Vulnerebility
2026()
2025()
| HOME
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
Vulnerebility Calendar Top Vulnerebility List of Attack
|
DATE |
NAME |
INFO |
CATEGORY |
SUBCATE |
| 14.5.26 | CVE-2026-44338 | PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34. | VULNEREBILITY | VULNEREBILITY |
| 14.5.26 | Fragnesia | Fragnesia: Linux Kernel Local Privilege Escalation via ESP-in-TCP | VULNEREBILITY | VULNEREBILITY |
| 14.5.26 | NGINX Rift | An 18 year old memory corruption flaw in NGINX Plus and NGINX Open Source lets an unauthenticated attacker crash worker processes or execute remote code with crafted HTTP requests. | VULNEREBILITY | VULNEREBILITY |
| 14.5.26 | CVE-2026-42945 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). | VULNEREBILITY | VULNEREBILITY |
| 14.5.26 | CVE-2026-42946 | (CVSS v4 score: 8.3) - An excessive memory allocation vulnerability in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that could allow a remote, unauthenticated attacker with adversary-in-the-middle (AitM) capabilities to control responses from an upstream server to read the memory of the NGINX worker process or restart it when scgi_pass or uwsgi_pass is configured. | VULNEREBILITY | VULNEREBILITY |
| 14.5.26 | CVE-2026-40701 | (CVSS v4 score: 6.3) - A use-after-free vulnerability in the ngx_http_ssl_module module that could allow a remote, unauthenticated attacker to have limited control of modification of data or restart the NGINX worker process when the ssl_verify_client directive is set to "on" or "optional," and the ssl_ocsp directive is set to "on." | VULNEREBILITY | VULNEREBILITY |
| 14.5.26 | CVE-2026-42934 | (CVSS v4 score: 6.3) - An out-of-bounds read vulnerability in the ngx_http_charset_module module that could allow a remote, unauthenticated attacker to disclose memory contents or restart the NGINX worker process when charset, source_charset, and charset_map, and proxy_pass with disabled buffering ("off") directives are configured. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-42826 | (CVSS score: 10.0) - An exposure of sensitive information to an unauthorized actor in Azure DevOps that allows an unauthorized attacker to disclose information over a network. (Requires no customer action) | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-33109 | (CVSS score: 9.9) - An improper access control in Azure Managed Instance for Apache Cassandra that allows an authorized attacker to execute code over a network. (Requires no customer action) | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-42898 | (CVSS score: 9.9) - A code injection vulnerability in Microsoft Dynamics 365 (on-premises) that allows an authorized attacker to execute code over a network. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-42823 | (CVSS score: 9.9) - An improper access control in Azure Logic Apps that allows an authorized attacker to elevate privileges over a network. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-41089 | (CVSS score: 9.8) - A stack-based buffer overflow in Windows Netlogon that allows an unauthorized attacker to execute code over a network without needing to sign in or have prior access by sending a specially crafted network request to a Windows server that is acting as a domain controller. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-33823 | (CVSS score: 9.6) - An improper authorization in Microsoft Teams that allows an authorized attacker to disclose information over a network. (Requires no customer action) | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-35428 | (CVSS score: 9.6) - A command injection vulnerability in Azure Cloud Shell that allows an unauthorized attacker to perform spoofing over a network. (Requires no customer action) | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-40379 | (CVSS score: 9.3) - An exposure of sensitive information to an unauthorized actor in Azure Entra ID that allows an unauthorized attacker to perform spoofing over a network. (Requires no customer action) | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-40402 | (CVSS score: 9.3) - A user-after-free in Windows Hyper-V that allows an unauthorized attacker to gain SYSTEM privileges and access the Hyper-V host environment. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-41103 | (CVSS score: 9.1) - An incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence that allows an unauthorized attacker to gain unauthorized access to Jira or Confluence as a valid user and perform actions with the same permissions as the compromised account. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-33117 | (CVSS score: 9.1) - An improper authentication in Azure SDK that allows an unauthorized attacker to bypass a security feature over a network. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-42833 | (CVSS score: 9.1) - An execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) that allows an authorized attacker to execute code over a network and gain the ability to interact with other tenant’s applications and content. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-33844 | (CVSS score: 9.0) - An improper input validation in Azure Managed Instance for Apache Cassandra that allows an authorized attacker to execute code over a network. (Requires no customer action) | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-40361 | (CVSS score: 8.4) - A use-after-free vulnerability in Microsoft Office Word that allows an unauthorized attacker to execute code locally without requiring user interaction. | VULNEREBILITY | VULNEREBILITY |
| 13.5.26 | CVE-2026-40364 | (CVSS score: 8.4) - A type confusion vulnerability in Microsoft Office Word that allows an unauthorized attacker to execute code locally without requiring user interaction. | VULNEREBILITY | VULNEREBILITY |
| 11.5.26 | CVE-2026-26956 | WASM Sandbox Escape | VULNEREBILITY | VULNEREBILITY |
| 11.5.26 | CVE-2026-20188 | A vulnerability in the connection-handling mechanism of Cisco Crosswork Network Controller (CNC) and Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to an inadequate implementation of rate-limiting on incoming network connections. | VULNEREBILITY | VULNEREBILITY |
| 11.5.26 | CVE-2023-43896 | A buffer overflow in Macrium Reflect 8.1.7544 and below allows attackers to escalate privileges or execute arbitrary code. | VULNEREBILITY | VULNEREBILITY |
| 11.5.26 | CVE-2026-7482 | Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. | VULNEREBILITY | VULNEREBILITY |
| 9.5.26 | CVE-2026-29201 | (CVSS score: 4.3) - An insufficient input validation of the feature file name in the "feature::LOADFEATUREFILE" adminbin call that could result in an arbitrary file read. | VULNEREBILITY | VULNEREBILITY |
