Vulnerebility    2026()  2025() |  HOME  2001  2002  2003  2004  2005  2006  2007  2008  2009  2010  2011  2012  2013  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  2024  2025  2026
Vulnerebility Calendar  Top Vulnerebility  List of Attack   


DATE

NAME

INFO

CATEGORY

SUBCATE

14.5.26 CVE-2026-44338 PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34. VULNEREBILITY VULNEREBILITY
14.5.26 Fragnesia Fragnesia: Linux Kernel Local Privilege Escalation via ESP-in-TCP VULNEREBILITY VULNEREBILITY
14.5.26 NGINX Rift An 18 year old memory corruption flaw in NGINX Plus and NGINX Open Source lets an unauthenticated attacker crash worker processes or execute remote code with crafted HTTP requests. VULNEREBILITY VULNEREBILITY
14.5.26 CVE-2026-42945 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). VULNEREBILITY VULNEREBILITY
14.5.26 CVE-2026-42946 (CVSS v4 score: 8.3) - An excessive memory allocation vulnerability in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that could allow a remote, unauthenticated attacker with adversary-in-the-middle (AitM) capabilities to control responses from an upstream server to read the memory of the NGINX worker process or restart it when scgi_pass or uwsgi_pass is configured. VULNEREBILITY VULNEREBILITY
14.5.26 CVE-2026-40701 (CVSS v4 score: 6.3) - A use-after-free vulnerability in the ngx_http_ssl_module module that could allow a remote, unauthenticated attacker to have limited control of modification of data or restart the NGINX worker process when the ssl_verify_client directive is set to "on" or "optional," and the ssl_ocsp directive is set to "on." VULNEREBILITY VULNEREBILITY
14.5.26 CVE-2026-42934 (CVSS v4 score: 6.3) - An out-of-bounds read vulnerability in the ngx_http_charset_module module that could allow a remote, unauthenticated attacker to disclose memory contents or restart the NGINX worker process when charset, source_charset, and charset_map, and proxy_pass with disabled buffering ("off") directives are configured. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-42826 (CVSS score: 10.0) - An exposure of sensitive information to an unauthorized actor in Azure DevOps that allows an unauthorized attacker to disclose information over a network. (Requires no customer action) VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-33109 (CVSS score: 9.9) - An improper access control in Azure Managed Instance for Apache Cassandra that allows an authorized attacker to execute code over a network. (Requires no customer action) VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-42898 (CVSS score: 9.9) - A code injection vulnerability in Microsoft Dynamics 365 (on-premises) that allows an authorized attacker to execute code over a network. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-42823 (CVSS score: 9.9) - An improper access control in Azure Logic Apps that allows an authorized attacker to elevate privileges over a network. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-41089 (CVSS score: 9.8) - A stack-based buffer overflow in Windows Netlogon that allows an unauthorized attacker to execute code over a network without needing to sign in or have prior access by sending a specially crafted network request to a Windows server that is acting as a domain controller. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-33823 (CVSS score: 9.6) - An improper authorization in Microsoft Teams that allows an authorized attacker to disclose information over a network. (Requires no customer action) VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-35428 (CVSS score: 9.6) - A command injection vulnerability in Azure Cloud Shell that allows an unauthorized attacker to perform spoofing over a network. (Requires no customer action) VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-40379 (CVSS score: 9.3) - An exposure of sensitive information to an unauthorized actor in Azure Entra ID that allows an unauthorized attacker to perform spoofing over a network. (Requires no customer action) VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-40402 (CVSS score: 9.3) - A user-after-free in Windows Hyper-V that allows an unauthorized attacker to gain SYSTEM privileges and access the Hyper-V host environment. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-41103 (CVSS score: 9.1) - An incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence that allows an unauthorized attacker to gain unauthorized access to Jira or Confluence as a valid user and perform actions with the same permissions as the compromised account. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-33117 (CVSS score: 9.1) - An improper authentication in Azure SDK that allows an unauthorized attacker to bypass a security feature over a network. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-42833 (CVSS score: 9.1) - An execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) that allows an authorized attacker to execute code over a network and gain the ability to interact with other tenant’s applications and content. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-33844 (CVSS score: 9.0) - An improper input validation in Azure Managed Instance for Apache Cassandra that allows an authorized attacker to execute code over a network. (Requires no customer action) VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-40361 (CVSS score: 8.4) - A use-after-free vulnerability in Microsoft Office Word that allows an unauthorized attacker to execute code locally without requiring user interaction. VULNEREBILITY VULNEREBILITY
13.5.26 CVE-2026-40364 (CVSS score: 8.4) - A type confusion vulnerability in Microsoft Office Word that allows an unauthorized attacker to execute code locally without requiring user interaction. VULNEREBILITY VULNEREBILITY
11.5.26 CVE-2026-26956 WASM Sandbox Escape VULNEREBILITY VULNEREBILITY
11.5.26 CVE-2026-20188 A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. VULNEREBILITY VULNEREBILITY
11.5.26 CVE-2023-43896 A buffer overflow in Macrium Reflect 8.1.7544 and below allows attackers to escalate privileges or execute arbitrary code. VULNEREBILITY VULNEREBILITY
11.5.26 CVE-2026-7482 Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. VULNEREBILITY VULNEREBILITY
9.5.26 CVE-2026-29201 (CVSS score: 4.3) - An insufficient input validation of the feature file name in the "feature::LOADFEATUREFILE" adminbin call that could result in an arbitrary file read. VULNEREBILITY VULNEREBILITY
9.5.26 CVE-2026-29202 (CVSS score: 8.8) - An insufficient input validation of the "plugin" parameter in the "create_user API" call that could result in arbitrary Perl code execution on behalf of the already authenticated account's system user. VULNEREBILITY VULNEREBILITY
9.5.26 CVE-2026-29203 (CVSS score: 8.8) - An unsafe symlink handling vulnerability that allows a user to modify access permissions of an arbitrary file using chmod, resulting in denial-of-service or possible privilege escalation. VULNEREBILITY VULNEREBILITY
