9.8

CVSS3.1

CVE-2026-2758 - Use-after-free in the JavaScript: GC component

Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

πŸ“… Published: Feb. 24, 2026, 1:32 p.m. πŸ”„ Last Modified: April 15, 2026, 5:15 p.m.

9.8

CVSS3.1

CVE-2026-2757 - Incorrect boundary conditions in the WebRTC: Audio/Video component

Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

πŸ“… Published: Feb. 24, 2026, 1:32 p.m. πŸ”„ Last Modified: April 15, 2026, 5:15 p.m.

7.6

CVSS4.0

CVE-2026-2460 - Insufficient Authorization Allows Low‑Privilege User to Alter Directories via DAC Protocol

A vulnerability exists in REB500 for an authenticated user with low-level privileges to access and alter the content of directories by using the DAC protocol that the user is not authorized to do so.

πŸ“… Published: Feb. 24, 2026, 1:24 p.m. πŸ”„ Last Modified: April 16, 2026, 4:30 p.m.

7.4

CVSS4.0

CVE-2026-2459 - Installer Role Exploit Allows Unauthorized Directory Access in Hitachi Energy REB500

A vulnerability exists in REB500 for an authenticated user with Installer role to access and alter the contents of directories that the role is not authorized to do so.

πŸ“… Published: Feb. 24, 2026, 1:21 p.m. πŸ”„ Last Modified: April 18, 2026, 5:45 p.m.

9.3

CVSS4.0

CVE-2025-14577 - PHP Function Injection in Slican NPC/IPL/IPM/IPU

Slican NCP/IPL/IPM/IPU devices are vulnerable to PHP Function Injection. An unauthenticated remote attacker is able to execute arbitrary PHP commands by sending specially crafted requests to /webcti/session_ajax.php endpoint. This issue was fixed in version 1.24.0190 (Slican NCP) and 6.61.0010 (S…

πŸ“… Published: Feb. 24, 2026, 1:21 p.m. πŸ”„ Last Modified: March 2, 2026, 2:10 p.m.

8.7

CVSS4.0

CVE-2026-1773 - Denial of Service via Invalid U-Format Frame in IEC 60870-5-104

IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame.Β Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of expl…

πŸ“… Published: Feb. 24, 2026, 1:13 p.m. πŸ”„ Last Modified: April 16, 2026, 4:30 p.m.

5.3

CVSS4.0

CVE-2026-1772 - Unauthorized Access to User Management Data via Web Interface

RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.

πŸ“… Published: Feb. 24, 2026, 1:03 p.m. πŸ”„ Last Modified: April 17, 2026, 4 p.m.

5.3

CVSS4.0

CVE-2026-23969 - Apache Superset: Exposure of Sensitive Information via Incomplete ClickHouse Function Filtering

Apache Superset utilizes a configurable dictionary, DISALLOWED_SQL_FUNCTIONS, to restrict the execution of potentially sensitive SQL functions within SQL Lab and charts. While this feature included restrictions for engines like PostgreSQL, a vulnerability was reported where the default list for the…

πŸ“… Published: Feb. 24, 2026, 1:02 p.m. πŸ”„ Last Modified: April 17, 2026, 4 p.m.

5.3

CVSS4.0

CVE-2026-23980 - Apache Superset: Improper Neutralization of Special Elements used in a SQL Command

Improper Neutralization of Special Elements used in a SQL Command ('SQL Injection') vulnerability in Apache Superset allows an authenticated user with read access to conduct error-based SQL injection via the sqlExpression or where parameters. This issue affects Apache Superset: before 6.0.0. User…

πŸ“… Published: Feb. 24, 2026, 12:54 p.m. πŸ”„ Last Modified: April 18, 2026, 7:45 p.m.

7.1

CVSS4.0

CVE-2026-23982 - Apache Superset: Improper Authorization in Dataset Creation Allows Access Control Bypass

An Improper Authorization vulnerability exists in Apache Superset that allows a low-privileged user to bypass data access controls. When creating a dataset, Superset enforces permission checks to prevent users from querying unauthorized data. However, an authenticated attacker with permissions to w…

πŸ“… Published: Feb. 24, 2026, 12:52 p.m. πŸ”„ Last Modified: April 17, 2026, 4 p.m.
Total resulsts: 349182
Page 1468 of 34,919
Β« previous page Β» next page
Filters