators (IOB, IOC, TTP, IOA) Submit #741977 | projectworlds.com House rental And Property Listing Project V1.0 cross site scripting https://github.com/jiahao412/CVE/issues/3 |
| Red Hat–Red Hat Build of Keycloak | A flaw was found in Keycloak’s SAML brokering functionality. When Keycloak is configured as a client in a Security Assertion Markup Language (SAML) setup, it fails to validate the `NotOnOrAfter` timestamp within the `SubjectConfirmationData`. This allows an attacker to delay the expiration of SAML responses, potentially extending the time a response is considered valid and leading to unexpected session durations or resource consumption. | 2026-01-26 | 3.1 | CVE-2026-1190 | https://access.redhat.com/security/cve/CVE-2026-1190 RHBZ#2430835 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in Glib’s content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability. | 2026-01-27 | 2.8 | CVE-2026-1485 | https://access.redhat.com/security/cve/CVE-2026-1485 RHBZ#2433325 |
| rethinkdb–rethinkdb | A vulnerability was identified in rethinkdb up to 2.4.3. Affected by this issue is some unknown functionality of the component Secondary Index Handler. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | 2026-01-28 | 2.4 | CVE-2026-1520 | VDB-343191 | rethinkdb Secondary Index cross site scripting VDB-343191 | CTI Indicators (IOB, IOC, TTP) Submit #738312 | rethinkdb V2.4.3(latest) cross-site scripting(XSS) https://github.com/59lab/dbdb/blob/main/There%20is%20a%20cross-site%20scripting(XSS)%20vulnerability%20in%20the%20rethinkdb%20database.md https://github.com/59lab/dbdb/blob/main/There%20is%20a%20cross-site%20scripting(XSS)%20vulnerability%20in%20the%20rethinkdb%20database.md#poc |
| Tanium–Discover | Tanium addressed an improper input validation vulnerability in Discover. | 2026-01-26 | 2.7 | CVE-2026-0925 | TAN-2026-002 |
| Tanium–Interact | Tanium addressed an improper access controls vulnerability in Interact. | 2026-01-29 | 3.1 | CVE-2025-15288 | TAN-2025-034 |
Severity Not Yet Assigned
| Primary Vendor — Product |
Description | Published | CVSS Score | Source Info | Patch Info |
|---|---|---|---|---|---|
| aangine–aangine | An issue in continuous.software aangine v.2025.2 allows a remote attacker to obtain sensitive information via the excel-integration-service template download module, integration-persistence-service job listing module, portfolio-item-service data retrieval module endpoints | 2026-01-26 | not yet calculated | CVE-2025-67274 | https://aangine.com https://continuous.software/products https://gist.github.com/c4m0uflag3/26fec868b764c4e7314ad246bab01c88 |
| abcz316–SKRoot-linuxKernelRoot | NULL Pointer Dereference vulnerability in abcz316 SKRoot-linuxKernelRoot (testRoot/jni/utils modules). This vulnerability is associated with program files cJSON.Cpp. This issue affects SKRoot-linuxKernelRoot. | 2026-01-27 | not yet calculated | CVE-2026-24813 | https://github.com/abcz316/SKRoot-linuxKernelRoot/pull/116 |
| Acronis–Acronis Cloud Manager | Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cloud Manager (Windows) before build 6.4.25342.354. | 2026-01-27 | not yet calculated | CVE-2026-0705 | SEC-7316 |
| AhaChat–AhaChat Messenger Marketing | The AhaChat Messenger Marketing WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | 2026-01-26 | not yet calculated | CVE-2025-14316 | https://wpscan.com/vulnerability/7d69ebec-f940-4491-a51e-70a9e1bf8a4c/ |
| akuity–kargo | Kargo manages and automates the promotion of software artifacts. Prior to versions 1.8.7, 1.7.7, and 1.6.3, a bug was found with authentication checks on the `GetConfig()` API endpoint. This allowed unauthenticated users to access this endpoint by specifying an `Authorization` header with any non-empty `Bearer` token value, regardless of validity. This vulnerability did allow for exfiltration of configuration data such as endpoints for connected Argo CD clusters. This data could allow an attacker to enumerate cluster URLs and namespaces for use in subsequent attacks. Additionally, the same bug affected the `RefreshResource` endpoint. This endpoint does not lead to any information disclosure, but could be used by an unauthenticated attacker to perform a denial-of-service style attack against the Kargo API. `RefreshResource` sets an annotation on specific Kubernetes resources to trigger reconciliations. If run on a constant loop, this could also slow down legitimate requests to the Kubernetes API server. This problem has been patched in Kargo versiosn 1.8.7, 1.7.7, and 1.6.3. There are no workarounds for this issue. | 2026-01-27 | not yet calculated | CVE-2026-24748 | https://github.com/akuity/kargo/security/advisories/GHSA-w5wv-wvrp-v5m5 https://github.com/akuity/kargo/commit/23646eaefb449a6cc2e76a8033e8a57f71369772 https://github.com/akuity/kargo/commit/aa28f81ac15ad871c6eba329fc2f0417a08c39d7 https://github.com/akuity/kargo/commit/b3297ace0d3b9e7f7128858c5c4288d77f072b8c |
| ALSA Project–alsa-lib | alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to commit 5f7fe33, contain a heap-based buffer overflow in the topology mixer control decoder. The tplg_decode_control_mixer1() function reads the num_channels field from untrusted .tplg data and uses it as a loop bound without validating it against the fixed-size channel array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive num_channels value can cause out-of-bounds heap writes, leading to a crash. | 2026-01-29 | not yet calculated | CVE-2026-25068 | https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40 https://www.vulncheck.com/advisories/alsa-lib-topology-decoder-heap-based-buffer-overflow |
| Altitude–Altitude Communication Server | Illegal HTTP request traffic vulnerability (CL.0) in Altitude Communication Server, caused by inconsistent analysis of multiple HTTP requests over a single Keep-Alive connection using Content-Length headers. This can cause a desynchronization of requests between frontend and backend servers, which could allow request hiding, cache poisoning or security bypass. | 2026-01-26 | not yet calculated | CVE-2025-41082 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-altitude-communication-server |
| Altitude–Altitude Communication Server | Vulnerability in Altitude Authentication Service and Altitude Communication Server v8.5.3290.0 by Altitude, where manipulation of Host header in HTTP requests allows redirection to an arbitrary URL or modification of the base URL to trick the victim into sending login credentials to a malicious website. This behavior can be used to redirect clients to endpoints controlled by the attacker. | 2026-01-26 | not yet calculated | CVE-2025-41083 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-altitude-communication-server |
| AltumCode–AltumCode | A directory traversal (Zip Slip) vulnerability exists in the “Static Sites” feature of 66biolinks v44.0.0 by AltumCode. Uploaded ZIP archives are automatically extracted without validating or sanitizing file paths. An attacker can include traversal sequences (e.g., ../) in ZIP entries to write files outside the intended extraction directory. This allows static files (html, js, css, images) file write to unintended locations, or overwriting existing HTML files, potentially leading to content defacement and, in certain deployments, further impact if sensitive files are overwritten. | 2026-01-28 | not yet calculated | CVE-2025-69601 | https://gist.github.com/Waqar-Arain/9cd59aa74de540eeb3b09d15bac35e36 |
| AltumCode–AltumCode | A session fixation vulnerability exists in 66biolinks v62.0.0 by AltumCode, where the application does not regenerate the session identifier after successful authentication. As a result, the same session cookie value is reused for users logging in from the same browser, allowing an attacker who can set or predict a session ID to potentially hijack an authenticated session. | 2026-01-28 | not yet calculated | CVE-2025-69602 | https://gist.github.com/Waqar-Arain/c8117308325a91b8f3b7829646915275 |
| Amidaware–Amidaware | A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint of Amidaware Tactical RMM, affecting versions equal to or earlier than v1.3.1, allows low-privileged users with Report Viewer or Report Manager permissions to achieve remote command execution on the server. This occurs due to improper sanitization of the template_md parameter, enabling direct injection of Jinja2 templates. This occurs due to misuse of the generate_html() function, the user-controlled value is inserted into `env.from_string`, a function that processes Jinja2 templates arbitrarily, making an SSTI possible. | 2026-01-29 | not yet calculated | CVE-2025-69516 | https://github.com/amidaware/tacticalrmm https://www.amidaware.com/ https://gist.github.com/NtGabrielGomes/7c424367cc316fd7527f668ff076fece |
| Amidaware–Amidaware | An HTML injection vulnerability in Amidaware Inc Tactical RMM v1.3.1 and earlier allows authenticated users to inject arbitrary HTML content during the creation of a new agent via the POST /api/v3/newagent/ endpoint. The agent_id parameter accepts up to 255 characters and is improperly sanitized using DOMPurify.sanitize() with the html: true option enabled, which fails to adequately filter HTML input. The injected HTML is rendered in the Tactical RMM management panel when an administrator attempts to remove or shut down the affected agent, potentially leading to client-side attacks such as UI manipulation or phishing. NOTE: the Supplier’s position is that this has incorrect information. | 2026-01-28 | not yet calculated | CVE-2025-69517 | https://github.com/amidaware/tacticalrmm https://www.amidaware.com/ https://gist.github.com/NtGabrielGomes/fdabcd9e85d841c5490739686e0f8b72 |
| amir20–dozzle | Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s agent-backed shell endpoints allows a user restricted by label filters (for example, `label=env=dev`) to obtain an interactive root shell in out of scope containers (for example, `env=prod`) on the same agent host by directly targeting their container IDs. Version 9.0.3 contains a patch for the issue. | 2026-01-27 | not yet calculated | CVE-2026-24740 | https://github.com/amir20/dozzle/security/advisories/GHSA-m855-r557-5rc5 https://github.com/amir20/dozzle/commit/620e59aa246347ba8a27e68c532853b8a5137bc1 https://github.com/amir20/dozzle/releases/tag/v9.0.3 |
| anyrtcIO-Community–anyRTC-RTMP-OpenSource | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in anyrtcIO-Community anyRTC-RTMP-OpenSource (third_party/faad2-2.7/libfaad modules). This vulnerability is associated with program files bits.C, syntax.C. This issue affects anyRTC-RTMP-OpenSource: before 1.0. | 2026-01-27 | not yet calculated | CVE-2026-1465 | https://github.com/anyrtcIO-Community/anyRTC-RTMP-OpenSource/pull/166 |
| Apache Software Foundation–Apache Karaf | Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter. The Decanter log socket collector exposes the port 4560, without authentication. If the collector exposes allowed classes property, this configuration can be bypassed. It means that the log socket collector is vulnerable to deserialization of untrusted data, eventually causing DoS. NB: Decanter log socket collector is not installed by default. Users who have not installed Decanter log socket are not impacted by this issue. This issue affects Apache Karaf Decanter before 2.12.0. Users are recommended to upgrade to version 2.12.0, which fixes the issue. | 2026-01-26 | not yet calculated | CVE-2026-24656 | https://lists.apache.org/thread/dc5wmdn6hyc992olntkl75kk04ndzx34 |
| Apache Software Foundation–HDFS native client | Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client. This issue affects Apache Hadoop: from 3.2.0 before 3.4.2. Users are recommended to upgrade to version 3.4.2, which fixes the issue. | 2026-01-26 | not yet calculated | CVE-2025-27821 | https://lists.apache.org/thread/kwjhyyx0wl2z9b0mw0styjk0hhdbyplh |
| Apple–iOS and iPadOS | The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26, Keynote 15.1, iOS 26 and iPadOS 26. Processing a maliciously crafted Keynote file may disclose memory contents. | 2026-01-28 | not yet calculated | CVE-2025-46306 | https://support.apple.com/en-us/125108 https://support.apple.com/en-us/126254 https://support.apple.com/en-us/125110 |
| Apple–macOS | An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 26.1 and iPadOS 26.1, Pages 15.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory. | 2026-01-28 | not yet calculated | CVE-2025-46316 | https://support.apple.com/en-us/125634 https://support.apple.com/en-us/126255 https://support.apple.com/en-us/125632 |
| askbot–askbot | All versions of askbot before and including 0.12.2 allow an attacker authenticated with normal user permissions to modify the profile picture of other application users. This issue affects askbot: 0.12.2. | 2026-01-27 | not yet calculated | CVE-2026-1213 | https://fluidattacks.com/advisories/ghost https://askbot.com/ https://github.com/ASKBOT/askbot-devel/commit/3da3d75f35204aa71633c7a315327ba39cb6295d |
| assertj–assertj | AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists in `org.assertj.core.util.xml.XmlStringPrettyFormatter`: the `toXmlDocument(String)` method initializes `DocumentBuilderFactory` with default settings, without disabling DTDs or external entities. This formatter is used by the `isXmlEqualTo(CharSequence)` assertion for `CharSequence` values. An application is vulnerable only when it uses untrusted XML input with either `isXmlEqualTo(CharSequence)` from `org.assertj.core.api.AbstractCharSequenceAssert` or `xmlPrettyFormat(String)` from `org.assertj.core.util.xml.XmlStringPrettyFormatter`. If untrusted XML input is processed by tone of these methods, an attacker couldnread arbitrary local files via `file://` URIs (e.g., `/etc/passwd`, application configuration files); perform Server-Side Request Forgery (SSRF) via HTTP/HTTPS URIs, and/or cause Denial of Service via “Billion Laughs” entity expansion attacks. `isXmlEqualTo(CharSequence)` has been deprecated in favor of XMLUnit in version 3.18.0 and will be removed in version 4.0. Users of affected versions should, in order of preference: replace `isXmlEqualTo(CharSequence)` with XMLUnit, upgrade to version 3.27.7, or avoid using `isXmlEqualTo(CharSequence)` or `XmlStringPrettyFormatter` with untrusted input. `XmlStringPrettyFormatter` has historically been considered a utility for `isXmlEqualTo(CharSequence)` rather than a feature for AssertJ users, so it is deprecated in version 3.27.7 and removed in version 4.0, with no replacement. | 2026-01-26 | not yet calculated | CVE-2026-24400 | https://github.com/assertj/assertj/security/advisories/GHSA-rqfh-9r24-8c9r https://github.com/assertj/assertj/commit/85ca7eb6609bb179c043b85ae7d290523b1ba79a https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html https://github.com/assertj/assertj/releases/tag/assertj-build-3.27.7 |
| Atlassian–Crowd Data Center | This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.0 of Crowd Data Center and Server. This XXE (XML External Entity Injection) vulnerability, with a CVSS Score of 7.9, allows an authenticated attacker to access local and remote content which has high impact to confidentiality, low impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Crowd Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Crowd Data Center and Server 7.1: Upgrade to a release greater than or equal to 7.1.3 See the release notes (https://confluence.atlassian.com/crowd/crowd-release-notes-199094.html). You can download the latest version of Crowd Data Center and Server from the download center (https://www.atlassian.com/software/crowd/download-archive). This vulnerability was reported via our Atlassian (Internal) program. | 2026-01-28 | not yet calculated | CVE-2026-21569 | https://confluence.atlassian.com/pages/viewpage.action?pageId=1712324819 https://jira.atlassian.com/browse/CWD-6453 |
| azerothcore–azerothcore-wotlk | Out-of-bounds Write, Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in azerothcore azerothcore-wotlk (deps/zlib modules). This vulnerability is associated with program files inflate.C. This issue affects azerothcore-wotlk: through v4.0.0. | 2026-01-27 | not yet calculated | CVE-2026-24793 | https://github.com/azerothcore/azerothcore-wotlk/pull/21599 |
| briandilley–jsonrpc4j | Loop with Unreachable Exit Condition (‘Infinite Loop’) vulnerability in briandilley jsonrpc4j (src/main/java/com/googlecode/jsonrpc4j modules). This vulnerability is associated with program files NoCloseOutputStream.Java. This issue affects jsonrpc4j: through 1.6.0. | 2026-01-27 | not yet calculated | CVE-2026-24802 | https://github.com/briandilley/jsonrpc4j/pull/333 |
| Budibase–budibase | Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions up to and including 3.26.3, a Creator-level user, who normally has no UI permission to invite users, can manipulate API requests to invite new users with any role, including Admin, Creator, or App Viewer, and assign them to any group in the organization. This allows full privilege escalation, bypassing UI restrictions, and can lead to complete takeover of the workspace or organization. As of time of publication, no known fixed versions are available. | 2026-01-29 | not yet calculated | CVE-2026-25040 | https://github.com/Budibase/budibase/security/advisories/GHSA-4wfw-r86x-qxrm https://drive.google.com/file/d/1Dtn1WLJILRYUeoMjEbUfCbqQ3g2AW2Qz/view?usp=sharing https://github.com/user-attachments/files/22066135/budibase-privileged-esc-poc.txt |
| bytecodealliance–wasmtime | Wasmtime is a runtime for WebAssembly. Starting in version 29.0.0 and prior to version 36.0.5, 40.0.3, and 41.0.1, on x86-64 platforms with AVX, Wasmtime’s compilation of the `f64.copysign` WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due to loading from unmapped guard pages. With guard pages disabled it’s possible for out-of-sandbox data to be loaded, but unless there is another bug in Cranelift this data is not visible to WebAssembly guests. Wasmtime 36.0.5, 40.0.3, and 41.0.1 have been released to fix this issue. Users are recommended to upgrade to the patched versions of Wasmtime. Other affected versions are not patched and users should updated to supported major version instead. This bug can be worked around by enabling signals-based-traps. While disabling guard pages can be a quick fix in some situations, it’s not recommended to disabled guard pages as it is a key defense-in-depth measure of Wasmtime. | 2026-01-27 | not yet calculated | CVE-2026-24116 | https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-vc8c-j3xm-xj73 https://github.com/bytecodealliance/wasmtime/commit/728fa07184f8da2a046f48ef9b61f869dce133a6 https://github.com/bytecodealliance/wasmtime/commit/799585fc362fcb991de147dd1a9f2ba0861ed440 https://github.com/bytecodealliance/wasmtime/commit/ac92d9bb729ad3a6d93f0724c4c33a0c4a9c0227 https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.memory_guard_size https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.signals_based_traps https://docs.wasmtime.dev/stability-release.html https://rustsec.org/advisories/RUSTSEC-2026-0006.html |
| Cacti–Cacti | A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. | 2026-01-29 | not yet calculated | CVE-2025-45160 | https://github.com/Cacti/cacti https://gist.github.com/BEND0US/49d76897a5bb676d8c3f51425553cc32 |
| cadaver–turso3d | Out-of-bounds Write, Divide By Zero, NULL Pointer Dereference, Use of Uninitialized Resource, Out-of-bounds Read, Reachable Assertion vulnerability in cadaver turso3d. This issue affects . | 2026-01-27 | not yet calculated | CVE-2026-24826 | https://github.com/cadaver/turso3d/pull/11 |
| Canonical–juju | Vulnerable cross-model authorization in juju. If a charm’s cross-model permissions are revoked or expire, a malicious user who is able to update database records can mint an invalid macaroon that is incorrectly validated by the juju controller, enabling a charm to maintain otherwise revoked or expired permissions. This allows a charm to continue relating to another charm in a cross-model relation, and use their workload without their permission. No fix is available as of the time of writing. | 2026-01-28 | not yet calculated | CVE-2026-1237 | https://github.com/juju/juju/security/advisories/GHSA-j477-6vpg-6c8x |
| CardboardPowered–cardboard | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in CardboardPowered cardboard (src/main/java/org/cardboardpowered/impl/world modules). This vulnerability is associated with program files WorldImpl.Java. This issue affects cardboard: before 1.21.4. | 2026-01-27 | not yet calculated | CVE-2026-24794 | https://github.com/CardboardPowered/cardboard/pull/506 |
| ChurchCRM–CRM | ChurchCRM is an open-source church management system. Versions prior to 6.7.2 have a Stored Cross-Site Scripting (XSS) vulnerability occurs in Create Events in Church Calendar. Users with low privileges can create XSS payloads in the Description field. This payload is stored in the database, and when other users view that event (including the admin), the payload is triggered, leading to account takeover. Version 6.7.2 fixes the vulnerability. | 2026-01-30 | not yet calculated | CVE-2026-24855 | https://github.com/ChurchCRM/CRM/security/advisories/GHSA-49qp-cfqx-c767 https://github.com/ChurchCRM/CRM/commit/0cd0d211459b8c19509d36b3c1dfcd7f8c10d914 https://github.com/ChurchCRM/CRM/commit/ec4b16e9a3ca09c8a01a712bcb90579c42f2ba28 |
| CloverHackyColor–CloverBootloader | Out-of-bounds Write vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regcomp.C. This issue affects CloverBootloader: before 5162. | 2026-01-27 | not yet calculated | CVE-2026-24795 | https://github.com/CloverHackyColor/CloverBootloader/pull/733 |
| CloverHackyColor–CloverBootloader | Out-of-bounds Read vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regparse.C. This issue affects CloverBootloader: before 5162. | 2026-01-27 | not yet calculated | CVE-2026-24796 | https://github.com/CloverHackyColor/CloverBootloader/pull/732 |
| code-projects–code-projects | code-projects Computer Book Store 1.0 is vulnerable to File Upload in admin_add.php. | 2026-01-27 | not yet calculated | CVE-2025-69559 | https://gitee.com/Z_180yc/zyy/issues/IDBY27 https://gist.github.com/lih28984-commits/cd3a275dfd9c92a79b6a4a0e8801f4fa |
| code-projects–code-projects | code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /insertmessage.php via the userid parameter. | 2026-01-27 | not yet calculated | CVE-2025-69562 | https://gitee.com/Z_180yc/zyy/issues/IDC5FU https://gist.github.com/lih28984-commits/a847a034c3bb626904dcc6ab7576257f |
| code-projects–code-projects | code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /ExLogin.php via the Password parameter. | 2026-01-27 | not yet calculated | CVE-2025-69563 | https://gitee.com/Z_180yc/zyy/issues/IDC3IB https://gist.github.com/lih28984-commits/544eaaca3ea58563a807c43b521d76e6 |
| code-projects–code-projects | code-projects Mobile Shop Management System 1.0 is vulnerable to SQL Injection in /ExAddNewUser.php via the Name, Address, email, UserName, Password, confirm_password, Role, Branch, and Activate parameters. | 2026-01-27 | not yet calculated | CVE-2025-69564 | https://gitee.com/Z_180yc/zyy/issues/IDCEJP https://gist.github.com/lih28984-commits/87eacfc32186020a04e03a2af448723f |
| code-projects–code-projects | code-projects Mobile Shop Management System 1.0 is vulnerable to File Upload in /ExAddProduct.php. | 2026-01-27 | not yet calculated | CVE-2025-69565 | https://gitee.com/Z_180yc/zyy/issues/IDCFAQ https://gist.github.com/lih28984-commits/81d523afde3b122c652f652bab808e33 |
| coolsnowwolf–lede | Loop with Unreachable Exit Condition (‘Infinite Loop’) vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7615d/src/mt_wifi/embedded/security modules). This vulnerability is associated with program files bn_lib.C. This issue affects lede: through r25.10.1. | 2026-01-27 | not yet calculated | CVE-2026-24803 | https://github.com/coolsnowwolf/lede/pull/13346 |
| coolsnowwolf–lede | Loop with Unreachable Exit Condition (‘Infinite Loop’) vulnerability in coolsnowwolf lede (package/lean/mt/drivers/mt7603e/src/mt7603_wifi/common modules). This vulnerability is associated with program files bn_lib.C. This issue affects lede: through r25.10.1. | 2026-01-27 | not yet calculated | CVE-2026-24804 | https://github.com/coolsnowwolf/lede/pull/13368 |
| CPU-Z–CPU-Z | The kernel driver of CPUID CPU-Z v2.17 and earlier does not validate user-supplied values passed via its IOCTL interface, allowing an attacker to access sensitive information via a crafted request. | 2026-01-27 | not yet calculated | CVE-2025-65264 | https://www.cpuid.com/softwares/cpu-z.html https://github.com/cwjchoi01/CVE-2025-65264 |
