Search

Search Results (329601 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-24124 1 Dragonflyoss 1 Dragonfly2 2026-01-24 N/A
Dragonfly is an open source P2P-based file distribution and image acceleration system. In versions 2.4.1-rc.0 and below, the Job API endpoints (/api/v1/jobs) lack JWT authentication middleware and RBAC authorization checks in the routing configuration. This allows any unauthenticated user with access to the Manager API to view, update and delete jobs. The issue is fixed in version 2.4.1-rc.1.
CVE-2026-21264 1 Microsoft 1 Micrososft Account 2026-01-24 9.3 Critical
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-24306 1 Microsoft 1 Azure Front Door 2026-01-24 9.8 Critical
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-67847 1 Moodle 1 Moodle 2026-01-24 8.8 High
A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.
CVE-2026-22271 2026-01-24 7.5 High
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and Dell ObjectScale versions prior to 4.2.0.0, contains a Cleartext Transmission of Sensitive Information vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to information exposure.
CVE-2024-37079 1 Vmware 2 Cloud Foundation, Vcenter Server 2026-01-24 9.8 Critical
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CVE-2026-24307 1 Microsoft 1 365 Copilot 2026-01-24 9.3 Critical
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
CVE-2024-37080 1 Vmware 2 Cloud Foundation, Vcenter Server 2026-01-24 9.8 Critical
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CVE-2026-24305 1 Microsoft 1 Microsoft Entra Id 2026-01-24 9.3 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2026-24649 2026-01-24 N/A
Not used
CVE-2026-24648 2026-01-24 N/A
Not used
CVE-2026-24647 2026-01-24 N/A
Not used
CVE-2026-24646 2026-01-24 N/A
Not used
CVE-2026-24645 2026-01-24 N/A
Not used
CVE-2026-24644 2026-01-24 N/A
Not used
CVE-2026-24643 2026-01-24 N/A
Not used
CVE-2026-24642 2026-01-24 N/A
Not used
CVE-2026-24469 2026-01-24 7.5 High
C++ HTTP Server is an HTTP/1.1 server built to handle client connections and serve HTTP requests. Versions 1.0 and below are vulnerable to Path Traversal via the RequestHandler::handleRequest method. This flaw allows an unauthenticated, remote attacker to read arbitrary files from the server's filesystem by crafting a malicious HTTP GET request containing ../ sequences. The application fails to sanitize the filename variable derived from the user-controlled URL path, directly concatenating it to the files_directory base path and enabling traversal outside the intended root. No patch was available at the time of publication.
CVE-2026-24422 2026-01-24 5.3 Medium
phpMyFAQ is an open source FAQ web application. In versions 4.0.16 and below, multiple public API endpoints improperly expose sensitive user information due to insufficient access controls. The OpenQuestionController::list() endpoint calls Question::getAll() with showAll=true by default, returning records marked as non-public (isVisible=false) along with user email addresses, with similar exposures present in comment, news, and FAQ APIs. This information disclosure vulnerability could enable attackers to harvest email addresses for phishing campaigns or access content that was explicitly marked as private. This issue has been fixed in version 4.0.17.
CVE-2026-24421 2026-01-24 6.5 Medium
phpMyFAQ is an open source FAQ web application. Versions 4.0.16 and below have flawed authorization logic which exposes the /api/setup/backup endpoint to any authenticated user despite their permissions. SetupController.php uses userIsAuthenticated() but does not verify that the requester has configuration/admin permissions. Non-admin users can trigger a configuration backup and retrieve its path. The endpoint only checks authentication, not authorization, and returns a link to the generated ZIP. This issue is fixed in version 4.0.17.