8.5.26 Dirty Frag Dirty Frag (CVE-2026-43284, CVE-2026-43500) vulnerability fix is ready for testing VULNEREBILITY VULNEREBILITY
8.5.26 CVE-2026-6973 An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution. VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-24118 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "__lookupGetter__" and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.4, patches in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-24120 (CVSS score: 9.8) - A patch bypass for CVE-2023-37466 (CVSS score: 9.8) that could allow attackers to escape the sandbox through the species property of promise objects and execute arbitrary commands on the underlying host. (Affects versions <= 3.10.3, patched in 3.10.5) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-24781 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via the "inspect" function and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.3, patches in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-26332 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "SuppressedError" and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.4, patches in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-26956 (CVSS score: 9.8) - A protection mechanism failure vulnerability that allows sandbox escape with arbitrary code execution by triggering a TypeError produced by Symbol-to-string coercion. (Affects version 3.10.4, confirmed on Node.js 25.6.1, patched in 3.10.5) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-43997 (CVSS score: 10.0) - A code injection vulnerability that allows an attacker to obtain the host Object and escape the sandbox, leading to arbitrary code execution. (Affects versions <= 3.10.5, patched in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-43999 (CVSS score: 9.9) - A vulnerability that allows a bypass of NodeVM's built-in allowlist and enables an attacker to load excluded builtins like child_process and achieve remote code execution. (Affects version 3.10.5, patched in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-44005 (CVSS score: 10.0) - A vulnerability that allows attacker-controlled JavaScript to escape the sandbox and enable prototype pollution. (Affects versions 3.9.6-3.10.5, patched in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-44006 (CVSS score: 10.0) - A code injection vulnerability via "BaseHandler.getPrototypeOf" that enables sandbox escape and remote code execution. (Affects versions <= 3.10.5, patched in 3.11.0) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-44007 (CVSS score: 9.1) - An improper access control vulnerability that allows sandbox escape and execution of arbitrary operating system commands on the underlying host. (Affects versions <= 3.11.0, patched in 3.11.1) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-44008 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "neutralizeArraySpeciesBatch()" and permits an attacker to execute arbitrary commands on the underlying host. (Affects versions <= 3.11.1, patched in 3.11.2) VULNEREBILITY VULNEREBILITY
7.5.26 CVE-2026-44009 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via a null proto exception and permits an attacker to execute arbitrary commands on the underlying host. (Affects versions <= 3.11.1, patched in 3.11.2) VULNEREBILITY VULNEREBILITY
6.5.26 CVE-2026-0300 CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal VULNEREBILITY VULNEREBILITY
6.5.26 CVE-2026-23918 Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. VULNEREBILITY VULNEREBILITY
5.5.26 CVE-2026-29014 MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. VULNEREBILITY VULNEREBILITY
5.5.26 CVE-2026-22679 Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. VULNEREBILITY VULNEREBILITY
5.5.26 CVE-2026-5174 Improper input validation vulnerability in Progress Software MOVEit Automation allows Privilege Escalation. This issue affects MOVEit Automation: from 2025.1.0 before 2025.1.5, from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0. VULNEREBILITY VULNEREBILITY
5.5.26 CVE-2026-4670 Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0. VULNEREBILITY VULNEREBILITY
3.5.26 Copy Fail Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017. VULNEREBILITY VULNEREBILITY
3.5.26 CVE-2026-41940 CVE-2026-41940: cPanel & WHM Authentication Bypass VULNEREBILITY VULNEREBILITY
3.5.26 CVE-2026-31431 Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability VULNEREBILITY VULNEREBILITY
3.5.26 CVE-2026-21510 Windows Shell Security Feature Bypass Vulnerability VULNEREBILITY VULNEREBILITY
30.4.26 CVE-2026-26268 Sandbox escape via Git hooks VULNEREBILITY VULNEREBILITY
30.4.26 CVE-2026-31431 In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. VULNEREBILITY VULNEREBILITY
29.4.26 CVE-2026-32202 Microsoft Windows Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network. VULNEREBILITY VULNEREBILITY
29.4.26 CVE-2024-1708 ConnectWise ScreenConnect Path Traversal Vulnerability: ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. VULNEREBILITY VULNEREBILITY
29.4.26 CVE-2026-42208 SQL injection in Proxy API key verification VULNEREBILITY VULNEREBILITY
29.4.26 CVE-2026-3854 An improper neutralization of special elements... VULNEREBILITY VULNEREBILITY
28.4.26 CVE-2026-25874 LeRobot Unsafe Deserialization Remote Code Execution via gRPC VULNEREBILITY VULNEREBILITY
28.4.26 CVE-2026-32202 Windows Shell Spoofing Vulnerability VULNEREBILITY VULNEREBILITY
26.4.26 CVE-2026-41651 PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. VULNEREBILITY VULNEREBILITY
25.4.26 CVE-2024-57726 (CVSS score: 9.9) - A missing authorization vulnerability in SimpleHelp that could allow low-privileged technicians to create API keys with excessive permissions, which can then be used to escalate privileges to the server admin role. VULNEREBILITY VULNEREBILITY
25.4.26 CVE-2024-57728 (CVSS score: 7.2) - A path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e., zip slip), which can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. VULNEREBILITY VULNEREBILITY
25.4.26 CVE-2024-7399 (CVSS score: 8.8) - A path traversal vulnerability in Samsung MagicINFO 9 Server that could allow an attacker to write arbitrary files as system authority. VULNEREBILITY VULNEREBILITY
25.4.26 CVE-2025-29635 (CVSS score: 7.5) - A command injection vulnerability in end-of-life D-Link DIR-823X series routers that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. VULNEREBILITY VULNEREBILITY
25.4.26 CVE-2025-20333 (CVSS score: 9.9) - An improper validation of user-supplied input vulnerability that could allow an authenticated, remote attacker with valid VPN user credentials to execute arbitrary code as root on an affected device by sending crafted HTTP requests. VULNEREBILITY VULNEREBILITY
25.4.26 CVE-2025-20362 (CVSS score: 6.5) - An improper validation of user-supplied input vulnerability that could allow an unauthenticated, remote attacker to access restricted URL endpoints without authentication by sending crafted HTTP requests. VULNEREBILITY VULNEREBILITY
24.4.26 CVE-2026-33626 Server-Side Request Forgery (SSRF) in Vision-Language Image Loading VULNEREBILITY VULNEREBILITY
