Search

Search Results (331354 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-12131 2026-02-05 N/A
A truncated 802.15.4 packet can lead to an assert, resulting in a denial of service.
CVE-2025-15342 1 Tanium 1 Service Reputation 2026-02-05 4.3 Medium
Tanium addressed an improper access controls vulnerability in Reputation.
CVE-2025-15341 1 Tanium 1 Service Benchmark 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
CVE-2025-15340 1 Tanium 1 Service Comply 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Comply.
CVE-2025-15339 1 Tanium 1 Service Discover 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Discover.
CVE-2025-15336 1 Tanium 1 Service Performance 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Performance.
CVE-2025-15334 1 Tanium 1 Service Threatresponse 2026-02-05 4.3 Medium
Tanium addressed an information disclosure vulnerability in Threat Response.
CVE-2025-15327 1 Tanium 1 Service Deploy 2026-02-05 4.3 Medium
Tanium addressed an improper access controls vulnerability in Deploy.
CVE-2025-15337 1 Tanium 1 Service Patch 2026-02-05 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Patch.
CVE-2025-15326 1 Tanium 1 Service Patch 2026-02-05 4.3 Medium
Tanium addressed an improper access controls vulnerability in Patch.
CVE-2025-15325 1 Tanium 1 Service Discover 2026-02-05 6.3 Medium
Tanium addressed an improper input validation vulnerability in Discover.
CVE-2025-15323 1 Tanium 1 Tanos 2026-02-05 3.7 Low
Tanium addressed an improper certificate validation vulnerability in Tanium Appliance.
CVE-2025-15321 1 Tanium 1 Tanos 2026-02-05 2.7 Low
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CVE-2025-15289 1 Tanium 1 Service Interact 2026-02-05 3.1 Low
Tanium addressed an improper access controls vulnerability in Interact.
CVE-2025-47911 2026-02-05 N/A
The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
CVE-2025-58190 2026-02-05 N/A
The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
CVE-2026-0715 2026-02-05 N/A
Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.
CVE-2025-70073 2026-02-05 N/A
An issue in ChestnutCMS v.1.5.8 and before allows a remote attacker to execute arbitrary code via the template creation function
CVE-2025-69906 2026-02-05 N/A
Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin. The application relies on blacklist-based file extension validation and stores uploaded files directly in a web-accessible directory. Under typical server configurations, this can allow an attacker to upload files that are interpreted as executable code, resulting in remote code execution.
CVE-2025-68723 2026-02-05 N/A
Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabilities in the WebAdmin interface. Three instances exist: (1) the log file name parameter in the Local Services Log page, (2) certificate file content in the SSL Certificates View Usage feature, and (3) the Certificate File name parameter in the WebMail Listeners SSL settings. Attackers can inject malicious JavaScript payloads that execute in administrators' browsers when they access affected pages or features, enabling privilege escalation attacks where low-privileged admins can force high-privileged admins to perform unauthorized actions.