163 CVEs tracked today. 28 Critical, 60 High, 57 Medium, 11 Low.
-
CVE-2026-25939
CRITICAL
CVSS 9.1
FUXA SCADA has an eleventh critical vulnerability — missing authorization from versions 1.2.8 onward.
Scada
Fuxa
-
CVE-2026-25938
CRITICAL
CVSS 9.8
FUXA SCADA has an authentication spoofing vulnerability from versions 1.2.8 through 1.2.10 — tenth critical vulnerability.
Scada
Authentication Bypass
Fuxa
-
CVE-2026-25923
CRITICAL
CVSS 9.1
my little forum PHP forum software has an unrestricted file upload allowing authenticated users to upload dangerous file types.
PHP
Deserialization
File Upload
My Little Forum
-
CVE-2026-25895
CRITICAL
CVSS 9.8
FUXA SCADA has a path traversal vulnerability — ninth critical vulnerability enabling arbitrary file access on SCADA servers.
Scada
Path Traversal
Fuxa
-
CVE-2026-25894
CRITICAL
CVSS 9.8
FUXA SCADA has insecure default configuration with a known JWT secret — eighth critical vulnerability.
Scada
Fuxa
-
CVE-2026-25893
CRITICAL
CVSS 9.8
FUXA SCADA has yet another authorization bypass — now the seventh critical FUXA vulnerability discovered, enabling unauthenticated access to industrial controls.
Scada
Authentication Bypass
Fuxa
-
CVE-2026-25881
CRITICAL
CVSS 9.0
SandboxJS prior to 0.8.31 has yet another sandbox escape via prototype pollution, the sixth distinct escape technique discovered.
RCE
Sandboxjs
-
CVE-2026-25876
CRITICAL
CVSS 9.1
PlaciPy has another missing authorization vulnerability — fourth of seven critical security flaws.
Authentication Bypass
Placipy
-
CVE-2026-25875
CRITICAL
CVSS 9.8
PlaciPy has an incorrect authorization allowing privilege escalation — seventh and final critical vulnerability.
Authentication Bypass
Placipy
-
CVE-2026-25848
CRITICAL
CVSS 9.1
JetBrains Hub before 2025.3.119807 has an authentication bypass allowing administrative actions without proper credentials.
Authentication Bypass
Hub
-
CVE-2026-25814
CRITICAL
CVSS 9.8
PlaciPy has an injection vulnerability allowing user input to be processed as commands — sixth critical flaw.
Information Disclosure
Placipy
-
CVE-2026-25811
CRITICAL
CVSS 9.1
PlaciPy has an incorrect authorization vulnerability — fifth of seven critical flaws.
Authentication Bypass
Placipy
-
CVE-2026-25810
CRITICAL
CVSS 9.1
PlaciPy has a missing authorization vulnerability — third of seven critical security flaws.
Authentication Bypass
Placipy
-
CVE-2026-25809
CRITICAL
CVSS 9.8
PlaciPy placement system 1.0.0 has an improper authorization vulnerability enabling unauthenticated admin access — second of seven critical PlaciPy vulnerabilities.
Authentication Bypass
Placipy
-
CVE-2026-25057
CRITICAL
CVSS 9.1
MarkUs grading platform prior to 2.9.1 has a path traversal enabling students to access other students' submissions or grading data.
Path Traversal
Markus
-
CVE-2026-24679
CRITICAL
CVSS 9.1
FreeRDP prior to 3.22.0 has a heap buffer overflow in the URBDRC USB redirection client enabling RCE through malicious RDP servers.
Buffer Overflow
Freerdp
Redhat
Suse
-
CVE-2026-24677
CRITICAL
CVSS 9.1
FreeRDP prior to 3.22.0 has a use-after-free in ecam_encoder_compress allowing malicious RDP servers to crash or execute code on clients.
Use After Free
Buffer Overflow
Freerdp
Redhat
Suse
-
CVE-2026-22906
CRITICAL
CVSS 9.8
A device stores user credentials using AES-ECB encryption with a hard-coded key, allowing any attacker to decrypt all stored passwords.
Authentication Bypass
-
CVE-2026-22904
CRITICAL
CVSS 9.8
A device has a stack-based buffer overflow in cookie parsing (including TRACKID) enabling unauthenticated remote code execution.
RCE
Buffer Overflow
-
CVE-2026-22903
CRITICAL
CVSS 9.8
A device has a stack-based buffer overflow in HTTP SESSION cookie processing allowing unauthenticated remote code execution.
RCE
Buffer Overflow
Denial Of Service
-
CVE-2026-2234
CRITICAL
CVSS 9.1
HGiga C&Cm@il email system has a missing authentication vulnerability allowing unauthenticated remote access to email server functions.
Authentication Bypass
-
CVE-2026-1868
CRITICAL
CVSS 9.9
GitLab AI Gateway's Duo Workflow Service has a CVSS 9.9 server-side template injection enabling code execution through the AI workflow system.
Gitlab
Denial Of Service
AI / ML
-
CVE-2026-1615
CRITICAL
CVSS 9.2
jsonpath library before 1.2.0 has an arbitrary code injection vulnerability via unsafe use of eval-like constructs in JSONPath expressions.
Node.js
RCE
XSS
Code Injection
Redhat
-
CVE-2025-66630
CRITICAL
CVSS 9.4
Go Fiber web framework before 2.52.11 has a weak PRNG vulnerability (on Go < 1.24) that makes session tokens predictable, enabling session hijacking.
Golang
CSRF
Fiber
Redhat
Suse
-
CVE-2025-66606
CRITICAL
CVSS 9.6
Yokogawa FAST/TOOLS has a third vulnerability involving improper encoding of output that could enable injection attacks against the SCADA web interface.
Information Disclosure
-
CVE-2025-66603
CRITICAL
CVSS 9.8
Yokogawa FAST/TOOLS has a second web server vulnerability involving improper cryptographic handling that weakens the security of SCADA communications.
Information Disclosure
-
CVE-2025-66602
CRITICAL
CVSS 9.8
Yokogawa FAST/TOOLS SCADA has a vulnerability in its web server component enabling unauthorized access to the industrial control monitoring system.