| 9.5.26 | CVE-2026-29202 | (CVSS score: 8.8) - An insufficient input validation of the "plugin" parameter in the "create_user API" call that could result in arbitrary Perl code execution on behalf of the already authenticated account's system user. | VULNEREBILITY | VULNEREBILITY |
| 9.5.26 | CVE-2026-29203 | (CVSS score: 8.8) - An unsafe symlink handling vulnerability that allows a user to modify access permissions of an arbitrary file using chmod, resulting in denial-of-service or possible privilege escalation. | VULNEREBILITY | VULNEREBILITY |
| 8.5.26 | Dirty Frag | Dirty Frag (CVE-2026-43284, CVE-2026-43500) vulnerability fix is ready for testing | VULNEREBILITY | VULNEREBILITY |
| 8.5.26 | CVE-2026-6973 | An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-24118 | (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "__lookupGetter__" and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.4, patches in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-24120 | (CVSS score: 9.8) - A patch bypass for CVE-2023-37466 (CVSS score: 9.8) that could allow attackers to escape the sandbox through the species property of promise objects and execute arbitrary commands on the underlying host. (Affects versions <= 3.10.3, patched in 3.10.5) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-24781 | (CVSS score: 9.8) - A vulnerability that allows sandbox escape via the "inspect" function and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.3, patches in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-26332 | (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "SuppressedError" and permits an attacker to run arbitrary code on the underlying host. (Affects versions <= 3.10.4, patches in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-26956 | (CVSS score: 9.8) - A protection mechanism failure vulnerability that allows sandbox escape with arbitrary code execution by triggering a TypeError produced by Symbol-to-string coercion. (Affects version 3.10.4, confirmed on Node.js 25.6.1, patched in 3.10.5) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-43997 | (CVSS score: 10.0) - A code injection vulnerability that allows an attacker to obtain the host Object and escape the sandbox, leading to arbitrary code execution. (Affects versions <= 3.10.5, patched in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-43999 | (CVSS score: 9.9) - A vulnerability that allows a bypass of NodeVM's built-in allowlist and enables an attacker to load excluded builtins like child_process and achieve remote code execution. (Affects version 3.10.5, patched in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-44005 | (CVSS score: 10.0) - A vulnerability that allows attacker-controlled JavaScript to escape the sandbox and enable prototype pollution. (Affects versions 3.9.6-3.10.5, patched in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-44006 | (CVSS score: 10.0) - A code injection vulnerability via "BaseHandler.getPrototypeOf" that enables sandbox escape and remote code execution. (Affects versions <= 3.10.5, patched in 3.11.0) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-44007 | (CVSS score: 9.1) - An improper access control vulnerability that allows sandbox escape and execution of arbitrary operating system commands on the underlying host. (Affects versions <= 3.11.0, patched in 3.11.1) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-44008 | (CVSS score: 9.8) - A vulnerability that allows sandbox escape via "neutralizeArraySpeciesBatch()" and permits an attacker to execute arbitrary commands on the underlying host. (Affects versions <= 3.11.1, patched in 3.11.2) | VULNEREBILITY | VULNEREBILITY |
| 7.5.26 | CVE-2026-44009 | (CVSS score: 9.8) - A vulnerability that allows sandbox escape via a null proto exception and permits an attacker to execute arbitrary commands on the underlying host. (Affects versions <= 3.11.1, patched in 3.11.2) | VULNEREBILITY | VULNEREBILITY |
| 6.5.26 | CVE-2026-0300 | CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal | VULNEREBILITY | VULNEREBILITY |
| 6.5.26 | CVE-2026-23918 | Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. | VULNEREBILITY | VULNEREBILITY |
| 5.5.26 | CVE-2026-29014 | MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. | VULNEREBILITY | VULNEREBILITY |
| 5.5.26 | CVE-2026-22679 | Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. | VULNEREBILITY | VULNEREBILITY |
| 5.5.26 | CVE-2026-5174 | Improper input validation vulnerability in Progress Software MOVEit Automation allows Privilege Escalation. This issue affects MOVEit Automation: from 2025.1.0 before 2025.1.5, from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0. | VULNEREBILITY | VULNEREBILITY |
| 5.5.26 | CVE-2026-4670 | Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0. | VULNEREBILITY | VULNEREBILITY |
| 3.5.26 | Copy Fail | Most Linux LPEs need a race window or a kernel-specific offset. Copy Fail is a straight-line logic flaw — it needs neither. The same 732-byte Python script roots every Linux distribution shipped since 2017. | VULNEREBILITY | VULNEREBILITY |
| 3.5.26 | CVE-2026-41940 | CVE-2026-41940: cPanel & WHM Authentication Bypass | VULNEREBILITY | VULNEREBILITY |
| 3.5.26 | CVE-2026-31431 | Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 3.5.26 | CVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 30.4.26 | CVE-2026-26268 | Sandbox escape via Git hooks | VULNEREBILITY | VULNEREBILITY |
| 30.4.26 | CVE-2026-31431 | In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. | VULNEREBILITY | VULNEREBILITY |
| 29.4.26 | CVE-2026-32202 | Microsoft Windows Protection Mechanism Failure Vulnerability: Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network. | VULNEREBILITY | VULNEREBILITY |
| 29.4.26 | CVE-2024-1708 | ConnectWise ScreenConnect Path Traversal Vulnerability: ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. | VULNEREBILITY | VULNEREBILITY |
| 29.4.26 | CVE-2026-42208 | SQL injection in Proxy API key verification | VULNEREBILITY | VULNEREBILITY |
| 29.4.26 | CVE-2026-3854 | An improper neutralization of special elements... | VULNEREBILITY | VULNEREBILITY |
| 28.4.26 | CVE-2026-25874 | LeRobot Unsafe Deserialization Remote Code Execution via gRPC | VULNEREBILITY | VULNEREBILITY |
| 28.4.26 | CVE-2026-32202 | Windows Shell Spoofing Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 26.4.26 | CVE-2026-41651 | PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. | VULNEREBILITY | VULNEREBILITY |
| 25.4.26 | CVE-2024-57726 | (CVSS score: 9.9) - A missing authorization vulnerability in SimpleHelp that could allow low-privileged technicians to create API keys with excessive permissions, which can then be used to escalate privileges to the server admin role. | VULNEREBILITY | VULNEREBILITY |
