7.5

CVSS3.1

CVE-2025-67274 -

An issue in continuous.software aangine v.2025.2 allows a remote attacker to obtain sensitive information via the excel-integration-service template download module, integration-persistence-service job listing module, portfolio-item-service data retrieval module endpoints

πŸ“… Published: Jan. 26, 2026, midnight πŸ”„ Last Modified: Feb. 12, 2026, 3:46 p.m.

9.9

CVSS3.1

CVE-2025-70982 -

Incorrect access control in the importUser function of SpringBlade v4.5.0 allows attackers with low-level privileges to arbitrarily import sensitive user data.

πŸ“… Published: Jan. 26, 2026, midnight πŸ”„ Last Modified: Feb. 12, 2026, 3:43 p.m.

5.4

CVSS3.1

CVE-2025-70368 -

Worklenz version 2.1.5 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Project Updates feature. An attacker can submit a malicious payload in the Updates text field which is then rendered in the reporting view without proper sanitization. Malicious JavaScript may be executed in a …

πŸ“… Published: Jan. 26, 2026, midnight πŸ”„ Last Modified: Feb. 13, 2026, 3:12 p.m.

5.5

CVSS3.1

CVE-2025-50537 - eslint: eslint: Denial of Service via stack overflow when serializing objects with circular referen…

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function chec…

πŸ“… Published: Jan. 26, 2026, midnight πŸ”„ Last Modified: Feb. 4, 2026, 3:11 p.m.

1

CVSS4.0

CVE-2026-1409 - Beetel 777VR1 UART excessive authentication

A security vulnerability has been detected in Beetel 777VR1 up to 01.00.09/01.00.09_55. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack on the physica…

πŸ“… Published: Jan. 25, 2026, 11:32 p.m. πŸ”„ Last Modified: Feb. 23, 2026, 8:54 a.m.

1

CVSS4.0

CVE-2026-1408 - Beetel 777VR1 UART weak password

A weakness has been identified in Beetel 777VR1 up to 01.00.09/01.00.09_55. This vulnerability affects unknown code of the component UART Interface. Executing a manipulation can lead to weak password requirements. The physical device can be targeted for the attack. The attack requires a high level …

πŸ“… Published: Jan. 25, 2026, 11:02 p.m. πŸ”„ Last Modified: Feb. 23, 2026, 8:54 a.m.

1

CVSS4.0

CVE-2026-1407 - Beetel 777VR1 UART information disclosure

A security flaw has been discovered in Beetel 777VR1 up to 01.00.09/01.00.09_55. This affects an unknown part of the component UART Interface. Performing a manipulation results in information disclosure. The attack may be carried out on the physical device. The attack is considered to have high com…

πŸ“… Published: Jan. 25, 2026, 10:02 p.m. πŸ”„ Last Modified: Feb. 23, 2026, 8:54 a.m.

8.5

CVSS4.0

CVE-2020-36937 - MEMU PLAY 3.7.0 - 'MEmusvc' Unquoted Service Path

Microvirt MEMU Play 3.7.0 contains an unquoted service path vulnerability in the MEmusvc Windows service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with elevated LocalSystem privi…

πŸ“… Published: Jan. 25, 2026, 2:01 p.m. πŸ”„ Last Modified: Jan. 26, 2026, 4:31 p.m.

8.5

CVSS4.0

CVE-2020-36936 - Magic Mouse 2 utilities 2.20 - 'magicmouse2service' Unquoted Service Path

Magic Mouse 2 Utilities 2.20 contains an unquoted service path vulnerability in its Windows service configuration. Attackers can exploit the unquoted path to inject malicious executables and gain elevated system privileges by placing a malicious file in the service path.

πŸ“… Published: Jan. 25, 2026, 2:01 p.m. πŸ”„ Last Modified: Jan. 26, 2026, 4:44 p.m.

8.5

CVSS4.0

CVE-2020-36935 - KMSpico 17.1.0.0 - 'Service KMSELDI' Unquoted Service Path

KMSpico 17.1.0.0 contains an unquoted service path vulnerability in the Service KMSELDI configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path in C:\Program Files\KMSpico\Service_KMS.exe to inject malicious executables and esc…

πŸ“… Published: Jan. 25, 2026, 2:01 p.m. πŸ”„ Last Modified: Jan. 26, 2026, 3:03 p.m.
Total resulsts: 343744
Page 1411 of 34,375
Β« previous page Β» next page
Filters