Vulnerebility 2026
2026()
2025()
Vulnerebility Calendar
Top
40 in years Top Vulnerebility
List of Attack
EVCatalog | 2025
2024
|
DATE |
NAME |
CATEGORY |
SUB |
|
|
24.1.26 |
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. |
VULNEREBILITY | VULNEREBILITY | |
|
24.1.26 |
(CVSS score: 7.5) - An embedded malicious code vulnerability in eslint-config-prettier that could allow for execution of a malicious DLL dubbed Scavenger Loader that's designed to deliver an information stealer |
VULNEREBILITY | VULNEREBILITY | |
|
24.1.26 |
(CVSS score: 5.3) - An improper access control vulnerability in Vite Vitejs that could allow contents of arbitrary files to be returned to the browser using ?inline&import or ?raw?import (Fixed in March 2025 with versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11) |
VULNEREBILITY | VULNEREBILITY | |
|
24.1.26 |
(CVSS score: 9.2) - An authentication bypass in the Versa Concerto SD-WAN orchestration platform that could allow an attacker to access administrative endpoints (Fixed in April 2025 with version 12.2.1 GA) |
VULNEREBILITY | VULNEREBILITY | |
|
24.1.26 |
(CVSS score: 8.8) - A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow a remote attacker to craft requests to the "/h/rest" endpoint and allow inclusion of arbitrary files from the WebRoot directory without any authentication (Fixed in November 2025 with version 10.1.13) |
VULNEREBILITY | VULNEREBILITY | |
|
23.1.26 |
An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message. |
VULNEREBILITY | VULNEREBILITY | |
|
23.1.26 |
A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 |
VULNEREBILITY | VULNEREBILITY | |
|
23.1.26 |
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable. |
VULNEREBILITY | VULNEREBILITY | |
|
22.1.26 |
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & |
VULNEREBILITY | VULNEREBILITY | |
|
22.1.26 |
A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote code execution of the MMR via network access. |
VULNEREBILITY | VULNEREBILITY | |
|
21.1.26 |
ChainLeak: Critical AI framework vulnerabilities expose data, enable cloud takeover |
VULNEREBILITY |
AI |
|
|
21.1.26 |
A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. |
VULNEREBILITY | VULNEREBILITY | |
|
19.1.26 |
Improper access control within AMD CPUs may allow an admin-privileged attacker to modify the configuration of the CPU pipeline, potentially resulting in the corruption of the stack pointer inside an SEV-SNP guest. |
VULNEREBILITY | VULNEREBILITY | |
|
18.1.26 |
There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above. |
VULNEREBILITY | VULNEREBILITY | |
|
18.1.26 |
In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation. |
VULNEREBILITY | VULNEREBILITY | |
|
17.1.26 |
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. |
VULNEREBILITY | VULNEREBILITY | |
|
17.1.26 |
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. |
VULNEREBILITY | VULNEREBILITY | |
|
17.1.26 |
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. |
VULNEREBILITY | VULNEREBILITY | |
|
17.1.26 |
jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.0.0, user control of the first argument of the loadFile method in the node.js build allows local file inclusion/path traversal. |
VULNEREBILITY | VULNEREBILITY | |
|
17.1.26 |
Multiple D-Link DSL/DIR/DNS devices contain an authentication bypass and improper access control vulnerability in the dnscfg.cgi endpoint that allows an unauthenticated attacker to access DNS configuration functionality |
VULNEREBILITY | VULNEREBILITY | |
|
16.1.26 |
Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager |
VULNEREBILITY | VULNEREBILITY | |
|
16.1.26 |
CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild |
VULNEREBILITY | VULNEREBILITY | |
|
16.1.26 |
Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1. |
VULNEREBILITY | VULNEREBILITY | |
|
16.1.26 |
PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal |
VULNEREBILITY | VULNEREBILITY | |
|
14.1.26 |
A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. |
VULNEREBILITY | VULNEREBILITY | |
|
14.1.26 |
Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code. |
VULNEREBILITY | VULNEREBILITY | |
|
14.1.26 |
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests. |
VULNEREBILITY | VULNEREBILITY | |
|
10.1.26 |
A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations. |
VULNEREBILITY | VULNEREBILITY | |
|
10.1.26 |
(CVSS score: 7.5) - A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to create a denial-of-service condition on affected installations |
VULNEREBILITY | VULNEREBILITY | |
|
10.1.26 |