| 25.4.26 | CVE-2024-57728 | (CVSS score: 7.2) - A path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e., zip slip), which can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. | VULNEREBILITY | VULNEREBILITY |
| 25.4.26 | CVE-2024-7399 | (CVSS score: 8.8) - A path traversal vulnerability in Samsung MagicINFO 9 Server that could allow an attacker to write arbitrary files as system authority. | VULNEREBILITY | VULNEREBILITY |
| 25.4.26 | CVE-2025-29635 | (CVSS score: 7.5) - A command injection vulnerability in end-of-life D-Link DIR-823X series routers that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. | VULNEREBILITY | VULNEREBILITY |
| 25.4.26 | CVE-2025-20333 | (CVSS score: 9.9) - An improper validation of user-supplied input vulnerability that could allow an authenticated, remote attacker with valid VPN user credentials to execute arbitrary code as root on an affected device by sending crafted HTTP requests. | VULNEREBILITY | VULNEREBILITY |
| 25.4.26 | CVE-2025-20362 | (CVSS score: 6.5) - An improper validation of user-supplied input vulnerability that could allow an unauthenticated, remote attacker to access restricted URL endpoints without authentication by sending crafted HTTP requests. | VULNEREBILITY | VULNEREBILITY |
| 24.4.26 | CVE-2026-33626 | Server-Side Request Forgery (SSRF) in Vision-Language Image Loading | VULNEREBILITY | VULNEREBILITY |
| 23.4.26 | CVE-2026-28950 | A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device. | VULNEREBILITY | VULNEREBILITY |
| 22.4.26 | CVE-2026-40372 | ASP.NET Core Elevation of Privilege Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 22.4.26 | CVE-2026-5752 | Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal. | VULNEREBILITY | VULNEREBILITY |
| 22.4.26 | Bridge:Break | Bridge:Break: Vulnerabilities Thrive in Serial-to-Ethernet Converters | VULNEREBILITY | VULNEREBILITY |
| 18.4.26 | CVE-2026-5194 | Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled. | VULNEREBILITY | VULNEREBILITY |
| 18.4.26 | CVE-2026-39987 | marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands | VULNEREBILITY | VULNEREBILITY |
| 17.4.26 | CVE-2026-20180 | A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at least Read Only Admin credentials. This vulnerability is due to insufficient validation of user-supplied input | VULNEREBILITY | VULNEREBILITY |
| 17.4.26 | CVE-2026-20186 | A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. | VULNEREBILITY | VULNEREBILITY |
| 17.4.26 | CVE-2026-20147 | (CVSS score: 9.9) - An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests | VULNEREBILITY | VULNEREBILITY |
| 17.4.26 | CVE-2026-20184 | (CVSS score: 9.8) - An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services. | VULNEREBILITY | VULNEREBILITY |
| 17.4.26 | CVE-2026-34197 | Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. | VULNEREBILITY | VULNEREBILITY |
| 15.4.26 | CVE-2026-33824 | Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 15.4.26 | CVE-2026-33825 | Microsoft Defender Elevation of Privilege Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 15.4.26 | CVE-2026-32201 | Microsoft SharePoint Server Spoofing Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 15.4.26 | CVE-2026-40176 | (CVSS score: 7.8) - An improper input validation vulnerability that could allow an attacker controlling a repository configuration in a malicious composer.json declaring a Perforce VCS repository to inject arbitrary commands, resulting in command execution in the context of the user running Composer. | VULNEREBILITY | VULNEREBILITY |
| 15.4.26 | CVE-2026-40261 | (CVSS score: 8.8) - An improper input validation vulnerability stemming from inadequate escaping that could allow an attacker to inject arbitrary commands through a crafted source reference containing shell metacharacters. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2026-21643 | (CVSS score: 9.1) - An SQL injection vulnerability in Fortinet FortiClient EMS that could allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2020-9715 | (CVSS score: 7.8) - A use-after-free vulnerability in Adobe Acrobat Reader that could result in remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2023-36424 | (CVSS score: 7.8) - An out-of-bounds read vulnerability in Microsoft Windows Common Log File System Driver that could result in privilege escalation. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2023-21529 | (CVSS score: 8.8) - A deserialization of untrusted data in Microsoft Exchange Server that could allow an authenticated attacker to achieve remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2025-60710 | (CVSS score: 7.8) - An improper link resolution before file access vulnerability in Host Process for Windows Tasks that could allow an authorized attacker to elevate privileges locally. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2012-1854 | (CVSS score: 7.8) - An insecure library loading vulnerability in Microsoft Visual Basic for Applications (VBA) that could result in remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 14.4.26 | CVE-2025-0520 | ShowDoc unrestricted file upload vulnerability | VULNEREBILITY | VULNEREBILITY |
| 13.4.26 | CVE-2026-34621 | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. | VULNEREBILITY | VULNEREBILITY |
| 12.4.26 | CVE-2026-1340 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 12.4.26 | CVE-2026-34197 | Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2026-1731 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2026-23760 | SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2025-52691 | Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2025-10035 | SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE‑2025‑31161 | Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-57728 | A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-57727 | CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A race condition exists in the AWS4-HMAC (compatible with S3) authorization method of the HTTP component of the FTP server. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-57726 | SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-27199 | SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-27198 | In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-1709 | In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-1708 | ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2024-21887 | A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2023-46805 | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2023-27351 | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2023-21529 | Microsoft Exchange Server Remote Code Execution Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2025-59528 | RCE in FlowiseAI/Flowise | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2023-50224 | TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. | VULNEREBILITY | VULNEREBILITY |