| datavane–tis | Unrestricted Upload of File with Dangerous Type, Deserialization of Untrusted Data vulnerability in datavane tis (tis-plugin/src/main/java/com/qlangtech/tis/extension/impl modules). This vulnerability is associated with program files XmlFile.Java. This issue affects tis: before v4.3.0. | 2026-01-27 | not yet calculated | CVE-2026-24815 | https://github.com/datavane/tis/pull/443 |
| datavane–tis | Loop with Unreachable Exit Condition (‘Infinite Loop’) vulnerability in datavane tis (tis-console/src/main/java/com/qlangtech/tis/runtime/module/action modules). This vulnerability is associated with program files ChangeDomainAction.Java. This issue affects tis: before v4.3.0. | 2026-01-27 | not yet calculated | CVE-2026-24816 | https://github.com/datavane/tis/pull/444 |
| davisking–dlib | Out-of-bounds Write, Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in davisking dlib (dlib/external/zlib modules). This vulnerability is associated with program files inflate.C. This issue affects dlib: before v19.24.9. | 2026-01-27 | not yet calculated | CVE-2026-24799 | https://github.com/davisking/dlib/pull/3063 |
| Delinea Inc.–Secret Server On-Prem | Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation modules). This issue affects Secret Server On-Prem: 11.8.1, 11.9.6, 11.9.25. A secret with “change password on check in” enabled automatically checks in even when the password change fails after reaching its retry limit. This leaves the secret in an inconsistent state with the wrong password. Remediation: Upgrade to 11.9.47 or later. The secret will remain checked out when the password change fails. | 2026-01-27 | not yet calculated | CVE-2025-12810 | https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-9-000047.htm https://trust.delinea.com/?tcuUid=48260de9-954d-45c2-9c66-2c9510798a0b |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, an endpoint lets any authenticated user bypass the ai_discover_persona access controls and gain ongoing DM access to personas that may be wired to staff-only categories, RAG document sets, or automated tooling, enabling unauthorized data disclosure. Because the controller also accepts arbitrary user_id, an attacker can impersonate other accounts to trigger unwanted AI conversations on their behalf, generating confusing or abusive PM traffic. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available. | 2026-01-28 | not yet calculated | CVE-2025-68660 | https://github.com/discourse/discourse/security/advisories/GHSA-mrvm-rprq-jqqh |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, users archives are viewable by users with moderation privileges even though moderators should not have access to the archives. Private topic/post content made by the users are leaked through the archives leading to a breach of confidentiality. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. To work around this problem, a site admin can temporarily revoke the moderation role from all moderators until the Discourse instance has been upgraded to a version that has been patched. | 2026-01-28 | not yet calculated | CVE-2025-68666 | https://github.com/discourse/discourse/security/advisories/GHSA-xmvw-jjqq-25mv |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, moderators can access the `top_uploads` admin report which should be restricted to admins only. This report displays direct URLs to all uploaded files on the site, including sensitive content such as user data exports, admin backups, and other private attachments that moderators should not have access to. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. There is no workaround. Limit moderator privileges to trusted users until the patch is applied. | 2026-01-28 | not yet calculated | CVE-2025-69218 | https://github.com/discourse/discourse/security/advisories/GHSA-79f9-j8h4-3w6w |
| discourse–discourse | Discourse is an open source discussion platform. A privilege escalation vulnerability in versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 allows a non-admin moderator to bypass email-change restrictions, allowing a takeover of non-staff accounts. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. As a workaround, ensure moderators are trusted or enable the “require_change_email_confirmation” setting. | 2026-01-28 | not yet calculated | CVE-2025-69289 | https://github.com/discourse/discourse/security/advisories/GHSA-p39j-x54c-rwqq |
| discourse–discourse | Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs containing the resource slug, even when the user didn’t have access to view the resource. This leaked potentially sensitive information (e.g., private topic titles) via the redirect Location header and the 404 page’s search box. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available. | 2026-01-28 | not yet calculated | CVE-2026-23743 | https://github.com/discourse/discourse/security/advisories/GHSA-v5jw-rxc6-4cvv |
| DokuWiki–DokuWiki | aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php. | 2026-01-30 | not yet calculated | CVE-2025-51958 | https://www.dokuwiki.org/plugin:runcommand https://github.com/aelsantex/runcommand https://gist.github.com/NtustLin/f64528002e4f61874045799127dc49a4 |
| dormakaba–Access Manager 92xx-k5 | The exos 9300 application can be used to configure Access Managers (e.g. 92xx, 9230 and 9290). The configuration is done in a graphical user interface on the dormakaba exos server. As soon as the save button is clicked in exos 9300, the whole configuration is sent to the selected Access Manager via SOAP. The SOAP request is sent without any prior authentication or authorization by default. Though authentication and authorization can be configured using IPsec for 92xx-K5 devices and mTLS for 92xx-K7 devices, it is not enabled by default and must therefore be activated with additional steps. This insecure default allows an attacker with network level access to completely control the whole environment. An attacker is for example easily able to conduct the following tasks without prior authentication: – Re-configure Access Managers (e.g. remove alarming system requirements) – Freely re-configure the inputs and outputs – Open all connected doors permanently – Open all doors for a defined time interval – Change the admin password – and many more Network level access can be gained due to an insufficient network segmentation as well as missing LAN firewalls. Devices with an insecure configuration have been identified to be directly exposed to the internet. | 2026-01-26 | not yet calculated | CVE-2025-59097 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | The Access Manager is offering a trace functionality to debug errors and issues with the device. The trace functionality is implemented as a simple TCP socket. A tool called TraceClient.exe, provided by dormakaba via the Access Manager web interface, is used to connect to the socket and receive debug information. The data is permanently broadcasted on the TCP socket. The socket can be accessed without any authentication or encryption. The transmitted data is based on the set verbosity level. The verbosity level can be set using the http(s) endpoint with the service interface password or with the guessable identifier of the device via the SOAP interface. The transmitted data contains sensitive data like the Card ID as well as all button presses on Registration units. This allows an attacker with network level access to retrieve all entered PINs on a registration unit. | 2026-01-26 | not yet calculated | CVE-2025-59098 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication. Hence, it is possible to retrieve all files stored on the file system, including the SQLite database Database.sq3, containing badge information and the corresponding PIN codes. Additionally, when trying to access certain files, the web server crashes and becomes unreachable for about 60 seconds. This can be abused to continuously send the request and cause denial of service. | 2026-01-26 | not yet calculated | CVE-2025-59099 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | The web interface offers a functionality to export the internal SQLite database. After executing the database export, an automatic download is started and the device reboots. After rebooting, the exported database is deleted and cannot be accessed anymore. However, it was noticed that sometimes the device does not reboot and therefore the exported database is not deleted, or the device reboots and the export is not deleted for unknown reasons. The path where the database export is located can be accessed without prior authentication. This leads to the fact that an attacker might be able to get access to the exported database without prior authentication. The database includes sensitive data like passwords, card pins, encrypted Mifare sitekeys and much more. | 2026-01-26 | not yet calculated | CVE-2025-59100 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface. | 2026-01-26 | not yet calculated | CVE-2025-59101 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | The web server of the Access Manager offers a functionality to download a backup of the local database stored on the device. This database contains the whole configuration. This includes encrypted MIFARE keys, card data, user PINs and much more. The PINs are even stored unencrypted. Combined with the fact that an attacker can easily get access to the backup functionality by abusing the session management issue (CVE-2025-59101), or by exploiting the weak default password (CVE-2025-59108), or by simply setting a new password without prior authentication via the SOAP API (CVE-2025-59097), it is easily possible to access the sensitive data on the device. | 2026-01-26 | not yet calculated | CVE-2025-59102 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | The Access Manager 92xx in hardware revision K7 is based on Linux instead of Windows CE embedded in older hardware revisions. In this new hardware revision it was noticed that an SSH service is exposed on port 22. By analyzing the firmware of the devices, it was noticed that there are two users with hardcoded and weak passwords that can be used to access the devices via SSH. The passwords can be also guessed very easily. The password of at least one user is set to a random value after the first deployment, with the restriction that the password is only randomized if the configured date is prior to 2022. Therefore, under certain circumstances, the passwords are not randomized. For example, if the clock is never set on the device, the battery of the clock module has been changed, the Access Manager has been factory reset and has not received a time yet. | 2026-01-26 | not yet calculated | CVE-2025-59103 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | With physical access to the device and enough time an attacker can desolder the flash memory, modify it and then reinstall it because of missing encryption. Thus, essential files, such as “/etc/passwd”, as well as stored certificates, cryptographic keys, stored PINs and so on can be modified and read, in order to gain SSH root access on the Linux-based K7 model. On the Windows CE based K5 model, the password for the Access Manager can additionally be read in plain text from the stored SQLite database. | 2026-01-26 | not yet calculated | CVE-2025-59105 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | Dormakaba provides the software FWServiceTool to update the firmware version of the Access Managers via the network. The firmware in some instances is provided in an encrypted ZIP file. Within this tool, the password used to decrypt the ZIP and extract the firmware is set statically and can be extracted. This password was valid for multiple observed firmware versions. | 2026-01-26 | not yet calculated | CVE-2025-59107 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k5 | By default, the password for the Access Manager’s web interface, is set to ‘admin’. In the tested version changing the password was not enforced. | 2026-01-26 | not yet calculated | CVE-2025-59108 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k7 | With physical access to the device and enough time an attacker is able to solder test leads to the debug footprint (or use the 6-Pin tag-connect cable). Thus, the attacker gains access to the bootloader, where the kernel command line can be changed. An attacker is able to gain a root shell through this vulnerability. | 2026-01-26 | not yet calculated | CVE-2025-59104 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Access Manager 92xx-k7 | The binary serving the web server and executing basically all actions launched from the Web UI is running with root privileges. This is against the least privilege principle. If an attacker is able to execute code on the system via other vulnerabilities it is possible to directly execute commands with highest privileges. | 2026-01-26 | not yet calculated | CVE-2025-59106 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–dormakaba registration unit 9002 | The dormakaba registration units 9002 (PIN Pad Units) have an exposed UART header on the backside. The PIN pad is sending every button press to the UART interface. An attacker can use the interface to exfiltrate PINs. As the devices are explicitly built as Plug-and-Play to be easily replaced, an attacker is easily able to remove the device, install a hardware implant which connects to the UART and exfiltrates the data exposed via UART to another system (e.g. via WiFi). | 2026-01-26 | not yet calculated | CVE-2025-59109 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkaccess https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | On the exos 9300 server, a SOAP API is reachable on port 8002. This API does not require any authentication prior to sending requests. Therefore, network access to the exos server allows e.g. the creation of arbitrary access log events as well as querying the 2FA PINs associated with the enrolled chip cards. | 2026-01-26 | not yet calculated | CVE-2025-59090 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | Multiple hardcoded credentials have been identified, which are allowed to sign-in to the exos 9300 datapoint server running on port 1004 and 1005. This server is used for relaying status information from and to the Access Managers. This information, among other things, is used to graphically visualize open doors and alerts. However, controlling the Access Managers via this interface is also possible. To send and receive status information, authentication is necessary. The Kaba exos 9300 application contains hard-coded credentials for four different users, which are allowed to login to the datapoint server and receive as well as send information, including commands to open arbitrary doors. | 2026-01-26 | not yet calculated | CVE-2025-59091 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | An RPC service, which is part of exos 9300, is reachable on port 4000, run by the process FSMobilePhoneInterface.exe. This service is used for interprocess communication between services and the Kaba exos 9300 GUI, containing status information about the Access Managers. Interacting with the service does not require any authentication. Therefore, it is possible to send arbitrary status information about door contacts etc. without prior authentication. | 2026-01-26 | not yet calculated | CVE-2025-59092 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | Exos 9300 instances are using a randomly generated database password to connect to the configured MSSQL server. The password is derived from static random values, which are concatenated to the hostname and a random string that can be read by every user from the registry. This allows an attacker to derive the database password and get authenticated access to the central exos 9300 database as the user Exos9300Common. The user has the roles ExosDialog and ExosDialogDotNet assigned, which are able to read most tables of the database as well as update and insert into many tables. | 2026-01-26 | not yet calculated | CVE-2025-59093 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | A local privilege escalation vulnerability has been identified in the Kaba exos 9300 System management application (d9sysdef.exe). Within this application it is possible to specify an arbitrary executable as well as the weekday and start time, when the specified executable should be run with SYSTEM privileges. | 2026-01-26 | not yet calculated | CVE-2025-59094 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | The program libraries (DLL) and binaries used by exos 9300 contain multiple hard-coded secrets. One notable example is the function “EncryptAndDecrypt” in the library Kaba.EXOS.common.dll. This algorithm uses a simple XOR encryption technique combined with a cryptographic key (cryptoKey) to transform each character of the input string. However, it’s important to note that this implementation does not provide strong encryption and should not be considered secure for sensitive data. It’s more of a custom encryption approach rather than a common algorithm used in cryptographic applications. The key itself is static and based on the founder’s name of the company. The functionality is for example used to encrypt the user PINs before storing them in the MSSQL database. | 2026-01-26 | not yet calculated | CVE-2025-59095 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| dormakaba–Kaba exos 9300 | The default password for the extended admin user mode in the application U9ExosAdmin.exe (“Kaba 9300 Administration”) is hard-coded in multiple locations as well as documented in the locally stored user documentation. | 2026-01-26 | not yet calculated | CVE-2025-59096 | https://r.sec-consult.com/dormakaba https://r.sec-consult.com/dkexos https://www.dormakabagroup.com/en/security-advisories |
| Drupal–Acquia Content Hub | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery. This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3. | 2026-01-28 | not yet calculated | CVE-2025-14472 | https://www.drupal.org/sa-contrib-2025-125 |
| Drupal–AI (Artificial Intelligence) | Improper Neutralization of Input During Web Page Generation (“Cross-site Scripting”) vulnerability in Drupal AI (Artificial Intelligence) allows Cross-Site Scripting (XSS). This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.7, from 1.1.0 before 1.1.7, from 1.2.0 before 1.2.4. | 2026-01-28 | not yet calculated | CVE-2025-13981 | https://www.drupal.org/sa-contrib-2025-119 |
| Drupal–CKEditor 5 Premium Features | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium Features allows Functionality Bypass. This issue affects CKEditor 5 Premium Features: from 0.0.0 before 1.2.10, from 1.3.0 before 1.3.6, from 1.4.0 before 1.4.3, from 1.5.0 before 1.5.1, from 1.6.0 before 1.6.4. | 2026-01-28 | not yet calculated | CVE-2025-13980 | https://www.drupal.org/sa-contrib-2025-118 |
| Drupal–Disable Login Page | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page allows Functionality Bypass. This issue affects Disable Login Page: from 0.0.0 before 1.1.3. | 2026-01-28 | not yet calculated | CVE-2025-13986 | https://www.drupal.org/sa-contrib-2025-124 |
| Drupal–Drupal | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Drupal Form Builder allows Cross-Site Scripting (XSS). This issue affects Drupal: from 7.X-1.0 through 7.X-1.22. | 2026-01-28 | not yet calculated | CVE-2026-0749 | https://www.herodevs.com/vulnerability-directory/cve-2026-0749 https://d7es.tag1.com/security-advisories/form-builder-less-critical-cross-site-scripting |
| Drupal–Drupal Commerce Paybox | Improper Verification of Cryptographic Signature vulnerability in Drupal Drupal Commerce Paybox Commerce Paybox on Drupal 7.X allows Authentication Bypass. This issue affects Drupal Commerce Paybox: from 7-x-1.0 through 7.X-1.5. | 2026-01-28 | not yet calculated | CVE-2026-0750 | https://www.herodevs.com/vulnerability-directory/cve-2026-0750 https://d7es.tag1.com/security-advisories/commerce-paybox-moderately-critical-payment-bypass-vulnerability |
| Drupal–Entity Share | Incorrect Authorization vulnerability in Drupal Entity Share allows Forceful Browsing. This issue affects Entity Share: from 0.0.0 before 3.13.0. | 2026-01-28 | not yet calculated | CVE-2025-13985 | https://www.drupal.org/sa-contrib-2025-123 |
| Drupal–HTTP Client Manager | Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal HTTP Client Manager allows Forceful Browsing. This issue affects HTTP Client Manager: from 0.0.0 before 9.3.13, from 10.0.0 before 10.0.2, from 11.0.0 before 11.0.1. | 2026-01-28 | not yet calculated | CVE-2025-14840 | https://www.drupal.org/sa-contrib-2025-126 |
| Drupal–Login Time Restriction | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery. This issue affects Login Time Restriction: from 0.0.0 before 1.0.3. | 2026-01-28 | not yet calculated | CVE-2025-13982 | https://www.drupal.org/sa-contrib-2025-120 |
| Drupal–Mini site | Privilege Defined With Unsafe Actions vulnerability in Drupal Mini site allows Stored XSS. This issue affects Mini site: from 0.0.0 before 3.0.2. | 2026-01-28 | not yet calculated | CVE-2025-13979 | https://www.drupal.org/sa-contrib-2025-117 |
| Drupal–Next.js | Permissive Cross-domain Security Policy with Untrusted Domains vulnerability in Drupal Next.Js allows Cross-Site Scripting (XSS). This issue affects Next.Js: from 0.0.0 before 1.6.4, from 2.0.0 before 2.0.1. | 2026-01-28 | not yet calculated | CVE-2025-13984 | https://www.drupal.org/sa-contrib-2025-122 |
| Drupal–Tagify | Improper Neutralization of Input During Web Page Generation (“Cross-site Scripting”) vulnerability in Drupal Tagify allows Cross-Site Scripting (XSS). This issue affects Tagify: from 0.0.0 before 1.2.44. | 2026-01-28 | not yet calculated | CVE-2025-13983 | https://www.drupal.org/sa-contrib-2025-121 |
| Eclipse Foundation–Eclipse OMR | In the Eclipse OMR port library component since release 0.2.0, an API function to return the textual names of all supported processor features was not accounting for the separator inserted between processor features. If the output buffer supplied to this function was incorrectly sized, failing to account for the separator when determining when a write to the buffer was safe could lead to a buffer overflow. This issue is fixed in Eclipse OMR version 0.8.0. | 2026-01-29 | not yet calculated | CVE-2026-1188 | https://github.com/eclipse-omr/omr/pull/8082 |
| Eclipse Foundation–Eclipse ThreadX – NetX Duo | A denial-of-service vulnerability exists in the NetX IPv6 component functionality of Eclipse ThreadX NetX Duo. A specially crafted network packet of “Packet Too Big” with more than 15 different source address can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability. | 2026-01-27 | not yet calculated | CVE-2025-55102 | https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-f3rx-xrwm-q2rf |
| Edgemo (Danoffice IT)–Local Admin Service | Improper access control in the WCF endpoint in Edgemo (now owned by Danoffice IT) Local Admin Service 1.2.7.23180 on Windows allows a local user to escalate their privileges to local administrator via direct communication with the LocalAdminService.exe named pipe, bypassing client-side group membership restrictions. | 2026-01-30 | not yet calculated | CVE-2026-1680 | https://retest.dk/local-privilege-escalation-vulnerability-found-in-local-admin-service/ https://www.danofficeit.com/howwedoit/workplace/management/ |
| EGroupware–egroupware | EGroupware is a Web based groupware server written in PHP. A SQL Injection vulnerability exists in the core components of EGroupware prior to versions 23.1.20260113 and 26.0.20260113, specifically in the `Nextmatch` filter processing. The flaw allows authenticated attackers to inject arbitrary SQL commands into the `WHERE` clause of database queries. This is achieved by exploiting a PHP type juggling issue where JSON decoding converts numeric strings into integers, bypassing the `is_int()` security check used by the application. Versions 23.1.20260113 and 26.0.20260113 patch the vulnerability. | 2026-01-28 | not yet calculated | CVE-2026-22243 | https://github.com/EGroupware/egroupware/security/advisories/GHSA-rvxj-7f72-mhrx https://github.com/EGroupware/egroupware/releases/tag/23.1.20260113 https://github.com/EGroupware/egroupware/releases/tag/26.0.20260113 |
| ESET, spol. s.r.o–ESET Inspect Connector | Planting a custom configuration file in ESET Inspect Connector allow load a malicious DLL. | 2026-01-30 | not yet calculated | CVE-2025-13176 | https://support.eset.com/en/ca8910-eset-customer-advisory-local-privilege-escalation-vulnerability-fixed-in-eset-inspect-connector-for-windows |
