Search

Search Results (331767 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-66415 1 Fastify 1 Reply-from 2026-02-06 5.4 Medium
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
CVE-2026-24918 2026-02-06 6.8 Medium
Address read vulnerability in the communication module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2025-66410 2 Flipped-aurora, Gin-vue-admin Project 2 Gin-vue-admin, Gin-vue-admin 2026-02-06 9.1 Critical
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
CVE-2026-24423 1 Smartertools 1 Smartermail 2026-02-06 9.8 Critical
SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
CVE-2025-66405 2 Portkey-ai, Portkey.ai 2 Gateway, Gateway 2026-02-06 9.8 Critical
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.
CVE-2025-66400 2 Syntax-tree, Unifiedjs 2 Mdast-util-to-hast, Mdast-util-to-hast 2026-02-06 5.3 Medium
mdast-util-to-hast is an mdast utility to transform to hast. From 13.0.0 to before 13.2.1, multiple (unprefixed) classnames could be added in markdown source by using character references. This could make rendered user supplied markdown code elements appear like the rest of the page. This vulnerability is fixed in 13.2.1.
CVE-2025-66401 2 Kapilduraphe, Mcp-watch Project 2 Mcp Watch, Mcp-watch 2026-02-06 9.8 Critical
MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.
CVE-2026-24917 2026-02-06 6.5 Medium
UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2026-0661 1 Autodesk 1 3ds Max 2026-02-06 7.8 High
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-69906 1 Monstra 1 Monstra Cms 2026-02-06 8.8 High
Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin. The application relies on blacklist-based file extension validation and stores uploaded files directly in a web-accessible directory. Under typical server configurations, this can allow an attacker to upload files that are interpreted as executable code, resulting in remote code execution.
CVE-2025-69619 1 Zipperapp 1 My Text Editor 2026-02-06 7.5 High
A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.
CVE-2025-68121 1 Go Standard Library 1 Crypto Tls 2026-02-06 4.8 Medium
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
CVE-2026-24927 2026-02-06 5.5 Medium
Out-of-bounds access vulnerability in the frequency modulation module. Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2026-0598 1 Redhat 1 Ansible Automation Platform 2026-02-06 4.2 Medium
A security flaw was identified in the Ansible Lightspeed API conversation endpoints that handle AI chat interactions. The APIs do not properly verify whether a conversation identifier belongs to the authenticated user making the request. As a result, an attacker with valid credentials could access or influence conversations owned by other users. This exposes sensitive conversation data and allows unauthorized manipulation of AI-generated outputs.
CVE-2025-55749 1 Xwiki 3 Wiki-platform, Xwiki, Xwiki-platform 2026-02-06 7.5 High
XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.
CVE-2025-3500 2 Avast, Microsoft 2 Antivirus, Windows 2026-02-06 9 Critical
Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.
CVE-2025-49643 1 Zabbix 2 Frontend, Zabbix 2026-02-06 6.5 Medium
An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
CVE-2025-27232 1 Zabbix 2 Frontend, Zabbix 2026-02-06 4.9 Medium
An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
CVE-2024-36599 1 Aegon 1 Life Insurance Management System 2026-02-06 6.1 Medium
A cross-site scripting (XSS) vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter at insertClient.php.
CVE-2024-36597 1 Projectworlds 1 Life Insurance Management System 2026-02-06 8.8 High
Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php.