8.2

CVSS4.0

CVE-2026-24430 - Tenda W30E V2 HTTP Responses Expose Plaintext Credentials

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) disclose sensitive account credentials in cleartext within HTTP responses generated by the maintenance interface. Because the management interface is accessible over unencrypted HTTP by default, credentials may be expose…

πŸ“… Published: Jan. 26, 2026, 5:39 p.m. πŸ”„ Last Modified: March 5, 2026, 1:30 a.m.

9.3

CVSS4.0

CVE-2026-24429 - Tenda W30E V2 Hardcoded Default Password for Built-in Account

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated acce…

πŸ“… Published: Jan. 26, 2026, 5:39 p.m. πŸ”„ Last Modified: March 5, 2026, 1:30 a.m.

8.7

CVSS4.0

CVE-2026-24440 - Tenda W30E V2 Allows Password Changes Without Verifying Current Password

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) allow account passwords to be changed through the maintenance interface without requiring verification of the existing password. This enables unauthorized password changes when access to the affected endpoint is obtained.

πŸ“… Published: Jan. 26, 2026, 5:38 p.m. πŸ”„ Last Modified: March 5, 2026, 1:30 a.m.

4.9

CVSS3.1

CVE-2026-1224 - Tanium addressed an uncontrolled resource consumption vulnerability in Discover.

Tanium addressed an uncontrolled resource consumption vulnerability in Discover.

πŸ“… Published: Jan. 26, 2026, 5:36 p.m. πŸ”„ Last Modified: March 9, 2026, 6:09 p.m.

5

CVSS3.1

CVE-2026-1446 - XSS issue is Esri ArcGIS Pro versions 3.6.0 and earlier

There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS Pro is a desktop application, and exploitation is limited to local users interacting with the application; no privileged role or elevated permissions are required beyond standard local user access. A l…

πŸ“… Published: Jan. 26, 2026, 5:24 p.m. πŸ”„ Last Modified: Feb. 13, 2026, 7:41 p.m.

7.8

CVSS3.1

CVE-2026-21509 - Microsoft Office Security Feature Bypass Vulnerability

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

πŸ“… Published: Jan. 26, 2026, 5:06 p.m. πŸ”„ Last Modified: April 1, 2026, 1:49 p.m.

8.5

CVSS4.0

CVE-2020-36952 - IObit Uninstaller 10 Pro - Unquoted Service Path

IObit Uninstaller 10 Pro contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted service path in the IObit Uninstaller Service to insert malicious code that would execute with SYSTEM-leve…

πŸ“… Published: Jan. 26, 2026, 4 p.m. πŸ”„ Last Modified: April 7, 2026, 2:05 p.m.

7.8

CVSS3.1

CVE-2026-1284 - Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings…

An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

πŸ“… Published: Jan. 26, 2026, 1:25 p.m. πŸ”„ Last Modified: Feb. 26, 2026, 3:04 p.m.

7.8

CVSS3.1

CVE-2026-1283 - Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eD…

A Heap-based Buffer Overflow vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawings from Release SOLIDWORKS Desktop 2025 through Release SOLIDWORKS Desktop 2026 could allow an attacker to execute arbitrary code while opening a specially crafted EPRT file.

πŸ“… Published: Jan. 26, 2026, 1:25 p.m. πŸ”„ Last Modified: Feb. 26, 2026, 3:04 p.m.

9.9

CVSS3.1

CVE-2016-15057 - Apache Continuum: Command injection leading to RCE

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Continuum. This issue affects Apache Continuum: all versions. Attackers with access to the installations REST API can use this to invoke arbitrary commands o…

πŸ“… Published: Jan. 26, 2026, 11:29 a.m. πŸ”„ Last Modified: Jan. 27, 2026, 8:29 p.m.
Total resulsts: 344670
Page 1498 of 34,467
Β« previous page Β» next page
Filters