| eslint–eslint | Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow. | 2026-01-26 | not yet calculated | CVE-2025-50537 | https://github.com/eslint/eslint/issues/19646 https://gist.github.com/lyyffee/2ee1815e5c2da82c05e9838b9bfefbbc |
| Explorance–Blue | Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user input in a web application endpoint. An attacker can supply crafted input that is executed as part of backend database queries. The issue is exploitable without authentication, significantly raising the risk. | 2026-01-28 | not yet calculated | CVE-2025-57792 | https://www.explorance.com/products/blue https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57792 https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0001.md |
| Explorance–Blue | Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. The issue is exploitable without authentication, significantly elevating the risk. | 2026-01-28 | not yet calculated | CVE-2025-57793 | https://www.explorance.com/products/blue https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57793 https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0002.md |
| Explorance–Blue | Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and executed by the server. This condition enables remote code execution under default configurations. | 2026-01-28 | not yet calculated | CVE-2025-57794 | https://www.explorance.com/products/blue https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57794 https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0003.md |
| Explorance–Blue | Explorance Blue versions prior to 8.14.13 contain an authenticated remote file download vulnerability in a web service component. In default configurations, this flaw can be leveraged to achieve remote code execution. | 2026-01-28 | not yet calculated | CVE-2025-57795 | https://www.explorance.com/products/blue https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57795 https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0004.md |
| Explorance–Blue | Explorance Blue versions prior to 8.14.12 use reversible symmetric encryption with a hardcoded static key to protect sensitive data, including user passwords and system configurations. This approach allows stored values to be decrypted offline if the encrypted data are obtained. | 2026-01-28 | not yet calculated | CVE-2025-57796 | https://www.explorance.com/products/blue https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57796 https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0005.md |
| ExpressionEngine–ExpressionEngine | SQL Injection vulnerability in the Structure for Admin authenticated user | 2026-01-26 | not yet calculated | CVE-2025-59473 | https://hackerone.com/reports/3249794 |
| EZCast–EZCast Pro II | Multiple Buffer Overflows in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to cause a program crash and potential remote code execution | 2026-01-27 | not yet calculated | CVE-2026-24344 | https://hub.ntc.swiss/ntcf-2025-68873 |
| EZCast–EZCast Pro II | Cross-Site Request Forgery in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI | 2026-01-27 | not yet calculated | CVE-2026-24345 | https://hub.ntc.swiss/ntcf-2025-32832 |
| EZCast–EZCast Pro II | Use of well-known default credentials in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to access protected areas in the web application | 2026-01-27 | not yet calculated | CVE-2026-24346 | https://hub.ntc.swiss/ntcf-2025-13993 |
| EZCast–EZCast Pro II | Improper input validation in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to manipulate files in the /tmp directory | 2026-01-27 | not yet calculated | CVE-2026-24347 | https://hub.ntc.swiss/ntcf-2025-32806 |
| EZCast–EZCast Pro II | Multiple cross-site scripting vulnerabilities in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to execute arbitrary JavaScript code in the browser of other Admin UI users. | 2026-01-27 | not yet calculated | CVE-2026-24348 | https://hub.ntc.swiss/ntcf-2025-145332 |
| FASTSHIFT–X-TRACK | Out-of-bounds Write, Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in FASTSHIFT X-TRACK (Software/X-Track/USER/App/Utils/lv_img_png/PNGdec/src modules). This vulnerability is associated with program files inflate.C. This issue affects X-TRACK: through v2.7. | 2026-01-27 | not yet calculated | CVE-2026-24823 | https://github.com/FASTSHIFT/X-TRACK/pull/120 |
| Flexense–Sync Breeze Enterprise Server | Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. This vulnerability is possible due to the lack of proper CSRF token implementation. Among other things, it is possible, using a POST request to change a user’s password or create users via ‘/setup_login?sid=’, affecting the ‘username’, ‘password’, and ‘cpassword’ parameters. | 2026-01-28 | not yet calculated | CVE-2025-59891 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. This vulnerability is possible due to the lack of proper CSRF token implementation. Among other things, it is possible, using a POST request to delete commands individually via ‘/delete_command?sid=’, using the ‘cid’ parameter. | 2026-01-28 | not yet calculated | CVE-2025-59892 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. This vulnerability is possible due to the lack of proper CSRF token implementation. Among other things, it is possible, using a POST request to rename commands via ‘/rename_command?sid=’, affecting the ‘command_name’ parameter. | 2026-01-28 | not yet calculated | CVE-2025-59893 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18. An authenticated user could cause another user to perform unwanted actions within the application they are logged into. This vulnerability is possible due to the lack of proper CSRF token implementation. Among other things, it is possible, using a POST request to delete all commands via ‘/delete_all_commands?sid=’. | 2026-01-28 | not yet calculated | CVE-2025-59894 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a remote denial-of-service (DoS) vulnerability in the configuration restore functionality. The issue is due to insufficient validation of user-supplied data during this process. An attacker could send malicious requests to alter the configuration file, causing the application to become unresponsive. In a successful scenario, the service may not recover on its own and require a complete reinstallation, as the configuration becomes corrupted and prevents the service from restarting, even manually. | 2026-01-28 | not yet calculated | CVE-2025-59895 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. An attacker could send malicious content to an authenticated user and steal information from their session due to insufficient validation of user input in ‘/add_command?sid=’, affecting the ‘command_name’ parameter. | 2026-01-28 | not yet calculated | CVE-2025-59896 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. An attacker could send malicious content to an authenticated user and steal information from their session due to insufficient validation of user input in ‘/edit_command?sid=’, affecting the ‘source_dir’ and ‘dest_dir’ parameters. | 2026-01-28 | not yet calculated | CVE-2025-59897 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. An attacker could send malicious content to an authenticated user and steal information from their session due to insufficient validation of user input in ‘/add_exclude_dir?sid=’, affecting the ‘exclude_dir’ parameter. | 2026-01-28 | not yet calculated | CVE-2025-59898 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. An attacker could send malicious content to an authenticated user and steal information from their session due to insufficient validation of user input in ‘/server_options?sid=’, affecting the ‘tasks_logs_dir’, ‘errors_logs_dir’, ‘error_notifications_address’, ‘status_notifications_address’, and ‘status_reports_address’ parameters. | 2026-01-28 | not yet calculated | CVE-2025-59899 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent authenticated Cross-Site Scripting (XSS) vulnerability. An attacker could send malicious content to an authenticated user and steal information from their session due to insufficient validation of user input in ‘/server_options?sid=’, affecting the ‘tasks_logs_dir’, ‘errors_logs_dir’, ‘error_notifications_address’, ‘status_notifications_address’, and ‘status_reports_address’ parameters. | 2026-01-28 | not yet calculated | CVE-2025-59900 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| Flexense–Sync Breeze Enterprise Server | Disk Pulse Enterprise v10.4.18 has an authenticated reflected XSS vulnerability in the ‘/monitor_directory?sid=’ endpoint, caused by insufficient validation of the ‘monitor_directory’ parameter sent by POST. An attacker could exploit this weakness to send malicious content to an authenticated user and steal information from their session. | 2026-01-28 | not yet calculated | CVE-2025-59901 | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-products |
| FluentCMS–FluentCMS | FluentCMS 2026 contains a stored cross-site scripting vulnerability that allows authenticated administrators to upload SVG files with embedded JavaScript via the File Management module. Attackers can upload malicious SVG files that execute JavaScript in the browser of any user accessing the uploaded file URL. | 2026-01-29 | not yet calculated | CVE-2025-15549 | GitHub Issue #2404 VulnCheck Advisory: FluentCMS 2026 Stored XSS via SVG Upload in File Management |
| foxinmy–weixin4j | Improperly Controlled Sequential Memory Allocation vulnerability in foxinmy weixin4j (weixin4j-base/src/main/java/com/foxinmy/weixin4j/util modules). This vulnerability is associated with program files CharArrayBuffer.Java, ClassUtil.Java. This issue affects weixin4j. | 2026-01-27 | not yet calculated | CVE-2026-24819 | https://github.com/foxinmy/weixin4j/pull/229 |
| FUJIFILM Business Innovation Corp.–beat-access for Windows | beat-access for Windows version 3.0.3 and prior contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with SYSTEM privileges. | 2026-01-27 | not yet calculated | CVE-2026-21408 | https://www.fujifilm.com/fbglobal/eng/company/news/notice/2026/0127_announce.html https://jvn.jp/en/jp/JVN03776126/ |
| Funambol–Cloud Server | Vulnerability that allows a Padding Oracle Attack to be performed on the Funambol v30.0.0.20 cloud server. The thumbnail display URL allows an attacker to decrypt and encrypt the parameters used by the application to generate ‘self-signed’ access URLs. | 2026-01-28 | not yet calculated | CVE-2025-41351 | https://www.incibe.es/en/incibe-cert/notices/aviso/weak-encryption-funambols-cloud-server |
| FunJSO–FunJSO | FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, exposes an HTTP server over the LAN interface of affected devices. This interface is vulnerable to unauthenticated arbitrary command injection through the funjsq_access_token parameter. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26. | 2026-01-28 | not yet calculated | CVE-2022-40619 | https://kb.netgear.com/000065132/Security-Advisory-for-Vulnerabilities-in-FunJSQ-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2022-0117 https://www.onekey.com/resource/security-advisory-netgear-routers-funjsq-vulnerabilities |
| FunJSO–FunJSO | FunJSQ, a third-party module integrated on some NETGEAR routers and Orbi WiFi Systems, does not properly validate TLS certificates when downloading update packages through its auto-update mechanism. An attacker (suitably positioned on the network) could intercept the update request and deliver a malicious update package in order to gain arbitrary code execution on affected devices. This affects R6230 before 1.1.0.112, R6260 before 1.1.0.88, R7000 before 1.0.11.134, R8900 before 1.0.5.42, R9000 before 1.0.5.42, and XR300 before 1.0.3.72 and Orbi RBR20 before 2.7.2.26, RBR50 before 2.7.4.26, RBS20 before 2.7.2.26, and RBS50 before 2.7.4.26. | 2026-01-28 | not yet calculated | CVE-2022-40620 | https://kb.netgear.com/000065132/Security-Advisory-for-Vulnerabilities-in-FunJSQ-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2022-0117 https://www.onekey.com/resource/security-advisory-netgear-routers-funjsq-vulnerabilities |
| GaijinEntertainment–DagorEngine | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GaijinEntertainment DagorEngine (prog/3rdPartyLibs/miniupnpc modules). This vulnerability is associated with program files upnpreplyparse.C. This issue affects DagorEngine: through dagor_2025_01_15. | 2026-01-27 | not yet calculated | CVE-2026-24798 | https://github.com/GaijinEntertainment/DagorEngine/pull/136 |
| geopandas–geopandas | SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database. | 2026-01-30 | not yet calculated | CVE-2025-69662 | https://aydinnyunus.github.io/2025/12/27/sql-injection-geopandas/ https://github.com/geopandas/geopandas/pull/3681 |
| gmrtd–gmrtd | gmrtd is a Go library for reading Machine Readable Travel Documents (MRTDs). Prior to version 0.17.2, ReadFile accepts TLVs with lengths that can range up to 4GB, which can cause unconstrained resource consumption in both memory and cpu cycles. ReadFile can consume an extended TLV with lengths well outside what would be available in ICs. It can accept something all the way up to 4GB which would take too many iterations in 256 byte chunks, and would also try to allocate memory that might not be available in constrained environments like phones. Or if an API sends data to ReadFile, the same problem applies. The very small chunked read also locks the goroutine in accepting data for a very large number of iterations. projects using the gmrtd library to read files from NFCs can experience extreme slowdowns or memory consumption. A malicious NFC can just behave like the mock transceiver described above and by just sending dummy bytes as each chunk to be read, can make the receiving thread unresponsive and fill up memory on the host system. Version 0.17.2 patches the issue. | 2026-01-27 | not yet calculated | CVE-2026-24738 | https://github.com/gmrtd/gmrtd/security/advisories/GHSA-j49h-6577-5xwq https://github.com/gmrtd/gmrtd/commit/54469a95e5a20a8602ac1457b2110bfeb80c8891 https://github.com/gmrtd/gmrtd/releases/tag/v0.17.2 |
| Go standard library–archive/zip | archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. | 2026-01-28 | not yet calculated | CVE-2025-61728 | https://go.dev/cl/736713 https://go.dev/issue/77102 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4342 |
| Go standard library–crypto/tls | During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake. | 2026-01-28 | not yet calculated | CVE-2025-61730 | https://go.dev/cl/724120 https://go.dev/issue/76443 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4340 |
| Go standard library–net/url | The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | 2026-01-28 | not yet calculated | CVE-2025-61726 | https://go.dev/cl/736712 https://go.dev/issue/77101 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4341 |
| Go toolchain–cmd/go | Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The “#cgo pkg-config:” directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a “–log-file” argument to this directive, causing pkg-config to write to an attacker-controlled location. | 2026-01-28 | not yet calculated | CVE-2025-61731 | https://go.dev/cl/736711 https://go.dev/issue/77100 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4339 |
| Go toolchain–cmd/go | Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths. | 2026-01-28 | not yet calculated | CVE-2025-68119 | https://go.dev/cl/736710 https://go.dev/issue/77099 https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc https://pkg.go.dev/vuln/GO-2026-4338 |
| Google–Chrome | Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High) | 2026-01-27 | not yet calculated | CVE-2026-1504 | https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_27.html https://issues.chromium.org/issues/474435504 |
| gradle–gradle-completion | gradle-completion provides Bash and Zsh completion support for Gradle. A command injection vulnerability was found in gradle-completion up to and including 9.3.0 that allows arbitrary code execution when a user triggers Bash tab completion in a project containing a malicious Gradle build file. The `gradle-completion` script for Bash fails to adequately sanitize Gradle task names and task descriptions, allowing command injection via a malicious Gradle build file when the user completes a command in Bash (without them explicitly running any task in the build). For example, given a task description that includes a string between backticks, then that string would be evaluated as a command when presenting the task description in the completion list. While task execution is the core feature of Gradle, this inherent execution may lead to unexpected outcomes. The vulnerability does not affect zsh completion. The first patched version is 9.3.1. As a workaround, it is possible and effective to temporarily disable bash completion for Gradle by removing `gradle-completion` from `.bashrc` or `.bash_profile`. | 2026-01-29 | not yet calculated | CVE-2026-25063 | https://github.com/gradle/gradle-completion/security/advisories/GHSA-qggc-44r3-cjgv https://github.com/gradle/gradle-completion/commit/ecacc32bb882210e5d37cd79a74de1af0d0ccad7 |
| Hiawatha–Hiawatha Web server | Improper header parsing may lead to request smuggling has been identified in Hiawatha webserver version 11.7 which allows an unauthenticated attacker to access restricted resources managed by Hiawatha webserver. | 2026-01-26 | not yet calculated | CVE-2025-57783 | https://gitlab.com/hsleisink/hiawatha/-/blame/master/src/http.c?ref_type=heads#L205 |
| Hiawatha–Hiawatha Web server | Tomahawk auth timing attack due to usage of `strcmp` has been identified in Hiawatha webserver version 11.7 which allows a local attacker to access the management client. | 2026-01-26 | not yet calculated | CVE-2025-57784 | https://gitlab.com/hsleisink/hiawatha/-/blame/master/src/tomahawk.c?ref_type=heads#L429 |
| Hiawatha–Hiawatha Web server | A Double Free in XSLT `show_index` has been identified in Hiawatha webserver version 11.7 which allows an unauthenticated attacker to corrupt data which may lead to arbitrary code execution. | 2026-01-26 | not yet calculated | CVE-2025-57785 | https://gitlab.com/hsleisink/hiawatha/-/blame/master/src/xslt.c?ref_type=heads#L675 |
| Hitachi Energy–SuprOS | Default credentials vulnerability exists in SuprOS product. If exploited, this could allow an authenticated local attacker to use an admin account created during product deployment. | 2026-01-28 | not yet calculated | CVE-2025-7740 | https://publisher.hitachienergy.com/preview?DocumentID=8DBD000223&LanguageCode=en&DocumentPartId=&Action=launch |
| honojs–hono | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.11.7, Serve static Middleware for the Cloudflare Workers adapter contains an information disclosure vulnerability that may allow attackers to read arbitrary keys from the Workers environment. Improper validation of user-controlled paths can result in unintended access to internal asset keys. Version 4.11.7 contains a patch for the issue. | 2026-01-27 | not yet calculated | CVE-2026-24473 | https://github.com/honojs/hono/security/advisories/GHSA-w332-q679-j88p https://github.com/honojs/hono/commit/cf9a78db4d0a19b117aee399cbe9d3a6d9bfd817 https://github.com/honojs/hono/releases/tag/v4.11.7 |
| iba Systems–ibaPDA | A security issue has been identified in ibaPDA that could allow unauthorized actions on the file system under certain conditions. This may impact the confidentiality, integrity, or availability of the system. | 2026-01-27 | not yet calculated | CVE-2025-14988 | https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-01 |
| Icinga–icinga-powershell-framework | The Icinga PowerShell Framework provides configuration and check possibilities to ensure integration and monitoring of Windows environments. In versions prior to 1.13.4, 1.12.4, and 1.11.2, permissions of the Icinga for Windows `certificate` directory grant every user read access, which results in the exposure of private key of the Icinga certificate for the given host. All installations are affected. Versions 1.13.4, 1.12.4, and 1.11.2 contains a patch. Please note that upgrading to a fixed version of Icinga for Windows will also automatically fix a similar issue present in Icinga 2, CVE-2026-24413. As a workaround, the permissions can be restricted manually by updating the ACL for the given folder `C:Program FilesWindowsPowerShellmodulesicinga-powershell-frameworkcertificate` (and `C:ProgramDataicinga2var` to fix the issue for the Icinga 2 agent as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access. | 2026-01-29 | not yet calculated | CVE-2026-24414 | https://github.com/Icinga/icinga-powershell-framework/security/advisories/GHSA-88h5-rrm6-5973 https://github.com/Icinga/icinga2/security/advisories/GHSA-vfjg-6fpv-4mmr https://icinga.com/blog/releasing-icinga-2-v2-15-2-v2-14-8-v2-13-14-and-icinga-for-windows-v1-13-4-v1-12-4-v1-11-2 |
| Icinga–icinga2 | Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not set appropriate permissions for the `%ProgramData%icinga2var` folder on Windows. This resulted in the its contents – including the private key of the user and synced configuration – being readable by all local users. All installations on Windows are affected. Versions 2.13.14, 2.14.8, and 2.15.2 contains a fix. There are two possibilities to work around the issue without upgrading Icinga 2. Upgrade Icinga for Windows to at least version v1.13.4, v1.12.4, or v1.11.2. These version will automatically fix the ACLs for the Icinga 2 agent as well. Alternatively, manually update the ACL for the given folder `C:ProgramDataicinga2var` (and `C:Program FilesWindowsPowerShellmodulesicinga-powershell-frameworkcertificate` to fix the issue for the Icinga for Windows as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access. | 2026-01-29 | not yet calculated | CVE-2026-24413 | https://github.com/Icinga/icinga2/security/advisories/GHSA-vfjg-6fpv-4mmr https://github.com/Icinga/icinga-powershell-framework/security/advisories/GHSA-88h5-rrm6-5973 https://icinga.com/blog/releasing-icinga-2-v2-15-2-v2-14-8-v2-13-14-and-icinga-for-windows-v1-13-4-v1-12-4-v1-11-2 |
| inspektor-gadget–inspektor-gadget | Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. The `ig` binary provides a subcommand for image building, used to generate custom gadget OCI images. A part of this functionality is implemented in the file `inspektor-gadget/cmd/common/image/build.go`. The `Makefile.build` file is the Makefile template employed during the building process. This file includes user-controlled data in an unsafe fashion, specifically some parameters are embedded without an adequate escaping in the commands inside the Makefile. Prior to version 0.48.1, this implementation is vulnerable to command injection: an attacker able to control values in the `buildOptions` structure would be able to execute arbitrary commands during the building process. An attacker able to exploit this vulnerability would be able to execute arbitrary command on the Linux host where the `ig` command is launched, if images are built with the `–local` flag or on the build container invoked by `ig`, if the `–local` flag is not provided. The `buildOptions` structure is extracted from the YAML gadget manifest passed to the `ig image build` command. Therefore, the attacker would need a way to control either the full `build.yml` file passed to the `ig image build` command, or one of its options. Typically, this could happen in a CI/CD scenario that builds untrusted gadgets to verify correctness. Version 0.48.1 fixes the issue. | 2026-01-29 | not yet calculated | CVE-2026-24905 | https://github.com/inspektor-gadget/inspektor-gadget/security/advisories/GHSA-79qw-g77v-2vfh https://github.com/inspektor-gadget/inspektor-gadget/commit/7c83ad84ff7a68565655253e2cf1c5d2da695c1a |
| Internet Information Co., Ltd–DreamMaker | A missing authentication for critical function vulnerability in the /servlet/baServer3 endpoint of Interinfo DreamMaker versions before 2025/10/22 allows remote attackers to access exposed administrative functionality without prior authentication. | 2026-01-30 | not yet calculated | CVE-2026-24728 | https://zuso.ai/advisory/za-2026-01 |
| Internet Information Co., Ltd–DreamMaker | An unrestricted upload of file with dangerous type vulnerability in the file upload function of Interinfo DreamMaker versions before 2025/10/22 allows remote attackers to execute arbitrary system commands via a malicious class file. | 2026-01-30 | not yet calculated | CVE-2026-24729 | https://zuso.ai/advisory/za-2026-02 |
