Search

Search Results (331425 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-22771 1 Envoyproxy 1 Gateway 2026-02-05 8.8 High
Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. Prior to 1.5.7 and 1.6.2, EnvoyExtensionPolicy Lua scripts executed by Envoy proxy can be used to leak the proxy's credentials. These credentials can then be used to communicate with the control plane and gain access to all secrets that are used by Envoy proxy, e.g. TLS private keys and credentials used for downstream and upstream communication. This vulnerability is fixed in 1.5.7 and 1.6.2.
CVE-2026-22777 1 Comfy 2 Comfyui, Comfyui-manager 2026-02-05 7.5 High
ComfyUI-Manager is an extension designed to enhance the usability of ComfyUI. Prior to versions 3.39.2 and 4.0.5, an attacker can inject special characters into HTTP query parameters to add arbitrary configuration values to the config.ini file. This can lead to security setting tampering or modification of application behavior. This issue has been patched in versions 3.39.2 and 4.0.5.
CVE-2026-25526 1 Hubspot 1 Jinjava 2026-02-05 9.8 Critical
JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.
CVE-2026-22704 2 Haxtheweb, Psu 2 Hax, Haxcms-nodejs 2026-02-05 8.1 High
HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions 11.0.6 to before 25.0.0, HAX CMS is vulnerable to stored XSS, which could lead to account takeover. This issue has been patched in version 25.0.0.
CVE-2026-22703 1 Sigstore 1 Cosign 2026-02-05 5.5 Medium
Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event. This issue has been patched in versions 2.6.2 and 3.0.4.
CVE-2026-25536 1 Modelcontextprotocol 1 Typescript-sdk 2026-02-05 7.1 High
MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. From version 1.10.0 to 1.25.3, cross-client response data leak when a single McpServer/Server and transport instance is reused across multiple client connections, most commonly in stateless StreamableHTTPServerTransport deployments. This issue has been patched in version 1.26.0.
CVE-2026-22030 1 Shopify 2 React-router, Remix-run\/react 2026-02-05 6.5 Medium
React Router is a router for React. In @remix-run/server-runtime version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route action handlers in Framework Mode, or when using React Server Actions in the new unstable RSC modes. There is no impact if Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>) is being used. This issue has been patched in @remix-run/server-runtime version 2.17.3 and react-router version 7.12.0.
CVE-2025-15321 1 Tanium 1 Tanos 2026-02-05 2.7 Low
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CVE-2025-15323 1 Tanium 1 Tanos 2026-02-05 3.7 Low
Tanium addressed an improper certificate validation vulnerability in Tanium Appliance.
CVE-2025-15325 1 Tanium 1 Service Discover 2026-02-05 6.3 Medium
Tanium addressed an improper input validation vulnerability in Discover.
CVE-2025-15326 1 Tanium 1 Service Patch 2026-02-05 4.3 Medium
Tanium addressed an improper access controls vulnerability in Patch.
CVE-2025-15337 1 Tanium 1 Service Patch 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Patch.
CVE-2025-15327 1 Tanium 1 Service Deploy 2026-02-05 4.3 Medium
Tanium addressed an improper access controls vulnerability in Deploy.
CVE-2025-15334 1 Tanium 1 Service Threatresponse 2026-02-05 4.3 Medium
Tanium addressed an information disclosure vulnerability in Threat Response.
CVE-2025-15336 1 Tanium 1 Service Performance 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Performance.
CVE-2025-15339 1 Tanium 1 Service Discover 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Discover.
CVE-2025-15340 1 Tanium 1 Service Comply 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Comply.
CVE-2025-15341 1 Tanium 1 Service Benchmark 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
CVE-2025-15342 1 Tanium 1 Service Reputation 2026-02-05 4.3 Medium
Tanium addressed an improper access controls vulnerability in Reputation.
CVE-2025-15328 1 Tanium 1 Service Enforce 2026-02-05 5 Medium
Tanium addressed an improper link resolution before file access vulnerability in Enforce.