Information Disclosure
-
CVE-2025-6830
CRITICAL
CVSS 9.8
An SQL injection vulnerability in a product allows unauthenticated database compromise through unsanitized input.
SQLi
-
CVE-2026-25961
HIGH
CVSS 7.5
SumatraPDF versions 3.5.0 through 3.5.2 fail to validate TLS certificates during software updates and execute installers without signature verification, allowing network attackers to perform man-in-the-middle attacks and inject malicious code. An attacker with any valid TLS certificate can intercept update requests and redirect users to a malicious installer, achieving arbitrary code execution on Windows systems. Public exploit code exists for this vulnerability and no patch is currently available.
Windows
Tls
Sumatrapdf
-
CVE-2026-25958
HIGH
CVSS 7.7
Privilege escalation in Cube.js versions 0.27.19 through 1.5.12 allows authenticated attackers to craft specially designed API requests that bypass access controls and gain elevated privileges within the application. This vulnerability affects Cube.js semantic layer deployments and requires only a valid API token to exploit, making it a risk to multi-tenant or role-based access control implementations. No patch is currently available for this HIGH severity issue.
Privilege Escalation
Cube.Js
-
CVE-2026-25951
HIGH
CVSS 7.2
Remote code execution in FUXA prior to 1.2.11 allows authenticated administrators to bypass path traversal protections using nested directory sequences, enabling arbitrary file writes to the server filesystem. An attacker with admin privileges can inject malicious scripts into runtime directories that execute when the server reloads, achieving complete system compromise. Update to version 1.2.11 or later to remediate.
Scada
RCE
Path Traversal
Fuxa
-
CVE-2026-25931
HIGH
CVSS 7.8
Arbitrary code execution in vscode-spell-checker prior to v4.5.4 allows attackers to execute malicious Node.js code by placing a crafted .cspell.config.js file in an untrusted workspace, since the extension fails to validate VS Code's workspace-trust state before loading configuration files. An attacker can exploit this by tricking users into opening a malicious workspace, resulting in code execution with the privileges of the extension host process.
Node.js
-
CVE-2026-25925
HIGH
CVSS 7.8
PowerDocu versions prior to 2.4.0 allow arbitrary .NET object instantiation and code execution through unsafe deserialization of the $type property in JSON files within Flow or App packages. A local attacker with user interaction can exploit this vulnerability to achieve full system compromise. Public exploit code exists for this vulnerability, and no patch is currently available for affected versions.
Windows
Dotnet
Powerdocu
-
CVE-2026-25892
HIGH
CVSS 7.5
Adminer versions 5.4.1 and earlier suffer from a post-message validation bypass that allows remote attackers to trigger denial of service affecting all users. By sending a crafted POST request with array parameters to the version endpoint, an attacker can cause openssl_verify() to receive malformed input, resulting in a TypeError that crashes the application and returns HTTP 500 errors. Public exploit code exists for this vulnerability; administrators should upgrade to version 5.4.2 immediately.
PHP
OpenSSL
Adminer
Suse
-
CVE-2026-25890
HIGH
CVSS 8.1
Path normalization bypass in Filebrowser prior to 2.57.1 allows authenticated users to circumvent file access restrictions by injecting multiple slashes into request URLs, enabling unauthorized access to files designated as restricted. The vulnerability exploits a mismatch between the authorization validation logic and filesystem path resolution, affecting users running vulnerable versions. Public exploit code exists for this high-severity issue.
Authentication Bypass
Filebrowser
Suse
-
CVE-2026-25885
HIGH
CVSS 7.5
Unauthenticated message injection in PolarLearn 0-PRERELEASE-16 and earlier allows remote attackers to send persistent messages to arbitrary group chats via the WebSocket API without credentials. Public exploit code exists for this vulnerability, which affects all users of vulnerable versions by enabling spam and potential information manipulation within group communications.
Authentication Bypass
Polarlearn
-
CVE-2026-25880
HIGH
CVSS 7.8
SumatraPDF 3.5.2 and earlier on Windows allows arbitrary code execution when a user opens a PDF and selects "Show in folder," as the application executes a malicious explorer.exe binary from the same directory without warning. Public exploit code exists for this vulnerability, which affects any user who opens untrusted PDFs and interacts with the file menu option. An attacker can achieve code execution with the privileges of the victim's user account through a simple social engineering attack.
Windows
Sumatrapdf
-
CVE-2026-25847
HIGH
CVSS 8.2
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible [CVSS 8.2 HIGH]
XSS
Pycharm
-
CVE-2026-25813
HIGH
CVSS 7.5
Placipy versions up to 1.0.0 is affected by insertion of sensitive information into log file (CVSS 7.5).
Information Disclosure
Placipy
-
CVE-2026-25812
HIGH
CVSS 8.8
Placipy 1.0.0 fails to implement CSRF protections while permitting credentialed cross-origin requests, allowing unauthenticated attackers to perform unauthorized actions on behalf of logged-in users through malicious websites. An attacker can exploit this vulnerability to modify placement records, access sensitive educational data, or compromise institutional operations without user knowledge. No patch is currently available.
CSRF
Placipy
-
CVE-2026-25808
HIGH
CVSS 7.5
Hollo versions prior to 0.6.20 and 0.7.2 improperly expose direct messages and followers-only posts through the ActivityPub outbox endpoint, allowing unauthenticated remote attackers to access sensitive user communications. Public exploit code exists for this authorization bypass vulnerability, enabling attackers to enumerate and retrieve private content intended for restricted audiences. Patched versions 0.6.20 and 0.7.2 are available to remediate the exposure.
Authentication Bypass
Hollo
-
CVE-2026-25807
HIGH
CVSS 8.8
Unauthenticated remote code execution in Zai Shell prior to 9.0.3 via the unprotected P2P terminal sharing feature on port 5757, where attackers can inject arbitrary system commands that execute with user privileges if approved. Public exploit code exists for this vulnerability, and affected systems running --no-ai mode completely bypass safety checks during command execution. Update to version 9.0.3 to remediate.