| 8.4.26 | CVE-2026-34040 | AuthZ plugin bypass with oversized request body | VULNEREBILITY | VULNEREBILITY |
| 5.4.26 | CVE-2025-53521 | When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | VULNEREBILITY | VULNEREBILITY |
| 5.4.26 | CVE-2026-3502 | TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. | VULNEREBILITY | VULNEREBILITY |
| 5.4.26 | CVE-2026-4415 | VULNEREBILITY | VULNEREBILITY | VULNEREBILITY |
| 3.4.26 | CVE-2026-21643 | An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. | VULNEREBILITY | VULNEREBILITY |
| 3.4.26 | CVE-2026-3098 | The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.5.1.33 via the 'actionExportAll' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | VULNEREBILITY | VULNEREBILITY |
| 3.4.26 | CVE-2026-20093 | Cisco Integrated Management Controller Authentication Bypass Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 1.4.26 | CVE-2026-5281 | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) | VULNEREBILITY | VULNEREBILITY |
| 1.4.26 | CVE-2026-3502 | TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. | VULNEREBILITY | VULNEREBILITY |
| 28.3.26 | CVE-2025-53521 | F5 BIG-IP Unspecified Vulnerability: F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 28.3.26 | CVE-2026-3055 | Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread | VULNEREBILITY | VULNEREBILITY |
| 28.3.26 | CVE-2026-4681 | A critical remote code execution (RCE) vulnerability has been reported in PTC Windchill and PTC FlexPLM. The vulnerability may be exploited through the deserialization of untrusted data. | VULNEREBILITY | VULNEREBILITY |
| 28.3.26 | CVE-2025-15517 | A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations. | VULNEREBILITY | VULNEREBILITY |
| 27.3.26 | Open Sesame | Open Sesame: How a Fail-Open Bug in Open VSX's New Scanner Let Malware Walk Right In | VULNEREBILITY | VULNEREBILITY |
| 26.3.26 | CVE-2026-3564 | A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios. | ||
| 26.3.26 | CVE-2026-22557 | A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account. | ||
| 24.3.26 | CVE-2026-3055 | (CVSS score: 9.3) - Insufficient input validation leading to memory overread | ||
| 24.3.26 | CVE-2026-4368 | (CVSS score: 7.7) - Race condition leading to user session mixup | ||
| 24.3.26 | CVE-2025-32975 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover. | ||
| 22.3.26 | CVE-2025-27889 | Wing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker. | ||
| 22.3.26 | CVE-2025-47812 | In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). | ||
| 21.3.26 | CVE-2026-21992 | Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). | ||
| 21.3.26 | CVE-2025-31277 | (CVSS score: 8.8) - A vulnerability in Apple WebKit that could result in memory corruption when processing maliciously crafted web content. (Fixed in July 2025) | ||
| 21.3.26 | CVE-2025-43510 | (CVSS score: 7.8) - A memory corruption vulnerability in Apple's kernel component that could allow a malicious application to cause unexpected changes in memory shared between processes. (Fixed in December 2025) | ||
| 21.3.26 | CVE-2025-43520 | (CVSS score: 8.8) - A memory corruption vulnerability in Apple's kernel component that could allow a malicious application to cause unexpected system termination or write kernel memory. (Fixed in December 2025) | ||
| 21.3.26 | CVE-2025-32432 | (CVSS score: 10.0) - A code injection vulnerability in Craft CMS that could allow a remote attacker to execute arbitrary code. (Fixed in April 2025) | ||
| 21.3.26 | CVE-2025-54068 | (CVSS score: 9.8) - A code injection vulnerability in Laravel Livewire that could allow unauthenticated attackers to achieve remote command execution in specific scenarios. (Fixed in July 2025) | ||
| 19.3.26 | DarkSword | Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites | ||
| 19.3.26 | CVE-2025-43520 | Memory corruption vulnerability in the iOS kernel (Patched in versions 18.7.2 and 26.1) | ||
| 19.3.26 | CVE-2025-43510 | Memory management vulnerability in the iOS kernel (Patched in versions 18.7.2 and 26.1) | ||
| 19.3.26 | CVE-2025-14174 | Memory corruption vulnerability in ANGLE (Patched in versions 18.7.3 and 26.2) | ||
| 19.3.26 | CVE-2025-43529 | Memory corruption vulnerability in JavaScriptCore (Patched in versions 18.7.3 and 26.2) | ||
| 19.3.26 | CVE-2026-20700 | User-mode Pointer Authentication Code (PAC) bypass in dyld (Patched in version 26.3) | ||
| 19.3.26 | CVE-2025-31277 | Memory corruption vulnerability in JavaScriptCore (Patched in version 18.6) | ||
| 19.3.26 | CVE-2026-20963 | (CVSS score: 8.8) - A deserialization of untrusted data vulnerability in Microsoft Office SharePoint that allows an unauthorized attacker to execute code over a network. (Fixed in January 2026) | ||
| 19.3.26 | CVE-2025-66376 | (CVSS score: 7.2) - A stored cross-site scripting vulnerability in the Classic UI of ZCS, where attackers could abuse Cascading Style Sheets (CSS) @import directives in an HTML e-mail message. (Fixed in versions 10.0.18 and 10.1.13 in November 2025) | ||
| 19.3.26 | CVE-2026-20131 | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. | ||
| 18.3.26 | CVE-2026-32746 | telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full. | ||
| 18.3.26 | CVE-2026-3888 | Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS. | ||
| 18.3.26 | CVE-2026-20643 | A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. | ||
| 17.3.26 | CVE-2025-47813 | Wing FTP Server Information Disclosure Vulnerability: Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie. | ||
| 15.3.26 | CVE-2023-43000 | Apple Multiple products Use-After-Free Vulnerability: Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption. | ||
| 15.3.26 | CVE-2021-30952 | Apple Multiple Products Integer Overflow or Wraparound Vulnerability: Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted web content that may lead to arbitrary code execution. | ||
| 15.3.26 | CVE-2023-41974 | Apple iOS and iPadOS Use-After-Free Vulnerability: Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges. | ||
| 13.3.26 | CVE-2026-21671 | (CVSS score: 9.1) - A vulnerability that allows an authenticated user with the Backup Administrator role to perform remote code execution in high availability (HA) deployments of Veeam Backup & Replication. | ||
| 13.3.26 | CVE-2026-21669 | (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server. | ||
| 13.3.26 | CVE-2026-21666 | (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server. | ||
| 13.3.26 | CVE-2026-21667 | (CVSS score: 9.9) - A vulnerability that allows an authenticated domain user to perform remote code execution on the Backup Server. | ||
| 13.3.26 | CVE-2026-21668 | (CVSS score: 8.8) - A vulnerability that allows an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository. | ||
