Latest CVE Feed
-
8.1
HIGHCVE-2025-62002
BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes.... Read more
Affected Products : ransomware_containment- Published: Dec. 18, 2025
- Modified: Jan. 15, 2026
- Vuln Type: Denial of Service
-
8.8
HIGHCVE-2025-62001
BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that av... Read more
Affected Products : ransomware_containment- Published: Dec. 18, 2025
- Modified: Jan. 15, 2026
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-12049
Missing Authentication for Critical Function vulnerability in Sharp Display Solutions Media Player MP-01 All Verisons allows a attacker may access to the web interface of the affected product without authentication and change settings or perform other ope... Read more
- Published: Dec. 22, 2025
- Modified: Jan. 15, 2026
- Vuln Type: Authentication
-
7.8
HIGHCVE-2026-20976
Improper input validation in Galaxy Store prior to version 4.6.02 allows local attacker to execute arbitrary script.... Read more
Affected Products : galaxy_store- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Cross-Site Scripting
-
5.5
MEDIUMCVE-2026-20975
Improper handling of insufficient permission in Samsung Cloud prior to version 5.6.11 allows local attackers to access specific files in arbitrary path.... Read more
Affected Products : cloud- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Path Traversal
-
5.5
MEDIUMCVE-2026-20969
Improper input validation in SecSettings prior to SMR Jan-2026 Release 1 allows local attacker to access file with system privilege. User interaction is required for triggering this vulnerability.... Read more
Affected Products : android- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Path Traversal
-
4.8
MEDIUMCVE-2026-20972
Improper Export of Android Application Components in UwbTest prior to SMR Jan-2026 Release 1 allows local attackers to enable UWB.... Read more
Affected Products : android- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Authorization
-
8.2
HIGHCVE-2019-25279
FaceSentry Access Control System 6.4.8 contains a cleartext password storage vulnerability that allows attackers to access unencrypted credentials in the device's SQLite database. Attackers can directly read sensitive login information stored in /faceGuar... Read more
- Published: Jan. 08, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Cryptography
-
7.8
HIGHCVE-2026-20971
Use After Free in PROCA driver prior to SMR Jan-2026 Release 1 allows local attackers to potentially execute arbitrary code.... Read more
Affected Products : android- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Memory Corruption
-
7.8
HIGHCVE-2026-20970
Improper access control in SLocation prior to SMR Jan-2026 Release 1 allows local attackers to execute the privileged APIs.... Read more
Affected Products : android- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Authorization
-
6.7
MEDIUMCVE-2026-20968
Use after free in DualDAR prior to SMR Jan-2026 Release 1 allows local privileged attackers to execute arbitrary code.... Read more
Affected Products : android- Published: Jan. 09, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Memory Corruption
-
9.1
CRITICALCVE-2019-25278
FaceSentry Access Control System 6.4.8 contains a cleartext transmission vulnerability that allows remote attackers to intercept authentication credentials. Attackers can perform man-in-the-middle attacks to capture HTTP cookie authentication information ... Read more
- Published: Jan. 08, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Cryptography
-
8.9
HIGHCVE-2026-21441
urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform de... Read more
Affected Products : urllib3- Published: Jan. 07, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-69258
A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected insta... Read more
- Published: Jan. 08, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2026-0640
A weakness has been identified in Tenda AC23 16.03.07.52. This affects the function sscanf of the file /goform/PowerSaveSet. Executing a manipulation of the argument Time can lead to buffer overflow. The attack can be launched remotely. The exploit has be... Read more
- Published: Jan. 06, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Memory Corruption
-
7.5
HIGHCVE-2025-69259
A message unchecked NULL return value vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulner... Read more
- Published: Jan. 08, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Denial of Service
-
7.5
HIGHCVE-2025-69260
A message out-of-bounds read vulnerability in Trend Micro Apex Central could allow a remote attacker to create a denial-of-service condition on affected installations. Please note: authentication is not required in order to exploit this vulnerability.... Read more
- Published: Jan. 08, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Denial of Service
-
2.7
LOWCVE-2026-22597
Ghost is a Node.js content management system. In versions 5.38.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost’s media inliner mechanism allows staff users in possession of a valid authentication token for the Ghost Admin API to exfil... Read more
Affected Products : ghost- Published: Jan. 10, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Server-Side Request Forgery
-
7.2
HIGHCVE-2026-22596
Ghost is a Node.js content management system. In versions 5.90.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's /ghost/api/admin/members/events endpoint allows users with authentication credentials for the Admin API to execute arbitr... Read more
Affected Products : ghost- Published: Jan. 10, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Injection
-
8.1
HIGHCVE-2026-22595
Ghost is a Node.js content management system. In versions 5.121.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's handling of Staff Token authentication allowed certain endpoints to be accessed that were only intended to be accessible... Read more
Affected Products : ghost- Published: Jan. 10, 2026
- Modified: Jan. 15, 2026
- Vuln Type: Authentication