RCE
Code Injection
Zai Shell
-
CVE-2026-25791
HIGH
CVSS 7.5
Memory exhaustion in Sliver C2 framework prior to version 1.7.0 allows unauthenticated remote attackers to bypass OTP validation in the DNS listener and create unbounded server-side sessions without expiry mechanisms. Public exploit code exists for this vulnerability, enabling attackers to repeatedly allocate sessions and exhaust server memory resources. The DNS C2 listener accepts bootstrap messages without proper authentication even when OTP enforcement is enabled.
Dns
Wireguard
Sliver
Suse
-
CVE-2026-25761
HIGH
CVSS 8.8
Command injection in GitHub Super-linter versions 6.0.0 through 8.3.0 allows attackers to execute arbitrary commands in workflow runner contexts by submitting pull requests with maliciously crafted filenames containing shell command substitution syntax. An attacker exploiting this vulnerability can access sensitive workflow credentials, including GITHUB_TOKEN, depending on permission configurations. The vulnerability affects Super-linter when used as a GitHub Action and has no available patch at this time.
Github
Command Injection
Super Linter
-
CVE-2026-25639
HIGH
CVSS 7.5
Axios versions up to 0.30.3 is affected by improper check for unusual or exceptional conditions (CVSS 7.5).
Node.js
Denial Of Service
Axios
Redhat
-
CVE-2026-25498
HIGH
CVSS 7.2
Craft is a platform for creating digital experiences. [CVSS 7.2 HIGH]
PHP
RCE
Craft Cms
-
CVE-2026-25497
HIGH
CVSS 8.8
Craft CMS versions 4.0.0-RC1 to 4.17.0 and 5.0 to 5.9.0 contain a privilege escalation vulnerability in the GraphQL API that allows authenticated users with write access to one asset volume to modify or transfer assets across any other volume, including restricted ones they should not access. The vulnerability stems from insufficient authorization validation in the saveAsset mutation, which verifies permissions against the intended volume but fails to confirm the target asset actually belongs to that volume. An attacker with limited asset write permissions can exploit this to gain unauthorized access to and manipulate sensitive assets in protected volumes.
Privilege Escalation
Craft Cms
-
CVE-2026-25495
HIGH
CVSS 8.8
SQL injection in Craft CMS 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21 allows authenticated Control Panel users to execute arbitrary SQL queries via the criteria[orderBy] parameter in the element-indexes/get-elements endpoint. The vulnerability stems from insufficient input sanitization in the ORDER BY clause, enabling attackers to manipulate database queries. Public exploit code exists for this high-severity vulnerability, and patches are available in versions 4.16.18 and 5.8.22.
SQLi
Craft Cms
-
CVE-2026-25478
HIGH
CVSS 7.4
Litestar ASGI framework versions before 2.20.0 fail to properly escape regex metacharacters in CORS origin validation, allowing attackers to bypass origin restrictions through crafted malicious origins. This configuration flaw affects cross-origin request filtering and enables unauthorized cross-origin access. Public exploit code exists for this vulnerability.
Information Disclosure
Litestar
-
CVE-2026-25231
HIGH
CVSS 7.5
Unauthenticated directory traversal in FileRise prior to version 3.3.0 allows remote attackers to read arbitrary files from the /uploads directory without authentication by directly accessing guessable file paths. Public exploit code exists for this vulnerability, enabling attackers to expose sensitive data and breach user privacy. No patch is currently available.
Authentication Bypass
Information Disclosure
Filerise
-
CVE-2026-24684
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a use-after-free vulnerability in the audio playback subsystem where the RDPSND async thread processes queued audio packets after the channel has been closed and its internal state freed, causing a denial of service. The vulnerability affects systems running vulnerable FreeRDP versions and can be exploited remotely without authentication or user interaction. A patch is available in FreeRDP 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24683
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a use-after-free vulnerability in the input event handling mechanism where unsynchronized access to cached channel callbacks can be freed or reinitialized by concurrent channel closure operations. An attacker with network access can trigger a denial of service condition by exploiting this race condition. A patch is available in version 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24682
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a buffer management error in audio format parsing that causes out-of-bounds memory access when processing malformed audio data. An attacker can exploit this vulnerability over the network without authentication to trigger a denial of service condition. A patch is available in FreeRDP 3.22.0 and later.
Buffer Overflow
Freerdp
Redhat
Suse
-
CVE-2026-24681
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a use-after-free vulnerability in the URBDRC channel handler where asynchronous bulk transfer completions reference freed memory after channel closure, enabling denial of service attacks. An unauthenticated remote attacker can trigger this condition through malformed RDP protocol messages to crash the FreeRDP service. A patch is available in version 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24680
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a use-after-free vulnerability in pointer handling where sdl_Pointer_New and sdl_Pointer_Free both attempt to free the same memory, causing a denial of service condition. An attacker with network access can trigger this memory corruption to crash RDP client instances without authentication. The vulnerability affects all users of vulnerable FreeRDP versions and is resolved in version 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24678
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 are vulnerable to a use-after-free condition in the ecam_channel_write function when a capture thread attempts to write samples through a freed device channel callback. An unauthenticated remote attacker can exploit this vulnerability to cause a denial of service by crashing the affected system. A patch is available in version 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24676
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a use-after-free vulnerability in audio format renegotiation that allows unauthenticated attackers to cause denial of service by triggering a crash through audio processing. The vulnerability occurs when the AUDIN format list is freed during renegotiation while the capture thread continues accessing the freed memory, affecting any system running vulnerable FreeRDP instances. A patch is available in version 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24675
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 contain a use-after-free vulnerability in the libusb device interface selection code where error handling prematurely frees configuration data that subsequent code attempts to access, causing denial of service. This vulnerability affects systems using FreeRDP for remote desktop protocol operations and can be triggered remotely without authentication or user interaction. A patch is available in version 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-24491
HIGH
CVSS 7.5
FreeRDP versions prior to 3.22.0 are vulnerable to a use-after-free condition where the video_timer component sends notifications after the control channel closes, dereferencing freed memory and causing denial of service. An unauthenticated remote attacker can trigger this crash by manipulating RDP session timing, making the vulnerability exploitable with no user interaction required. A patch is available in FreeRDP 3.22.0 and later.
