Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
9.8 CRITICAL
CVE-2026-2251 — Path Traversal leading to Remote Code Execution (RCE)

Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. This issue affects Xerox FreeFlow…

freeflow_core | Remote | Path Traversal
Feb 27, 2026 Mar 02, 2026
Feb 27, 2026
Mar 02, 2026
9.8 CRITICAL
CVE-2026-21658 — Johnson Controls -Frick Quantum HD- Unauthenticated Remote Code Execution

Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient val…

Feb 27, 2026 Mar 02, 2026
Feb 27, 2026
Mar 02, 2026
9.8 CRITICAL
CVE-2026-21657 — Johnson Controls -Frick Quantum HD- Unauthenticated Remote Code Execution

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may…

Feb 27, 2026 Mar 02, 2026
Feb 27, 2026
Mar 02, 2026
9.8 CRITICAL
CVE-2026-21656 — Johnson Controls -Frick Quantum HD- Unauthenticated Remote Code Execution

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may…

Feb 27, 2026 Mar 02, 2026
Feb 27, 2026
Mar 02, 2026
9.8 CRITICAL
CVE-2026-21654 — Johnson Controls -Frick Quantum HD- Unauthenticated Remote Code Execution

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection. Insufficient valida…

Feb 27, 2026 Mar 02, 2026
Feb 27, 2026
Mar 02, 2026
8.1 HIGH
CVE-2026-1627 — Cisco SSH Weak MAC Algorithm Vulnerability

An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data i…

Feb 27, 2026 Mar 05, 2026
Feb 27, 2026
Mar 05, 2026
9.1 CRITICAL
CVE-2026-1626 — Cisco SSH CBC Vulnerability

An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercep…

Feb 27, 2026 Mar 05, 2026
Feb 27, 2026
Mar 05, 2026
3.1 LOW
CVE-2025-12150 — Org.keycloak/keycloak-services: webauthn attestation statement verification bypass

A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via s…

keycloak build_of_keycloak | Remote | Authentication
Feb 27, 2026 Mar 05, 2026
Feb 27, 2026
Mar 05, 2026
Showing 20 of 5928 Results