5.7

CVSS3.1

CVE-2025-13821 - User profile update exposes password hash and MFA secrets

Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to sanitize sensitive data in WebSocket messages which allows authenticated users to exfiltrate password hashes and MFA secrets via profile nickname updates or email verification events. Mattermost Advisory ID: MMSA-202โ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 11:57 a.m. ๐Ÿ”„ Last Modified: Feb. 18, 2026, 9:44 p.m.

4.3

CVSS3.1

CVE-2025-2418 - Open Redirect in TR7's Web Application Firewall

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in TR7 Cyber โ€‹โ€‹Defense Inc. Web Application Firewall allows Phishing.This issue affects Web Application Firewall: from 4.30 through 16022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

๐Ÿ“… Published: Feb. 16, 2026, 11:47 a.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.3

CVSS4.0

CVE-2026-2553 - tushar-2223 Hotel-Management-System HTTP POST Request home.php sql injection

A security flaw has been discovered in tushar-2223 Hotel-Management-System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. This affects an unknown part of the file /home.php of the component HTTP POST Request Handler. Performing a manipulation of the argument Name/Email results in sql injection. Thโ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 11:32 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 7:15 p.m.

5.6

CVSS3.1

CVE-2026-2604 - evolution-data-server: Evolution Data Server: Arbitrary file deletion via inconsistent URI handling

No description is available for this CVE.

๐Ÿ“… Published: Feb. 16, 2026, 11:11 a.m. ๐Ÿ”„ Last Modified: Feb. 17, 2026, 8:56 a.m.

5.1

CVSS4.0

CVE-2026-2552 - ZenTao Editor control.php delete path traversal

A vulnerability was identified in ZenTao up to 21.7.8. Affected by this issue is the function delete of the file editor/control.php of the component Committer. Such manipulation of the argument filePath leads to path traversal. Upgrading to version 21.7.9 can resolve this issue. The affected componโ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 11:02 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 7:15 p.m.

5.3

CVSS4.0

CVE-2026-2551 - ZenTao Backup control.php delete path traversal

A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the function delete of the file editor/control.php of the component Backup Handler. This manipulation of the argument fileName causes path traversal. It is possible to initiate the attack remotely. The exploit โ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 10:32 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 7:15 p.m.

7.5

CVSS4.0

CVE-2026-2452 - Unsafe variable evaluation in email templates

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate informatioโ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 10:16 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 7:15 p.m.

7.5

CVSS4.0

CVE-2026-2451 - Unsafe variable evaluation in email templates

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate informatioโ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 10:16 a.m. ๐Ÿ”„ Last Modified: April 18, 2026, 12:15 p.m.

7.5

CVSS4.0

CVE-2026-2415 - Unsafe variable evaluation in email templates

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained two security-relevant bugs: * It was possible to exfiltratโ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 10:15 a.m. ๐Ÿ”„ Last Modified: April 18, 2026, 6 p.m.

9.3

CVSS4.0

CVE-2026-2550 - EFM iptime A6004MX timepro.cgi commit_vpncli_file_upload unrestricted upload

A vulnerability was found in EFM iptime A6004MX 14.18.2. Affected is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi. The manipulation results in unrestricted upload. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contโ€ฆ

๐Ÿ“… Published: Feb. 16, 2026, 10:02 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 7:15 p.m.
Total resulsts: 346565
Page 1359 of 34,657
ยซ previous page ยป next page
Filters