| 13.3.26 | CVE-2026-21672 | (CVSS score: 8.8) - A vulnerability that allows local privilege escalation on Windows-based Veeam Backup & Replication servers. | ||
| 13.3.26 | CVE-2026-21708 | (CVSS score: 9.9) - A vulnerability that allows a Backup Viewer to perform remote code execution as the postgres user. | ||
| 13.3.26 | CVE-2026-3909 | (CVSS score: 8.8) - An out-of-bounds write vulnerability in the Skia 2D graphics library that allows a remote attacker to perform out-of-bounds memory access via a crafted HTML page. | ||
| 13.3.26 | CVE-2026-3910 | (CVSS score: 8.8) - An inappropriate implementation vulnerability in the V8 JavaScript and WebAssembly engine that allows a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | ||
| 13.3.26 | CrackArmor | CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root | ||
| 12.3.26 | CVE-2023-43010 | The issue was addressed with improved memory handling. This issue is fixed in iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2, Safari 17.2, iOS 16.7.15 and iPadOS 16.7.15, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption. | ||
| 12.3.26 | CVE-2025-68613 | n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. | ||
| 11.3.26 | CVE-2026-27577 | (CVSS score: 9.4) - Expression sandbox escape leading to remote code execution (RCE) | ||
| 11.3.26 | CVE-2026-27493 | (CVSS score: 9.5) - Unauthenticated expression evaluation via n8n's Form nodes | ||
| 11.3.26 | CVE-2026-26144 | Microsoft Excel Information Disclosure Vulnerability | ||
| 11.3.26 | CVE-2026-26118 | Azure MCP Server Tools Elevation of Privilege Vulnerability | ||
| 11.3.26 | CVE-2026-25187 | Winlogon Elevation of Privilege Vulnerability | ||
| 11.3.26 | CVE-2026-21536 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | ||
| 11.3.26 | CVE-2026-21262 | SQL Server Elevation of Privilege Vulnerability | ||
| 11.3.26 | CVE-2026-26127 | .NET Denial of Service Vulnerability | ||
| 11.3.26 | CVE-2026-27685 | SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system. | ||
| 11.3.26 | CVE-2019-17571 | Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. | ||
| 11.3.26 | LeakyLooker | LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities | ||
| 10.3.26 | CVE-2021-22054 | (CVSS score: 7.5) - A server-side request forgery (SSRF) vulnerability in Omnissa Workspace One UEM (formerly VMware Workspace One UEM) that could allow a malicious actor with network access to UEM to send requests without authentication and to gain access to sensitive information. | ||
| 10.3.26 | CVE-2025-26399 | (CVSS score: 9.8) - A deserialization of untrusted data vulnerability in the AjaxProxy component of SolarWinds Web Help Desk that could allow an attacker to run commands on the host machine. | ||
| 10.3.26 | CVE-2026-1603 | (CVSS score: 8.6) - An authentication bypass using an alternate path or channel vulnerability in Ivanti Endpoint Manager that could allow a remote unauthenticated attacker to leak specific stored credential data. | ||
| 8.3.26 | CVE-2026-27636 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's file upload restriction list in `app/Misc/Helper.php` does not include `.htaccess` or `.user.ini` files. | ||
| 8.3.26 | CVE-2026-28289 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check | ||
| 8.3.26 | CVE-2026-20131 | Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability | ||
| 8.3.26 | CVE-2026-20079 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | ||
| 6.3.26 | CVE-2026-20122 | A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. | ||
| 6.3.26 | CVE-2026-20128 | A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. | ||
| 6.3.26 | CVE-2017-7921 | (CVSS score: 9.8) - An improper authentication vulnerability affecting multiple Hikvision products that could allow a malicious user to escalate privileges on the system and gain access to sensitive information. | ||
| 6.3.26 | CVE-2021-22681 | (CVSS score: 9.8) - An insufficiently protected credentials vulnerability affecting multiple Rockwell Automation Studio 5000 Logix Designer, RSLogix 5000, and Logix Controllers that could allow an unauthorized user with network access to the controller to bypass the verification mechanism and authenticate with it, as well as alter its configuration and/or application code. | ||
| 5.3.26 | CVE-2026-1459 | A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.7)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device. | ||
| 5.3.26 | CVE-2025-13943 | A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device. | ||
| 5.3.26 | CVE-2025-13942 | A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests. | ||
| 5.3.26 | CVE-2025-11848 | A null pointer dereference vulnerability in the Wake-on-LAN CGI program of the Zyxel VMG3625-T50B firmware version through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request. | ||
| 5.3.26 | CVE-2025-11847 | A null pointer dereference vulnerability in the IP settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request. | ||
| 5.3.26 | CVE-2025-11846 | A null pointer dereference vulnerability in the account settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request. | ||
| 5.3.26 | CVE-2025-11845 | A null pointer dereference vulnerability in the certificate downloader CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request. | ||
| 4.3.26 | CVE-2026-21902 | An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root. | ||
| 4.3.26 | CVE-2026-22719 | VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress. | ||
| 3.3.26 | CVE-2026-21385 | Memory corruption while using alignments for memory allocation. | ||
| 3.3.26 | CVE-2026-0628 | Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High) | ||
| 1.3.26 | ClawJacked | OpenClaw Vulnerability: Website-to-Local Agent Takeover | ||
| 1.3.26 | CVE-2026-25593 | Unauthenticated Local RCE via WebSocket config.apply | ||
| 1.3.26 | CVE-2026-24763 | Command Injection in Clawdbot Docker Execution via PATH Environment Variable | ||
| 1.3.26 | CVE-2026-25157 | OS Command Injection via Project Root Path in sshNodeCommand | ||
| 1.3.26 | CVE-2026-25475 | OpenClaw may disclose local files via MEDIA: path staging | ||
| 1.3.26 | CVE-2025-49113 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | ||
| 27.2.26 | CVE-2026-20127 | an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. | ||
| 27.2.26 | CVE-2022-20775 | a path traversal vulnerability that allows an authenticated, local attacker to gain elevated privileges and execute arbitrary commands as root. | ||
| 27.2.26 | CVE-2026-20127 | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | ||