Use After Free
Freerdp
Redhat
Suse
-
CVE-2026-23948
HIGH
CVSS 7.5
FreeRDP proxy versions prior to 3.22.0 are vulnerable to denial of service when processing specially crafted RDP server responses that trigger a null pointer dereference in the logon information handler. An unauthenticated attacker controlling a malicious RDP server can crash the FreeRDP proxy by sending a LogonInfoV2 PDU with empty domain or username fields. This vulnerability has been patched in version 3.22.0 and later.
Null Pointer Dereference
Denial Of Service
Freerdp
Redhat
Suse
-
CVE-2026-22905
HIGH
CVSS 7.5
Insufficient URI validation in CGI endpoints permits unauthenticated attackers to bypass authentication controls through path traversal techniques, enabling direct access to protected administrative functions and configuration files. An attacker can exploit this remotely without credentials to retrieve sensitive data and potentially modify system settings. No patch is currently available for this vulnerability.
Authentication Bypass
Path Traversal
-
CVE-2026-2236
HIGH
CVSS 7.5
Unauthenticated attackers can exploit SQL injection in C&Cm@il by HGiga to execute arbitrary database queries and extract sensitive information without authentication or user interaction. The vulnerability has a high severity rating with a CVSS score of 7.5 and impacts database confidentiality. No patch is currently available for this issue.
SQLi
-
CVE-2026-2225
HIGH
CVSS 7.3
SQL injection in the News Portal Project 1.0 administrator login interface allows unauthenticated remote attackers to manipulate the email parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker could exploit this to extract sensitive data, modify database contents, or potentially escalate privileges within the application.
PHP
SQLi
News Portal Project
-
CVE-2026-2223
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 via the ID parameter in the assessment module allows unauthenticated remote attackers to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2221
HIGH
CVSS 7.3
SQL injection in the login component of code-projects Online Reviewer System 1.0 allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, which affects PHP-based installations of the Online Reviewer System. An attacker can exploit this to extract sensitive data, modify database contents, or potentially gain unauthorized system access.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2220
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 via the difficulty_id parameter in /system/system/admins/assessments/pretest/btn_functions.php allows unauthenticated remote attackers to manipulate database queries and potentially extract sensitive data or modify database contents. Public exploit code exists for this vulnerability, and no patch is currently available.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2217
HIGH
CVSS 7.3
SQL injection in itsourcecode Event Management System 1.0 via the ID parameter in /admin/manage_user.php allows unauthenticated remote attackers to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available, putting all affected installations at immediate risk.
PHP
SQLi
Event Management System
-
CVE-2026-2212
HIGH
CVSS 7.3
SQL injection in code-projects Online Music Site 1.0 allows unauthenticated remote attackers to manipulate the ID parameter in AdminEditCategory.php, enabling unauthorized database access and modification. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations at immediate risk.
PHP
SQLi
Online Music Site
-
CVE-2026-2211
HIGH
CVSS 7.3
Online Music Site versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).
PHP
SQLi
Online Music Site
-
CVE-2026-2210
HIGH
CVSS 7.2
D-Link DIR-823X firmware versions up to 250416 contain an OS command injection vulnerability in the /goform/set_filtering function that allows remote attackers with high privileges to execute arbitrary commands with full system access. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires network access and administrative credentials but carries high confidentiality, integrity, and availability impact.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2203
HIGH
CVSS 8.8
Buffer overflow in Tenda AC8 firmware version 16.03.33.05 allows authenticated remote attackers to execute arbitrary code via the timeZone parameter in the /goform/fast_setting_wifi_set endpoint. Public exploit code exists for this vulnerability, and no patch is currently available. The high CVSS score of 8.8 reflects the ability to achieve complete system compromise through network access.
Buffer Overflow
Ac8 Firmware
-
CVE-2026-2202
HIGH
CVSS 8.8
Remote code execution in Tenda AC8 firmware 16.03.33.05 allows authenticated attackers to achieve full system compromise through a buffer overflow in the WiFi guest settings function. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires network access but minimal user interaction, making it a significant risk for exposed devices.
Buffer Overflow
Ac8 Firmware
-
CVE-2026-2199
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 allows unauthenticated remote attackers to manipulate the ID parameter in the user deletion function, potentially leading to unauthorized database access and modification. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations vulnerable to active exploitation.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2198
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 via the difficulty_id parameter in /system/system/admins/assessments/pretest/loaddata.php allows remote attackers to execute arbitrary SQL queries without authentication. Public exploit code exists for this vulnerability, and no patch is currently available. Successful exploitation could result in unauthorized data access, modification, or deletion within the application database.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2197
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 allows remote attackers to manipulate the test_id parameter in the exam-delete.php file, enabling unauthorized database access and modification without authentication. The vulnerability has public exploit code available and currently lacks a patch, posing an immediate risk to unpatched installations. Affected organizations using this system should prioritize mitigation strategies while awaiting official remediation.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2196
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 allows unauthenticated remote attackers to manipulate the test_id parameter in the exam-update.php endpoint, enabling unauthorized database access and modification. Public exploit code exists for this vulnerability, and no patch is currently available.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2195
HIGH
CVSS 7.3
SQL injection in code-projects Online Reviewer System 1.0 via the ID parameter in the questions-view.php file allows unauthenticated remote attackers to execute arbitrary SQL queries and potentially access or modify database contents. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations at active risk.
PHP
SQLi
Online Reviewer System
-
CVE-2026-1529
HIGH
CVSS 8.1
Keycloak's invitation token validation fails to cryptographically verify JWT payload modifications, allowing authenticated attackers to alter organization IDs and email addresses to register into unauthorized organizations. This enables unauthorized access to organizations without proper authentication, affecting any Keycloak deployment using the invitation feature. No patch is currently available.
Authentication Bypass
Redhat
-
CVE-2026-1486
HIGH
CVSS 8.8
Keycloak's JWT authorization grant flow fails to verify that an Identity Provider is enabled before accepting tokens signed by its key, allowing attackers with a disabled IdP's signing credentials to obtain valid access tokens. This authentication bypass affects organizations that have disabled IdPs due to compromise or offboarding but retain the associated signing keys. An attacker can exploit this to gain unauthorized access to systems relying on Keycloak for authentication.
