2.3

CVSS4.0

CVE-2026-2555 - JeecgBoot Retrieval-Augmented Generation AiragKnowledgeController.java importDocumentFromZip deseri…

A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDocumentFromZip of the file org/jeecg/modules/airag/llm/controller/AiragKnowledgeController.java of the component Retrieval-Augmented Generation. Executing a manipulation can lead to deserialization. Th…

📅 Published: Feb. 16, 2026, 12:02 p.m. 🔄 Last Modified: April 18, 2026, 12:15 p.m.

5.7

CVSS3.1

CVE-2025-13821 - User profile update exposes password hash and MFA secrets

Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to sanitize sensitive data in WebSocket messages which allows authenticated users to exfiltrate password hashes and MFA secrets via profile nickname updates or email verification events. Mattermost Advisory ID: MMSA-202…

📅 Published: Feb. 16, 2026, 11:57 a.m. 🔄 Last Modified: Feb. 18, 2026, 9:44 p.m.

4.3

CVSS3.1

CVE-2025-2418 - Open Redirect in TR7's Web Application Firewall

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in TR7 Cyber ​​Defense Inc. Web Application Firewall allows Phishing. This issue affects Web Application Firewall: from 4.30 before v1.4.0.117.

📅 Published: Feb. 16, 2026, 11:47 a.m. 🔄 Last Modified: May 7, 2026, 7:20 a.m.

5.3

CVSS4.0

CVE-2026-2553 - tushar-2223 Hotel-Management-System HTTP POST Request home.php sql injection

A security flaw has been discovered in tushar-2223 Hotel-Management-System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. This affects an unknown part of the file /home.php of the component HTTP POST Request Handler. Performing a manipulation of the argument Name/Email results in sql injection. Th…

📅 Published: Feb. 16, 2026, 11:32 a.m. 🔄 Last Modified: April 17, 2026, 7:15 p.m.

5.6

CVSS3.1

CVE-2026-2604 - evolution-data-server: Evolution Data Server: Arbitrary file deletion via inconsistent URI handling

No description is available for this CVE.

📅 Published: Feb. 16, 2026, 11:11 a.m. 🔄 Last Modified: Feb. 17, 2026, 8:56 a.m.

5.1

CVSS4.0

CVE-2026-2552 - ZenTao Editor control.php delete path traversal

A vulnerability was identified in ZenTao up to 21.7.8. Affected by this issue is the function delete of the file editor/control.php of the component Committer. Such manipulation of the argument filePath leads to path traversal. Upgrading to version 21.7.9 can resolve this issue. The affected compon…

📅 Published: Feb. 16, 2026, 11:02 a.m. 🔄 Last Modified: April 17, 2026, 7:15 p.m.

5.3

CVSS4.0

CVE-2026-2551 - ZenTao Backup control.php delete path traversal

A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the function delete of the file editor/control.php of the component Backup Handler. This manipulation of the argument fileName causes path traversal. It is possible to initiate the attack remotely. The exploit …

📅 Published: Feb. 16, 2026, 10:32 a.m. 🔄 Last Modified: April 17, 2026, 7:15 p.m.

7.5

CVSS4.0

CVE-2026-2452 - Unsafe variable evaluation in email templates

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate informatio…

📅 Published: Feb. 16, 2026, 10:16 a.m. 🔄 Last Modified: April 17, 2026, 7:15 p.m.

7.5

CVSS4.0

CVE-2026-2451 - Unsafe variable evaluation in email templates

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained a security-relevant bug: It was possible to exfiltrate informatio…

📅 Published: Feb. 16, 2026, 10:16 a.m. 🔄 Last Modified: April 18, 2026, 12:15 p.m.

7.5

CVSS4.0

CVE-2026-2415 - Unsafe variable evaluation in email templates

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained two security-relevant bugs: * It was possible to exfiltrat…

📅 Published: Feb. 16, 2026, 10:15 a.m. 🔄 Last Modified: April 18, 2026, 6 p.m.
Total resulsts: 349182
Page 1620 of 34,919
« previous page » next page
Filters