8.7

CVSS4.0

CVE-2025-60003 - Junos OS and Junos OS Evolved: BGP update with a set of specific attributes causes rpd crash

A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive att…

📅 Published: Jan. 15, 2026, 8:15 p.m. 🔄 Last Modified: Jan. 23, 2026, 7:39 p.m.

6.8

CVSS4.0

CVE-2025-59961 - Junos OS and Junos OS Evolved: Unix socket used to control the jdhcpd process is world-writable

An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged user to write to the Unix socket used to manage the jdhcpd process, resulting in complete control over the reso…

📅 Published: Jan. 15, 2026, 8:14 p.m. 🔄 Last Modified: Jan. 23, 2026, 7:39 p.m.

6.3

CVSS4.0

CVE-2025-59960 - Junos OS and Junos OS Evolved: DHCP Option 82 messages from clients being passed unmodified to the …

An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows a DHCP client in one subnet to exhaust the address pools of other subnets, leading to a Denial of Service (DoS) on the downstream DHCP …

📅 Published: Jan. 15, 2026, 8:14 p.m. 🔄 Last Modified: Jan. 23, 2026, 7:39 p.m.

6.8

CVSS4.0

CVE-2025-59959 - Junos OS and Junos OS Evolved: Executing a specific show command leads to an rpd crash

An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with low privileges to cause a Denial-of-Service (DoS). When the command 'show route < ( receive-protocol | advertising-proto…

📅 Published: Jan. 15, 2026, 8:13 p.m. 🔄 Last Modified: Jan. 23, 2026, 7:38 p.m.

5.1

CVSS4.0

CVE-2025-52987 - Paragon Automation: A clickjacking vulnerability in the web server configuration has been addressed

A clickjacking vulnerability exists in the web portal of Juniper Networks Paragon Automation (Pathfinder, Planner, Insights) due to the application's failure to set appropriate X-Frame-Options and X-Content-Type HTTP headers. This vulnerability allows an attacker to trick users into interacting wit…

📅 Published: Jan. 15, 2026, 8:10 p.m. 🔄 Last Modified: Jan. 26, 2026, 6:01 p.m.

5.3

CVSS4.0

CVE-2025-15265 - Svelte 5.46.0 - Hydratable Key Script-Breakout XSS (SSR)

An SSR XSS exists in async hydration when attacker‑controlled keys are passed to hydratable. The key is embedded inside a <script> block without HTML‑safe escaping, allowing </script> to terminate the script and inject arbitrary JavaScript. This enables remote script execution in users' browsers, w…

📅 Published: Jan. 15, 2026, 7:59 p.m. 🔄 Last Modified: Jan. 23, 2026, 7:04 p.m.

9.3

CVSS4.0

CVE-2026-23746 - Entrust Instant Financial Issuance (IFI) SmartCardController Service .NET Remoting RCE

Entrust Instant Financial Issuance (IFI) On Premise software (formerly referred to as CardWizard) versions 5.x, prior to 6.10.5, and prior to 6.11.1 contain an insecure .NET Remoting exposure in the SmartCardController service (DCG.SmartCardControllerService.exe). The service registers a TCP remoti…

📅 Published: Jan. 15, 2026, 7:44 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.

7.4

CVSS4.0

CVE-2026-23622 - CSRF Protection Bypass: Sensitive endpoints accept GET requests, enabling admin account takeover

Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters fro…

📅 Published: Jan. 15, 2026, 7:28 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.

8.9

CVSS3.1

CVE-2026-23527 - Request Smuggling (TE.TE) in h3 v1

H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this heade…

📅 Published: Jan. 15, 2026, 7:24 p.m. 🔄 Last Modified: Jan. 23, 2026, 6:50 p.m.

9.1

CVSS3.1

CVE-2026-23520 - Arcane has a Command Injection in Arcane Updater Lifecycle Labels Enables RCE

Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecycle.post-update that allowed defining a command to run…

📅 Published: Jan. 15, 2026, 7:20 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.
Total resulsts: 329682
Page 177 of 32,969
« previous page » next page
Filters