Denial Of Service
Redhat
-
CVE-2026-0870
HIGH
CVSS 7.8
GIGABYTE MacroHub improperly executes external applications with elevated privileges, enabling authenticated local users to achieve arbitrary code execution with SYSTEM-level access. This local privilege escalation affects MacroHub users on Windows systems and could allow attackers to fully compromise affected machines. No patch is currently available.
Privilege Escalation
-
CVE-2025-66608
HIGH
CVSS 7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not
properly validate URLs. [CVSS 7.5 HIGH]
Information Disclosure
-
CVE-2025-66598
HIGH
CVSS 7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports
old SSL/TLS versions, potentially allowing an attacker to decrypt
communications with the web server. [CVSS 7.5 HIGH]
Information Disclosure
-
CVE-2025-66597
HIGH
CVSS 7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports
weak cryptographic algorithms, potentially allowing an attacker to decrypt
communications with the web server. [CVSS 7.5 HIGH]
Information Disclosure
-
CVE-2025-59023
HIGH
CVSS 8.2
Crafted delegations or IP fragments can poison cached delegations in Recursor. [CVSS 8.2 HIGH]
Information Disclosure
Suse
-
CVE-2025-15319
HIGH
CVSS 7.8
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools. [CVSS 7.8 HIGH]
Privilege Escalation
Patch Endpoint Tools
-
CVE-2025-10465
HIGH
CVSS 8.8
Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway is affected by unrestricted upload of file with dangerous type (CVSS 8.8).
File Upload
-
CVE-2025-10463
HIGH
CVSS 7.3
Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by improper authentication (CVSS 7.3).
Authentication Bypass
-
CVE-2025-7799
HIGH
CVSS 8.6
Zirve Information Technologies Inc. E-Taxpayer Accounting Website is affected by cross-site scripting (xss) (CVSS 8.6).
XSS
-
CVE-2026-25957
MEDIUM
CVSS 6.5
Cube.js versions 1.1.17 through 1.5.12 and 1.4.x before 1.4.2 are vulnerable to denial of service attacks where an authenticated attacker can craft a malicious request to completely disable the Cube API. This network-accessible vulnerability requires valid credentials but no user interaction, making it exploitable by any authenticated user with API access. No patch is currently available for affected versions.
Information Disclosure
Cube.Js
-
CVE-2026-25934
MEDIUM
CVSS 4.3
Corrupted Git pack and index files are not properly validated in go-git versions before 5.16.5, allowing an attacker to supply malicious packfiles that bypass integrity checks and cause go-git to consume corrupted data. This can result in unexpected application errors and denial of service conditions for any system using the vulnerable go-git library to fetch or process Git repositories. The vulnerability requires user interaction to fetch from a malicious or compromised Git source.
Information Disclosure
Go Git
Redhat
Suse
-
CVE-2026-25920
MEDIUM
CVSS 5.5
SumatraPDF versions 3.5.2 and earlier are vulnerable to a heap buffer over-read in the MOBI file parser due to incomplete bounds validation in the HuffDic decompressor, allowing attackers to crash the application by opening a malicious .mobi file. Public exploit code exists for this vulnerability. Local user interaction is required to trigger the vulnerability, and while denial of service is the primary impact, the out-of-bounds read could potentially leak sensitive memory contents.
Windows
Denial Of Service
Sumatrapdf
-
CVE-2026-25918
MEDIUM
CVSS 5.5
Unity-Cli versions up to 1.8.2 is affected by insertion of sensitive information into log file (CVSS 5.5).
Information Disclosure
Unity Cli
-
CVE-2026-25916
MEDIUM
CVSS 4.3
Roundcube Webmail versions before 1.5.13 and 1.6.x before 1.6.13 fail to block SVG feImage elements when the "Block remote images" security feature is enabled, allowing attackers to bypass the protection and load remote content. This remote image bypass could enable tracking, information disclosure, or facilitate phishing attacks against users who rely on this feature to prevent remote content loading. No patch is currently available for this medium-severity vulnerability.
Information Disclosure
Suse
-
CVE-2026-25905
MEDIUM
CVSS 5.8
Python code execution through Pyodide in the mcp-run-python library lacks isolation from the JavaScript environment, enabling attackers to manipulate the JS runtime and hijack MCP server functionality. This allows adversaries to perform malicious operations including tool shadowing and potential server compromise through crafted Python payloads. No patch is available as the project is archived.
Python
AI / ML
-
CVE-2026-25904
MEDIUM
CVSS 5.8
Pydantic-AI's MCP Run Python tool uses an insufficiently restrictive Deno sandbox configuration that permits Python code to access the host's localhost interface, enabling Server-Side Request Forgery (SSRF) attacks. An attacker can exploit this to probe or interact with services running on the local machine that should be isolated from external access. The archived project status means no patch is expected to be released.
Python
SSRF
AI / ML
-
CVE-2026-25889
MEDIUM
CVSS 5.4
Filebrowser versions prior to 2.57.1 allow authenticated users to reset passwords without verifying the current password due to case-sensitive validation logic that can be bypassed using mixed-case field names in API requests. An attacker with a valid JWT token obtained through XSS, session hijacking, or similar means could exploit this to perform account takeover. Public exploit code exists for this vulnerability, and a patch is available.
XSS
Filebrowser
Suse
-
CVE-2026-25878
MEDIUM
CVSS 5.3
Froshadminer versions up to 2.2.1 is affected by missing authentication for critical function (CVSS 5.3).
Authentication Bypass
Froshadminer
-
CVE-2026-25846
MEDIUM
CVSS 6.5
Youtrack versions up to 2025.3.119033 is affected by insertion of sensitive information into log file (CVSS 6.5).