| jmlepisto–clatter | Clatter is a no_std compatible, pure Rust implementation of the Noise protocol framework with post-quantum support. Versiosn prior to2.2.0 have a protocol compliance vulnerability. The library allowed post-quantum handshake patterns that violated the PSK validity rule (Noise Protocol Framework Section 9.3). This could allow PSK-derived keys to be used for encryption without proper randomization by self-chosen ephemeral randomness, weakening security guarantees and potentially allowing catastrophic key reuse. Affected default patterns include `noise_pqkk_psk0`, `noise_pqkn_psk0`, `noise_pqnk_psk0`, `noise_pqnn_psk0“, and some hybrid variants. Users of these patterns may have been using handshakes that do not meet the intended security properties. The issue is fully patched and released in Clatter v2.2.0. The fixed version includes runtime checks to detect offending handshake patterns. As a workaround, avoid using offending `*_psk0` variants of post-quantum patterns. Review custom handshake patterns carefully. | 2026-01-27 | not yet calculated | CVE-2026-24785 | https://github.com/jmlepisto/clatter/security/advisories/GHSA-253q-9q78-63×4 https://github.com/jmlepisto/clatter/commit/b65ae6e9b8019bed5407771e21f89ddff17c5a71 https://noiseprotocol.org/noise.html#validity-rule |
| Johnson Controls–iSTAR Configuration Utility (ICU) | Johnson Controls iSTAR Configuration Utility (ICU) has Stack-based Buffer Overflow vulnerability. This issue affects iSTAR Configuration Utility (ICU) version 6.9.7 and prior. Successful exploitation of this vulnerability could result in failure within the operating system of the machine hosting the ICU tool. | 2026-01-28 | not yet calculated | CVE-2025-26386 | https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-04 |
| Johnson Controls–Metasys | Johnson Controls Metasys component listed below have Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability . Successful exploitation of this vulnerability could allow remote SQL execution This issue affects * Metasys: Application and Data Server (ADS) installed with SQL Express deployed as part of the Metasys 14.1 and prior installation, * Extended Application and Data Server (ADX) installed with SQL Express deployed as part of the Metasys 14.1 installation, * LCS8500 or NAE8500 installed with SQL Express deployed as part of the Metasys installation Releases 12.0 through 14.1, * System Configuration Tool (SCT) installed with SQL Express deployed as part of the SCT installation 17.1 and prior, * Controller Configuration Tool (CCT) installed with SQL Express deployed as part of the CCT installation 17.0 and prior. | 2026-01-30 | not yet calculated | CVE-2025-26385 | https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-04 https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories |
| json–json | The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution. | 2026-01-28 | not yet calculated | CVE-2025-61140 | https://github.com/dchester/jsonpath https://gist.github.com/Dremig/8105c189774217222a8ebea3ed4d341d |
| kata-containers–kata-containers | Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.26.0, when a container image is malformed or contains no layers, containerd falls back to bind-mounting an empty snapshotter directory for the container rootfs. When the Kata runtime attempts to mount the container rootfs, the bind mount causes the rootfs to be detected as a block device, leading to the underlying device being hotplugged to the guest. This can cause filesystem-level errors on the host due to double inode allocation, and may lead to the host’s block device being mounted as read-only. Version 3.26.0 contains a patch for the issue. | 2026-01-29 | not yet calculated | CVE-2026-24054 | https://github.com/kata-containers/kata-containers/security/advisories/GHSA-5fc8-gg7w-3g5c https://github.com/kata-containers/kata-containers/commit/20ca4d2d79aa5bf63aa1254f08915da84f19e92a https://github.com/containerd/containerd/blob/d939b6af5f8536c2cae85e919e7c40070557df0e/plugins/snapshots/overlay/overlay.go#L564-L581 https://github.com/kata-containers/kata-containers/blob/a164693e1afead84cd01d5bc3575e2cbfe64ce35/src/runtime/virtcontainers/container.go#L1122-L1126 https://github.com/kata-containers/kata-containers/blob/c7d0c270ee7dfaa6d978e6e07b99dabdaf2b9fda/src/runtime/virtcontainers/container.go#L1616-L1623 |
| libpng–libpng | Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive | 2026-01-27 | not yet calculated | CVE-2025-28162 | https://github.com/pnggroup/libpng/issues/656 https://gist.github.com/kittener/fbfdb9b5610c6b3db0d5dea045a07c60 |
| libpng–libpng | Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function. | 2026-01-27 | not yet calculated | CVE-2025-28164 | https://github.com/pnggroup/libpng/issues/655 https://gist.github.com/kittener/506516f8c22178005b4379c8b2a7de20 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: counter: interrupt-cnt: Drop IRQF_NO_THREAD flag An IRQ handler can either be IRQF_NO_THREAD or acquire spinlock_t, as CONFIG_PROVE_RAW_LOCK_NESTING warns: ============================= [ BUG: Invalid wait context ] 6.18.0-rc1+git… #1 —————————– some-user-space-process/1251 is trying to lock: (&counter->events_list_lock){….}-{3:3}, at: counter_push_event [counter] other info that might help us debug this: context-{2:2} no locks held by some-user-space-process/…. stack backtrace: CPU: 0 UID: 0 PID: 1251 Comm: some-user-space-process 6.18.0-rc1+git… #1 PREEMPT Call trace: show_stack (C) dump_stack_lvl dump_stack __lock_acquire lock_acquire _raw_spin_lock_irqsave counter_push_event [counter] interrupt_cnt_isr [interrupt_cnt] __handle_irq_event_percpu handle_irq_event handle_simple_irq handle_irq_desc generic_handle_domain_irq gpio_irq_handler handle_irq_desc generic_handle_domain_irq gic_handle_irq call_on_irq_stack do_interrupt_handler el0_interrupt __el0_irq_handler_common el0t_64_irq_handler el0t_64_irq … and Sebastian correctly points out. Remove IRQF_NO_THREAD as an alternative to switching to raw_spinlock_t, because the latter would limit all potential nested locks to raw_spinlock_t only. | 2026-01-31 | not yet calculated | CVE-2025-71180 | https://git.kernel.org/stable/c/ef668c9a2261ec9287faba6e6ef05a98b391aa2b https://git.kernel.org/stable/c/51d2e5d6491447258cb39ff1deb93df15d3c23cb https://git.kernel.org/stable/c/1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c https://git.kernel.org/stable/c/49a66829dd3653695e60d7cae13521d131362fcd https://git.kernel.org/stable/c/425886b1f8304621b3f16632b274357067d5f13f https://git.kernel.org/stable/c/23f9485510c338476b9735d516c1d4aacb810d46 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: rust_binder: remove spin_lock() in rust_shrink_free_page() When forward-porting Rust Binder to 6.18, I neglected to take commit fb56fdf8b9a2 (“mm/list_lru: split the lock to per-cgroup scope”) into account, and apparently I did not end up running the shrinker callback when I sanity tested the driver before submission. This leads to crashes like the following: ============================================ WARNING: possible recursive locking detected 6.18.0-mainline-maybe-dirty #1 Tainted: G IO ——————————————– kswapd0/68 is trying to acquire lock: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, at: lock_list_lru_of_memcg+0x128/0x230 but task is already holding lock: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, at: rust_helper_spin_lock+0xd/0x20 other info that might help us debug this: Possible unsafe locking scenario: CPU0 —- lock(&l->lock); lock(&l->lock); *** DEADLOCK *** May be due to missing lock nesting notation 3 locks held by kswapd0/68: #0: ffffffff90d2e260 (fs_reclaim){+.+.}-{0:0}, at: kswapd+0x597/0x1160 #1: ffff956000fa18b0 (&l->lock){+.+.}-{2:2}, at: rust_helper_spin_lock+0xd/0x20 #2: ffffffff90cf3680 (rcu_read_lock){….}-{1:2}, at: lock_list_lru_of_memcg+0x2d/0x230 To fix this, remove the spin_lock() call from rust_shrink_free_page(). | 2026-01-31 | not yet calculated | CVE-2025-71181 | https://git.kernel.org/stable/c/30a98c97f7874031f2e1de19c777ce011143cba4 https://git.kernel.org/stable/c/361e0ff456a8daf9753c18030533256e4133ce7a |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: can: j1939: make j1939_session_activate() fail if device is no longer registered syzbot is still reporting unregister_netdevice: waiting for vcan0 to become free. Usage count = 2 even after commit 93a27b5891b8 (“can: j1939: add missing calls in NETDEV_UNREGISTER notification handler”) was added. A debug printk() patch found that j1939_session_activate() can succeed even after j1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER) has completed. Since j1939_cancel_active_session() is processed with the session list lock held, checking ndev->reg_state in j1939_session_activate() with the session list lock held can reliably close the race window. | 2026-01-31 | not yet calculated | CVE-2025-71182 | https://git.kernel.org/stable/c/ebb0dfd718dd31c8d3600612ca4b7207ec3d923a https://git.kernel.org/stable/c/c3a4316e3c746af415c0fd6c6d489ad13f53714d https://git.kernel.org/stable/c/46ca9dc978923c5e1247a9e9519240ba7ace413c https://git.kernel.org/stable/c/78d87b72cebe2a993fd5b017e9f14fb6278f2eae https://git.kernel.org/stable/c/ba6f0d1832eeb5eb3a6dc5cb30e0f720b3cb3536 https://git.kernel.org/stable/c/79dd3f1d9dd310c2af89b09c71f34d93973b200f https://git.kernel.org/stable/c/5d5602236f5db19e8b337a2cd87a90ace5ea776d |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: btrfs: always detect conflicting inodes when logging inode refs After rename exchanging (either with the rename exchange operation or regular renames in multiple non-atomic steps) two inodes and at least one of them is a directory, we can end up with a log tree that contains only of the inodes and after a power failure that can result in an attempt to delete the other inode when it should not because it was not deleted before the power failure. In some case that delete attempt fails when the target inode is a directory that contains a subvolume inside it, since the log replay code is not prepared to deal with directory entries that point to root items (only inode items). 1) We have directories “dir1” (inode A) and “dir2” (inode B) under the same parent directory; 2) We have a file (inode C) under directory “dir1” (inode A); 3) We have a subvolume inside directory “dir2” (inode B); 4) All these inodes were persisted in a past transaction and we are currently at transaction N; 5) We rename the file (inode C), so at btrfs_log_new_name() we update inode C’s last_unlink_trans to N; 6) We get a rename exchange for “dir1” (inode A) and “dir2” (inode B), so after the exchange “dir1” is inode B and “dir2” is inode A. During the rename exchange we call btrfs_log_new_name() for inodes A and B, but because they are directories, we don’t update their last_unlink_trans to N; 7) An fsync against the file (inode C) is done, and because its inode has a last_unlink_trans with a value of N we log its parent directory (inode A) (through btrfs_log_all_parents(), called from btrfs_log_inode_parent()). 8) So we end up with inode B not logged, which now has the old name of inode A. At copy_inode_items_to_log(), when logging inode A, we did not check if we had any conflicting inode to log because inode A has a generation lower than the current transaction (created in a past transaction); 9) After a power failure, when replaying the log tree, since we find that inode A has a new name that conflicts with the name of inode B in the fs tree, we attempt to delete inode B… this is wrong since that directory was never deleted before the power failure, and because there is a subvolume inside that directory, attempting to delete it will fail since replay_dir_deletes() and btrfs_unlink_inode() are not prepared to deal with dir items that point to roots instead of inodes. When that happens the mount fails and we get a stack trace like the following: [87.2314] BTRFS info (device dm-0): start tree-log replay [87.2318] BTRFS critical (device dm-0): failed to delete reference to subvol, root 5 inode 256 parent 259 [87.2332] ————[ cut here ]———— [87.2338] BTRFS: Transaction aborted (error -2) [87.2346] WARNING: CPU: 1 PID: 638968 at fs/btrfs/inode.c:4345 __btrfs_unlink_inode+0x416/0x440 [btrfs] [87.2368] Modules linked in: btrfs loop dm_thin_pool (…) [87.2470] CPU: 1 UID: 0 PID: 638968 Comm: mount Tainted: G W 6.18.0-rc7-btrfs-next-218+ #2 PREEMPT(full) [87.2489] Tainted: [W]=WARN [87.2494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014 [87.2514] RIP: 0010:__btrfs_unlink_inode+0x416/0x440 [btrfs] [87.2538] Code: c0 89 04 24 (…) [87.2568] RSP: 0018:ffffc0e741f4b9b8 EFLAGS: 00010286 [87.2574] RAX: 0000000000000000 RBX: ffff9d3ec8a6cf60 RCX: 0000000000000000 [87.2582] RDX: 0000000000000002 RSI: ffffffff84ab45a1 RDI: 00000000ffffffff [87.2591] RBP: ffff9d3ec8a6ef20 R08: 0000000000000000 R09: ffffc0e741f4b840 [87.2599] R10: ffff9d45dc1fffa8 R11: 0000000000000003 R12: ffff9d3ee26d77e0 [87.2608] R13: ffffc0e741f4ba98 R14: ffff9d4458040800 R15: ffff9d44b6b7ca10 [87.2618] FS: 00007f7b9603a840(0000) GS:ffff9d4658982000(0000) knlGS:0000000000000000 [87. —truncated— | 2026-01-31 | not yet calculated | CVE-2025-71183 | https://git.kernel.org/stable/c/c7f0207db68d5a1b4af23acbef1a8e8ddc431ebb https://git.kernel.org/stable/c/a63998cd6687c14b160dccb0bbcf281b2eb0dab3 https://git.kernel.org/stable/c/0c2413c69129f6ce60157f7b53d9ba880260400b https://git.kernel.org/stable/c/d52af58dd463821c5c516aebb031a58934f696ea https://git.kernel.org/stable/c/7ba0b6461bc4edb3005ea6e00cdae189bcf908a5 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: btrfs: fix NULL dereference on root when tracing inode eviction When evicting an inode the first thing we do is to setup tracing for it, which implies fetching the root’s id. But in btrfs_evict_inode() the root might be NULL, as implied in the next check that we do in btrfs_evict_inode(). Hence, we either should set the ->root_objectid to 0 in case the root is NULL, or we move tracing setup after checking that the root is not NULL. Setting the rootid to 0 at least gives us the possibility to trace this call even in the case when the root is NULL, so that’s the solution taken here. | 2026-01-31 | not yet calculated | CVE-2025-71184 | https://git.kernel.org/stable/c/582ba48e4a4c06fef6bdcf4e57b7b9af660bbd0c https://git.kernel.org/stable/c/99e057f3d3ef24b99a7b1d84e01dd1bd890098da https://git.kernel.org/stable/c/f157dd661339fc6f5f2b574fe2429c43bd309534 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation Make sure to drop the reference taken when looking up the crossbar platform device during am335x route allocation. | 2026-01-31 | not yet calculated | CVE-2025-71185 | https://git.kernel.org/stable/c/6fdf168f57e331e148a1177a9b590a845c21b315 https://git.kernel.org/stable/c/f810132e825588fbad3cba940458c58bb7ec4d84 https://git.kernel.org/stable/c/30352277d8e09c972436f883a5efd1f1b763ac14 https://git.kernel.org/stable/c/4fc17b1c6d2e04ad13fd6c21cfbac68043ec03f9 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: stm32: dmamux: fix device leak on route allocation Make sure to drop the reference taken when looking up the DMA mux platform device during route allocation. Note that holding a reference to a device does not prevent its driver data from going away so there is no point in keeping the reference. | 2026-01-31 | not yet calculated | CVE-2025-71186 | https://git.kernel.org/stable/c/1a179ac01ff3993ab97e33cc77c316ed7415cda1 https://git.kernel.org/stable/c/2fb10259d4efb4367787b5ae9c94192e8a91c648 https://git.kernel.org/stable/c/3ef52d31cce8ba816739085a61efe07b63c6cf27 https://git.kernel.org/stable/c/dd6e4943889fb354efa3f700e42739da9bddb6ef |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: sh: rz-dmac: fix device leak on probe failure Make sure to drop the reference taken when looking up the ICU device during probe also on probe failures (e.g. probe deferral). | 2026-01-31 | not yet calculated | CVE-2025-71187 | https://git.kernel.org/stable/c/926d1666420c227eab50962a8622c1b8444720e8 https://git.kernel.org/stable/c/9fb490323997dcb6f749cd2660a17a39854600cd |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: lpc18xx-dmamux: fix device leak on route allocation Make sure to drop the reference taken when looking up the DMA mux platform device during route allocation. Note that holding a reference to a device does not prevent its driver data from going away so there is no point in keeping the reference. | 2026-01-31 | not yet calculated | CVE-2025-71188 | https://git.kernel.org/stable/c/9fba97baa520c9446df51a64708daf27c5a7ed32 https://git.kernel.org/stable/c/992eb8055a6e5dbb808672d20d68e60d5a89b12b https://git.kernel.org/stable/c/1e47d80f6720f0224efd19bcf081d39637569c10 https://git.kernel.org/stable/c/d4d63059dee7e7cae0c4d9a532ed558bc90efb55 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw: dmamux: fix OF node leak on route allocation failure Make sure to drop the reference taken to the DMA master OF node also on late route allocation failures. | 2026-01-31 | not yet calculated | CVE-2025-71189 | https://git.kernel.org/stable/c/db7c79c1bbfb1b0184e78a17ac2bd0f2bc3134d1 https://git.kernel.org/stable/c/8f7a391211381ed2f6802032c78c7820d166bc49 https://git.kernel.org/stable/c/eabe40f8a53c29f531e92778ea243e379f4f7978 https://git.kernel.org/stable/c/ec25e60f9f95464aa11411db31d0906b3fb7b9f2 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: bcm-sba-raid: fix device leak on probe Make sure to drop the reference taken when looking up the mailbox device during probe on probe failures and on driver unbind. | 2026-01-31 | not yet calculated | CVE-2025-71190 | https://git.kernel.org/stable/c/c80ca7bdff158401440741bdcf9175bd8608580b https://git.kernel.org/stable/c/db6f1d6d31711e73e6a214c73e6a8fb4cda0483d https://git.kernel.org/stable/c/2ed1a9de1f2d727ccae5bc9cc7c63ee3519c0c8b https://git.kernel.org/stable/c/7c3a46ebf15a9796b763a54272407fdbf945bed8 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: at_hdmac: fix device leak on of_dma_xlate() Make sure to drop the reference taken when looking up the DMA platform device during of_dma_xlate() when releasing channel resources. Note that commit 3832b78b3ec2 (“dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate()”) fixed the leak in a couple of error paths but the reference is still leaking on successful allocation. | 2026-01-31 | not yet calculated | CVE-2025-71191 | https://git.kernel.org/stable/c/987c71671367f42460689b78244d7b894c50999a https://git.kernel.org/stable/c/6a86cf2c09e149d5718a5b7090545f7566da9334 https://git.kernel.org/stable/c/f3c23b7e941349505c3d40de2cc0acd93d9ac057 https://git.kernel.org/stable/c/b9074b2d7a230b6e28caa23165e9d8bc0677d333 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: perf: Ensure swevent hrtimer is properly destroyed With the change to hrtimer_try_to_cancel() in perf_swevent_cancel_hrtimer() it appears possible for the hrtimer to still be active by the time the event gets freed. Make sure the event does a full hrtimer_cancel() on the free path by installing a perf_event::destroy handler. | 2026-01-28 | not yet calculated | CVE-2026-23014 | https://git.kernel.org/stable/c/deee9dfb111ab00f9dfd46c0c7e36656b80f5235 https://git.kernel.org/stable/c/ff5860f5088e9076ebcccf05a6ca709d5935cfa9 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: gpio: mpsse: fix reference leak in gpio_mpsse_probe() error paths The reference obtained by calling usb_get_dev() is not released in the gpio_mpsse_probe() error paths. Fix that by using device managed helper functions. Also remove the usb_put_dev() call in the disconnect function since now it will be released automatically. | 2026-01-31 | not yet calculated | CVE-2026-23015 | https://git.kernel.org/stable/c/7ea26e6dcabc270433b6ded2a1aee85b215d1b28 https://git.kernel.org/stable/c/1e876e5a0875e71e34148c9feb2eedd3bf6b2b43 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: inet: frags: drop fraglist conntrack references Jakub added a warning in nf_conntrack_cleanup_net_list() to make debugging leaked skbs/conntrack references more obvious. syzbot reports this as triggering, and I can also reproduce this via ip_defrag.sh selftest: conntrack cleanup blocked for 60s WARNING: net/netfilter/nf_conntrack_core.c:2512 [..] conntrack clenups gets stuck because there are skbs with still hold nf_conn references via their frag_list. net.core.skb_defer_max=0 makes the hang disappear. Eric Dumazet points out that skb_release_head_state() doesn’t follow the fraglist. ip_defrag.sh can only reproduce this problem since commit 6471658dc66c (“udp: use skb_attempt_defer_free()”), but AFAICS this problem could happen with TCP as well if pmtu discovery is off. The relevant problem path for udp is: 1. netns emits fragmented packets 2. nf_defrag_v6_hook reassembles them (in output hook) 3. reassembled skb is tracked (skb owns nf_conn reference) 4. ip6_output refragments 5. refragmented packets also own nf_conn reference (ip6_fragment calls ip6_copy_metadata()) 6. on input path, nf_defrag_v6_hook skips defragmentation: the fragments already have skb->nf_conn attached 7. skbs are reassembled via ipv6_frag_rcv() 8. skb_consume_udp -> skb_attempt_defer_free() -> skb ends up in pcpu freelist, but still has nf_conn reference. Possible solutions: 1 let defrag engine drop nf_conn entry, OR 2 export kick_defer_list_purge() and call it from the conntrack netns exit callback, OR 3 add skb_has_frag_list() check to skb_attempt_defer_free() 2 & 3 also solve ip_defrag.sh hang but share same drawback: Such reassembled skbs, queued to socket, can prevent conntrack module removal until userspace has consumed the packet. While both tcp and udp stack do call nf_reset_ct() before placing skb on socket queue, that function doesn’t iterate frag_list skbs. Therefore drop nf_conn entries when they are placed in defrag queue. Keep the nf_conn entry of the first (offset 0) skb so that reassembled skb retains nf_conn entry for sake of TX path. Note that fixes tag is incorrect; it points to the commit introducing the ‘ip_defrag.sh reproducible problem’: no need to backport this patch to every stable kernel. | 2026-01-31 | not yet calculated | CVE-2026-23016 | https://git.kernel.org/stable/c/088ca99dbb039c444c3ff987c5412a73f4f0cbf8 https://git.kernel.org/stable/c/2ef02ac38d3c17f34a00c4b267d961a8d4b45d1a |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: idpf: fix error handling in the init_task on load If the init_task fails during a driver load, we end up without vports and netdevs, effectively failing the entire process. In that state a subsequent reset will result in a crash as the service task attempts to access uninitialized resources. Following trace is from an error in the init_task where the CREATE_VPORT (op 501) is rejected by the FW: [40922.763136] idpf 0000:83:00.0: Device HW Reset initiated [40924.449797] idpf 0000:83:00.0: Transaction failed (op 501) [40958.148190] idpf 0000:83:00.0: HW reset detected [40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8 … [40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf] [40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf] … [40958.177932] Call Trace: [40958.178491] <TASK> [40958.179040] process_one_work+0x226/0x6d0 [40958.179609] worker_thread+0x19e/0x340 [40958.180158] ? __pfx_worker_thread+0x10/0x10 [40958.180702] kthread+0x10f/0x250 [40958.181238] ? __pfx_kthread+0x10/0x10 [40958.181774] ret_from_fork+0x251/0x2b0 [40958.182307] ? __pfx_kthread+0x10/0x10 [40958.182834] ret_from_fork_asm+0x1a/0x30 [40958.183370] </TASK> Fix the error handling in the init_task to make sure the service and mailbox tasks are disabled if the error happens during load. These are started in idpf_vc_core_init(), which spawns the init_task and has no way of knowing if it failed. If the error happens on reset, following successful driver load, the tasks can still run, as that will allow the netdevs to attempt recovery through another reset. Stop the PTP callbacks either way as those will be restarted by the call to idpf_vc_core_init() during a successful reset. | 2026-01-31 | not yet calculated | CVE-2026-23017 | https://git.kernel.org/stable/c/a514c374edcd33581cdcccf8faa7cc606a600319 https://git.kernel.org/stable/c/4d792219fe6f891b5b557a607ac8a0a14eda6e38 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before initializing extent tree in btrfs_read_locked_inode() In btrfs_read_locked_inode() we are calling btrfs_init_file_extent_tree() while holding a path with a read locked leaf from a subvolume tree, and btrfs_init_file_extent_tree() may do a GFP_KERNEL allocation, which can trigger reclaim. This can create a circular lock dependency which lockdep warns about with the following splat: [6.1433] ====================================================== [6.1574] WARNING: possible circular locking dependency detected [6.1583] 6.18.0+ #4 Tainted: G U [6.1591] —————————————————— [6.1599] kswapd0/117 is trying to acquire lock: [6.1606] ffff8d9b6333c5b8 (&delayed_node->mutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node.part.0+0x39/0x2f0 [6.1625] but task is already holding lock: [6.1633] ffffffffa4ab8ce0 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat+0x195/0xc60 [6.1646] which lock already depends on the new lock. [6.1657] the existing dependency chain (in reverse order) is: [6.1667] -> #2 (fs_reclaim){+.