23.4.26 CVE-2026-28950 A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device. VULNEREBILITY VULNEREBILITY
22.4.26 CVE-2026-40372 ASP.NET Core Elevation of Privilege Vulnerability VULNEREBILITY VULNEREBILITY
22.4.26 CVE-2026-5752 Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal. VULNEREBILITY VULNEREBILITY
22.4.26 Bridge:Break Bridge:Break: Vulnerabilities Thrive in Serial-to-Ethernet Converters VULNEREBILITY VULNEREBILITY
18.4.26 CVE-2026-5194 Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled. VULNEREBILITY VULNEREBILITY
18.4.26 CVE-2026-39987 marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands VULNEREBILITY VULNEREBILITY
17.4.26 CVE-2026-20180 A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at least Read Only Admin credentials. This vulnerability is due to insufficient validation of user-supplied input VULNEREBILITY VULNEREBILITY
17.4.26 CVE-2026-20186 A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. VULNEREBILITY VULNEREBILITY
17.4.26 CVE-2026-20147 (CVSS score: 9.9) - An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests VULNEREBILITY VULNEREBILITY
17.4.26 CVE-2026-20184 (CVSS score: 9.8) - An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services. VULNEREBILITY VULNEREBILITY
17.4.26 CVE-2026-34197 Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. VULNEREBILITY VULNEREBILITY
15.4.26 CVE-2026-33824 Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY
15.4.26 CVE-2026-33825 Microsoft Defender Elevation of Privilege Vulnerability VULNEREBILITY VULNEREBILITY
15.4.26 CVE-2026-32201 Microsoft SharePoint Server Spoofing Vulnerability VULNEREBILITY VULNEREBILITY
15.4.26 CVE-2026-40176 (CVSS score: 7.8) - An improper input validation vulnerability that could allow an attacker controlling a repository configuration in a malicious composer.json declaring a Perforce VCS repository to inject arbitrary commands, resulting in command execution in the context of the user running Composer. VULNEREBILITY VULNEREBILITY
15.4.26 CVE-2026-40261 (CVSS score: 8.8) - An improper input validation vulnerability stemming from inadequate escaping that could allow an attacker to inject arbitrary commands through a crafted source reference containing shell metacharacters. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2026-21643 (CVSS score: 9.1) - An SQL injection vulnerability in Fortinet FortiClient EMS that could allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2020-9715 (CVSS score: 7.8) - A use-after-free vulnerability in Adobe Acrobat Reader that could result in remote code execution. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2023-36424 (CVSS score: 7.8) - An out-of-bounds read vulnerability in Microsoft Windows Common Log File System Driver that could result in privilege escalation. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2023-21529 (CVSS score: 8.8) - A deserialization of untrusted data in Microsoft Exchange Server that could allow an authenticated attacker to achieve remote code execution. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2025-60710 (CVSS score: 7.8) - An improper link resolution before file access vulnerability in Host Process for Windows Tasks that could allow an authorized attacker to elevate privileges locally. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2012-1854 (CVSS score: 7.8) - An insecure library loading vulnerability in Microsoft Visual Basic for Applications (VBA) that could result in remote code execution. VULNEREBILITY VULNEREBILITY
14.4.26 CVE-2025-0520 ShowDoc unrestricted file upload vulnerability VULNEREBILITY VULNEREBILITY
13.4.26 CVE-2026-34621 Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. VULNEREBILITY VULNEREBILITY
12.4.26 CVE-2026-1340 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. VULNEREBILITY VULNEREBILITY
12.4.26 CVE-2026-34197 Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2026-1731 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2026-23760 SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2025-52691 Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2025-10035 SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts VULNEREBILITY VULNEREBILITY
8.4.26 CVE‑2025‑31161 Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-57728 A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-57727 CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-57726 SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-27199 SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-27198 In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-1709 In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-1708 ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2024-21887 A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2023-46805 An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2023-27351 This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2023-21529 Microsoft Exchange Server Remote Code Execution Vulnerability VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2025-59528 RCE in FlowiseAI/Flowise VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2023-50224 TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. VULNEREBILITY VULNEREBILITY
8.4.26 CVE-2026-34040 AuthZ plugin bypass with oversized request body VULNEREBILITY VULNEREBILITY
5.4.26 CVE-2025-53521 When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. VULNEREBILITY VULNEREBILITY
5.4.26 CVE-2026-3502 TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. VULNEREBILITY VULNEREBILITY
5.4.26 CVE-2026-4415 VULNEREBILITY VULNEREBILITY VULNEREBILITY
3.4.26 CVE-2026-21643 An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. VULNEREBILITY VULNEREBILITY
3.4.26 CVE-2026-3098 The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.5.1.33 via the 'actionExportAll' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. VULNEREBILITY VULNEREBILITY
3.4.26 CVE-2026-20093 Cisco Integrated Management Controller Authentication Bypass Vulnerability VULNEREBILITY VULNEREBILITY
1.4.26 CVE-2026-5281 Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) VULNEREBILITY VULNEREBILITY
1.4.26 CVE-2026-3502 TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. VULNEREBILITY VULNEREBILITY
28.3.26 CVE-2025-53521 F5 BIG-IP Unspecified Vulnerability: F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution. VULNEREBILITY VULNEREBILITY
28.3.26 CVE-2026-3055 Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread VULNEREBILITY VULNEREBILITY
28.3.26 CVE-2026-4681 A critical remote code execution (RCE) vulnerability has been reported in PTC Windchill and PTC FlexPLM. The vulnerability may be exploited through the deserialization of untrusted data. VULNEREBILITY VULNEREBILITY
28.3.26 CVE-2025-15517 A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations. VULNEREBILITY VULNEREBILITY
27.3.26 Open Sesame Open Sesame: How a Fail-Open Bug in Open VSX's New Scanner Let Malware Walk Right In VULNEREBILITY VULNEREBILITY
26.3.26 CVE-2026-3564 A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