Information Disclosure
Youtrack
-
CVE-2026-25806
MEDIUM
CVSS 6.5
PlaciPy is a placement management system designed for educational institutions. [CVSS 6.5 MEDIUM]
Authentication Bypass
Placipy
-
CVE-2026-25765
MEDIUM
CVSS 5.8
Faraday HTTP client library versions before 2.14.1 fail to properly validate protocol-relative URLs when merging user-supplied paths with base URLs, allowing attackers to redirect requests to arbitrary hosts via SSRF attacks. Applications that pass untrusted input to Faraday request methods like get() or post() are vulnerable to request hijacking. A patch is available in version 2.14.1 and later.
Ruby
SSRF
Faraday
Redhat
Suse
-
CVE-2026-25598
MEDIUM
CVSS 5.3
Harden-Runner versions prior to 2.14.2 fail to log outbound network connections made through sendto, sendmsg, and sendmmsg socket calls when audit mode is enabled, allowing attackers to exfiltrate data from GitHub Actions runners without detection. This integrity bypass affects users relying on Harden-Runner's egress policy auditing for security monitoring. A patch is available in version 2.14.2 and later.
Github
Harden Runner
Redhat
-
CVE-2026-25528
MEDIUM
CVSS 5.8
LangSmith Client SDKs for Python and AI/ML platforms are susceptible to server-side request forgery through malicious HTTP baggage headers that allow attackers to redirect trace data exfiltration to attacker-controlled endpoints. An unauthenticated attacker can inject arbitrary api_url values during distributed tracing operations, causing the SDK to send sensitive trace data outside the intended infrastructure. No patch is currently available for this medium-severity vulnerability.
Python
SSRF
AI / ML
-
CVE-2026-25496
MEDIUM
CVSS 4.8
Stored XSS in Craft CMS Number field settings (versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21) allows authenticated users with high privileges to inject malicious scripts via the Prefix or Suffix fields, which execute when the field is viewed on user profiles. Public exploit code exists for this vulnerability. Updates to versions 4.16.18 and 5.8.22 are available to remediate the issue.
XSS
Craft Cms
-
CVE-2026-25494
MEDIUM
CVSS 6.5
Craft is a platform for creating digital experiences. In Craft versions 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21, the saveAsset GraphQL mutation uses filter_var(..., FILTER_VALIDATE_IP) to block a specific list of IP addresses. [CVSS 6.5 MEDIUM]
SSRF
Craft Cms
-
CVE-2026-25493
MEDIUM
CVSS 6.5
SSRF bypass in Craft CMS 4.0.0-RC1 through 4.16.17 and 5.0.0-RC1 through 5.8.21 allows unauthenticated attackers to access cloud metadata endpoints and internal IP addresses through the saveAsset GraphQL mutation by exploiting Guzzle's automatic redirect handling. The vulnerability bypasses hostname and IP blocklist protections that validate only the initial request URL, enabling attackers to reach sensitive internal resources. Public exploit code exists; patched versions 4.16.18 and 5.8.22 are available.
SSRF
Craft Cms
-
CVE-2026-25492
MEDIUM
CVSS 6.5
Craft CMS versions 3.5.0-4.16.17 and 5.0.0-RC1-5.8.21 contain a server-side request forgery vulnerability in the save_images_Asset GraphQL mutation that allows authenticated users to bypass hostname validation and retrieve internal URLs by specifying domains resolving to private IP addresses. By uploading files with non-image extensions like .txt, attackers can bypass downstream validation to access sensitive data including AWS instance metadata credentials from the host system. Public exploit code exists for this vulnerability, though patches are available in versions 4.16.18 and 5.8.22.
Aws
Craft Cms
-
CVE-2026-25491
MEDIUM
CVSS 4.8
Stored cross-site scripting in Craft CMS versions 5.0.0-RC1 through 5.8.21 allows authenticated users with high privileges to inject malicious scripts through Entry Type names that are not sanitized when displayed in the Entry Types list. An attacker exploiting this vulnerability can execute arbitrary JavaScript in the browsers of other users viewing the affected list, potentially compromising session data or performing unauthorized actions. Public exploit code exists for this vulnerability, though a patch is available in version 5.8.22 and later.
XSS
Craft Cms
-
CVE-2026-25480
MEDIUM
CVSS 6.5
Cache poisoning in Litestar before 2.20.0 allows unauthenticated remote attackers to exploit improper Unicode normalization in the FileStore cache backend to create collisions between cache keys, enabling one URL to serve another URL's cached responses. Public exploit code exists for this vulnerability. An attacker can leverage this to serve malicious cached content to users accessing legitimate endpoints.
Information Disclosure
Litestar
-
CVE-2026-25479
MEDIUM
CVSS 6.5
Litestar versions before 2.20.0 improperly escape regex metacharacters in the allowed_hosts middleware, allowing attackers to bypass hostname validation by supplying hosts that match the compiled regex pattern but differ from intended literal hostnames. Public exploit code exists for this vulnerability. The flaw affects the ASGI framework's ability to properly restrict incoming requests to authorized hosts.
Authentication Bypass
Litestar
-
CVE-2026-25230
MEDIUM
CVSS 4.6
FileRise versions before 3.3.0 contain an HTML injection vulnerability that allows authenticated users to manipulate the DOM and inject malicious form or link elements to redirect users or trigger unauthorized actions. Public exploit code exists for this medium-severity flaw, and no patch is currently available. The vulnerability requires user interaction and valid credentials to exploit, limiting its immediate impact but creating risk for organizations running affected FileRise instances.
XSS
Filerise
-
CVE-2026-24900
MEDIUM
CVSS 6.5
Markus versions up to 2.9.1 is affected by authorization bypass through user-controlled key (CVSS 6.5).
Authentication Bypass
Markus
-
CVE-2026-24777
MEDIUM
CVSS 6.7
Insufficient permission validation in OpenProject prior to 17.0.2 allows users with the Manage Users permission to lock and unlock application administrators, a capability that should be restricted to administrators only. An authenticated attacker with user management privileges can exploit this to lock out admin accounts and potentially disrupt system administration capabilities. No patch is currently available for affected versions.
Authentication Bypass
Openproject
-
CVE-2026-24466
MEDIUM
CVSS 6.7
Windows services registered by Oki Electric Industry, Ricoh, and Murata Machinery products use unquoted file paths, allowing a local user with write access to the system drive root to achieve arbitrary code execution with SYSTEM privileges. This vulnerability requires elevated permissions and local access to exploit, making it primarily a privilege escalation risk in multi-user environments. No patch is currently available for affected products.