+.}-{0:0}: [6.1677] fs_reclaim_acquire+0x9d/0xd0 [6.1685] __kmalloc_cache_noprof+0x59/0x750 [6.1694] btrfs_init_file_extent_tree+0x90/0x100 [6.1702] btrfs_read_locked_inode+0xc3/0x6b0 [6.1710] btrfs_iget+0xbb/0xf0 [6.1716] btrfs_lookup_dentry+0x3c5/0x8e0 [6.1724] btrfs_lookup+0x12/0x30 [6.1731] lookup_open.isra.0+0x1aa/0x6a0 [6.1739] path_openat+0x5f7/0xc60 [6.1746] do_filp_open+0xd6/0x180 [6.1753] do_sys_openat2+0x8b/0xe0 [6.1760] __x64_sys_openat+0x54/0xa0 [6.1768] do_syscall_64+0x97/0x3e0 [6.1776] entry_SYSCALL_64_after_hwframe+0x76/0x7e [6.1784] -> #1 (btrfs-tree-00){++++}-{3:3}: [6.1794] lock_release+0x127/0x2a0 [6.1801] up_read+0x1b/0x30 [6.1808] btrfs_search_slot+0x8e0/0xff0 [6.1817] btrfs_lookup_inode+0x52/0xd0 [6.1825] __btrfs_update_delayed_inode+0x73/0x520 [6.1833] btrfs_commit_inode_delayed_inode+0x11a/0x120 [6.1842] btrfs_log_inode+0x608/0x1aa0 [6.1849] btrfs_log_inode_parent+0x249/0xf80 [6.1857] btrfs_log_dentry_safe+0x3e/0x60 [6.1865] btrfs_sync_file+0x431/0x690 [6.1872] do_fsync+0x39/0x80 [6.1879] __x64_sys_fsync+0x13/0x20 [6.1887] do_syscall_64+0x97/0x3e0 [6.1894] entry_SYSCALL_64_after_hwframe+0x76/0x7e [6.1903] -> #0 (&delayed_node->mutex){+.+.}-{3:3}: [6.1913] __lock_acquire+0x15e9/0x2820 [6.1920] lock_acquire+0xc9/0x2d0 [6.1927] __mutex_lock+0xcc/0x10a0 [6.1934] __btrfs_release_delayed_node.part.0+0x39/0x2f0 [6.1944] btrfs_evict_inode+0x20b/0x4b0 [6.1952] evict+0x15a/0x2f0 [6.1958] prune_icache_sb+0x91/0xd0 [6.1966] super_cache_scan+0x150/0x1d0 [6.1974] do_shrink_slab+0x155/0x6f0 [6.1981] shrink_slab+0x48e/0x890 [6.1988] shrink_one+0x11a/0x1f0 [6.1995] shrink_node+0xbfd/0x1320 [6.1002] balance_pgdat+0x67f/0xc60 [6.1321] kswapd+0x1dc/0x3e0 [6.1643] kthread+0xff/0x240 [6.1965] ret_from_fork+0x223/0x280 [6.1287] ret_from_fork_asm+0x1a/0x30 [6.1616] other info that might help us debug this: [6.1561] Chain exists of: &delayed_node->mutex –> btrfs-tree-00 –> fs_reclaim [6.1503] Possible unsafe locking scenario: [6.1110] CPU0 CPU1 [6.1411] —- —- [6.1707] lock(fs_reclaim); [6.1998] lock(btrfs-tree-00); [6.1291] lock(fs_reclaim); [6.1581] lock(&del —truncated— | 2026-01-31 | not yet calculated | CVE-2026-23018 | https://git.kernel.org/stable/c/92a5590851144f034adc51fee55e6878ccac716e https://git.kernel.org/stable/c/8731f2c50b0b1d2b58ed5b9671ef2c4bdc2f8347 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix NULL dereference on devlink_alloc() failure devlink_alloc() may return NULL on allocation failure, but prestera_devlink_alloc() unconditionally calls devlink_priv() on the returned pointer. This leads to a NULL pointer dereference if devlink allocation fails. Add a check for a NULL devlink pointer and return NULL early to avoid the crash. | 2026-01-31 | not yet calculated | CVE-2026-23019 | https://git.kernel.org/stable/c/8a4333b2818f0d853b43e139936c20659366e4a0 https://git.kernel.org/stable/c/325aea74be7e192b5c947c782da23b0d19a5fda2 https://git.kernel.org/stable/c/94e070cd50790317fba7787ae6006934b7edcb6f https://git.kernel.org/stable/c/3950054c9512add0cc79ab7e72b6d2f9f675e25b https://git.kernel.org/stable/c/326a4b7e61d01db3507f71c8bb5e85362f607064 https://git.kernel.org/stable/c/a428e0da1248c353557970848994f35fd3f005e2 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: net: 3com: 3c59x: fix possible null dereference in vortex_probe1() pdev can be null and free_ring: can be called in 1297 with a null pdev. | 2026-01-31 | not yet calculated | CVE-2026-23020 | https://git.kernel.org/stable/c/053ac9e37eee435e999277c0f1ef890dad6064bf https://git.kernel.org/stable/c/6cff14b831dbdb32675b4c7904dcc3eeeaf47e9d https://git.kernel.org/stable/c/606872c8e8bf96066730f6a2317502c5633c37f1 https://git.kernel.org/stable/c/28b2a805609699be7b90020ae7dccfb234be1ceb https://git.kernel.org/stable/c/2f05f7737e16d9a40038cc1c38a96a3f7964898b https://git.kernel.org/stable/c/d82796a57cc0dac1dbef19d913c8f02a8cc7b1a7 https://git.kernel.org/stable/c/a4e305ed60f7c41bbf9aabc16dd75267194e0de3 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: fix memory leak in update_eth_regs_async() When asynchronously writing to the device registers and if usb_submit_urb() fail, the code fail to release allocated to this point resources. | 2026-01-31 | not yet calculated | CVE-2026-23021 | https://git.kernel.org/stable/c/5397ea6d21c35a17707e201a60761bdee00bcc4e https://git.kernel.org/stable/c/a40af9a2904a1ab8ce61866ebe2a894ef30754ba https://git.kernel.org/stable/c/ac5d92d2826dec51e5d4c6854865bc5817277452 https://git.kernel.org/stable/c/93f18eaa190374e0f2d253e3b1a65cee19a7abe6 https://git.kernel.org/stable/c/471dfb97599eec74e0476046b3ef8e7037f27b34 https://git.kernel.org/stable/c/ce6eef731aba23a988decea1df3b08cf978f7b01 https://git.kernel.org/stable/c/afa27621a28af317523e0836dad430bec551eb54 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leak in idpf_vc_core_deinit() Make sure to free hw->lan_regs. Reported by kmemleak during reset: unreferenced object 0xff1b913d02a936c0 (size 96): comm “kworker/u258:14”, pid 2174, jiffies 4294958305 hex dump (first 32 bytes): 00 00 00 c0 a8 ba 2d ff 00 00 00 00 00 00 00 00 ……-……… 00 00 40 08 00 00 00 00 00 00 25 b3 a8 ba 2d ff ..@…….%…-. backtrace (crc 36063c4f): __kmalloc_noprof+0x48f/0x890 idpf_vc_core_init+0x6ce/0x9b0 [idpf] idpf_vc_event_task+0x1fb/0x350 [idpf] process_one_work+0x226/0x6d0 worker_thread+0x19e/0x340 kthread+0x10f/0x250 ret_from_fork+0x251/0x2b0 ret_from_fork_asm+0x1a/0x30 | 2026-01-31 | not yet calculated | CVE-2026-23022 | https://git.kernel.org/stable/c/23391db8a00c23854915b8b72ec1aa10080aa540 https://git.kernel.org/stable/c/e111cbc4adf9f9974eed040aeece7e17460f6bff |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leak in idpf_vport_rel() Free vport->rx_ptype_lkup in idpf_vport_rel() to avoid leaking memory during a reset. Reported by kmemleak: unreferenced object 0xff450acac838a000 (size 4096): comm “kworker/u258:5”, pid 7732, jiffies 4296830044 hex dump (first 32 bytes): 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 00 ……………. 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 ……………. backtrace (crc 3da81902): __kmalloc_cache_noprof+0x469/0x7a0 idpf_send_get_rx_ptype_msg+0x90/0x570 [idpf] idpf_init_task+0x1ec/0x8d0 [idpf] process_one_work+0x226/0x6d0 worker_thread+0x19e/0x340 kthread+0x10f/0x250 ret_from_fork+0x251/0x2b0 ret_from_fork_asm+0x1a/0x30 | 2026-01-31 | not yet calculated | CVE-2026-23023 | https://git.kernel.org/stable/c/a4212d6732e3f674c6cc7d0b642f276d827e8f94 https://git.kernel.org/stable/c/ec602a2a4071eb956d656ba968c58fee09f0622d https://git.kernel.org/stable/c/f6242b354605faff263ca45882b148200915a3f6 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leak of flow steer list on rmmod The flow steering list maintains entries that are added and removed as ethtool creates and deletes flow steering rules. Module removal with active entries causes memory leak as the list is not properly cleaned up. Prevent this by iterating through the remaining entries in the list and freeing the associated memory during module removal. Add a spinlock (flow_steer_list_lock) to protect the list access from multiple threads. | 2026-01-31 | not yet calculated | CVE-2026-23024 | https://git.kernel.org/stable/c/1aedff70a5e97628eaaf17b169774cb6a45a1dc5 https://git.kernel.org/stable/c/f9841bd28b600526ca4f6713b0ca49bf7bb98452 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: prevent pcp corruption with SMP=n The kernel test robot has reported: BUG: spinlock trylock failure on UP on CPU#0, kcompactd0/28 lock: 0xffff888807e35ef0, .magic: dead4ead, .owner: kcompactd0/28, .owner_cpu: 0 CPU: 0 UID: 0 PID: 28 Comm: kcompactd0 Not tainted 6.18.0-rc5-00127-ga06157804399 #1 PREEMPT 8cc09ef94dcec767faa911515ce9e609c45db470 Call Trace: <IRQ> __dump_stack (lib/dump_stack.c:95) dump_stack_lvl (lib/dump_stack.c:123) dump_stack (lib/dump_stack.c:130) spin_dump (kernel/locking/spinlock_debug.c:71) do_raw_spin_trylock (kernel/locking/spinlock_debug.c:?) _raw_spin_trylock (include/linux/spinlock_api_smp.h:89 kernel/locking/spinlock.c:138) __free_frozen_pages (mm/page_alloc.c:2973) ___free_pages (mm/page_alloc.c:5295) __free_pages (mm/page_alloc.c:5334) tlb_remove_table_rcu (include/linux/mm.h:? include/linux/mm.h:3122 include/asm-generic/tlb.h:220 mm/mmu_gather.c:227 mm/mmu_gather.c:290) ? __cfi_tlb_remove_table_rcu (mm/mmu_gather.c:289) ? rcu_core (kernel/rcu/tree.c:?) rcu_core (include/linux/rcupdate.h:341 kernel/rcu/tree.c:2607 kernel/rcu/tree.c:2861) rcu_core_si (kernel/rcu/tree.c:2879) handle_softirqs (arch/x86/include/asm/jump_label.h:36 include/trace/events/irq.h:142 kernel/softirq.c:623) __irq_exit_rcu (arch/x86/include/asm/jump_label.h:36 kernel/softirq.c:725) irq_exit_rcu (kernel/softirq.c:741) sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1052) </IRQ> <TASK> RIP: 0010:_raw_spin_unlock_irqrestore (arch/x86/include/asm/preempt.h:95 include/linux/spinlock_api_smp.h:152 kernel/locking/spinlock.c:194) free_pcppages_bulk (mm/page_alloc.c:1494) drain_pages_zone (include/linux/spinlock.h:391 mm/page_alloc.c:2632) __drain_all_pages (mm/page_alloc.c:2731) drain_all_pages (mm/page_alloc.c:2747) kcompactd (mm/compaction.c:3115) kthread (kernel/kthread.c:465) ? __cfi_kcompactd (mm/compaction.c:3166) ? __cfi_kthread (kernel/kthread.c:412) ret_from_fork (arch/x86/kernel/process.c:164) ? __cfi_kthread (kernel/kthread.c:412) ret_from_fork_asm (arch/x86/entry/entry_64.S:255) </TASK> Matthew has analyzed the report and identified that in drain_page_zone() we are in a section protected by spin_lock(&pcp->lock) and then get an interrupt that attempts spin_trylock() on the same lock. The code is designed to work this way without disabling IRQs and occasionally fail the trylock with a fallback. However, the SMP=n spinlock implementation assumes spin_trylock() will always succeed, and thus it’s normally a no-op. Here the enabled lock debugging catches the problem, but otherwise it could cause a corruption of the pcp structure. The problem has been introduced by commit 574907741599 (“mm/page_alloc: leave IRQs enabled for per-cpu page allocations”). The pcp locking scheme recognizes the need for disabling IRQs to prevent nesting spin_trylock() sections on SMP=n, but the need to prevent the nesting in spin_lock() has not been recognized. Fix it by introducing local wrappers that change the spin_lock() to spin_lock_iqsave() with SMP=n and use them in all places that do spin_lock(&pcp->lock). [vbabka@suse.cz: add pcp_ prefix to the spin_lock_irqsave wrappers, per Steven] | 2026-01-31 | not yet calculated | CVE-2026-23025 | https://git.kernel.org/stable/c/4a04ff9cd816e7346fcc8126f00ed80481f6569d https://git.kernel.org/stable/c/df63d31e9ae02e2f6cd96147779e4ed7cd0e75f6 https://git.kernel.org/stable/c/3098f8f7c7b0686c74827aec42a2c45e69801ff8 https://git.kernel.org/stable/c/038a102535eb49e10e93eafac54352fcc5d78847 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue occurs when: 1. gchan->config points to previously allocated memory 2. krealloc() fails and returns NULL 3. The function directly assigns NULL to gchan->config, losing the reference to the original memory 4. The original memory becomes unreachable and cannot be freed Fix this by using a temporary variable to hold the krealloc() result and only updating gchan->config when the allocation succeeds. Found via static analysis and code review. | 2026-01-31 | not yet calculated | CVE-2026-23026 | https://git.kernel.org/stable/c/6bf4ef078fd11910988889a6c0b3698d2e0c89af https://git.kernel.org/stable/c/01b1d781394fc9b83015e3a3cd46b17bda842bd8 https://git.kernel.org/stable/c/55a67ba5ac4cebfd54cc8305d4d57a0f1dfe6a85 https://git.kernel.org/stable/c/3f747004bbd641131d9396d87b5d2d3d1e182728 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Fix kvm_device leak in kvm_pch_pic_destroy() In kvm_ioctl_create_device(), kvm_device has allocated memory, kvm_device->destroy() seems to be supposed to free its kvm_device struct, but kvm_pch_pic_destroy() is not currently doing this, that would lead to a memory leak. So, fix it. | 2026-01-31 | not yet calculated | CVE-2026-23027 | https://git.kernel.org/stable/c/fc53a66227af08d868face4b33fa8b2e1ba187ed https://git.kernel.org/stable/c/1cf342a7c3adc5877837b53bbceb5cc9eff60bbf |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Fix kvm_device leak in kvm_ipi_destroy() In kvm_ioctl_create_device(), kvm_device has allocated memory, kvm_device->destroy() seems to be supposed to free its kvm_device struct, but kvm_ipi_destroy() is not currently doing this, that would lead to a memory leak. So, fix it. | 2026-01-31 | not yet calculated | CVE-2026-23028 | https://git.kernel.org/stable/c/5defcc2f9c22e6e09b5be68234ad10f4ba0292b7 https://git.kernel.org/stable/c/0bf58cb7288a4d3de6d8ecbb3a65928a9362bf21 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Fix kvm_device leak in kvm_eiointc_destroy() In kvm_ioctl_create_device(), kvm_device has allocated memory, kvm_device->destroy() seems to be supposed to free its kvm_device struct, but kvm_eiointc_destroy() is not currently doing this, that would lead to a memory leak. So, fix it. | 2026-01-31 | not yet calculated | CVE-2026-23029 | https://git.kernel.org/stable/c/e94ec9661c5820d157d2cc4b6cf4a6ab656a7b4d https://git.kernel.org/stable/c/7d8553fc75aefa7ec936af0cf8443ff90b51732e |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe() The for_each_available_child_of_node() calls of_node_put() to release child_np in each success loop. After breaking from the loop with the child_np has been released, the code will jump to the put_child label and will call the of_node_put() again if the devm_request_threaded_irq() fails. These cause a double free bug. Fix by returning directly to avoid the duplicate of_node_put(). | 2026-01-31 | not yet calculated | CVE-2026-23030 | https://git.kernel.org/stable/c/ebae26dd15140b840cf65be5e1c0daee949ba70b https://git.kernel.org/stable/c/027d42b97e6eb827c3438ebc09bab7efaee9270d https://git.kernel.org/stable/c/efe92ee7a111fe0f4d75f3ed6b7e3f86322279d5 https://git.kernel.org/stable/c/e07dea3de508cd6950c937cec42de7603190e1ca |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak In gs_can_open(), the URBs for USB-in transfers are allocated, added to the parent->rx_submitted anchor and submitted. In the complete callback gs_usb_receive_bulk_callback(), the URB is processed and resubmitted. In gs_can_close() the URBs are freed by calling usb_kill_anchored_urbs(parent->rx_submitted). However, this does not take into account that the USB framework unanchors the URB before the complete function is called. This means that once an in-URB has been completed, it is no longer anchored and is ultimately not released in gs_can_close(). Fix the memory leak by anchoring the URB in the gs_usb_receive_bulk_callback() to the parent->rx_submitted anchor. | 2026-01-31 | not yet calculated | CVE-2026-23031 | https://git.kernel.org/stable/c/f905bcfa971edb89e398c98957838d8c6381c0c7 https://git.kernel.org/stable/c/08624b7206ddb9148eeffc2384ebda2c47b6d1e9 https://git.kernel.org/stable/c/9f669a38ca70839229b7ba0f851820850a2fe1f7 https://git.kernel.org/stable/c/7352e1d5932a0e777e39fa4b619801191f57e603 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: null_blk: fix kmemleak by releasing references to fault configfs items When CONFIG_BLK_DEV_NULL_BLK_FAULT_INJECTION is enabled, the null-blk driver sets up fault injection support by creating the timeout_inject, requeue_inject, and init_hctx_fault_inject configfs items as children of the top-level nullbX configfs group. However, when the nullbX device is removed, the references taken to these fault-config configfs items are not released. As a result, kmemleak reports a memory leak, for example: unreferenced object 0xc00000021ff25c40 (size 32): comm “mkdir”, pid 10665, jiffies 4322121578 hex dump (first 32 bytes): 69 6e 69 74 5f 68 63 74 78 5f 66 61 75 6c 74 5f init_hctx_fault_ 69 6e 6a 65 63 74 00 88 00 00 00 00 00 00 00 00 inject………. backtrace (crc 1a018c86): __kmalloc_node_track_caller_noprof+0x494/0xbd8 kvasprintf+0x74/0xf4 config_item_set_name+0xf0/0x104 config_group_init_type_name+0x48/0xfc fault_config_init+0x48/0xf0 0xc0080000180559e4 configfs_mkdir+0x304/0x814 vfs_mkdir+0x49c/0x604 do_mkdirat+0x314/0x3d0 sys_mkdir+0xa0/0xd8 system_call_exception+0x1b0/0x4f0 system_call_vectored_common+0x15c/0x2ec Fix this by explicitly releasing the references to the fault-config configfs items when dropping the reference to the top-level nullbX configfs group. | 2026-01-31 | not yet calculated | CVE-2026-23032 | https://git.kernel.org/stable/c/1a3286edf4d48ce37f8982ff3c3b65159a5ecbb2 https://git.kernel.org/stable/c/d59ba448ccd595d5d65e197216cf781a87db2b28 https://git.kernel.org/stable/c/f1718da051282698aa8fa150bebb9724f6389fda https://git.kernel.org/stable/c/40b94ec7edbbb867c4e26a1a43d2b898f04b93c5 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: dmaengine: omap-dma: fix dma_pool resource leak in error paths The dma_pool created by dma_pool_create() is not destroyed when dma_async_device_register() or of_dma_controller_register() fails, causing a resource leak in the probe error paths. Add dma_pool_destroy() in both error paths to properly release the allocated dma_pool resource. | 2026-01-31 | not yet calculated | CVE-2026-23033 | https://git.kernel.org/stable/c/88a9483f093bbb9263dcf21bc7fdb5132e5de88d https://git.kernel.org/stable/c/4b93712e96be17029bd22787f2e39feb0e73272c https://git.kernel.org/stable/c/829b00481734dd54e72f755fd6584bce6fbffbb0 https://git.kernel.org/stable/c/2e1136acf8a8887c29f52e35a77b537309af321f |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix fence reference leak on queue teardown v2 The user mode queue keeps a pointer to the most recent fence in userq->last_fence. This pointer holds an extra dma_fence reference. When the queue is destroyed, we free the fence driver and its xarray, but we forgot to drop the last_fence reference. Because of the missing dma_fence_put(), the last fence object can stay alive when the driver unloads. This leaves an allocated object in the amdgpu_userq_fence slab cache and triggers This is visible during driver unload as: BUG amdgpu_userq_fence: Objects remaining on __kmem_cache_shutdown() kmem_cache_destroy amdgpu_userq_fence: Slab cache still has objects Call Trace: kmem_cache_destroy amdgpu_userq_fence_slab_fini amdgpu_exit __do_sys_delete_module Fix this by putting userq->last_fence and clearing the pointer during amdgpu_userq_fence_driver_free(). This makes sure the fence reference is released and the slab cache is empty when the module exits. v2: Update to only release userq->last_fence with dma_fence_put() (Christian) (cherry picked from commit 8e051e38a8d45caf6a866d4ff842105b577953bb) | 2026-01-31 | not yet calculated | CVE-2026-23034 | https://git.kernel.org/stable/c/e1a30e1ab33fc522785d04bbf7e1b13a5c5c9175 https://git.kernel.org/stable/c/b2426a211dba6432e32a2e70e9183c6e134475c6 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv mlx5e_priv is an unstable structure that can be memset(0) if profile attaching fails. Pass netdev to mlx5e_destroy_netdev() to guarantee it will work on a valid netdev. On mlx5e_remove: Check validity of priv->profile, before attempting to cleanup any resources that might be not there. This fixes a kernel oops in mlx5e_remove when switchdev mode fails due to change profile failure. $ devlink dev eswitch set pci/0000:00:03.0 mode switchdev Error: mlx5_core: Failed setting eswitch to offloads. dmesg: workqueue: Failed to create a rescuer kthread for wq “mlx5e”: -EINTR mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12 mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12 workqueue: Failed to create a rescuer kthread for wq “mlx5e”: -EINTR mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12 mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12 $ devlink dev reload pci/0000:00:03.0 ==> oops BUG: kernel NULL pointer dereference, address: 0000000000000370 PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014 RIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100 RSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286 RAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0 RBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10 R10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0 R13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400 FS: 00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0 Call Trace: <TASK> mlx5e_remove+0x57/0x110 device_release_driver_internal+0x19c/0x200 bus_remove_device+0xc6/0x130 device_del+0x160/0x3d0 ? devl_param_driverinit_value_get+0x2d/0x90 mlx5_detach_device+0x89/0xe0 mlx5_unload_one_devl_locked+0x3a/0x70 mlx5_devlink_reload_down+0xc8/0x220 devlink_reload+0x7d/0x260 devlink_nl_reload_doit+0x45b/0x5a0 genl_family_rcv_msg_doit+0xe8/0x140 | 2026-01-31 | not yet calculated | CVE-2026-23035 | https://git.kernel.org/stable/c/a7625bacaa8c8c2bfcde6dd6d1397bd63ad82b02 https://git.kernel.org/stable/c/66a25f6b7c0bfd84e6d27b536f5d24116dbd52da https://git.kernel.org/stable/c/4ef8512e1427111f7ba92b4a847d181ff0aeec42 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before iget_failed() in btrfs_read_locked_inode() In btrfs_read_locked_inode() if we fail to lookup the inode, we jump to the ‘out’ label with a path that has a read locked leaf and then we call iget_failed(). This can result in a ABBA deadlock, since iget_failed() triggers inode eviction and that causes the release of the delayed inode, which must lock the delayed inode’s mutex, and a task updating a delayed inode starts by taking the node’s mutex and then modifying the inode’s subvolume btree. Syzbot reported the following lockdep splat for this: ====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted —————————————————— btrfs-cleaner/8725 is trying to acquire lock: ffff0000d6826a48 (&delayed_node->mutex){+.+.}-{4:4}, at: __btrfs_release_delayed_node+0xa0/0x9b0 fs/btrfs/delayed-inode.c:290 but task is already holding lock: ffff0000dbeba878 (btrfs-tree-00){++++}-{4:4}, at: btrfs_tree_read_lock_nested+0x44/0x2ec fs/btrfs/locking.c:145 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (btrfs-tree-00){++++}-{4:4}: __lock_release kernel/locking/lockdep.c:5574 [inline] lock_release+0x198/0x39c kernel/locking/lockdep.c:5889 up_read+0x24/0x3c kernel/locking/rwsem.c:1632 btrfs_tree_read_unlock+0xdc/0x298 fs/btrfs/locking.c:169 btrfs_tree_unlock_rw fs/btrfs/locking.h:218 [inline] btrfs_search_slot+0xa6c/0x223c fs/btrfs/ctree.c:2133 btrfs_lookup_inode+0xd8/0x38c fs/btrfs/inode-item.c:395 __btrfs_update_delayed_inode+0x124/0xed0 fs/btrfs/delayed-inode.c:1032 btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1118 [inline] __btrfs_commit_inode_delayed_items+0x15f8/0x1748 fs/btrfs/delayed-inode.c:1141 __btrfs_run_delayed_items+0x1ac/0x514 fs/btrfs/delayed-inode.c:1176 btrfs_run_delayed_items_nr+0x28/0x38 fs/btrfs/delayed-inode.c:1219 flush_space+0x26c/0xb68 fs/btrfs/space-info.c:828 do_async_reclaim_metadata_space+0x110/0x364 fs/btrfs/space-info.c:1158 btrfs_async_reclaim_metadata_space+0x90/0xd8 fs/btrfs/space-info.c:1226 process_one_work+0x7e8/0x155c kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3427 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 -> #0 (&delayed_node->mutex){+.+.}-{4:4}: check_prev_add kernel/locking/lockdep.c:3165 [inline] check_prevs_add kernel/locking/lockdep.c:3284 [inline] validate_chain kernel/locking/lockdep.c:3908 [inline] __lock_acquire+0x1774/0x30a4 kernel/locking/lockdep.c:5237 lock_acquire+0x14c/0x2e0 kernel/locking/lockdep.c:5868 __mutex_lock_common+0x1d0/0x2678 kernel/locking/mutex.c:598 __mutex_lock kernel/locking/mutex.c:760 [inline] mutex_lock_nested+0x2c/0x38 kernel/locking/mutex.c:812 __btrfs_release_delayed_node+0xa0/0x9b0 fs/btrfs/delayed-inode.c:290 btrfs_release_delayed_node fs/btrfs/delayed-inode.c:315 [inline] btrfs_remove_delayed_node+0x68/0x84 fs/btrfs/delayed-inode.c:1326 btrfs_evict_inode+0x578/0xe28 fs/btrfs/inode.c:5587 evict+0x414/0x928 fs/inode.c:810 iput_final fs/inode.c:1914 [inline] iput+0x95c/0xad4 fs/inode.c:1966 iget_failed+0xec/0x134 fs/bad_inode.c:248 btrfs_read_locked_inode+0xe1c/0x1234 fs/btrfs/inode.c:4101 btrfs_iget+0x1b0/0x264 fs/btrfs/inode.c:5837 btrfs_run_defrag_inode fs/btrfs/defrag.c:237 [inline] btrfs_run_defrag_inodes+0x520/0xdc4 fs/btrf —truncated— | 2026-01-31 | not yet calculated | CVE-2026-23036 | https://git.kernel.org/stable/c/65241e3ddda60b53a4ee3ae12721fc9ee21d5827 https://git.kernel.org/stable/c/1e1f2055ad5a7a5d548789b334a4473a7665c418 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: allow partial RX URB allocation to succeed When es58x_alloc_rx_urbs() fails to allocate the requested number of URBs but succeeds in allocating some, it returns an error code. This causes es58x_open() to return early, skipping the cleanup label ‘free_urbs’, which leads to the anchored URBs being leaked. As pointed out by maintainer Vincent Mailhol, the driver is designed to handle partial URB allocation gracefully. Therefore, partial allocation should not be treated as a fatal error. Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been allocated, restoring the intended behavior and preventing the leak in es58x_open(). | 2026-01-31 | not yet calculated | CVE-2026-23037 | https://git.kernel.org/stable/c/611e839d2d552416b498ed5593e10670f61fcd4d https://git.kernel.org/stable/c/ba45e3d6b02c97dbb4578fbae7027fd66f3caa10 https://git.kernel.org/stable/c/6c5124a60989051799037834f0a1a4b428718157 https://git.kernel.org/stable/c/b1979778e98569c1e78c2c7f16bb24d76541ab00 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails, the function jumps to the out_scratch label without freeing the already allocated dsaddrs list, leading to a memory leak. Fix this by jumping to the out_err_drain_dsaddrs label, which properly frees the dsaddrs list before cleaning up other resources. | 2026-01-31 | not yet calculated | CVE-2026-23038 | https://git.kernel.org/stable/c/869862056e100973e76ce9f5f1b01837771b7722 https://git.kernel.org/stable/c/86da7efd12295a7e2b4abde5e5984c821edd938f https://git.kernel.org/stable/c/ed5d3f2f6885eb99f729e6ffd946e3aa058bd3eb https://git.kernel.org/stable/c/0c728083654f0066f5e10a1d2b0bd0907af19a58 |