| 26.2.26 | Claude Code Vulnerable to Arbitrary Code Execution Due to Insufficient Startup Warning | When Claude Code was started in a new directory, it displayed a warning asking, "Do you trust the files in this folder?". This warning did not properly document that selecting "Yes, proceed" would allow Claude Code to execute files in the folder without additional confirmation. This may not have been clear to a user so we have updated the warning to clarify this functionality. | ||
| 26.2.26 | CVE-2025-59536 | (CVSS score: 8.7) - A code injection vulnerability that allows execution of arbitrary shell commands automatically upon tool initialization when a user starts Claude Code in an untrusted directory. (Fixed in version 1.0.111 in October 2025) | ||
| 26.2.26 | CVE-2026-21852 | (CVSS score: 5.3) - An information disclosure vulnerability in Claude Code's project-load flow that allows a malicious repository to exfiltrate data, including Anthropic API keys. (Fixed in version 2.0.65 in January 2026) | ||
| 26.2.26 | CVE-2025-40538 | A broken access control vulnerability that allows an attacker to create a system admin user and execute arbitrary code as root via domain admin or group admin privileges. | ||
| 26.2.26 | CVE-2025-40539 | A type confusion vulnerability that allows an attacker to execute arbitrary native code as root. | ||
| 26.2.26 | CVE-2025-40540 | A type confusion vulnerability that allows an attacker to execute arbitrary native code as root. | ||
| 26.2.26 | CVE-2025-40541 | An insecure direct object reference (IDOR) vulnerability that allows an attacker to execute native code as root. | ||
| 21.2.26 | CVE-2026-22769 | Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. | ||
| 21.2.26 | CVE-2025-49113 | A deserialization of untrusted data vulnerability that allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php. (Fixed in June 2025) | ||
| 21.2.26 | CVE-2025-68461 | A cross-site scripting vulnerability via the animate tag in an SVG document. (Fixed in December 2025) | ||
| 20.2.26 | CVE-2026-26119 | Windows Admin Center Elevation of Privilege Vulnerability | ||
| 20.2.26 | CVE-2026-26119 | Windows Admin Center Elevation of Privilege Vulnerability | ||
| 19.2.26 | CVE-2026-2329 | CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED) | ||
| 18.2.26 | CVE-2026-2441 | (CVSS score: 8.8) - A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. | ||
| 18.2.26 | CVE-2024-7694 | (CVSS score: 7.2) - An arbitrary file upload vulnerability in TeamT5 ThreatSonar Anti-Ransomware versions 3.4.5 and earlier that could allow an attacker to upload malicious files and achieve arbitrary system command execution on the server. | ||
| 18.2.26 | CVE-2020-7796 | (CVSS score: 9.8) - A server-side request forgery (SSRF) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow an attacker to send a crafted HTTP request to a remote host and obtain unauthorized access to sensitive information. | ||
| 18.2.26 | CVE-2008-0015 | (CVSS score: 8.8) - A stack-based buffer overflow vulnerability in Microsoft Windows Video ActiveX Control that could allow an attacker to achieve remote code execution by setting up a specially crafted web page. | ||
| 18.2.26 | CVE-2025-65717 | An issue in Visual Studio Code Extensions Live Server v5.7.9 allows attackers to exfiltrate files via user interaction with a crafted HTML page. | ||
| 18.2.26 | CVE-2025-65715 | An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace. | ||
| 18.2.26 | CVE-2025-65716 | An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file. | ||
| 16.2.26 | CVE-2026-2441 | Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) | ||
| 13.2.26 | CVE-2026-1731 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user. | ||
| 12.2.26 | CVE-2026-20700 | A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. | ||
| 11.2.26 | CVE-2026-21533 | (CVSS score: 7.8) - An improper privilege management in Windows Remote Desktop that allows an authorized attacker to elevate privileges locally. | VULNEREBILITY | VULNEREBILITY |
| 11.2.26 | CVE-2026-21525 | (CVSS score: 6.2) - A null pointer dereference in Windows Remote Access Connection Manager that allows an unauthorized attacker to deny service locally. | VULNEREBILITY | VULNEREBILITY |
| 11.2.26 | CVE-2026-21519 | (CVSS score: 7.8) - An access of resource using incompatible type ('type confusion') in the Desktop Window Manager that allows an authorized attacker to elevate privileges locally. | VULNEREBILITY | VULNEREBILITY |
| 11.2.26 | CVE-2026-21514 | (CVSS score: 7.8) - A reliance on untrusted inputs in a security decision in Microsoft Office Word that allows an unauthorized attacker to bypass a security feature locally. | VULNEREBILITY | VULNEREBILITY |
| 11.2.26 | CVE-2026-21513 | (CVSS score: 8.8) - A protection mechanism failure in MSHTML Framework that allows an unauthorized attacker to bypass a security feature over a network. | VULNEREBILITY | VULNEREBILITY |
| 11.2.26 | CVE-2026-21510 | (CVSS score: 8.8) - A protection mechanism failure in Windows Shell that allows an unauthorized attacker to bypass a security feature over a network. | VULNEREBILITY | VULNEREBILITY |
| 10.2.26 | CVE-2026-21643 | An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. | VULNEREBILITY | VULNEREBILITY |
| 9.2.26 | CVE-2026-1731 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user. | VULNEREBILITY | VULNEREBILITY |
| 8.2.26 | CVE-2025-11953 | The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments. | VULNEREBILITY | VULNEREBILITY |
| 6.2.26 | Evaluating and mitigating the growing risk of LLM-discovered 0-days | Claude Opus 4.6, released today, continues a trajectory of meaningful improvements in AI models’ cybersecurity capabilities. Last fall, we wrote that we believed we were at an inflection point for AI's impact on cybersecurity—that progress could become quite fast, and now was the moment to accelerate defensive use of AI. | VULNEREBILITY | VULNEREBILITY |
| 5.2.26 | CVE-2026-25049 | n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. | VULNEREBILITY | VULNEREBILITY |
| 4.2.26 | CVE-2021-39935 | (CVSS score: 7.5/6.8) - A server-side request forgery (SSRF) vulnerability in GitLab Community and Enterprise Editions that could allow unauthorized external users to perform Server Side Requests via the CI Lint API | VULNEREBILITY | VULNEREBILITY |
| 4.2.26 | CVE-2025-64328 | (CVSS score: 8.6) - An operating system command injection vulnerability in Sangoma FreePBX that could allow for a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function and potentially obtain remote access to the system as an asterisk user | VULNEREBILITY | VULNEREBILITY |
| 4.2.26 | CVE-2019-19006 | (CVSS score: 9.8) - An improper authentication vulnerability in Sangoma FreePBX that potentially allows unauthorized users to bypass password authentication and access services provided by the FreePBX administrator | VULNEREBILITY | VULNEREBILITY |