VULNEREBILITY

VULNEREBILITY

26.3.26 CVE-2026-22557 A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

VULNEREBILITY

VULNEREBILITY

24.3.26 CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread

VULNEREBILITY

VULNEREBILITY

24.3.26 CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user session mixup

VULNEREBILITY

VULNEREBILITY

24.3.26 CVE-2025-32975 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover.

VULNEREBILITY

VULNEREBILITY

22.3.26 CVE-2025-27889 Wing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker.

VULNEREBILITY

VULNEREBILITY

22.3.26 CVE-2025-47812 In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default).

VULNEREBILITY

VULNEREBILITY

21.3.26 CVE-2026-21992 Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security).

VULNEREBILITY

VULNEREBILITY

21.3.26 CVE-2025-31277 (CVSS score: 8.8) - A vulnerability in Apple WebKit that could result in memory corruption when processing maliciously crafted web content. (Fixed in July 2025)

VULNEREBILITY

VULNEREBILITY

21.3.26 CVE-2025-43510 (CVSS score: 7.8) - A memory corruption vulnerability in Apple's kernel component that could allow a malicious application to cause unexpected changes in memory shared between processes. (Fixed in December 2025)

VULNEREBILITY

VULNEREBILITY

21.3.26 CVE-2025-43520 (CVSS score: 8.8) - A memory corruption vulnerability in Apple's kernel component that could allow a malicious application to cause unexpected system termination or write kernel memory. (Fixed in December 2025)

VULNEREBILITY

VULNEREBILITY

21.3.26 CVE-2025-32432 (CVSS score: 10.0) - A code injection vulnerability in Craft CMS that could allow a remote attacker to execute arbitrary code. (Fixed in April 2025)

VULNEREBILITY

VULNEREBILITY

21.3.26 CVE-2025-54068 (CVSS score: 9.8) - A code injection vulnerability in Laravel Livewire that could allow unauthenticated attackers to achieve remote command execution in specific scenarios. (Fixed in July 2025)

VULNEREBILITY

VULNEREBILITY

19.3.26 DarkSword Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2025-43520 Memory corruption vulnerability in the iOS kernel (Patched in versions 18.7.2 and 26.1)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2025-43510 Memory management vulnerability in the iOS kernel (Patched in versions 18.7.2 and 26.1)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2025-14174 Memory corruption vulnerability in ANGLE (Patched in versions 18.7.3 and 26.2)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2025-43529 Memory corruption vulnerability in JavaScriptCore (Patched in versions 18.7.3 and 26.2)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2026-20700 User-mode Pointer Authentication Code (PAC) bypass in dyld (Patched in version 26.3)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2025-31277 Memory corruption vulnerability in JavaScriptCore (Patched in version 18.6)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2026-20963 (CVSS score: 8.8) - A deserialization of untrusted data vulnerability in Microsoft Office SharePoint that allows an unauthorized attacker to execute code over a network. (Fixed in January 2026)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2025-66376 (CVSS score: 7.2) - A stored cross-site scripting vulnerability in the Classic UI of ZCS, where attackers could abuse Cascading Style Sheets (CSS) @import directives in an HTML e-mail message. (Fixed in versions 10.0.18 and 10.1.13 in November 2025)

VULNEREBILITY

VULNEREBILITY

19.3.26 CVE-2026-20131 A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream.

VULNEREBILITY

VULNEREBILITY

18.3.26 CVE-2026-32746 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

VULNEREBILITY

VULNEREBILITY

18.3.26 CVE-2026-3888 Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

VULNEREBILITY

VULNEREBILITY

18.3.26 CVE-2026-20643 A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2.

VULNEREBILITY

VULNEREBILITY

17.3.26 CVE-2025-47813 Wing FTP Server Information Disclosure Vulnerability: Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.

VULNEREBILITY

VULNEREBILITY

15.3.26 CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability: Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.

VULNEREBILITY

VULNEREBILITY

15.3.26 CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability: Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution.

VULNEREBILITY

VULNEREBILITY

15.3.26 CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability: Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21671 (CVSS score: 9.1) - A vulnerability that allows an authenticated user with the Backup Administrator role to perform remote code execution in high availability (HA) deployments of Veeam Backup & Replication.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21669 (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21666 (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21667 (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21668 (CVSS score: 8.8) - A vulnerability that allows an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21672 (CVSS score: 8.8) - A vulnerability that allows local privilege escalation on Windows-based Veeam Backup & Replication servers.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-21708 (CVSS score: 9.9) - A vulnerability that allows a Backup Viewer to perform remote code execution as the postgres user.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-3909 (CVSS score: 8.8) - An out-of-bounds write vulnerability in the Skia 2D graphics library that allows a remote attacker to perform out-of-bounds memory access via a crafted HTML page.