| Linux–Linux | In the Linux kernel, the following vulnerability has been resolved: drm/gud: fix NULL fb and crtc dereferences on USB disconnect On disconnect drm_atomic_helper_disable_all() is called which sets both the fb and crtc for a plane to NULL before invoking a commit. This causes a kernel oops on every display disconnect. Add guards for those dereferences. | 2026-01-31 | not yet calculated | CVE-2026-23039 | https://git.kernel.org/stable/c/a255ec07f91d4c73a361a28b7a3d82f5710245f1 https://git.kernel.org/stable/c/dc2d5ddb193e363187bae2ad358245642d2721fb |
| liuyueyi–quick-media | Improper Control of Generation of Code (‘Code Injection’) vulnerability in liuyueyi quick-media (plugins/svg-plugin/batik-codec-fix/src/main/java/org/apache/batik/ext/awt/image/codec/png modules). This vulnerability is associated with program files PNGImageEncoder.Java. This issue affects quick-media: before v1.0. | 2026-01-27 | not yet calculated | CVE-2026-24806 | https://github.com/liuyueyi/quick-media/pull/122 |
| liuyueyi–quick-media | Improper Verification of Cryptographic Signature vulnerability in liuyueyi quick-media (plugins/svg-plugin/batik-codec-fix/src/main/java/org/apache/batik/ext/awt/image/codec/util modules). This vulnerability is associated with program files SeekableOutputStream.Java. This issue affects quick-media: before v1.0. | 2026-01-27 | not yet calculated | CVE-2026-24807 | https://github.com/liuyueyi/quick-media/pull/123 |
| LiveHelperChat–LiveHelperChat | Stored Cross-Site Scripting (XSS) vulnerability in the PDF file upload functionality of Live Helper Chat, versions prior to 4.72. An attacker can upload a malicious PDF file containing an XSS payload, which will be executed in the user’s context when they download and open the file via the link generated by the application. The vulnerability allows arbitrary JavaScript code to be executed in the user’s local context. | 2026-01-28 | not yet calculated | CVE-2026-0483 | https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-vulnerability-livehelperchat |
| lobehub–lobe-chat | LobeHub is an open source human-and-AI-agent network. Prior to version 1.143.3, the file upload feature in `Knowledge Base > File Upload` does not validate the integrity of the upload request, allowing users to intercept and modify the request parameters. As a result, it is possible to create arbitrary files in abnormal or unintended paths. In addition, since `lobechat.com` relies on the size parameter from the request to calculate file usage, an attacker can manipulate this value to misrepresent the actual file size, such as uploading a `1 GB` file while reporting it as `10 MB`, or falsely declaring a `10 MB` file as a `1 GB` file. By manipulating the size value provided in the client upload request, it is possible to bypass the monthly upload quota enforced by the server and continuously upload files beyond the intended storage and traffic limits. This abuse can result in a discrepancy between actual resource consumption and billing calculations, causing direct financial impact to the service operator. Additionally, exhaustion of storage or related resources may lead to degraded service availability, including failed uploads, delayed content delivery, or temporary suspension of upload functionality for legitimate users. A single malicious user can also negatively affect other users or projects sharing the same subscription plan, effectively causing an indirect denial of service (DoS). Furthermore, excessive and unaccounted-for uploads can distort monitoring metrics and overload downstream systems such as backup processes, malware scanning, and media processing pipelines, ultimately undermining overall operational stability and service reliability. Version 1.143.3 contains a patch for the issue. | 2026-01-30 | not yet calculated | CVE-2026-23835 | https://github.com/lobehub/lobehub/security/advisories/GHSA-wrrr-8jcv-wjf5 |
| Meta–react-server-dom-webpack | Multiple denial of service vulnerabilities exist in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack. The vulnerabilities are triggered by sending specially crafted HTTP requests to Server Function endpoints, and could lead to server crashes, out-of-memory exceptions or excessive CPU usage; depending on the vulnerable code path being exercised, the application configuration and application code. Strongly consider upgrading to the latest package versions to reduce risk and prevent availability issues in applications using React Server Components. | 2026-01-26 | not yet calculated | CVE-2026-23864 | https://www.facebook.com/security/advisories/cve-2026-23864 |
| Micron Technology, Inc.–Crucial Storage Executive | Crucial Storage Executive installer versions prior to 11.08.082025.00 contain a DLL preloading vulnerability. During installation, the installer runs with elevated privileges and loads Windows DLLs using an uncontrolled search path, which can cause a malicious DLL placed alongside the installer to be loaded instead of the intended system library. A local attacker who can convince a victim to run the installer from a directory containing the attacker-supplied DLL can achieve arbitrary code execution with administrator privileges. | 2026-01-26 | not yet calculated | CVE-2025-71178 | https://eu.crucial.com/support/storage-executive https://www.vulncheck.com/advisories/crucial-storage-executive-installer-dll-preloading-lpe |
| Mintplex-Labs–anything-llm | AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. If AnythingLLM prior to version 1.10.0 is configured to use Qdrant as the vector database with an API key, this QdrantApiKey could be exposed in plain text to unauthenticated users via the `/api/setup-complete` endpoint. Leakage of QdrantApiKey allows an unauthenticated attacker full read/write access to the Qdrant vector database instance used by AnythingLLM. Since Qdrant often stores the core knowledge base for RAG in AnythingLLM, this can lead to complete compromise of the semantic search / retrieval functionality and indirect leakage of confidential uploaded documents. Version 1.10.0 patches the issue. | 2026-01-26 | not yet calculated | CVE-2026-24477 | https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-gm94-qc2p-xcwf |
| monkey–monkey | An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63649 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | An out-of-bounds read in the mk_ptr_to_buf in mk_core function (mk_memory.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63650 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | A use-after-free in the mk_string_char_search function (mk_core/mk_string.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63651 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | A use-after-free in the mk_http_request_end function (mk_server/mk_http.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63652 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | An out-of-bounds read in the mk_vhost_fdt_close function (mk_server/mk_vhost.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63653 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | A NULL pointer dereference in the mk_http_range_parse function (mk_server/mk_http.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63655 | https://github.com/monkey/monkey/issues/427 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | An out-of-bounds read in the header_cmp function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63656 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | An out-of-bounds read in the mk_mimetype_find function (mk_server/mk_mimetype.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63657 | https://github.com/monkey/monkey/issues/426 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| monkey–monkey | A stack overflow in the mk_http_index_lookup function (mk_server/mk_http.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted HTTP request to the server. | 2026-01-29 | not yet calculated | CVE-2025-63658 | https://github.com/monkey/monkey/issues/427 https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md |
| Mozilla–Firefox | Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2. | 2026-01-27 | not yet calculated | CVE-2026-24868 | https://bugzilla.mozilla.org/show_bug.cgi?id=2007302 https://www.mozilla.org/security/advisories/mfsa2026-06/ |
| Mozilla–Firefox | Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2. | 2026-01-27 | not yet calculated | CVE-2026-24869 | https://bugzilla.mozilla.org/show_bug.cgi?id=2008698 https://www.mozilla.org/security/advisories/mfsa2026-06/ |
| Mozilla–Thunderbird | When a user explicitly requested Thunderbird to decrypt an inline OpenPGP message that was embedded in a text section of an email that was formatted and styled with HTML and CSS, then the decrypted contents were rendered in a context in which the CSS styles from the outer messages were active. If the user had additionally allowed loading of the remote content referenced by the outer email message, and the email was crafted by the sender using a combination of CSS rules and fonts and animations, then it was possible to extract the secret contents of the email. This vulnerability affects Thunderbird < 147.0.1 and Thunderbird < 140.7.1. | 2026-01-28 | not yet calculated | CVE-2026-0818 | https://bugzilla.mozilla.org/show_bug.cgi?id=1881530 https://www.mozilla.org/security/advisories/mfsa2026-07/ https://www.mozilla.org/security/advisories/mfsa2026-08/ |
| MuntashirAkon–AppManager | Integer Overflow or Wraparound vulnerability in MuntashirAkon AppManager (app/src/main/java/org/apache/commons/compress/archivers/tar modules). This vulnerability is associated with program files TarUtils.Java. This issue affects AppManager: before 4.0.4. | 2026-01-27 | not yet calculated | CVE-2026-1464 | https://github.com/MuntashirAkon/AppManager/pull/1598 |
| N3uron–N3uron | An issue in N3uron Web User Interface v.1.21.7-240207.1047 allows a remote attacker to escalate privileges via the password hashing on the client side using the MD5 algorithm over a predictable string format | 2026-01-29 | not yet calculated | CVE-2025-69929 | http://n3uron.com https://www.linkedin.com/in/joselabreu https://gist.github.com/JoseAbreu28/67f5d8bfc7ba1def526efeda5771a244 |
| NAVER–billboard.js | billboard.js before 3.18.0 allows an attacker to execute malicious JavaScript due to improper sanitization during chart option binding. | 2026-01-28 | not yet calculated | CVE-2026-1513 | https://cve.naver.com/detail/cve-2026-1513.html |
| neka-nat–cupoch | Out-of-bounds Write vulnerability in neka-nat cupoch (third_party/libjpeg-turbo/libjpeg-turbo modules). This vulnerability is associated with program files tjbench.C. This issue affects cupoch. | 2026-01-27 | not yet calculated | CVE-2026-24797 | https://github.com/neka-nat/cupoch/pull/138 |
| NETGEAR–NETGEAR products | Some end of service NETGEAR products provide “TelnetEnable” functionality, which allows a magic packet to activate telnet service on the box. | 2026-01-30 | not yet calculated | CVE-2026-24714 | https://www.netgear.com/about/eos/ https://jvn.jp/en/jp/JVN46722282/ |
| nocodb–nocodb | NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, an unvalidated redirect (open redirect) vulnerability exists in NocoDB’s login flow due to missing validation of the `continueAfterSignIn` parameter. During authentication, NocoDB processes a user-controlled redirect value and conditionally performs client-side navigation without enforcing any restrictions on the destination’s origin, domain or protocol. This allows attackers to redirect authenticated users to arbitrary external websites after login. This vulnerability enables phishing attacks by leveraging user trust in the legitimate NocoDB login flow. While it does not directly expose credentials or bypass authentication, it increases the likelihood of credential theft through social engineering. The issue does not allow arbitrary code execution or privilege escalation, but it undermines authentication integrity. Version 0.301.0 fixes the issue. | 2026-01-28 | not yet calculated | CVE-2026-24768 | https://github.com/nocodb/nocodb/security/advisories/GHSA-3hmw-8mw3-rmpj |
| nocodb–nocodb | NocoDB is software for building databases as spreadsheets. Prior to version 0.301.0, a stored cross-site scripting (XSS) vulnerability exists in NocoDB’s attachment handling mechanism. Authenticated users can upload malicious SVG files containing embedded JavaScript, which are later rendered inline and executed in the browsers of other users who view the attachment. Because the malicious payload is stored server-side and executed under the application’s origin, successful exploitation can lead to account compromise, data exfiltration and unauthorized actions performed on behalf of affected users. Version 0.301.0 patches the issue. | 2026-01-28 | not yet calculated | CVE-2026-24769 | https://github.com/nocodb/nocodb/security/advisories/GHSA-q5c6-h22r-qpwr |
| Node.js–Node.js | The Node.js package browserstack-local 1.5.8 contains a command injection vulnerability. This occurs because the logfile variable is not properly sanitized in lib/Local.js. | 2026-01-28 | not yet calculated | CVE-2025-57283 | https://www.npmjs.com https://gist.github.com/Dremig/b639c61541dd1482007dc7a5cd7fefb1 |
| nvm-sh–nvm | A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path). An attacker who can set environment variables in a victim’s shell environment (e.g., via malicious CI/CD configurations, compromised dotfiles, or Docker images) can inject arbitrary shell commands that execute when the victim runs nvm commands that trigger downloads, such as ‘nvm install’ or ‘nvm ls-remote’. | 2026-01-29 | not yet calculated | CVE-2026-1665 | Fix commit Release v0.40.4 nvm GitHub repository https://github.com/nvm-sh/nvm/pull/3380 |
| OctoPrint–OctoPrint | OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up to and including 1.11.5 are affected by a (theoretical) timing attack vulnerability that allows API key extraction over the network. Due to using character based comparison that short-circuits on the first mismatched character during API key validation, rather than a cryptographical method with static runtime regardless of the point of mismatch, an attacker with network based access to an affected OctoPrint could extract API keys valid on the instance by measuring the response times of the denied access responses and guess an API key character by character. The vulnerability is patched in version 1.11.6. The likelihood of this attack actually working is highly dependent on the network’s latency, noise and similar parameters. An actual proof of concept was not achieved so far. Still, as always administrators are advised to not expose their OctoPrint instance on hostile networks, especially not on the public Internet. | 2026-01-27 | not yet calculated | CVE-2026-23892 | https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-xg4x-w2j3-57h6 https://github.com/OctoPrint/OctoPrint/commit/249fd80ab01bc4b7dabedff768230a0fb5d01a8c https://github.com/OctoPrint/OctoPrint/releases/tag/1.11.6 |
| OneFlow–OneFlow | A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via supplying crafted tensor shapes. | 2026-01-28 | not yet calculated | CVE-2025-65886 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow https://github.com/Oneflow-Inc/oneflow/issues/10666 |
| OneFlow–OneFlow | A division-by-zero vulnerability in the flow.floor_divide() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input tensor with zero. | 2026-01-28 | not yet calculated | CVE-2025-65887 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow https://github.com/Oneflow-Inc/oneflow/issues/10665 |
| OneFlow–OneFlow | A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to cause a Denial of Service (DoS) via a negative or excessively large dimension value. | 2026-01-28 | not yet calculated | CVE-2025-65888 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow https://github.com/Oneflow-Inc/oneflow/issues/10664 |
| OneFlow–OneFlow | A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-65889 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow https://github.com/Oneflow-Inc/oneflow/issues/10663 |
| OneFlow–OneFlow | A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) by calling flow.cuda.synchronize() with an invalid or out-of-range GPU device index. | 2026-01-28 | not yet calculated | CVE-2025-65890 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow https://github.com/Oneflow-Inc/oneflow/issues/10662 |
| OneFlow–OneFlow | A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (DoS) by invoking flow.cuda.get_device_properties() with an invalid or negative device index. | 2026-01-28 | not yet calculated | CVE-2025-65891 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow https://github.com/Oneflow-Inc/oneflow/issues/10661 |
| OneFlow–OneFlow | A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted device ID. | 2026-01-28 | not yet calculated | CVE-2025-70999 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow/issues/10660 |
| OneFlow–OneFlow | An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71000 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow/issues/10659 |
| OneFlow–OneFlow | A segmentation violation in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71001 | https://github.com/Daisy2ang http://oneflow.com https://github.com/Oneflow-Inc/oneflow/issues/10658 |
| OneFlow–OneFlow | A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71002 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10657 |
| OneFlow–OneFlow | An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71003 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10656 |
| OneFlow–OneFlow | A segmentation violation in the oneflow.logical_or component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71004 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10655 |
| OneFlow–OneFlow | A floating point exception (FPE) in the oneflow.view component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71005 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10654 |
| OneFlow–OneFlow | A floating point exception (FPE) in the oneflow.reshape component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71006 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10653 |
| OneFlow–OneFlow | An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-28 | not yet calculated | CVE-2025-71007 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10652 |
| OneFlow–OneFlow | A segmentation violation in the oneflow._oneflow_internal.autograd.Function.FunctionCtx.mark_non_differentiable component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-29 | not yet calculated | CVE-2025-71008 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10651 |
| OneFlow–OneFlow | An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted indices. | 2026-01-29 | not yet calculated | CVE-2025-71009 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10649 |
| OneFlow–OneFlow | An input validation vulnerability in the flow.Tensor.new_empty/flow.Tensor.new_ones/flow.Tensor.new_zeros component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | 2026-01-29 | not yet calculated | CVE-2025-71011 | https://github.com/Daisy2ang https://github.com/Oneflow-Inc/oneflow/issues/10648 |
| openemr–openemr | OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a vulnerability where sensitive data is unintentionally revealed to unauthorized parties. Contents of Clinical Notes and Care Plan, where an encounter has Sensitivity=high, can be viewed and changed by users who do not have Sensitivities=high privilege. Version 7.0.4 fixes the issue. | 2026-01-27 | not yet calculated | CVE-2025-54373 | https://github.com/openemr/openemr/security/advisories/GHSA-739g-6m63-p7fr https://github.com/openemr/openemr/commit/aef3d1c85d9ff2f28d3d361d2818aee79b6dcd33 |
| OpenSSL–OpenSSL | Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation which can trigger a stack-based buffer overflow, invalid pointer or NULL pointer dereference during MAC verification. Impact summary: The stack buffer overflow or NULL pointer dereference may cause a crash leading to Denial of Service for an application that parses untrusted PKCS#12 files. The buffer overflow may also potentially enable code execution depending on platform mitigations. When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2 salt and keylength parameters from the file are used without validation. If the value of keylength exceeds the size of the fixed stack buffer used for the derived key (64 bytes), the key derivation will overflow the buffer. The overflow length is attacker-controlled. Also, if the salt parameter is not an OCTET STRING type this can lead to invalid or NULL pointer dereference. Exploiting this issue requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For this reason the issue was assessed as Moderate severity. The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as PKCS#12 processing is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue. OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do not support PBMAC1 in PKCS#12. | 2026-01-27 | not yet calculated | CVE-2025-11187 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit |
| OpenSSL–OpenSSL | Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-15467 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-15468 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit |
| OpenSSL–OpenSSL | Issue summary: The ‘openssl dgst’ command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the ‘openssl dgst’ command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the full message using library APIs will reject the signature, so the risk primarily affects workflows that both sign and verify with the affected ‘openssl dgst’ command. Streaming digest algorithms for ‘openssl dgst’ and library users are unaffected. The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the command-line tools are outside the OpenSSL FIPS module boundary. OpenSSL 3.5 and 3.6 are vulnerable to this issue. OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-15469 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit |
