6.9
CVE-2026-3185 - feiyuchuixue sz-boot-parent API Endpoint sys-message authorization
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the argument messageId results in authorization bypass. The attack can be launched remotely. The exploit β¦
2.3
CVE-2026-28196 - Credentials Configuration Left on Disk After Disabling Versioned Settings
In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk
4.3
CVE-2026-28195 - Missing Authorization Allows Project Developers to Add Build Parameters
In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations
4.3
CVE-2026-28194 - Open Redirect in TeamCity React Project Creation Flow
In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow
8.8
CVE-2026-28193 - Unauthorized Access to App Permissions in JetBrains YouTrack
In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to the app permissions endpoint
9.8
CVE-2026-2624 - Authentication Bypass in ePati's Antikor NGFW
Missing Authentication for Critical Function vulnerability in ePati Cyber ββSecurity Technologies Inc. Antikor Next Generation Firewall (NGFW) allows Authentication Bypass.This issue affects Antikor Next Generation Firewall (NGFW): from v.2.0.1298 before v.2.0.1301.
2.6
CVE-2026-21725 - Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name
A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so. This requires several very stringent conditions to be met: - The attacker must have admin access to the specific datasource prior to its first deletiβ¦
5.9
CVE-2026-0704 - Octopus Server API Endpoint Allows Unvalidated File Removal
In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.
0.0
CVE-2026-3197 -
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage.
7
CVE-2026-25701 - Insecure Temporary File Handling in openSUSE sdbootutil Enables Local Privilege Escalation
An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users toΒ pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating thβ¦