Search

Search Results (329260 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59389 1 Qnap 1 Hyper Data Protector 2026-01-22 9.8 Critical
An SQL injection vulnerability has been reported to affect Hyper Data Protector. The remote attackers can then exploit the vulnerability to execute unauthorized code or commands. We have already fixed the vulnerability in the following versions: Hyper Data Protector 2.2.4.1 and later
CVE-2026-22643 1 Sick Ag 1 Incoming Goods Suite 2026-01-22 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2026-22642 1 Sick Ag 1 Incoming Goods Suite 2026-01-22 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2025-69612 2026-01-22 6.5 Medium
A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. The "Download Template" function in the profile dashboard does not neutralize directory traversal sequences (../) in the filePath parameter, allowing authenticated users to read arbitrary files, such as the server's Web.config.
CVE-2025-63391 2 Open-webui, Openwebui 2 Open-webui, Open Webui 2026-01-22 7.5 High
An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
CVE-2025-63390 1 Mintplexlabs 1 Anythingllm 2026-01-22 5.3 Medium
An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel, agentProvider), system prompts (openAiPrompt), operational parameters (temperature, history length, similarity thresholds), vector search settings, chat modes, and timestamps.
CVE-2025-63389 1 Ollama 1 Ollama 2026-01-22 9.8 Critical
A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.
CVE-2025-63388 2 Dify, Langgenius 2 Dify, Dify 2026-01-22 9.1 Critical
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/system-features endpoint. The endpoint implements an overly permissive CORS policy that reflects arbitrary Origin headers and sets Access-Control-Allow-Credentials: true, allowing any external domain to make authenticated cross-origin requests.
CVE-2025-63386 2 Dify, Langgenius 2 Dify, Dify 2026-01-22 9.1 Critical
A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests.
CVE-2025-56590 2026-01-22 N/A
An issue was discovered in the InsertFromURL() function of the Apryse HTML2PDF SDK thru 11.10. This vulnerability could allow an attacker to execute arbitrary operating system commands on the local server.
CVE-2025-56157 1 Langgenius 1 Dify 2026-01-22 9.8 Critical
Default credentials in Dify thru 1.5.1. PostgreSQL username and password specified in the docker-compose.yaml file included in its source code.
CVE-2025-52691 1 Smartertools 1 Smartermail 2026-01-22 10 Critical
Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.
CVE-2025-0634 1 Samsung 1 Rlottie 2026-01-22 9.8 Critical
Use After Free vulnerability in Samsung Open Source rLottie allows Remote Code Inclusion.This issue affects rLottie: V0.2.
CVE-2017-16932 1 Xmlsoft 1 Libxml2 2026-01-22 7.5 High
parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
CVE-2026-0747 2 Devolutions, Microsoft 2 Remote Desktop Manager, Windows 2026-01-22 3.3 Low
Exposure of sensitive information in the TeamViewer entry dashboard component in Devolutions Remote Desktop Manager 2025.3.24.0 through 2025.3.28.0 on Windows allows an external observer to view a password on screen via a defective masking feature, for example during physical observation or screen sharing.
CVE-2025-20936 1 Samsung 1 Android 2026-01-22 8.8 High
Improper access control in HDCP trustlet prior to SMR Apr-2025 Release 1 allows local attackers with shell privilege to escalate their privileges to root.
CVE-2026-22050 1 Netapp 2 Ontap, Ontap 9 2026-01-22 4.3 Medium
ONTAP versions 9.16.1 prior to 9.16.1P9 and 9.17.1 prior to 9.17.1P2 with snapshot locking enabled are susceptible to a vulnerability which could allow a privileged remote attacker to set the snapshot expiry time to none.
CVE-2023-52355 2 Libtiff, Redhat 4 Libtiff, Ai Inference Server, Discovery and 1 more 2026-01-22 7.5 High
An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB.
CVE-2026-23699 2026-01-22 N/A
AP180 series with firmware versions prior to AP_RGOS 11.9(4)B1P8 contains an OS command injection vulnerability. If this vulnerability is exploited, arbitrary commands may be executed on the devices.
CVE-2025-61939 1 Columbiaweather 2 Weather Microserver, Weather Microserver Firmware 2026-01-22 8.8 High
An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.