| OpenSSL–OpenSSL | Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large buffer before decompression without checking against the configured certificate size limit. Impact summary: An attacker can cause per-connection memory allocations of up to approximately 22 MiB and extra CPU work, potentially leading to service degradation or resource exhaustion (Denial of Service). In affected configurations, the peer-supplied uncompressed certificate length from a CompressedCertificate message is used to grow a heap buffer prior to decompression. This length is not bounded by the max_cert_list setting, which otherwise constrains certificate message sizes. An attacker can exploit this to cause large per-connection allocations followed by handshake failure. No memory corruption or information disclosure occurs. This issue only affects builds where TLS 1.3 certificate compression is compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression algorithm (brotli, zlib, or zstd) is available, and where the compression extension is negotiated. Both clients receiving a server CompressedCertificate and servers in mutual TLS scenarios receiving a client CompressedCertificate are affected. Servers that do not request client certificates are not vulnerable to client-initiated attacks. Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION to disable receiving compressed certificates. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the TLS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-66199 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit |
| OpenSSL–OpenSSL | Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue. | 2026-01-27 | not yet calculated | CVE-2025-68160 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerated code paths, inputs whose length is not a multiple<br>of 16 bytes can leave the final partial block unencrypted and unauthenticated.<br><br>Impact summary: The trailing 1-15 bytes of a message may be exposed in<br>cleartext on encryption and are not covered by the authentication tag,<br>allowing an attacker to read or tamper with those bytes without detection.<br><br>The low-level OCB encrypt and decrypt routines in the hardware-accelerated<br>stream path process full 16-byte blocks but do not advance the input/output<br>pointers. The subsequent tail-handling code then operates on the original<br>base pointers, effectively reprocessing the beginning of the buffer while<br>leaving the actual trailing bytes unprocessed. The authentication checksum<br>also excludes the true tail bytes.<br><br>However, typical OpenSSL consumers using EVP are not affected because the<br>higher-level EVP and provider OCB implementations split inputs so that full<br>blocks and trailing partial blocks are processed in separate calls, avoiding<br>the problematic code path. Additionally, TLS does not use OCB ciphersuites.<br>The vulnerability only affects applications that call the low-level<br>CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with<br>non-block-aligned lengths in a single call on hardware-accelerated builds.<br>For these reasons the issue was assessed as Low severity.<br><br>The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected<br>by this issue, as OCB mode is not a FIPS-approved algorithm.<br><br>OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.<br><br>OpenSSL 1.0.2 is not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-69418 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-69419 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2025-69420 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue. | 2026-01-27 | not yet calculated | CVE-2025-69421 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read. The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue. | 2026-01-27 | not yet calculated | CVE-2026-22795 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenSSL–OpenSSL | Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue. | 2026-01-27 | not yet calculated | CVE-2026-22796 | OpenSSL Advisory 3.6.1 git commit 3.5.5 git commit 3.4.4 git commit 3.3.6 git commit 3.0.19 git commit |
| OpenText–Vertica | Cleartext Storage of Sensitive Information vulnerability in OpenTextâ„¢ Vertica allows Retrieve Embedded Sensitive Data. The vulnerability could read Vertica agent plaintext apikey. This issue affects Vertica versions: 23.X, 24.X, 25.X. | 2026-01-30 | not yet calculated | CVE-2024-9432 | https://portal.microfocus.com/s/article/KM000044937?language=en_US |
| OpenVPN–OpenVPN | Insufficient epoch key slot processing in OpenVPN 2.7_alpha1 through 2.7_rc5 allows remote authenticated users to trigger an assert resulting in a denial of service | 2026-01-30 | not yet calculated | CVE-2025-15497 | https://community.openvpn.net/Security%20Announcements/CVE-2025-15497 https://www.mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00156.html |
| opf–openproject | OpenProject is an open-source, web-based project management software. Versions prior to 16.6.6 and 17.0.2 have an arbitrary file write vulnerability in OpenProject’s repository diff download endpoint (`/projects/:project_id/repository/diff.diff`) when rendering a single revision via git show. By supplying a specially crafted rev value (for example, `rev=–output=/tmp/poc.txt)`, an attacker can inject git show command-line options. When OpenProject executes the SCM command, Git interprets the attacker-controlled rev as an option and writes the output to an attacker-chosen path. As a result, any user with the `:browse_repository` permission on the project can create or overwrite arbitrary files that the OpenProject process user is permitted to write. The written contents consist of git show output (commit metadata and patch), but overwriting application or configuration files still leads to data loss and denial of service, impacting integrity and availability. The issue has been fixed in OpenProject 17.0.2 and 16.6.6. | 2026-01-28 | not yet calculated | CVE-2026-24685 | https://github.com/opf/openproject/security/advisories/GHSA-74p5-9pr3-r6pw |
| orval-labs–orval | Orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Versions starting with 7.19.0 and prior to 7.21.0 and 8.2.0 have an incomplete fix for CVE-2026-23947. While the jsStringEscape function properly handles single quotes (‘), double quotes (“) and so on, it is still possible to achieve code injection using only a limited set of characters that are currently not escaped. The vulnerability lies in the fact that the application can be forced to execute arbitrary JavaScript using characters such as []()!+. By using a technique known as JSFuck, an attacker can bypass the current sanitization logic and run arbitrary code without needing any alphanumeric characters or quotes. Version 7.21.0 and 8.2.0 contain an updated fix. | 2026-01-30 | not yet calculated | CVE-2026-25141 | https://github.com/orval-labs/orval/security/advisories/GHSA-gch2-phqh-fg9q https://github.com/orval-labs/orval/security/advisories/GHSA-h526-wf6g-67jv https://github.com/orval-labs/orval/blob/02211fc413524be340ba9ace866a2ef68845ca7c/packages/core/src/utils/string.ts#L227 https://github.com/orval-labs/orval/releases/tag/v7.21.0 https://github.com/orval-labs/orval/releases/tag/v8.2.0 |
| Phala-Network–dcap-qvl | dcap-qvl implements the quote verification logic for DCAP (Data Center Attestation Primitives). A vulnerability present in versions prior to 0.3.9 involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity collateral (including qe_identity, qe_identity_signature, and qe_identity_issuer_chain) from the PCCS. However, it skips to verify the QE Identity signature against its certificate chain and does not enforce policy constraints on the QE Report. An attacker can forge the QE Identity data to whitelist a malicious or non-Intel Quoting Enclave. This allows the attacker to forge the QE and sign untrusted quotes that the verifier will accept as valid. Effectively, this bypasses the entire remote attestation security model, as the verifier can no longer trust the entity responsible for signing the quotes. All deployments utilizing the dcap-qvl library for SGX or TDX quote verification are affected. The vulnerability has been patched in dcap-qvl version 0.3.9. The fix implements the missing cryptographic verification for the QE Identity signature and enforces the required checks for MRSIGNER, ISVPRODID, and ISVSVN against the QE Report. Users of the `@phala/dcap-qvl-node` and `@phala/dcap-qvl-web` packages should switch to the pure JavaScript implementation, `@phala/dcap-qvl`. There are no known workarounds for this vulnerability. Users must upgrade to the patched version to ensure that QE Identity collateral is properly verified. | 2026-01-26 | not yet calculated | CVE-2026-22696 | https://github.com/Phala-Network/dcap-qvl/security/advisories/GHSA-796p-j2gh-9m2q |
| pilgrimage233–Minecraft-Rcon-Manage | Improper Control of Generation of Code (‘Code Injection’) vulnerability in pilgrimage233 Minecraft-Rcon-Manage. This issue affects Minecraft-Rcon-Manage: before 3.0. | 2026-01-27 | not yet calculated | CVE-2026-24871 | https://github.com/pilgrimage233/Minecraft-Rcon-Manage/pull/13 |
| Pix-Link–LV-WR21Q | Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point. The vendor was notified early about this vulnerability, but didn’t respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. | 2026-01-27 | not yet calculated | CVE-2025-12386 | https://cert.pl/en/posts/2026/01/CVE-2025-12386 https://www.pix-link.com/lv-wr21q https://github.com/wcyb/security_research |
| Pix-Link–LV-WR21Q | A vulnerability in the Pix-Link LV-WR21Q router’s language module allows remote attackers to trigger a denial of service (DoS) by sending a specially crafted HTTP POST request containing non-existing language parameter. This renders the server unable to serve correct lang.js file, which causes administrator panel to not work, resulting in DoS until the language settings is reverted to a correct value. The Denial of Service affects only the administrator panel and does not affect other router functionalities. The vendor was notified early about this vulnerability, but didn’t respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. | 2026-01-27 | not yet calculated | CVE-2025-12387 | https://cert.pl/en/posts/2026/01/CVE-2025-12386 https://www.pix-link.com/lv-wr21q https://github.com/wcyb/security_research |
| pnpm–pnpm | pnpm is a package manager. Prior to version 10.28.2, when pnpm installs a `file:` (directory) or `git:` dependency, it follows symlinks and reads their target contents without constraining them to the package root. A malicious package containing a symlink to an absolute path (e.g., `/etc/passwd`, `~/.ssh/id_rsa`) causes pnpm to copy that file’s contents into `node_modules`, leaking local data. The vulnerability only affects `file:` and `git:` dependencies. Registry packages (npm) have symlinks stripped during publish and are NOT affected. The issue impacts developers installing local/file dependencies andCI/CD pipelines installing git dependencies. It can lead to credential theft via symlinks to `~/.aws/credentials`, `~/.npmrc`, `~/.ssh/id_rsa`. Version 10.28.2 contains a patch. | 2026-01-26 | not yet calculated | CVE-2026-24056 | https://github.com/pnpm/pnpm/security/advisories/GHSA-m733-5w8f-5ggw https://github.com/pnpm/pnpm/commit/b277b45bc35ae77ca72d7634d144bbd58a48b70f https://github.com/pnpm/pnpm/releases/tag/v10.28.2 |
| pnpm–pnpm | pnpm is a package manager. Prior to version 10.28.2, when pnpm processes a package’s `directories.bin` field, it uses `path.join()` without validating the result stays within the package root. A malicious npm package can specify `”directories”: {“bin”: “../../../../tmp”}` to escape the package directory, causing pnpm to chmod 755 files at arbitrary locations. This issue only affects Unix/Linux/macOS. Windows is not affected (`fixBin` gated by `EXECUTABLE_SHEBANG_SUPPORTED`). Version 10.28.2 contains a patch. | 2026-01-26 | not yet calculated | CVE-2026-24131 | https://github.com/pnpm/pnpm/security/advisories/GHSA-v253-rj99-jwpq https://github.com/pnpm/pnpm/commit/17432ad5bbed5c2e77255ca6d56a1449bbcfd943 https://github.com/pnpm/pnpm/releases/tag/v10.28.2 |
| PodcastGenerator–PodcastGenerator | A Stored cross-site scripting (XSS) vulnerability in ‘Create New Live Item’ in PodcastGenerator 3.2.9 allows remote attackers to inject arbitrary script or HTML via the ‘TITLE’, ‘SHORT DESCRIPTION’ and ‘LONG DESCRIPTION’ parameters. The saved payload gets executed on ‘View All Live Items’ and ‘Live Stream’ pages. | 2026-01-28 | not yet calculated | CVE-2025-70336 | https://github.com/PodcastGenerator/PodcastGenerator https://github.com/aryasahil96-manu/CVE-Disclosures/blob/main/CVE-2025-70336 |
| podman-desktop–podman-desktop | Podman Desktop is a graphical tool for developing on containers and Kubernetes. A critical authentication bypass vulnerability in Podman Desktop prior to version 1.25.1 allows any extension to completely circumvent permission checks and gain unauthorized access to all authentication sessions. The `isAccessAllowed()` function unconditionally returns `true`, enabling malicious extensions to impersonate any user, hijack authentication sessions, and access sensitive resources without authorization. This vulnerability affects all versions of Podman Desktop. Version 1.25.1 contains a patch for the issue. | 2026-01-28 | not yet calculated | CVE-2026-24835 | https://github.com/podman-desktop/podman-desktop/security/advisories/GHSA-v3fx-qg34-6g9m https://drive.google.com/file/d/1ib4RG34mGHDlXeyib8L2j9L5rEDxuDM5/view?usp=sharing |
| praydog–REFramework | An issue from the component luaG_runerror in dependencies/lua/src/ldebug.c in praydog/REFramework version before 1.5.5 leads to a heap-buffer overflow when a recursive error occurs. | 2026-01-27 | not yet calculated | CVE-2026-24809 | https://github.com/praydog/REFramework/pull/1320 |
| praydog–UEVR | Out-of-bounds Write vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerability is associated with program files ldebug.C, lvm.C. This issue affects UEVR: before 1.05. | 2026-01-27 | not yet calculated | CVE-2026-24817 | https://github.com/praydog/UEVR/pull/336 |
| praydog–UEVR | Out-of-bounds Read vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerability is associated with program files lparser.C. This issue affects UEVR: before 1.05. | 2026-01-27 | not yet calculated | CVE-2026-24818 | https://github.com/praydog/UEVR/pull/337 |
| Progress Software–Chef Inspec | Chef InSpec up to version 5.23 creates named pipes with overly permissive default Windows access controls. A local attacker may interfere with the pipe connection process and exploit the insufficient access restrictions to assume the InSpec execution context, potentially resulting in elevated privileges or operational disruption. This issue affects Chef Inspec: through 5.23. | 2026-01-30 | not yet calculated | CVE-2025-6723 | https://docs.chef.io/inspec/ |
| pwncollege–dojo | pwn.college DOJO is an education platform for learning cybersecurity. Prior to commit e33da14449a5abcff507e554f66e2141d6683b0a, missing sandboxing on `/workspace/*` routes allows challenge authors to inject arbitrary javascript which runs on the same origin as `http[:]//dojo[.]website`. This is a sandbox escape leading to arbitrary javascript execution as the dojo’s origin. A challenge author can craft a page that executes any dangerous actions that the user could. Version e33da14449a5abcff507e554f66e2141d6683b0a patches the issue. | 2026-01-29 | not yet calculated | CVE-2026-25117 | https://github.com/pwncollege/dojo/security/advisories/GHSA-wvcf-9xm8-7mrg https://github.com/pwncollege/dojo/commit/e33da14449a5abcff507e554f66e2141d6683b0a |
| py-pdf–pypdf | pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vulnerability that is present in versions prior to 6.6.2 can craft a PDF which leads to an infinite loop. This requires accessing the outlines/bookmarks. This has been fixed in pypdf 6.6.2. If projects cannot upgrade yet, consider applying the changes from PR #3610 manually. | 2026-01-27 | not yet calculated | CVE-2026-24688 | https://github.com/py-pdf/pypdf/security/advisories/GHSA-2q4j-m29v-hq73 https://github.com/py-pdf/pypdf/pull/3610 https://github.com/py-pdf/pypdf/commit/b1282f8dcdc1a7b41ceab6740ffddfdf31b1fec1 https://github.com/py-pdf/pypdf/releases/tag/6.6.2 |
| qgis–QGIS | QGIS is a free, open source, cross platform geographical information system (GIS) The repository contains a GitHub Actions workflow called “pre-commit checks” that, before commit 76a693cd91650f9b4e83edac525e5e4f90d954e9, was vulnerable to remote code execution and repository compromise because it used the `pull_request_target` trigger and then checked out and executed untrusted pull request code in a privileged context. Workflows triggered by `pull_request_target` ran with the base repository’s credentials and access to secrets. If these workflows then checked out and executed code from the head of an external pull request (which could have been attacker controlled), the attacker could have executed arbitrary commands with elevated privileges. This insecure pattern has been documented as a security risk by GitHub and security researchers. Commit 76a693cd91650f9b4e83edac525e5e4f90d954e9 removed the vulnerable code. | 2026-01-27 | not yet calculated | CVE-2026-24480 | https://github.com/qgis/QGIS/security/advisories/GHSA-7h99-4f97-h6rw https://github.com/qgis/QGIS/commit/76a693cd91650f9b4e83edac525e5e4f90d954e9 |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘txAny’ in ‘/evaluacion_competencias_autoeval_list.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1472 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ in ‘/evaluacion_competencias_evalua.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1473 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ and ‘Id_evaluacion’ en ‘/evaluacion_inicio.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1474 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ in ‘/evaluacion_acciones_evalua.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1475 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ in ‘/evaluacion_acciones_ver_auto.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1476 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ and ‘Id_evaluacion’ in ‘/evaluacion_competencias_evalua_old.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1477 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ and ‘Id_evaluacion’ in ‘/evaluacion_hca_evalua.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1478 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameters ‘Id_usuario’ and ‘Id_evaluacion’ in ‘/evaluacion_hca_ver_auto.asp’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1479 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ in ‘/evaluacion_objetivos_anyo_sig_evalua.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1480 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ in ‘/evaluacion_objetivos_anyo_sig_ver_auto.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1481 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_evaluacion’ in ‘/evaluacion_objetivos_evalua_definido.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1482 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Quatuor–Evaluacin de Desempeo (EDD) | An out-of-band SQL injection vulnerability (OOB SQLi) has been detected in the Performance Evaluation (EDD) application developed by Gabinete Técnico de Programación. Exploiting this vulnerability in the parameter ‘Id_usuario’ in ‘/evaluacion_objetivos_ver_auto.aspx’, could allow an attacker to extract sensitive information from the database through external channels, without the affected application returning the data directly, compromising the confidentiality of the stored information. | 2026-01-27 | not yet calculated | CVE-2026-1483 | https://www.incibe.es/en/incibe-cert/notices/aviso/out-band-sql-injection-quatuor-performance-evaluation |
| Rails–activestorage | # Active Storage allowed transformation methods potentially unsafe Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default. The default allowed list contains three methods allow for the circumvention of the safe defaults which enables potential command injection vulnerabilities in cases where arbitrary user supplied input is accepted as valid transformation methods or parameters. Impact —— This vulnerability impacts applications that use Active Storage with the image_processing processing gem in addition to mini_magick as the image processor. Vulnerable code will look something similar to this: “` <%= image_tag blob.variant(params[:t] => params[:v]) %> “` Where the transformation method or its arguments are untrusted arbitrary input. All users running an affected release should either upgrade or use one of the workarounds immediately. Workarounds ———– Consuming user supplied input for image transformation methods or their parameters is unsupported behavior and should be considered dangerous. Strict validation of user supplied methods and parameters should be performed as well as having a strong [ImageMagick security policy](https://imagemagick.org/script/security-policy.php) deployed. Credits ——- Thank you [lio346](https://hackerone.com/lio346) for reporting this! | 2026-01-30 | not yet calculated | CVE-2025-24293 | https://github.com/advisories/GHSA-r4mg-4433-c7g3 |
| Ralim–IronOS | Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common/tinycrypt/source modules). This vulnerability is associated with program files ecc_dsa.C. This issue affects IronOS: before v2.23-rc3. | 2026-01-27 | not yet calculated | CVE-2026-24801 | https://github.com/Ralim/IronOS/pull/2087 |
| RawTherapee–RawTherapee | Integer Overflow or Wraparound vulnerability in RawTherapee (rtengine modules). This vulnerability is associated with program files dcraw.Cc. This issue affects RawTherapee: through 5.11. | 2026-01-27 | not yet calculated | CVE-2026-24808 | https://github.com/RawTherapee/RawTherapee/pull/7359 |
| Red Hat–Red Hat Enterprise Linux 10 | A flaw was found in NetworkManager. The NetworkManager package allows access to files that may belong to other users. NetworkManager allows non-root users to configure the system’s network. The daemon runs with root privileges and can access files owned by users different from the one who added the connection. | 2026-01-26 | not yet calculated | CVE-2025-9615 | https://access.redhat.com/security/cve/CVE-2025-9615 RHBZ#2391503 https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/1809 https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/merge_requests/2324 https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/merge_requests/2327 |
| rethinkdb–rethinkdb | Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc. This issue affects rethinkdb: through v2.4.4. | 2026-01-27 | not yet calculated | CVE-2026-24810 | https://github.com/rethinkdb/rethinkdb/pull/7163 |
| RLE NOVA–PlanManager | Stored Cross-Site Scripting (XSS) in RLE NOVA’s PlanManager. This vulnerability allows an attacker to execute JavaScript code in the victim’s browser by injecting malicious payload through the ‘comment’ and ‘brand’ parameters in ‘/index.php’. The payload is stored by the application and subsequently displayed without proper sanitization when other users access it. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user. | 2026-01-29 | not yet calculated | CVE-2026-1469 | https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-xss-rle-novas-planmanager |
| root-project–root | Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with program files inffast.C. This issue affects root. | 2026-01-27 | not yet calculated | CVE-2026-24811 | https://github.com/root-project/root/pull/18526 |
| root-project–root | Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with program files inftrees.C. This issue affects root: through 6.36.00-rc1. | 2026-01-27 | not yet calculated | CVE-2026-24812 | https://github.com/root-project/root/pull/18527 |
| Schneider Electric–EcoStruxure Process Expert | CWE-276: Incorrect Default Permissions vulnerability exists that could cause privilege escalation through the reverse shell when one or more executable service binaries are modified in the installation folder by a local user with normal privilege upon service restart. | 2026-01-29 | not yet calculated | CVE-2025-13905 | https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-013-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-013-02.pdf |
| shaarli–Shaarli | Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `”` prematurely ends the `<input>` tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. Version 0.16.0 fixes the issue. | 2026-01-26 | not yet calculated | CVE-2026-24476 | https://github.com/shaarli/Shaarli/security/advisories/GHSA-g3xq-mj52-f8pg https://github.com/shaarli/Shaarli/commit/b854c789289c4b0dfbb7c1e5793bae7d8f94e063 |