VULNEREBILITY

VULNEREBILITY

13.3.26 CVE-2026-3910 (CVSS score: 8.8) - An inappropriate implementation vulnerability in the V8 JavaScript and WebAssembly engine that allows a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

VULNEREBILITY

VULNEREBILITY

13.3.26 CrackArmor CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root

VULNEREBILITY

VULNEREBILITY

12.3.26 CVE-2023-43010 The issue was addressed with improved memory handling. This issue is fixed in iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2, Safari 17.2, iOS 16.7.15 and iPadOS 16.7.15, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.

VULNEREBILITY

VULNEREBILITY

12.3.26 CVE-2025-68613 n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system.

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-27577 (CVSS score: 9.4) - Expression sandbox escape leading to remote code execution (RCE)

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-27493 (CVSS score: 9.5) - Unauthenticated expression evaluation via n8n's Form nodes

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-26144 Microsoft Excel Information Disclosure Vulnerability

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-26118 Azure MCP Server Tools Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-25187 Winlogon Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-21536 Microsoft Devices Pricing Program Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-21262 SQL Server Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-26127 .NET Denial of Service Vulnerability

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2026-27685 SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.

VULNEREBILITY

VULNEREBILITY

11.3.26 CVE-2019-17571 Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

VULNEREBILITY

VULNEREBILITY

11.3.26 LeakyLooker LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities

VULNEREBILITY

VULNEREBILITY

10.3.26 CVE-2021-22054 (CVSS score: 7.5) - A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that could allow a malicious actor with network access to UEM to send requests without authentication and to gain access to sensitive information.

VULNEREBILITY

VULNEREBILITY

10.3.26 CVE-2025-26399 (CVSS score: 9.8) - A deserialization of untrusted data vulnerability in the AjaxProxy component of SolarWinds Web Help Desk that could allow an attacker to run commands on the host machine.

VULNEREBILITY

VULNEREBILITY

10.3.26 CVE-2026-1603 (CVSS score: 8.6) - An authentication bypass using an alternate path or channel vulnerability in Ivanti Endpoint Manager that could allow a remote unauthenticated attacker to leak specific stored credential data.

VULNEREBILITY

VULNEREBILITY

8.3.26 CVE-2026-27636 FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's file upload restriction list in `app/Misc/Helper.php` does not include `.htaccess` or `.user.ini` files.

VULNEREBILITY

VULNEREBILITY

8.3.26 CVE-2026-28289 FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check

VULNEREBILITY

VULNEREBILITY

8.3.26 CVE-2026-20131 Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability

VULNEREBILITY

VULNEREBILITY

8.3.26 CVE-2026-20079 Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability

VULNEREBILITY

VULNEREBILITY

6.3.26 CVE-2026-20122 A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system.

VULNEREBILITY

VULNEREBILITY

6.3.26 CVE-2026-20128 A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system.

VULNEREBILITY

VULNEREBILITY

6.3.26 CVE-2017-7921 (CVSS score: 9.8) - An improper authentication vulnerability affecting multiple Hikvision products that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.

VULNEREBILITY

VULNEREBILITY

6.3.26 CVE-2021-22681 (CVSS score: 9.8) - An insufficiently protected credentials vulnerability affecting multiple Rockwell Automation Studio 5000 Logix Designer, RSLogix 5000, and Logix Controllers that could allow an unauthorized user with network access to the controller to bypass the verification mechanism and authenticate with it, as well as alter its configuration and/or application code.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2026-1459 A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.7)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2025-13943 A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2025-13942 A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2025-11848 A null pointer dereference vulnerability in the Wake-on-LAN CGI program of the Zyxel VMG3625-T50B firmware version through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2025-11847 A null pointer dereference vulnerability in the IP settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2025-11846 A null pointer dereference vulnerability in the account settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

VULNEREBILITY

VULNEREBILITY

5.3.26 CVE-2025-11845 A null pointer dereference vulnerability in the certificate downloader CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

VULNEREBILITY

VULNEREBILITY

4.3.26 CVE-2026-21902 An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root.

VULNEREBILITY

VULNEREBILITY

4.3.26 CVE-2026-22719 VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.

VULNEREBILITY

VULNEREBILITY

3.3.26 CVE-2026-21385 Memory corruption while using alignments for memory allocation.

VULNEREBILITY

VULNEREBILITY

3.3.26 CVE-2026-0628 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

VULNEREBILITY

VULNEREBILITY

1.3.26 ClawJacked OpenClaw Vulnerability: Website-to-Local Agent Takeover

VULNEREBILITY

VULNEREBILITY

1.3.26 CVE-2026-25593 Unauthenticated Local RCE via WebSocket config.apply

VULNEREBILITY

VULNEREBILITY

1.3.26 CVE-2026-24763 Command Injection in Clawdbot Docker Execution via PATH Environment Variable

VULNEREBILITY

VULNEREBILITY

1.3.26 CVE-2026-25157 OS Command Injection via Project Root Path in sshNodeCommand

VULNEREBILITY

VULNEREBILITY

1.3.26 CVE-2026-25475 OpenClaw may disclose local files via MEDIA: path staging

VULNEREBILITY

VULNEREBILITY

1.3.26 CVE-2025-49113 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

VULNEREBILITY

VULNEREBILITY

27.2.26 CVE-2026-20127 an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.

VULNEREBILITY

VULNEREBILITY

27.2.26 CVE-2022-20775 a path traversal vulnerability that allows an authenticated, local attacker to gain elevated privileges and execute arbitrary commands as root.