Windows
-
CVE-2026-24098
MEDIUM
CVSS 6.5
Apache Airflow 3.0.0 through 3.1.6 allows authenticated users with access to specific DAGs to view import error messages from other DAGs they lack permission to access, resulting in unintended information disclosure. An authenticated attacker can leverage this privilege escalation to gather sensitive information about other workflows and their configurations. Apache recommends upgrading to version 3.1.7 or later to remediate this vulnerability.
Apache
Airflow
-
CVE-2026-24027
MEDIUM
CVSS 5.3
Crafted zones can lead to increased incoming network traffic. [CVSS 5.3 MEDIUM]
Information Disclosure
Suse
-
CVE-2026-23903
MEDIUM
CVSS 5.3
Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. [CVSS 5.3 MEDIUM]
macOS
Apache
Authentication Bypass
Shiro
Redhat
-
CVE-2026-22922
MEDIUM
CVSS 6.5
Airflow versions up to 3.1.6 contains a vulnerability that allows attackers to an authenticated user with custom permissions limited to task access to view tas (CVSS 6.5).
Apache
Airflow
-
CVE-2026-22613
MEDIUM
CVSS 5.7
Improper server identity validation in Eaton Network M3 firmware upgrade functionality enables man-in-the-middle attacks by network-adjacent threat actors with high privileges. An attacker can intercept and manipulate firmware updates to inject malicious code, compromise system integrity, or disrupt availability. No patch is currently available for this medium-severity issue.
Authentication Bypass
-
CVE-2026-21419
MEDIUM
CVSS 6.6
Dell Display and Peripheral Manager before version 2.2 on Windows contains an insecure link resolution flaw that allows local attackers with low privileges to escalate their access through the installer or service. An authenticated user can exploit improper symlink handling to gain elevated permissions on the system. No patch is currently available for this vulnerability.
Windows
-
CVE-2026-2235
MEDIUM
CVSS 6.5
C&Cm@il by HGiga contains a SQL injection flaw (CWE-89) that allows authenticated users to execute arbitrary database queries and extract sensitive information. The vulnerability requires valid credentials but no user interaction, making it exploitable by compromised or malicious internal accounts. No patch is currently available for this medium-severity issue.
SQLi
-
CVE-2026-2227
MEDIUM
CVSS 4.7
D-Link DCS-931L camera firmware versions up to 1.13.0 contain a command injection vulnerability in the /setSystemAdmin endpoint that allows remote attackers with high privileges to execute arbitrary commands by manipulating the AdminID parameter. Public exploit code exists for this vulnerability, though the affected devices are no longer supported by D-Link. An attacker with administrative access could achieve remote code execution on vulnerable cameras.
D-Link
Command Injection
Dcs 931l Firmware
-
CVE-2026-2226
MEDIUM
CVSS 4.7
Unrestricted file upload in DouPHP versions up to 1.9 allows remote attackers with administrative privileges to bypass upload restrictions via manipulation of the sql_filename parameter in the ZIP File Handler component. Public exploit code exists for this vulnerability, and no patch is currently available.
PHP
Douphp
-
CVE-2026-2218
MEDIUM
CVSS 6.3
Command injection in D-Link DCS-933L firmware up to version 1.14.11 allows authenticated remote attackers to execute arbitrary commands through the AdminID parameter in the /setSystemAdmin endpoint. Public exploit code exists for this vulnerability, which affects only end-of-life devices no longer receiving security updates. An attacker with valid credentials can achieve remote code execution with limited system privileges.
D-Link
Command Injection
Dcs 933l Firmware
-
CVE-2026-2216
MEDIUM
CVSS 4.3
Path traversal in rachelos WeRSS plugin versions up to 1.4.8 allows authenticated remote attackers to access arbitrary files through manipulation of the filename parameter in the download_export_file function. Public exploit code exists for this vulnerability. The issue requires valid credentials but has a low complexity attack surface, affecting file confidentiality without requiring user interaction.
Path Traversal
-
CVE-2026-2213
MEDIUM
CVSS 4.7
Unrestricted file upload in Online Music Site 1.0's AdminAddAlbum.php allows authenticated administrators with high privileges to upload arbitrary files via the txtimage parameter. Public exploit code exists for this vulnerability, enabling remote attackers to potentially execute malicious code or compromise the application. The affected component impacts both the PHP runtime and the vulnerable web application, with no patch currently available.
PHP
Online Music Site
-
CVE-2026-2194
MEDIUM
CVSS 6.3
Di-7100G C1 Firmware versions up to 24.04.18d1 contains a vulnerability that allows attackers to command injection (CVSS 6.3).
D-Link
Command Injection
Di 7100g C1 Firmware
-
CVE-2026-0632
MEDIUM
CVSS 5.4
Fluent Forms Pro Add On Pack (WordPress plugin) is affected by server-side request forgery (ssrf) (CVSS 5.4).
WordPress
SSRF
-
CVE-2026-0398
MEDIUM
CVSS 5.3
DNS recursive resolver denial-of-service via crafted zones and CNAME chain manipulation allows unauthenticated attackers to exhaust server resources and potentially poison the resolver's cache. The vulnerability affects Recursor instances exposed to untrusted DNS queries, enabling attackers to degrade performance or compromise DNS resolution integrity. No patch is currently available.
