Search

Search Results (331950 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-66410 2 Flipped-aurora, Gin-vue-admin Project 2 Gin-vue-admin, Gin-vue-admin 2026-02-06 9.1 Critical
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
CVE-2026-24423 1 Smartertools 1 Smartermail 2026-02-06 9.8 Critical
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
CVE-2025-66405 2 Portkey-ai, Portkey.ai 2 Gateway, Gateway 2026-02-06 9.8 Critical
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.
CVE-2025-66400 2 Syntax-tree, Unifiedjs 2 Mdast-util-to-hast, Mdast-util-to-hast 2026-02-06 5.3 Medium
mdast-util-to-hast is an mdast utility to transform to hast. From 13.0.0 to before 13.2.1, multiple (unprefixed) classnames could be added in markdown source by using character references. This could make rendered user supplied markdown code elements appear like the rest of the page. This vulnerability is fixed in 13.2.1.
CVE-2025-66401 2 Kapilduraphe, Mcp-watch Project 2 Mcp Watch, Mcp-watch 2026-02-06 9.8 Critical
MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.
CVE-2026-24917 2026-02-06 6.5 Medium
UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2026-0661 1 Autodesk 1 3ds Max 2026-02-06 7.8 High
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-69906 1 Monstra 1 Monstra Cms 2026-02-06 8.8 High
Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin. The application relies on blacklist-based file extension validation and stores uploaded files directly in a web-accessible directory. Under typical server configurations, this can allow an attacker to upload files that are interpreted as executable code, resulting in remote code execution.
CVE-2025-68121 1 Go Standard Library 1 Crypto Tls 2026-02-06 4.8 Medium
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
CVE-2026-0598 1 Redhat 1 Ansible Automation Platform 2026-02-06 4.2 Medium
A security flaw was identified in the Ansible Lightspeed API conversation endpoints that handle AI chat interactions. The APIs do not properly verify whether a conversation identifier belongs to the authenticated user making the request. As a result, an attacker with valid credentials could access or influence conversations owned by other users. This exposes sensitive conversation data and allows unauthorized manipulation of AI-generated outputs.
CVE-2025-55749 1 Xwiki 3 Wiki-platform, Xwiki, Xwiki-platform 2026-02-06 7.5 High
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
CVE-2025-3500 2 Avast, Microsoft 2 Antivirus, Windows 2026-02-06 9 Critical
Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.
CVE-2025-49643 1 Zabbix 2 Frontend, Zabbix 2026-02-06 6.5 Medium
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
CVE-2025-27232 1 Zabbix 2 Frontend, Zabbix 2026-02-06 4.9 Medium
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
CVE-2024-36599 1 Aegon 1 Life Insurance Management System 2026-02-06 6.1 Medium
A cross-site scripting (XSS) vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter at insertClient.php.
CVE-2024-36597 1 Projectworlds 1 Life Insurance Management System 2026-02-06 8.8 High
Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php.
CVE-2024-32256 1 Phpgurukul 1 Tourism Management System 2026-02-06 8.1 High
Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File with Dangerous Type via /tms/admin/change-image.php. When updating a current package, there are no checks for what types of files are uploaded from the image.
CVE-2023-51951 1 Stock Management System Project 1 Stock Management System 2026-02-06 9.8 Critical
SQL Injection vulnerability in Stock Management System 1.0 allows a remote attacker to execute arbitrary code via the id parameter in the manage_bo.php file.
CVE-2026-1962 1 Wekan Project 1 Wekan 2026-02-06 6.3 Medium
A vulnerability has been found in WeKan up to 8.20. The impacted element is an unknown function of the file server/attachmentMigration.js of the component Attachment Migration. The manipulation leads to improper access controls. The attack may be initiated remotely. Upgrading to version 8.21 is sufficient to resolve this issue. The identifier of the patch is 053bf1dfb76ef230db162c64a6ed50ebedf67eee. It is recommended to upgrade the affected component.
CVE-2026-1963 1 Wekan Project 1 Wekan 2026-02-06 6.3 Medium
A vulnerability was found in WeKan up to 8.20. This affects an unknown function of the file models/attachments.js of the component Attachment Storage. The manipulation results in improper access controls. The attack may be launched remotely. Upgrading to version 8.21 mitigates this issue. The patch is identified as c413a7e860bc4d93fe2adcf82516228570bf382d. Upgrading the affected component is advised.