VULNEREBILITY

VULNEREBILITY

27.2.26 CVE-2026-20127 Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

VULNEREBILITY

VULNEREBILITY

26.2.26 Claude Code Vulnerable to Arbitrary Code Execution Due to Insufficient Startup Warning When Claude Code was started in a new directory, it displayed a warning asking, "Do you trust the files in this folder?". This warning did not properly document that selecting "Yes, proceed" would allow Claude Code to execute files in the folder without additional confirmation. This may not have been clear to a user so we have updated the warning to clarify this functionality.

VULNEREBILITY

VULNEREBILITY

26.2.26 CVE-2025-59536 (CVSS score: 8.7) - A code injection vulnerability that allows execution of arbitrary shell commands automatically upon tool initialization when a user starts Claude Code in an untrusted directory. (Fixed in version 1.0.111 in October 2025)

VULNEREBILITY

VULNEREBILITY

26.2.26 CVE-2026-21852 (CVSS score: 5.3) - An information disclosure vulnerability in Claude Code's project-load flow that allows a malicious repository to exfiltrate data, including Anthropic API keys. (Fixed in version 2.0.65 in January 2026)

VULNEREBILITY

VULNEREBILITY

26.2.26 CVE-2025-40538 A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges.

VULNEREBILITY

VULNEREBILITY

26.2.26 CVE-2025-40539 A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.

VULNEREBILITY

VULNEREBILITY

26.2.26 CVE-2025-40540 A type confusion vulnerability that allows an attacker to execute arbitrary native code as root.

VULNEREBILITY

VULNEREBILITY

26.2.26 CVE-2025-40541 An insecure direct object reference (IDOR) vulnerability that allows an attacker to execute native code as root.

VULNEREBILITY

VULNEREBILITY

21.2.26 CVE-2026-22769 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability.

VULNEREBILITY

VULNEREBILITY

21.2.26 CVE-2025-49113 A deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. (Fixed in June 2025)

VULNEREBILITY

VULNEREBILITY

21.2.26 CVE-2025-68461 A cross-site scripting vulnerability via the animate tag in an SVG document. (Fixed in December 2025)

VULNEREBILITY

VULNEREBILITY

20.2.26 CVE-2026-26119 Windows Admin Center Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

20.2.26 CVE-2026-26119 Windows Admin Center Elevation of Privilege Vulnerability

VULNEREBILITY

VULNEREBILITY

19.2.26 CVE-2026-2329 CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2026-2441 (CVSS score: 8.8) - A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page.

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2024-7694 (CVSS score: 7.2) - An arbitrary file upload vulnerability in TeamT5 ThreatSonar Anti-Ransomware versions 3.4.5 and earlier that could allow an attacker to upload malicious files and achieve arbitrary system command execution on the server.

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2020-7796 (CVSS score: 9.8) - A server-side request forgery (SSRF) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow an attacker to send a crafted HTTP request to a remote host and obtain unauthorized access to sensitive information.

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2008-0015 (CVSS score: 8.8) - A stack-based buffer overflow vulnerability in Microsoft Windows Video ActiveX Control that could allow an attacker to achieve remote code execution by setting up a specially crafted web page.

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2025-65717 An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page.

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2025-65715 An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.