| 4.2.26 | CVE-2025-40551 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. | VULNEREBILITY | VULNEREBILITY |
| 4.2.26 | DockerDash | DockerDash: Two Attack Paths, One AI Supply Chain Crisis | VULNEREBILITY | VULNEREBILITY |
| 3.2.26 | CVE-2026-25253 | OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2026-24423 | SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2026-1340 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2026-1281 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2025-40553 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2025-40554 | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that, if exploited, could allow an attacker to invoke specific actions within Web Help Desk. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2025-40536 | SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2025-40551 | SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2025-40537 | SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions. | VULNEREBILITY | VULNEREBILITY |
| 30.1.26 | CVE-2025-40552 | SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication. | VULNEREBILITY | VULNEREBILITY |
| 28.1.26 | CVE-2026-22709 |
In vm2 for version 3.10.0, Promise.prototype.then Promise.prototype.catch
callback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. |
VULNEREBILITY | VULNEREBILITY |
| 28.1.26 | CVE-2026-1470 | (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n's main node by passing specially crafted JavaScript code | VULNEREBILITY | VULNEREBILITY |
| 28.1.26 | CVE-2026-0863 | (CVSS score: 8.5) - An eval injection vulnerability that could allow an authenticated user to bypass n8n's python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system | VULNEREBILITY | VULNEREBILITY |
| 28.1.26 | CVE-2026-24858 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 | VULNEREBILITY | VULNEREBILITY |
| 28.1.26 | Cellbreak | Cellbreak: Grist’s Pyodide Sandbox Escape and the Data-at-Risk Blast Radius | VULNEREBILITY | VULNEREBILITY |
| 28.1.26 | CVE-2026-24002 | Grist is spreadsheet software using Python as its formula language. Grist offers several methods for running those formulas in a sandbox, for cases where the user may be working with untrusted spreadsheets. | VULNEREBILITY | VULNEREBILITY |
| 27.1.26 | CVE-2026-21509 | Microsoft Office Security Feature Bypass Vulnerability | VULNEREBILITY | VULNEREBILITY |
| 27.1.26 | CVE-2025-69264 | pnpm is a package manager. Versions 10.0.0 through 10.25 allow git-hosted dependencies to execute arbitrary code during pnpm install, circumventing the v10 security feature "Dependency lifecycle scripts execution disabled by default". | VULNEREBILITY | VULNEREBILITY |
| 27.1.26 | CVE-2025-69263 | pnpm is a package manager. Versions 10.26.2 and below store HTTP tarball dependencies (and git-hosted tarballs) in the lockfile without integrity hashes. | VULNEREBILITY | VULNEREBILITY |
| 25.1.26 | HOUKEN | SEEKING A PATH BY LIVING ON THE EDGE WITH ZERO-DAYS | VULNEREBILITY | VULNEREBILITY |
| 25.1.26 | CVE-2023-27997 | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 | VULNEREBILITY | VULNEREBILITY |
| 25.1.26 | CVE-2022-42475 | A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. | VULNEREBILITY | VULNEREBILITY |
| 24.1.26 | CVE-2024-37079 | vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. | VULNEREBILITY | VULNEREBILITY |
| 24.1.26 | CVE-2025-54313 | (CVSS score: 7.5) - An embedded malicious code vulnerability in eslint-config-prettier that could allow for execution of a malicious DLL dubbed Scavenger Loader that's designed to deliver an information stealer | VULNEREBILITY | VULNEREBILITY |
| 24.1.26 | CVE-2025-31125 | (CVSS score: 5.3) - An improper access control vulnerability in Vite Vitejs that could allow contents of arbitrary files to be returned to the browser using ?inline&import or ?raw?import (Fixed in March 2025 with versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11) | VULNEREBILITY | VULNEREBILITY |
| 24.1.26 | CVE-2025-34026 | (CVSS score: 9.2) - An authentication bypass in the Versa Concerto SD-WAN orchestration platform that could allow an attacker to access administrative endpoints (Fixed in April 2025 with version 12.2.1 GA) | VULNEREBILITY | VULNEREBILITY |
| 24.1.26 | CVE-2025-68645 | (CVSS score: 8.8) - A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow a remote attacker to craft requests to the "/h/rest" endpoint and allow inclusion of arbitrary files from the WebRoot directory without any authentication (Fixed in November 2025 with version 10.1.13) | VULNEREBILITY | VULNEREBILITY |
| 23.1.26 | CVE-2025-59719 | An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message. | VULNEREBILITY | VULNEREBILITY |
| 23.1.26 | CVE-2025-59718 | A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 | VULNEREBILITY | VULNEREBILITY |
| 23.1.26 | CVE-2026-24061 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable. | VULNEREBILITY | VULNEREBILITY |
| 22.1.26 | CVE-2026-20045 | A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & | VULNEREBILITY | VULNEREBILITY |
| 22.1.26 | CVE-2026-22844 | A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access. | VULNEREBILITY | VULNEREBILITY |
| 21.1.26 | ChainLeak | ChainLeak: Critical AI framework vulnerabilities expose data, enable cloud takeover | VULNEREBILITY | AI |
| 21.1.26 | CVE-2026-1245 | A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. | VULNEREBILITY | VULNEREBILITY |
| 19.1.26 | CVE-2025-29943 | Improper access control within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline, potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest. | VULNEREBILITY | VULNEREBILITY |
| 18.1.26 | CVE-2025-6965 | There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above. | VULNEREBILITY | VULNEREBILITY |
| 18.1.26 | CVE-2025-36911 | In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation. | VULNEREBILITY | VULNEREBILITY |
| 17.1.26 | CVE-2025-22226 | VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. | VULNEREBILITY | VULNEREBILITY |
| 17.1.26 | CVE-2025-22225 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. | VULNEREBILITY | VULNEREBILITY |
| 17.1.26 | CVE-2025-22224 | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. | VULNEREBILITY | VULNEREBILITY |
| 17.1.26 | CVE-2025-68428 | jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. | VULNEREBILITY | VULNEREBILITY |
| 17.1.26 | CVE-2026-0625 | Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality | VULNEREBILITY | VULNEREBILITY |
| 16.1.26 | CVE-2025-20393 | Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager | VULNEREBILITY | VULNEREBILITY |
| 16.1.26 | CodeBreach | CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild | VULNEREBILITY | VULNEREBILITY |
