Search Results (324377 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-25561 1 Wekan Project 1 Wekan 2026-02-10 7.5 High
WeKan versions prior to 8.19 contain an authorization weakness in the attachment upload API. The API does not fully validate that provided identifiers (such as boardId, cardId, swimlaneId, and listId) are consistent and refer to a coherent card/board relationship, enabling attempts to upload attachments with mismatched object relationships.
CVE-2026-25562 1 Wekan Project 1 Wekan 2026-02-10 4.3 Medium
WeKan versions prior to 8.19 contain an information disclosure vulnerability in the attachments publication. Attachment metadata can be returned without properly scoping results to boards and cards accessible to the requesting user, potentially exposing attachment metadata to unauthorized users.
CVE-2026-25563 1 Wekan Project 1 Wekan 2026-02-10 7.5 High
WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in checklist creation and related checklist routes. The implementation does not verify that the supplied cardId belongs to the supplied boardId, allowing cross-board ID tampering by manipulating identifiers.
CVE-2026-25564 1 Wekan Project 1 Wekan 2026-02-10 7.5 High
WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in checklist creation and related checklist routes. The implementation does not verify that the supplied cardId belongs to the supplied boardId, allowing cross-board ID tampering by manipulating identifiers.
CVE-2026-25565 1 Wekan Project 1 Wekan 2026-02-10 6.5 Medium
WeKan versions prior to 8.19 contain an authorization vulnerability where certain card update API paths validate only board read access rather than requiring write permission. This can allow users with read-only roles to perform card updates that should require write access.
CVE-2026-25567 1 Wekan Project 1 Wekan 2026-02-10 4.3 Medium
WeKan versions prior to 8.19 contain an insecure direct object reference (IDOR) in the card comment creation API. The endpoint accepts an authorId from the request body, allowing an authenticated user to spoof the recorded comment author by supplying another user's identifier.
CVE-2026-2239 1 Gimp 1 Gimp 2026-02-10 2.8 Low
No description is available for this CVE.
CVE-2025-36407 1 Ibm 1 Db2 2026-02-10 6.5 Medium
IBM® Db2® is vulnerable to a denial of service with a specially crafted query that uses ALTER TABLE operations.
CVE-2026-25808 1 Fedify-dev 1 Hollo 2026-02-10 7.5 High
Hollo is a federated single-user microblogging software designed to be federated through ActivityPub. Prior to 0.6.20 and 0.7.2, there is a security vulnerability where DMs and followers-only posts were exposed through the ActivityPub outbox endpoint without authorization. This vulnerability is fixed in 0.6.20 and 0.7.2.
CVE-2026-25061 1 Simsong 1 Tcpflow 2026-02-10 N/A
tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available.
CVE-2025-64093 1 Zenitel 4 Icx500, Icx500 Firmware, Icx510 and 1 more 2026-02-10 10 Critical
Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.
CVE-2025-14598 1 Cloudilyaerp 1 Bet E-portal 2026-02-10 9.8 Critical
BeeS Software Solutions BET Portal contains an SQL injection vulnerability in the login functionality of affected sites. The vulnerability enables arbitrary SQL commands to be executed on the backend database.
CVE-2025-67133 1 Heromotocorp 2 Vida V1 Pro, Vida V1 Pro Firmware 2026-02-10 7.5 High
An issue in Hero Motocorp Vida V1 Pro 2.0.7 allows a local attacker to cause a denial of service via the BLE component
CVE-2026-0817 2 Mediawiki, Wikimedia 3 Mediawiki, Campaignevents, Mediawiki-campaignevents Extension 2026-02-10 5.3 Medium
Missing Authorization vulnerability in Wikimedia Foundation MediaWiki - CampaignEvents extension allows Privilege Abuse.This issue affects MediaWiki - CampaignEvents extension: 1.45, 1.44, 1.43, 1.39.
CVE-2025-47320 1 Qualcomm 427 9206 Lte Modem, 9206 Lte Modem Firmware, Apq8017 and 424 more 2026-02-10 7.8 High
Memory corruption while processing MFC channel configuration during music playback.
CVE-2025-21484 1 Qualcomm 347 Apq8064au, Apq8064au Firmware, Aqt1000 and 344 more 2026-02-10 8.2 High
Information disclosure when UE receives the RTP packet from the network, while decoding and reassembling the fragments from RTP packet.
CVE-2026-2093 1 Flowring 1 Docpedia 2026-02-10 7.5 High
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
CVE-2026-25150 2 Qwik, Qwikdev 2 Qwik, Qwik 2026-02-10 9.3 Critical
Qwik is a performance focused javascript framework. Prior to version 1.19.0, a prototype pollution vulnerability exists in the formToObj() function within @builder.io/qwik-city middleware. The function processes form field names with dot notation (e.g., user.name) to create nested objects, but fails to sanitize dangerous property names like __proto__, constructor, and prototype. This allows unauthenticated attackers to pollute Object.prototype by sending crafted HTTP POST requests, potentially leading to privilege escalation, authentication bypass, or denial of service. This issue has been patched in version 1.19.0.
CVE-2026-25223 1 Fastify 1 Fastify 2026-02-10 7.5 High
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.2, a validation bypass vulnerability exists in Fastify where request body validation schemas specified by Content-Type can be completely circumvented. By appending a tab character (\t) followed by arbitrary content to the Content-Type header, attackers can bypass body validation while the server still processes the body as the original content type. This issue has been patched in version 5.7.2.
CVE-2025-13836 1 Python 2 Cpython, Python 2026-02-10 7.5 High
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.