VULNEREBILITY

VULNEREBILITY

18.2.26 CVE-2025-65716 An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

VULNEREBILITY

VULNEREBILITY

16.2.26 CVE-2026-2441 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

VULNEREBILITY

VULNEREBILITY

13.2.26 CVE-2026-1731 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

VULNEREBILITY

VULNEREBILITY

12.2.26 CVE-2026-20700 A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3.

VULNEREBILITY

VULNEREBILITY

11.2.26 CVE-2026-21533 (CVSS score: 7.8) - An improper privilege management in Windows Remote Desktop that allows an authorized attacker to elevate privileges locally. VULNEREBILITY VULNEREBILITY
11.2.26 CVE-2026-21525 (CVSS score: 6.2) - A null pointer dereference in Windows Remote Access Connection Manager that allows an unauthorized attacker to deny service locally. VULNEREBILITY VULNEREBILITY
11.2.26 CVE-2026-21519 (CVSS score: 7.8) - An access of resource using incompatible type ('type confusion') in the Desktop Window Manager that allows an authorized attacker to elevate privileges locally. VULNEREBILITY VULNEREBILITY
11.2.26 CVE-2026-21514 (CVSS score: 7.8) - A reliance on untrusted inputs in a security decision in Microsoft Office Word that allows an unauthorized attacker to bypass a security feature locally. VULNEREBILITY VULNEREBILITY
11.2.26 CVE-2026-21513 (CVSS score: 8.8) - A protection mechanism failure in MSHTML Framework that allows an unauthorized attacker to bypass a security feature over a network. VULNEREBILITY VULNEREBILITY
11.2.26 CVE-2026-21510 (CVSS score: 8.8) - A protection mechanism failure in Windows Shell that allows an unauthorized attacker to bypass a security feature over a network. VULNEREBILITY VULNEREBILITY
10.2.26 CVE-2026-21643 An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. VULNEREBILITY VULNEREBILITY
9.2.26 CVE-2026-1731 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user. VULNEREBILITY VULNEREBILITY
8.2.26 CVE-2025-11953 The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments. VULNEREBILITY VULNEREBILITY
6.2.26 Evaluating and mitigating the growing risk of LLM-discovered 0-days Claude Opus 4.6, released today, continues a trajectory of meaningful improvements in AI models’ cybersecurity capabilities. Last fall, we wrote that we believed we were at an inflection point for AI's impact on cybersecurity—that progress could become quite fast, and now was the moment to accelerate defensive use of AI. VULNEREBILITY VULNEREBILITY
5.2.26 CVE-2026-25049 n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. VULNEREBILITY VULNEREBILITY
4.2.26 CVE-2021-39935 (CVSS score: 7.5/6.8) - A server-side request forgery (SSRF) vulnerability in GitLab Community and Enterprise Editions that could allow unauthorized external users to perform Server Side Requests via the CI Lint API VULNEREBILITY VULNEREBILITY
4.2.26 CVE-2025-64328 (CVSS score: 8.6) - An operating system command injection vulnerability in Sangoma FreePBX that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function and potentially obtain remote access to the system as an asterisk user VULNEREBILITY VULNEREBILITY
4.2.26 CVE-2019-19006 (CVSS score: 9.8) - An improper authentication vulnerability in Sangoma FreePBX that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX administrator VULNEREBILITY VULNEREBILITY
4.2.26 CVE-2025-40551 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. VULNEREBILITY VULNEREBILITY
4.2.26 DockerDash DockerDash: Two Attack Paths, One AI Supply Chain Crisis VULNEREBILITY VULNEREBILITY
3.2.26 CVE-2026-25253 OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2026-24423 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2026-1340 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2026-1281 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2025-40553 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2025-40554 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2025-40536 SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2025-40551 SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2025-40537 SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions. VULNEREBILITY VULNEREBILITY
30.1.26 CVE-2025-40552 SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication. VULNEREBILITY VULNEREBILITY
28.1.26 CVE-2026-22709 In vm2 for version 3.10.0, Promise.prototype.then Promise.prototype.catch callback sanitization can be bypassed.
This allows attackers to escape the sandbox and run arbitrary code.
VULNEREBILITY VULNEREBILITY
28.1.26 CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n's main node by passing specially crafted JavaScript code VULNEREBILITY VULNEREBILITY
28.1.26 CVE-2026-0863 (CVSS score: 8.5) - An eval injection vulnerability that could allow an authenticated user to bypass n8n's python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system VULNEREBILITY VULNEREBILITY
28.1.26 CVE-2026-24858 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 VULNEREBILITY VULNEREBILITY
28.1.26 Cellbreak Cellbreak: Grist’s Pyodide Sandbox Escape and the Data-at-Risk Blast Radius VULNEREBILITY VULNEREBILITY
28.1.26 CVE-2026-24002 Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. VULNEREBILITY VULNEREBILITY
27.1.26 CVE-2026-21509 Microsoft Office Security Feature Bypass Vulnerability VULNEREBILITY VULNEREBILITY
27.1.26 CVE-2025-69264 pnpm is a package manager. Versions 10.0.0 through 10.25 allow git-hosted dependencies to execute arbitrary code during pnpm install, circumventing the v10 security feature "Dependency lifecycle scripts execution disabled by default". VULNEREBILITY VULNEREBILITY
27.1.26 CVE-2025-69263 pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. VULNEREBILITY VULNEREBILITY
25.1.26 HOUKEN SEEKING A PATH BY LIVING ON THE EDGE WITH ZERO-DAYS VULNEREBILITY VULNEREBILITY
25.1.26 CVE-2023-27997 A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 VULNEREBILITY VULNEREBILITY
25.1.26 CVE-2022-42475 A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. VULNEREBILITY VULNEREBILITY
24.1.26 CVE-2024-37079 vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. VULNEREBILITY VULNEREBILITY
24.1.26 CVE-2025-54313 (CVSS score: 7.5) - An embedded malicious code vulnerability in eslint-config-prettier that could allow for execution of a malicious DLL dubbed Scavenger Loader that's designed to deliver an information stealer VULNEREBILITY VULNEREBILITY
24.1.26 CVE-2025-31125 (CVSS score: 5.3) - An improper access control vulnerability in Vite Vitejs that could allow contents of arbitrary files to be returned to the browser using ?inline&import or ?raw?import (Fixed in March 2025 with versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11) VULNEREBILITY VULNEREBILITY
24.1.26 CVE-2025-34026 (CVSS score: 9.2) - An authentication bypass in the Versa Concerto SD-WAN orchestration platform that could allow an attacker to access administrative endpoints (Fixed in April 2025 with version 12.2.1 GA) VULNEREBILITY VULNEREBILITY
24.1.26 CVE-2025-68645 (CVSS score: 8.8) - A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow a remote attacker to craft requests to the "/h/rest" endpoint and allow inclusion of arbitrary files from the WebRoot directory without any authentication (Fixed in November 2025 with version 10.1.13) VULNEREBILITY VULNEREBILITY
23.1.26 CVE-2025-59719 An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message. VULNEREBILITY VULNEREBILITY
23.1.26 CVE-2025-59718 A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 VULNEREBILITY VULNEREBILITY
23.1.26 CVE-2026-24061 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable. VULNEREBILITY VULNEREBILITY
22.1.26 CVE-2026-20045 A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; VULNEREBILITY VULNEREBILITY
22.1.26 CVE-2026-22844 A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access. VULNEREBILITY VULNEREBILITY
21.1.26 ChainLeak ChainLeak: Critical AI framework vulnerabilities expose data, enable cloud takeover VULNEREBILITY AI
