Search Results (10594 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-15289 1 Tanium 2 Interact, Service Interact 2026-02-10 3.1 Low
Tanium addressed an improper access controls vulnerability in Interact.
CVE-2025-15330 1 Tanium 2 Deploy, Service Deploy 2026-02-10 8.8 High
Tanium addressed an improper input validation vulnerability in Deploy.
CVE-2025-15327 1 Tanium 2 Deploy, Service Deploy 2026-02-10 4.3 Medium
Tanium addressed an improper access controls vulnerability in Deploy.
CVE-2025-15326 1 Tanium 2 Patch, Service Patch 2026-02-10 4.3 Medium
Tanium addressed an improper access controls vulnerability in Patch.
CVE-2025-15321 1 Tanium 1 Tanos 2026-02-10 2.7 Low
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CVE-2025-2848 1 Synology 2 Diskstation Manager, Mail Server 2026-02-09 6.3 Medium
A vulnerability in Synology Mail Server allows remote authenticated attackers to read and write non-sensitive settings, and disable some non-critical functions.
CVE-2025-68140 2 Everest, Linuxfoundation 2 Everest-core, Everest 2026-02-06 4.3 Medium
EVerest is an EV charging software stack. Prior to version 2025.9.0, once the validity of the received V2G message has been verified, it is checked whether the submitted session ID matches the registered one. However, if no session has been registered, the default value is 0. Therefore, a message submitted with a session ID of 0 is accepted, as it matches the registered value. This could allow unauthorized and anonymous indirect emission of MQTT messages and communication with V2G messages handlers, updating a session context. Version 2025.9.0 fixes the issue.
CVE-2025-13985 2 Drupal, Ithom 2 Entity Share, Entity Share 2026-02-06 5.3 Medium
Incorrect Authorization vulnerability in Drupal Entity Share allows Forceful Browsing.This issue affects Entity Share: from 0.0.0 before 3.13.0.
CVE-2025-27461 1 Endress 2 Meac300-fnade4, Meac300-fnade4 Firmware 2026-02-06 7.6 High
During startup, the device automatically logs in the EPC2 Windows user without requesting a password.
CVE-2025-63294 1 Workdo 2 Hrm Saas, Hrm Saas Hr And Payroll Tool 2026-02-04 6.5 Medium
WorkDo HRM SaaS HR and Payroll Tool 8.1 is affected vulnerable to Insecure Permissions. An authenticated user can create leave or resignation records on behalf of other users.
CVE-2026-22806 1 Loft-sh 1 Loft 2026-02-04 9.1 Critical
vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to access resources outside of it. However, the user still cannot access resources beyond what is accessible to the owner of the access key. Versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10 fix the vulnerability. Some other mitigations are available. Users can limit exposure by reviewing access keys which are scoped and ensuring any users with access to them have appropriate permissions set. Creating automation users with very limited permissions and using access keys for these automation users can be used as a temporary workaround where upgrading is not immediately possible but scoped access keys are needed.
CVE-2025-54159 1 Synology 2 Beedrive, Beedrive For Desktop 2026-02-04 7.5 High
Missing authorization vulnerability in BeeDrive in Synology BeeDrive for desktop before 1.4.2-13960 allows remote attackers to delete arbitrary files via unspecified vectors.
CVE-2026-1751 1 Gitlab 1 Gitlab 2026-02-04 3.1 Low
A vulnerability has been discovered in GitLab CE/EE affecting all versions starting with 16.8 before 18.5.0 that could have allowed unauthorized edits to merge request approval rules under certain conditions.
CVE-2025-48784 1 Scshr 1 Hr Portal 2026-02-04 7.5 High
A missing authorization vulnerability in Soar Cloud HRD Human Resource Management System through version 7.3.2025.0408 allows remote attackers to modify system settings without prior authorization.
CVE-2025-15115 1 Petlibro 2 Petlibro, Smart Pet Feeder Platform 2026-02-03 6.5 Medium
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authentication bypass vulnerability that allows unauthenticated attackers to access any user account by exploiting OAuth token validation flaws in the social login system. Attackers can send requests to /member/auth/thirdLogin with arbitrary Google IDs and phoneBrand parameters to obtain full session tokens and account access without proper OAuth verification.
CVE-2025-13348 1 Asus 1 Asus Business Manager 2026-02-03 N/A
An improper access control vulnerability exists in ASUS Secure Delete Driver of ASUS Business Manager. This vulnerability can be triggered by a local user sending a specially crafted request, potentially leading to the creation of arbitrary files in a specified path. Refer to the "Security Update for ASUS Business Manager" section on the ASUS Security Advisory for more information.
CVE-2025-49181 1 Sick 1 Media Server 2026-02-03 8.6 High
Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files’ root path as well as the TCP ports the service is running on, leading to a Denial of Service attack.
CVE-2018-25146 1 Microhardcorp 22 Bullet-3g, Bullet-3g Firmware, Bullet-lte and 19 more 2026-02-02 8.1 High
Microhard Systems IPn4G 1.1.0 contains an undocumented vulnerability that allows authenticated attackers to list and manipulate running system processes. Attackers can send arbitrary signals to kill background processes and system services through a hidden feature, potentially causing service disruption and requiring device restart.
CVE-2022-2552 1 Awesomemotive 1 Duplicator 2026-02-02 5.3 Medium
The Duplicator WordPress plugin before 1.4.7 does not authenticate or authorize visitors before displaying information about the system such as server software, php version and full file system path to the site.
CVE-2025-70985 2 Ruoyi, Y Project 2 Ruoyi, Ruoyi 2026-01-30 9.1 Critical
Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.