Denial Of Service
Suse
-
CVE-2025-66607
MEDIUM
CVSS 5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header
contains an insecure setting. [CVSS 5.3 MEDIUM]
Information Disclosure
-
CVE-2025-66605
MEDIUM
CVSS 5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input
fields on this webpage with the autocomplete attribute enabled, the input
content could be saved in the browser the user is using. [CVSS 5.3 MEDIUM]
Information Disclosure
-
CVE-2025-66604
MEDIUM
CVSS 5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version
could be displayed on the web page. [CVSS 5.3 MEDIUM]
Information Disclosure
-
CVE-2025-66601
MEDIUM
CVSS 6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not
specify MIME types. [CVSS 6.1 MEDIUM]
Information Disclosure
-
CVE-2025-66596
MEDIUM
CVSS 6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not
properly validate request headers. [CVSS 6.1 MEDIUM]
Open Redirect
-
CVE-2025-66595
MEDIUM
CVSS 5.4
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product is
vulnerable to Cross-Site Request Forgery (CSRF). [CVSS 5.4 MEDIUM]
CSRF
-
CVE-2025-66594
MEDIUM
CVSS 5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error
page. [CVSS 5.3 MEDIUM]
Information Disclosure
-
CVE-2025-63354
MEDIUM
CVSS 4.8
Hitron HI3120 v7.2.4.5.2b1 allows stored XSS via the Parental Control option when creating a new filter. The device fails to properly handle inputs, allowing an attacker to inject and execute JavaScript. [CVSS 4.8 MEDIUM]
XSS
Hi3120 Firmware
-
CVE-2025-59024
MEDIUM
CVSS 6.5
Crafted delegations or IP fragments can poison cached delegations in Recursor. [CVSS 6.5 MEDIUM]
Information Disclosure
Suse
-
CVE-2025-15318
MEDIUM
CVSS 5.5
Tanium addressed an arbitrary file deletion vulnerability in End-User Notifications Endpoint Tools. [CVSS 5.5 MEDIUM]
Path Traversal
End User Notifications
-
CVE-2025-15317
MEDIUM
CVSS 6.5
Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server. [CVSS 6.5 MEDIUM]
Denial Of Service
Server
-
CVE-2025-15316
MEDIUM
CVSS 6.7
Tanium addressed a local privilege escalation vulnerability in Tanium Server. [CVSS 6.7 MEDIUM]
Privilege Escalation
Server
Module Server
-
CVE-2025-15315
MEDIUM
CVSS 6.7
Tanium addressed a local privilege escalation vulnerability in Tanium Module Server. [CVSS 6.7 MEDIUM]
Privilege Escalation
Server
Module Server
-
CVE-2025-14831
MEDIUM
CVSS 5.3
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs). [CVSS 5.3 MEDIUM]
Denial Of Service
-
CVE-2025-14778
MEDIUM
CVSS 5.4
A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). [CVSS 5.4 MEDIUM]
Privilege Escalation
Redhat
-
CVE-2025-10464
MEDIUM
CVSS 6.5
Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by cleartext storage of sensitive information (CVSS 6.5).
Information Disclosure
-
CVE-2025-7708
MEDIUM
CVSS 6.8
Insertion of Sensitive Information Into Sent Data vulnerability in Atlas Educational Software Industry Ltd. Co. [CVSS 6.8 MEDIUM]
Information Disclosure
-
CVE-2026-25740
None
captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.
Dns
Chrome
-
CVE-2026-24095
None
Improper permission enforcement in Checkmk versions 2.4.0 versions up to 2.4.0 is affected by missing authorization.
Authentication Bypass
-
CVE-2026-2246
LOW
CVSS 3.3
A security vulnerability has been detected in AprilRobotics apriltag versions up to 3.4.5. is affected by buffer overflow (CVSS 3.3).
Industrial
Memory Corruption
-
CVE-2026-2245
LOW
CVSS 3.3
A vulnerability was identified in CCExtractor versions up to 183. is affected by buffer overflow (CVSS 3.3).
Buffer Overflow
-
CVE-2026-2242
LOW
CVSS 3.3
A vulnerability was determined in janet-lang janet up to 1.40.1. This impacts the function janetc_if of the file src/core/specials.c. [CVSS 3.3 LOW]
Buffer Overflow
-
CVE-2026-2241
LOW
CVSS 3.3
A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. [CVSS 3.3 LOW]
Buffer Overflow
-
CVE-2026-2240
LOW
CVSS 3.3
A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. [CVSS 3.3 LOW]
Buffer Overflow
-
CVE-2026-2224
LOW
CVSS 3.5
A vulnerability was detected in code-projects Online Reviewer System 1.0. This affects an unknown part of the file /system/system/admins/manage/users/btn_functions.php. [CVSS 3.5 LOW]
PHP
XSS
-
CVE-2026-2222
LOW
CVSS 2.4
A weakness has been identified in code-projects Online Reviewer System 1.0. Affected by this vulnerability is an unknown functionality of the file /system/system/admins/manage/users/btn_functions.php. [CVSS 2.4 LOW]
PHP
XSS
-
CVE-2026-2215
LOW
CVSS 3.7
A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult...
Information Disclosure
-
CVE-2026-2214
LOW
CVSS 2.4
A weakness has been identified in code-projects for Plugin 1.0. This affects an unknown part of the file /Administrator/PHP/AdminAddAlbum.php. [CVSS 2.4 LOW]
PHP
XSS
-
CVE-2026-2201
LOW
CVSS 2.4
A security vulnerability has been detected in ZeroWdd studentmanager up to 2151560fc0a50ec00426785ec1e01a3763b380d9. This impacts the function addLeave of the file src/main/java/com/wdd/studentmanager/controller/LeaveController.java. [CVSS 2.4 LOW]
Java
XSS
-
CVE-2026-2200
LOW
CVSS 2.4
A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the file /admin/admin/save of the component API Endpoint. [CVSS 2.4 LOW]
XSS
-
CVE-2026-1960
None
Stored Cross-Site Scripting (XSS) vulnerability in Loggro Pymes, via the 'Facebook' parameter in '/loggrodemo/jbrain/ConsultaTerceros' endpoint.
XSS
-
CVE-2026-1959
None
Stored Cross-Site Scripting (XSS) vulnerability in Loggro Pymes, via the
'descripción'
parameter in the '/loggrodemo/jbrain/MaestraCuentasBancarias' endpoint.
XSS
-
CVE-2025-66600
None
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product lacks
HSTS (HTTP Strict Transport Security) configuration.
Information Disclosure
-
CVE-2025-66599
None
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could
be displayed on web pages.
Information Disclosure
-
CVE-2025-7432
None
DPA countermeasures in Silicon Labs' Series 2 devices are not reseeded under certain conditions. This may allow an attacker to eventually extract secret keys through a DPA attack.
Information Disclosure