| sharpred–deepHas | deepHas provides a test for the existence of a nested object key and optionally returns that key. A prototype pollution vulnerability exists in version 1.0.7 of the deephas npm package that allows an attacker to modify global object behavior. This issue was fixed in version 1.0.8. | 2026-01-29 | not yet calculated | CVE-2026-25047 | https://github.com/sharpred/deepHas/security/advisories/GHSA-2733-6c58-pf27 https://github.com/sharpred/deepHas/commit/8097fafd3776c613d8066546653e0d2c7b5fc465 |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain an authorization flaw in the user management API that allows a low-privileged authenticated user to change the administrator account password. By sending a crafted request directly to the backend endpoint, an attacker can bypass role-based restrictions enforced by the web interface and obtain full administrative privileges. | 2026-01-26 | not yet calculated | CVE-2026-24428 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-incorrect-authorization-allows-administrator-password-change |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated access to the management interface. | 2026-01-26 | not yet calculated | CVE-2026-24429 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-hardcoded-default-password-for-built-in-account |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be exposed to network-based interception. | 2026-01-26 | not yet calculated | CVE-2026-24430 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-http-responses-expose-plaintext-credentials |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) display stored user account passwords in plaintext within the administrative web interface. Any user with access to the affected management pages can directly view credentials. | 2026-01-26 | not yet calculated | CVE-2026-24431 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-missing-csrf-protections-for-administrative-actions |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) lack cross-site request forgery (CSRF) protections on administrative endpoints, including those used to change administrator account credentials. As a result, an attacker can craft malicious requests that, when triggered by an authenticated user’s browser, modify administrative passwords and other configuration settings. | 2026-01-26 | not yet calculated | CVE-2026-24432 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-missing-csrf-protections-for-administrative-actions |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) contain a stored cross-site scripting vulnerability in the user creation functionality. Insufficient input validation allows attacker-controlled script content to be stored and later executed when administrative users access the affected management pages. | 2026-01-26 | not yet calculated | CVE-2026-24433 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-stored-xss-via-user-name-field |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) implement an insecure Cross-Origin Resource Sharing (CORS) policy on authenticated administrative endpoints. The device sets Access-Control-Allow-Origin: * in combination with Access-Control-Allow-Credentials: true, allowing attacker-controlled origins to issue credentialed cross-origin requests. | 2026-01-26 | not yet calculated | CVE-2026-24435 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-permissive-cors-allows-cross-origin-data-access |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) do not enforce rate limiting or account lockout mechanisms on authentication endpoints. This allows attackers to perform unrestricted brute-force attempts against administrative credentials. | 2026-01-26 | not yet calculated | CVE-2026-24436 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-lacks-rate-limiting-on-authentication |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) serve sensitive administrative content without appropriate cache-control directives. As a result, browsers may store credential-bearing responses locally, exposing them to subsequent unauthorized access. | 2026-01-26 | not yet calculated | CVE-2026-24437 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-missing-cache-controls-for-credential-bearing-pages |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) fail to include the X-Content-Type-Options: nosniff response header on web management interfaces. As a result, browsers that perform MIME sniffing may incorrectly interpret attacker-influenced responses as executable script. | 2026-01-26 | not yet calculated | CVE-2026-24439 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-lacks-x-content-type-options-header |
| Shenzhen Tenda Technology Co., Ltd.–W30E V2 | Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password changes when access to the affected endpoint is obtained. | 2026-01-26 | not yet calculated | CVE-2026-24440 | https://www.tendacn.com/product/W30E https://www.vulncheck.com/advisories/tenda-w30e-v2-allows-password-change-without-verifying-current-password |
| Significant-Gravitas–AutoGPT | AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.44, AutoGPT Platform’s block execution endpoints (both main web API and external API) allow executing blocks by UUID without checking the `disabled` flag. Any authenticated user can execute the disabled `BlockInstallationBlock`, which writes arbitrary Python code to the server filesystem and executes it via `__import__()`, achieving Remote Code Execution. In default self-hosted deployments where Supabase signup is enabled, an attacker can self-register; if signup is disabled (e.g., hosted), the attacker needs an existing account. autogpt-platform-beta-v0.6.44 contains a fix. | 2026-01-29 | not yet calculated | CVE-2026-24780 | https://github.com/Significant-Gravitas/AutoGPT/security/advisories/GHSA-r277-3xc5-c79v https://github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/api/external/v1/routes.py#L79-L93 https://github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/api/features/v1.py#L1408-L1424 https://github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/api/features/v1.py#L355-L395 https://github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/blocks/block.py#L15-L78 https://github.com/Significant-Gravitas/AutoGPT/blob/master/autogpt_platform/backend/backend/data/block.py#L459 |
| sigstore–sigstore-python | sigstore-python is a Python tool for generating and verifying Sigstore signatures. Prior to version 4.2.0, the sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery. `_OAuthSession` creates a unique “state” and sends it as a parameter in the authentication request but the “state” in the server response seems not not be cross-checked with this value. Version 4.2.0 contains a patch for the issue. | 2026-01-26 | not yet calculated | CVE-2026-24408 | https://github.com/sigstore/sigstore-python/security/advisories/GHSA-hm8f-75xx-w2vr https://github.com/sigstore/sigstore-python/commit/5e77497fe8f0b202bdd118949074ec2f20da69aa https://github.com/sigstore/sigstore-python/releases/tag/v4.2.0 |
| silabs.com–Silicon Labs Zigbee Stack | After receiving a malformed 802.15.4 MAC Data Request the Zigbee Coordinator sends a ‘network leave’ request to Zigbee router resulting in the Zigbee Router getting stuck in a non-rejoinable state. If a suitable parent is not available, the end devices will be unable to rejoin. A manual recommissioning is required to recover the Zigbee Router. | 2026-01-30 | not yet calculated | CVE-2025-7964 | https://community.silabs.com/068Vm00000dspiL |
| simsong–bulk_extractor | `bulk_extractor` is a digital forensics exploitation tool. Starting in version 1.4, `bulk_extractor`’s embedded unrar code has a heap buffer overflow in the RAR PPM LZ decoding path. A crafted RAR inside a disk image causes an out of bounds write in `Unpack::CopyString`, leading to a crash under ASAN (and likely a crash or memory corruption in production builds). There’s potential for using this for RCE. As of time of publication, no known patches are available. | 2026-01-28 | not yet calculated | CVE-2026-24857 | https://github.com/simsong/bulk_extractor/security/advisories/GHSA-rh8m-9xrx-q64q |
| simsong–tcpflow | tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available. | 2026-01-29 | not yet calculated | CVE-2026-25061 | https://github.com/simsong/tcpflow/security/advisories/GHSA-q5q6-frrv-9rj6 |
| SmarterTools–SmarterMail | SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication. | 2026-01-29 | not yet calculated | CVE-2026-25067 | https://www.smartertools.com/smartermail/release-notes/current https://www.vulncheck.com/advisories/smartertools-smartermail-unauthenticated-background-of-the-day-path-coercion |
| SpringBlade–SpringBlade | Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive user data. | 2026-01-26 | not yet calculated | CVE-2025-70982 | https://github.com/chillzhuang/SpringBlade https://github.com/chillzhuang/SpringBlade/issues/34 https://gist.github.com/old6ma/ea60151aa40ddc1cfb51fbaa0c173117 |
| SunFounder–Pironman Dashboard (pm_dashboard) | SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service. | 2026-01-31 | not yet calculated | CVE-2026-25069 | https://github.com/sunfounder/pm_dashboard https://github.com/sunfounder/pm_dashboard/blob/main/pm_dashboard/pm_dashboard.py#L62 https://github.com/sunfounder/pm_dashboard/blob/main/pm_dashboard/pm_dashboard.py#L440 https://www.vulncheck.com/advisories/sunfounder-pironman-dashboard-path-traversal-arbitrary-file-read-deletion https://gist.github.com/chapochapo/5db8702ede862af5c59a28b5d5a0aba3 |
| SuperDuper!–Super-Duper! | An issue in Shirt Pocket’s SuperDuper! 3.11 and earlier allow a local attacker to modify the default task template to install an arbitrary package that can run shell scripts with root privileges and Full Disk Access, thus bypassing macOS privacy controls. | 2026-01-29 | not yet calculated | CVE-2025-69604 | http://shirt.com https://shirt-pocket.com/SuperDuper/SuperDuperDescription.html https://www.shirtpocket.com/blog/index.php/shadedgrey/comments/superduper_v312_now_available |
| swoole–swoole-src | Integer Overflow or Wraparound vulnerability in swoole swoole-src (thirdparty/hiredis modules). This vulnerability is associated with program files sds.C. This issue affects swoole-src: before 6.0.2. | 2026-01-27 | not yet calculated | CVE-2026-24814 | https://github.com/swoole/swoole-src/pull/5698 |
| tale–tale | Cross Site Scripting vulnerability in tale v.2.0.5 allows an attacker to execute arbitrary code. | 2026-01-29 | not yet calculated | CVE-2025-69749 | https://github.com/otale/tale https://github.com/milantgh/otalexss |
| The Wikimedia Foundation–Mediawiki – DiscussionTools Extension | Improper Neutralization of Special Elements used in an Expression Language Statement (‘Expression Language Injection’) vulnerability in The Wikimedia Foundation Mediawiki – DiscussionTools Extension allows Regular Expression Exponential Blowup. This issue affects Mediawiki – DiscussionTools Extension: 1.44, 1.43. | 2026-01-30 | not yet calculated | CVE-2025-11175 | https://phabricator.wikimedia.org/T396248 https://gerrit.wikimedia.org/r/q/I563219f3298a8740e158d130492bf3d2897784d7 https://phabricator.wikimedia.org/T364910 https://gerrit.wikimedia.org/r/q/I126203ab1d3ec8c1719cbb5460a887e4d0c2cc6d |
| tildearrow–furnace | Out-of-bounds Write, Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in tildearrow furnace (extern/zlib modules). This vulnerability is associated with program files inflate.C. | 2026-01-27 | not yet calculated | CVE-2026-24800 | https://github.com/tildearrow/furnace/pull/2471 |
| TOTOLINK–X6000R | Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability in TOTOLINK X6000R allows OS Command Injection. This issue affects X6000R: through V9.4.0cu.1498_B20250826. | 2026-01-30 | not yet calculated | CVE-2026-1723 | https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/247/ids/36.html https://github.com/PaloAltoNetworks/u42-vulnerability-disclosures/blob/main/2025/PANW-2026-0001/PANW-2026-0001.md |
| TP-Link Systems Inc.–Archer MR600 v5.0 | Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise. | 2026-01-26 | not yet calculated | CVE-2025-14756 | https://www.tp-link.com/jp/support/download/archer-mr600/#Firmware https://www.tp-link.com/en/support/download/archer-mr600/#Firmware https://www.tp-link.com/us/support/faq/4916/ https://jvn.jp/en/vu/JVNVU94651499/ https://jvn.jp/vu/JVNVU94651499/ |
| TP-Link Systems Inc.–Archer RE605X | The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability. | 2026-01-29 | not yet calculated | CVE-2025-15545 | https://www.tp-link.com/en/support/download/re605x/v3/#Firmware https://www.tp-link.com/us/support/download/re605x/v3/#Firmware https://www.tp-link.com/us/support/faq/4929/ https://nico-security.com/posts/cve-2025-15545 |
| TP-Link Systems Inc.–Omada Controller | An IDOR vulnerability exists in Omada Controllers that allows an attacker with Administrator permissions to manipulate requests and potentially hijack the Owner account. | 2026-01-26 | not yet calculated | CVE-2025-9520 | https://support.omadanetworks.com/us/document/115200/ https://support.omadanetworks.com/us/download/software/omada-controller/ |
| TP-Link Systems Inc.–Omada Controller | Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security. | 2026-01-26 | not yet calculated | CVE-2025-9521 | https://support.omadanetworks.com/us/document/115200/ https://support.omadanetworks.com/us/download/software/omada-controller/ |
| TP-Link Systems Inc.–Omada Controller | Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information. | 2026-01-26 | not yet calculated | CVE-2025-9522 | https://support.omadanetworks.com/us/document/115200/ https://https://support.omadanetworks.com/us/download/software/omada-controller/ |
| TP-Link Systems Inc.–Tapo C220 v1 | The Tapo C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation triggers a NULL pointer dereference, causing the main service process to crash. An unauthenticated attacker can repeatedly crash the service, causing temporary denial of service. The device restarts automatically, and repeated requests can keep it unavailable. | 2026-01-27 | not yet calculated | CVE-2026-0918 | https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ https://www.tp-link.com/en/support/download/tapo-c220/v1/ https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ https://www.tp-link.com/us/support/faq/4923/ |
| TP-Link Systems Inc.–Tapo C220 v1 | The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service. | 2026-01-27 | not yet calculated | CVE-2026-0919 | https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ https://www.tp-link.com/en/support/download/tapo-c220/v1/ https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ https://www.tp-link.com/us/support/faq/4923/ |
| TP-Link Systems Inc.–Tapo C220 v1 | By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation. | 2026-01-27 | not yet calculated | CVE-2026-1315 | https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ https://www.tp-link.com/en/support/download/tapo-c220/v1/ https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ https://www.tp-link.com/us/support/faq/4923/ |
| TP-Link Systems Inc.–VIGI C485 V1 | An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges. | 2026-01-29 | not yet calculated | CVE-2026-1457 | https://www.tp-link.com/en/support/download/vigi-c385/v1/#Firmware https://www.tp-link.com/kr/support/download/vigi-c385/v1/#Firmware https://www.tp-link.com/us/support/faq/4931/ |
| TP-Link Systems Inc.–VX800v v1.0 | A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent attacker to brute force the weak AES key and decrypt intercepted traffic. Successful exploitation requires network proximity but no authentication, and may result in high impact to confidentiality, integrity, and availability of transmitted data. | 2026-01-29 | not yet calculated | CVE-2025-13399 | https://www.tp-link.com/de/support/download/vx800v/#Firmware https://www.tp-link.com/us/support/faq/4930/ |
| TP-Link Systems Inc.–VX800v v1.0 | Improper link resolution in the VX800v v1.0 SFTP service allows authenticated adjacent attackers to use crafted symbolic links to access system files, resulting in high confidentiality impact and limited integrity risk. | 2026-01-29 | not yet calculated | CVE-2025-15541 | https://www.tp-link.com/de/support/download/vx800v/#Firmware https://www.tp-link.com/us/support/faq/4930/ |
| TP-Link Systems Inc.–VX800v v1.0 | Improper handling of exceptional conditions in VX800v v1.0 in SIP processing allows an attacker to flood the device with crafted INVITE messages, blocking all voice lines and causing a denial of service on incoming calls. | 2026-01-29 | not yet calculated | CVE-2025-15542 | https://www.tp-link.com/de/support/download/vx800v/#Firmware https://www.tp-link.com/us/support/faq/4930/ |
| TP-Link Systems Inc.–VX800v v1.0 | Improper link resolution in USB HTTP access path in VX800v v1.0 allows a crafted USB device to expose root filesystem contents, giving an attacker with physical access read only access to system files. | 2026-01-29 | not yet calculated | CVE-2025-15543 | https://www.tp-link.com/de/support/download/vx800v/#Firmware https://www.tp-link.com/us/support/faq/4930/ |
| TP-Link Systems Inc.–VX800v v1.0 | Some VX800v v1.0 web interface endpoints transmit sensitive information over unencrypted HTTP due to missing application layer encryption, allowing a network adjacent attacker to intercept this traffic and compromise its confidentiality. | 2026-01-29 | not yet calculated | CVE-2025-15548 | https://www.tp-link.com/de/support/download/vx800v/#Firmware https://www.tp-link.com/us/support/faq/4930/ |
| ttttupup–wxhelper | Out-of-bounds Write, Heap-based Buffer Overflow vulnerability in ttttupup wxhelper (src modules). This vulnerability is associated with program files mongoose.C. This issue affects wxhelper: through 3.9.10.19-v1. | 2026-01-27 | not yet calculated | CVE-2026-24822 | https://github.com/ttttupup/wxhelper/pull/515 |
| turanszkij–WickedEngine | Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulnerability is associated with program files ldebug.C. This issue affects WickedEngine: before 0.71.705. | 2026-01-27 | not yet calculated | CVE-2026-24820 | https://github.com/turanszkij/WickedEngine/pull/1054 |
| turanszkij–WickedEngine | Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulnerability is associated with program files lparser.C. This issue affects WickedEngine: through 0.71.727. | 2026-01-27 | not yet calculated | CVE-2026-24821 | https://github.com/turanszkij/WickedEngine/pull/1095 |
| umbraco–Umbraco.Forms.Issues | Umbraco Forms is a form builder that integrates with the Umbraco content management system. It’s possible for an authenticated backoffice-user to enumerate and traverse paths/files on the systems filesystem and read their contents, on Mac/Linux Umbraco installations using Forms. As Umbraco Cloud runs in a Windows environment, Cloud users aren’t affected. This issue affects versions 16 and 17 of Umbraco Forms and is patched in 16.4.1 and 17.1.1. If upgrading is not immediately possible, users can mitigate this vulnerability by configuring a WAF or reverse proxy to block requests containing path traversal sequences (`../`, `..`) in the `fileName` parameter of the export endpoint, restricting network access to the Umbraco backoffice to trusted IP ranges, and/or blocking the `/umbraco/forms/api/v1/export` endpoint entirely if the export feature is not required. However, upgrading to the patched version is strongly recommended. | 2026-01-29 | not yet calculated | CVE-2026-24687 | https://github.com/umbraco/Umbraco.Forms.Issues/security/advisories/GHSA-hm5p-82g6-m3xh |
| vendurehq–vendure | Vendure is an open-source headless commerce platform. Prior to version 3.5.3, the `NativeAuthenticationStrategy.authenticate()` method is vulnerable to a timing attack that allows attackers to enumerate valid usernames (email addresses). In `packages/core/src/config/auth/native-authentication-strategy.ts`, the authenticate method returns immediately if a user is not found. The significant timing difference (~200-400ms for bcrypt vs ~1-5ms for DB miss) allows attackers to reliably distinguish between existing and non-existing accounts. Version 3.5.3 fixes the issue. | 2026-01-30 | not yet calculated | CVE-2026-25050 | https://github.com/vendurehq/vendure/security/advisories/GHSA-6f65-4fv2-wwch https://github.com/vendurehq/vendure/releases/tag/v3.5.3 |
| visualfc–liteide | NULL Pointer Dereference vulnerability in visualfc liteide (liteidex/src/3rdparty/libvterm/src modules). This vulnerability is associated with program files screen.C, state.C, vterm.C. This issue affects liteide: before x38.4. | 2026-01-27 | not yet calculated | CVE-2026-24805 | https://github.com/visualfc/liteide/pull/1326 |
| WatchGuard–Fireware OS | An LDAP Injection vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to retrieve sensitive information from a connected LDAP authentication server through an exposed authentication or management web interface. This vulnerability may also allow a remote attacker to authenticate as an LDAP user with a partial identifier if they additionally have that user’s valid passphrase. This issue affects Fireware OS: from 12.0 through 12.11.6, from 12.5 through 12.5.15, from 2025.1 through 2026.0. | 2026-01-30 | not yet calculated | CVE-2026-1498 | https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00001 |
| Western Digital–WD Discovery | DLL hijacking in the WD Discovery Installer in Western Digital WD Discovery 5.2.730 on Windows allows a local attacker to execute arbitrary code via placement of a crafted dll in the installer’s search path. | 2026-01-26 | not yet calculated | CVE-2025-30248 | https://www.westerndigital.com/support/product-security/wdc-25008-wd-discovery-desktop-app-version-5-3 |
| WordPress–Custom Login Page Customizer | The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account | 2026-01-29 | not yet calculated | CVE-2025-14975 | https://wpscan.com/vulnerability/a1403186-51aa-4eae-a3fe-0c559570eb93/ |
| WordPress–Recipe Card Blocks Lite | The Recipe Card Blocks Lite WordPress plugin before 3.4.13 does not sanitize and escape a parameter before using it in a SQL statement, allowing contributors and above to perform SQL injection attacks. | 2026-01-26 | not yet calculated | CVE-2025-14973 | https://wpscan.com/vulnerability/76f7d5d4-ba45-4bfd-bda9-ab0769e81107/ |
| WordPress–User Activity Log | The User Activity Log WordPress plugin through 2.2 does not properly handle failed login attempts in some cases, allowing unauthenticated users to set arbitrary options to 1 (for example to enable User Registration when it has been turned off) | 2026-01-28 | not yet calculated | CVE-2025-13471 | https://wpscan.com/vulnerability/cc8743f5-b1b9-4f88-b440-db044034bbfc/ |
| Worklenz–Worklenz | Worklenz version 2.1.5 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Project Updates feature. An attacker can submit a malicious payload in the Updates text field which is then rendered in the reporting view without proper sanitization. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | 2026-01-26 | not yet calculated | CVE-2025-70368 | https://github.com/Worklenz/worklenz https://github.com/Stolichnayer/CVE-2025-70368 |
| Xen–Xen | Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing. | 2026-01-28 | not yet calculated | CVE-2025-58150 | https://xenbits.xenproject.org/xsa/advisory-477.html |
| Xen–Xen | In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen’s isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1’s training still in the BTB. | 2026-01-28 | not yet calculated | CVE-2026-23553 | https://xenbits.xenproject.org/xsa/advisory-479.html |
| yacy–yacy_search_server | Improper Neutralization of Input During Web Page Generation (XSS or ‘Cross-site Scripting’) vulnerability in yacy yacy_search_server (source/net/yacy/http/servlets modules). This vulnerability is associated with program files YaCyDefaultServlet.Java. This issue affects yacy_search_server. | 2026-01-27 | not yet calculated | CVE-2026-24824 | https://github.com/yacy/yacy_search_server/pull/722 |
| ydb-platform–ydb | Missing Release of Memory after Effective Lifetime vulnerability in ydb-platform ydb (contrib/libs/yajl modules). This vulnerability is associated with program files yail_tree.C. This issue affects ydb: through 24.4.4.2. | 2026-01-27 | not yet calculated | CVE-2026-24825 | https://github.com/ydb-platform/ydb/pull/17570 |
| zhblue–hustoj | HUSTOF is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. Prior to version 26.01.24, the problem_import_qduoj.php and problem_import_hoj.php modules fail to properly sanitize filenames within uploaded ZIP archives. Attackers can craft a malicious ZIP file containing files with path traversal sequences (e.g., ../../shell.php). When extracted by the server, this allows writing files to arbitrary locations in the web root, leading to Remote Code Execution (RCE). Version 26.01.24 contains a fix for the issue. | 2026-01-27 | not yet calculated | CVE-2026-24479 | https://github.com/zhblue/hustoj/security/advisories/GHSA-xmgg-2rw4-7fxj https://github.com/zhblue/hustoj/commit/902bd09e6d0011fe89cd84d4236899314b33101f |