21.1.26 CVE-2026-1245 A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. VULNEREBILITY VULNEREBILITY
19.1.26 CVE-2025-29943 Improper access control within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline, potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest. VULNEREBILITY VULNEREBILITY
18.1.26 CVE-2025-6965 There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above. VULNEREBILITY VULNEREBILITY
18.1.26 CVE-2025-36911 In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation. VULNEREBILITY VULNEREBILITY
17.1.26 CVE-2025-22226 VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. VULNEREBILITY VULNEREBILITY
17.1.26 CVE-2025-22225 VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. VULNEREBILITY VULNEREBILITY
17.1.26 CVE-2025-22224 VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. VULNEREBILITY VULNEREBILITY
17.1.26 CVE-2025-68428 jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. VULNEREBILITY VULNEREBILITY
17.1.26 CVE-2026-0625 Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality VULNEREBILITY VULNEREBILITY
16.1.26 CVE-2025-20393 Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager VULNEREBILITY VULNEREBILITY
16.1.26 CodeBreach CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild VULNEREBILITY VULNEREBILITY
16.1.26 CVE-2026-23550 Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1. VULNEREBILITY VULNEREBILITY
16.1.26 CVE-2026-0227 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal VULNEREBILITY VULNEREBILITY
14.1.26 CVE-2025-12420 A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. VULNEREBILITY VULNEREBILITY
14.1.26 CVE-2025-8110 Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code. VULNEREBILITY VULNEREBILITY
14.1.26 CVE-2025-64155 An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests. VULNEREBILITY VULNEREBILITY
10.1.26 CVE-2025-69258 A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations. VULNEREBILITY VULNEREBILITY
10.1.26 CVE-2025-69260 (CVSS score: 7.5) - A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to create a denial-of-service condition on affected installations VULNEREBILITY VULNEREBILITY
10.1.26 CVE-2025-69259 (CVSS score: 7.5) - A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to create a denial-of-service condition on affected installations VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-66209 (CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-66210 (CVSS score: 10.0) - An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-66211 (CVSS score: 10.0) - A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-66212 (CVSS score: 10.0) - An authenticated command injection vulnerability in the Dynamic Proxy Configuration functionality allows users with server management permissions to execute arbitrary commands as root on managed servers VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-66213 (CVSS score: 10.0) - An authenticated command injection vulnerability in the File Storage Directory Mount functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-64419 (CVSS score: 9.7) - A command injection vulnerability via docker-compose.yaml that enables attackers to execute arbitrary system commands as root on the Coolify instance VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-64420 (CVSS score: 10.0) - An information disclosure vulnerability that allows low-privileged users to view the private key of the root user on the Coolify instance, allowing them to gain unauthorized access to the server via SSH and authenticate as the root user using the key VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-64424 (CVSS score: 9.4) - A command injection vulnerability was found in the git source input fields of a resource, allowing a low-privileged user (member) to execute system commands as root on the Coolify instance VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-59156 (CVSS score: 9.4) - An operating system command injection vulnerability that allows a low-privileged user to inject arbitrary Docker Compose directives and achieve root-level command execution on the underlying host VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-59157 (CVSS score: 10.0) - An operating system command injection vulnerability that allows a regular user to inject arbitrary shell commands that execute on the underlying server by using the Git Repository field during deployment VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-59158 (CVSS score: 9.4) - An improper encoding or escaping of the data that allows an authenticated user with low privileges to conduct a stored cross-site scripting (XSS) attack during project creation that's automatically executed in the browser context when an administrator later attempts to delete the project or its associated resource VULNEREBILITY VULNEREBILITY
8.1.26 RedLeaves VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2026-20029 A vulnerability in the licensing features of&nbsp;Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.&nbsp; This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-37164 (CVSS score: 10.0) - A code injection vulnerability in HPW OneView that allows a remote unauthenticated user to perform remote code execution VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2009-0556 (CVSS score: 8.8) - A code injection vulnerability in Microsoft Office PowerPoint that allows remote attackers to execute arbitrary code by means of memory corruption VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2026-21858 A vulnerability in n8n allows an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker. VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2026-21877 Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service. This could result in full compromise of the affected instance. VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-59469 (CVSS score: 7.2) - A vulnerability that allows a Backup or Tape Operator to write files as root VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-59468 (CVSS score: 6.7) - A vulnerability that allows a Backup Administrator to perform RCE as the postgres user by sending a malicious password parameter VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-55125 (CVSS score: 7.2) - A vulnerability that allows a Backup or Tape Operator to perform RCE as root by creating a malicious backup configuration file VULNEREBILITY VULNEREBILITY
8.1.26 CVE-2025-59470 Resolved in Veeam Backup & Replication 13.0.1.1071 VULNEREBILITY VULNEREBILITY
7.1.26 CVE-2026-0625 Multiple D-Link DSL gateway devices contain a command injection vulnerability in the dnscfg.cgi endpoint due to improper sanitization of user-supplied DNS configuration parameters. VULNEREBILITY VULNEREBILITY
7.1.26 CVE-2025-65606 TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service VULNEREBILITY VULNEREBILITY
7.1.26 CVE-2025-68668 n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide VULNEREBILITY VULNEREBILITY
3.1.26 CVE-2020-12812 An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username. VULNEREBILITY VULNEREBILITY
2.1.26 CVE-2025-59230 An elevation-of-privilege (EoP) vulnerability in Windows’ Remote Access Connection Manager (RasMan) service. A locally authenticated attacker could exploit improper access control to escalate their privileges to SYSTEM level on affected Windows installations. VULNEREBILITY VULNEREBILITY
2.1.26 CVE-2025-10294 A critical authentication bypass in the OwnID Passwordless Login plugin for WordPress. Due to improper validation of a shared secret, unauthenticated attackers could log in as arbitrary users, including administrators, without credentials. VULNEREBILITY VULNEREBILITY
2.1.26 CVE-2025-59295 A heap-based buffer overflow in the Windows MSHTML/Internet Explorer component, enabling arbitrary code execution via specially crafted data sent over the network. VULNEREBILITY VULNEREBILITY
2.1.26 CVE-2025-14847 Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions VULNEREBILITY VULNEREBILITY