| 16.1.26 | CVE-2026-23550 | Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1. | VULNEREBILITY | VULNEREBILITY |
| 16.1.26 | CVE-2026-0227 | PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal | VULNEREBILITY | VULNEREBILITY |
| 14.1.26 | CVE-2025-12420 | A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. | VULNEREBILITY | VULNEREBILITY |
| 14.1.26 | CVE-2025-8110 | Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code. | VULNEREBILITY | VULNEREBILITY |
| 14.1.26 | CVE-2025-64155 | An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests. | VULNEREBILITY | VULNEREBILITY |
| 10.1.26 | CVE-2025-69258 | A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations. | VULNEREBILITY | VULNEREBILITY |
| 10.1.26 | CVE-2025-69260 | (CVSS score: 7.5) - A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to create a denial-of-service condition on affected installations | VULNEREBILITY | VULNEREBILITY |
| 10.1.26 | CVE-2025-69259 | (CVSS score: 7.5) - A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to create a denial-of-service condition on affected installations | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-66209 | (CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-66210 | (CVSS score: 10.0) - An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-66211 | (CVSS score: 10.0) - A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-66212 | (CVSS score: 10.0) - An authenticated command injection vulnerability in the Dynamic Proxy Configuration functionality allows users with server management permissions to execute arbitrary commands as root on managed servers | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-66213 | (CVSS score: 10.0) - An authenticated command injection vulnerability in the File Storage Directory Mount functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-64419 | (CVSS score: 9.7) - A command injection vulnerability via docker-compose.yaml that enables attackers to execute arbitrary system commands as root on the Coolify instance | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-64420 | (CVSS score: 10.0) - An information disclosure vulnerability that allows low-privileged users to view the private key of the root user on the Coolify instance, allowing them to gain unauthorized access to the server via SSH and authenticate as the root user using the key | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-64424 | (CVSS score: 9.4) - A command injection vulnerability was found in the git source input fields of a resource, allowing a low-privileged user (member) to execute system commands as root on the Coolify instance | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-59156 | (CVSS score: 9.4) - An operating system command injection vulnerability that allows a low-privileged user to inject arbitrary Docker Compose directives and achieve root-level command execution on the underlying host | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-59157 | (CVSS score: 10.0) - An operating system command injection vulnerability that allows a regular user to inject arbitrary shell commands that execute on the underlying server by using the Git Repository field during deployment | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-59158 | (CVSS score: 9.4) - An improper encoding or escaping of the data that allows an authenticated user with low privileges to conduct a stored cross-site scripting (XSS) attack during project creation that's automatically executed in the browser context when an administrator later attempts to delete the project or its associated resource | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | RedLeaves | VULNEREBILITY | VULNEREBILITY | |
| 8.1.26 | CVE-2026-20029 | A vulnerability in the licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-37164 | (CVSS score: 10.0) - A code injection vulnerability in HPW OneView that allows a remote unauthenticated user to perform remote code execution | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2009-0556 | (CVSS score: 8.8) - A code injection vulnerability in Microsoft Office PowerPoint that allows remote attackers to execute arbitrary code by means of memory corruption | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2026-21858 | A vulnerability in n8n allows an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker. | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2026-21877 | Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service. This could result in full compromise of the affected instance. | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-59469 | (CVSS score: 7.2) - A vulnerability that allows a Backup or Tape Operator to write files as root | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-59468 | (CVSS score: 6.7) - A vulnerability that allows a Backup Administrator to perform RCE as the postgres user by sending a malicious password parameter | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-55125 | (CVSS score: 7.2) - A vulnerability that allows a Backup or Tape Operator to perform RCE as root by creating a malicious backup configuration file | VULNEREBILITY | VULNEREBILITY |
| 8.1.26 | CVE-2025-59470 | Resolved in Veeam Backup & Replication 13.0.1.1071 | VULNEREBILITY | VULNEREBILITY |
| 7.1.26 | CVE-2026-0625 | Multiple D-Link DSL gateway devices contain a command injection vulnerability in the dnscfg.cgi endpoint due to improper sanitization of user-supplied DNS configuration parameters. | VULNEREBILITY | VULNEREBILITY |
| 7.1.26 | CVE-2025-65606 | TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service | VULNEREBILITY | VULNEREBILITY |
| 7.1.26 | CVE-2025-68668 | n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide | VULNEREBILITY | VULNEREBILITY |
| 3.1.26 | CVE-2020-12812 | An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username. | VULNEREBILITY | VULNEREBILITY |
| 2.1.26 | CVE-2025-59230 | An elevation-of-privilege (EoP) vulnerability in Windows’ Remote Access Connection Manager (RasMan) service. A locally authenticated attacker could exploit improper access control to escalate their privileges to SYSTEM level on affected Windows installations. | VULNEREBILITY | VULNEREBILITY |
| 2.1.26 | CVE-2025-10294 | A critical authentication bypass in the OwnID Passwordless Login plugin for WordPress. Due to improper validation of a shared secret, unauthenticated attackers could log in as arbitrary users, including administrators, without credentials. | VULNEREBILITY | VULNEREBILITY |
| 2.1.26 | CVE-2025-59295 | A heap-based buffer overflow in the Windows MSHTML/Internet Explorer component, enabling arbitrary code execution via specially crafted data sent over the network. | VULNEREBILITY | VULNEREBILITY |
| 2.1.26 | CVE-2025-14847 | Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions | VULNEREBILITY | VULNEREBILITY |