(CVSS score: 7.5) - A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote, unauthenticated attacker to create a denial-of-service condition on affected installations |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - An authenticated command injection vulnerability in the Dynamic Proxy Configuration functionality allows users with server management permissions to execute arbitrary commands as root on managed servers |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - An authenticated command injection vulnerability in the File Storage Directory Mount functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 9.7) - A command injection vulnerability via docker-compose.yaml that enables attackers to execute arbitrary system commands as root on the Coolify instance |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - An information disclosure vulnerability that allows low-privileged users to view the private key of the root user on the Coolify instance, allowing them to gain unauthorized access to the server via SSH and authenticate as the root user using the key |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 9.4) - A command injection vulnerability was found in the git source input fields of a resource, allowing a low-privileged user (member) to execute system commands as root on the Coolify instance |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 9.4) - An operating system command injection vulnerability that allows a low-privileged user to inject arbitrary Docker Compose directives and achieve root-level command execution on the underlying host |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - An operating system command injection vulnerability that allows a regular user to inject arbitrary shell commands that execute on the underlying server by using the Git Repository field during deployment |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 9.4) - An improper encoding or escaping of the data that allows an authenticated user with low privileges to conduct a stored cross-site scripting (XSS) attack during project creation that's automatically executed in the browser context when an administrator later attempts to delete the project or its associated resource |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
|
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
A vulnerability in the licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 10.0) - A code injection vulnerability in HPW OneView that allows a remote unauthenticated user to perform remote code execution |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 8.8) - A code injection vulnerability in Microsoft Office PowerPoint that allows remote attackers to execute arbitrary code by means of memory corruption |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
A vulnerability in n8n allows an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker. |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
Under certain conditions, an authenticated user may be able to cause untrusted code to be executed by the n8n service. This could result in full compromise of the affected instance. |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 7.2) - A vulnerability that allows a Backup or Tape Operator to write files as root |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 6.7) - A vulnerability that allows a Backup Administrator to perform RCE as the postgres user by sending a malicious password parameter |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
(CVSS score: 7.2) - A vulnerability that allows a Backup or Tape Operator to perform RCE as root by creating a malicious backup configuration file |
VULNEREBILITY | VULNEREBILITY | |
|
8.1.26 |
Resolved in Veeam Backup & Replication 13.0.1.1071 |
VULNEREBILITY | VULNEREBILITY | |
|
7.1.26 |
Multiple D-Link DSL gateway devices contain a command injection vulnerability in the dnscfg.cgi endpoint due to improper sanitization of user-supplied DNS configuration parameters. |
VULNEREBILITY | VULNEREBILITY | |
|
7.1.26 |
TOTOLINK EX200 firmware-upload error handling can activate an unauthenticated root telnet service |
VULNEREBILITY | VULNEREBILITY | |
|
7.1.26 |
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide |
VULNEREBILITY | VULNEREBILITY | |
|
3.1.26 |
An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username. |
VULNEREBILITY | VULNEREBILITY | |
|
2.1.26 |
An elevation-of-privilege (EoP) vulnerability in Windows’ Remote Access Connection Manager (RasMan) service. A locally authenticated attacker could exploit improper access control to escalate their privileges to SYSTEM level on affected Windows installations. |
VULNEREBILITY | VULNEREBILITY | |
|
2.1.26 |
A critical authentication bypass in the OwnID Passwordless Login plugin for WordPress. Due to improper validation of a shared secret, unauthenticated attackers could log in as arbitrary users, including administrators, without credentials. |
VULNEREBILITY | VULNEREBILITY | |
|
2.1.26 |
A heap-based buffer overflow in the Windows MSHTML/Internet Explorer component, enabling arbitrary code execution via specially crafted data sent over the network. |
VULNEREBILITY | VULNEREBILITY | |
|
2.1.26 |
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions |