Latest CVE Feed
-
8.8
HIGHCVE-2026-21658
Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpe... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Injection
-
8.8
HIGHCVE-2026-21657
Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the secur... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Injection
-
8.8
HIGHCVE-2026-21656
Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the secur... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Injection
-
8.8
HIGHCVE-2026-21654
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection. Insufficient validation of input in certain parameters may permit unexpecte... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2026-1627
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Cryptography
-
6.5
MEDIUMCVE-2026-1626
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Cryptography
-
3.1
LOWCVE-2025-12150
A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", eve... Read more
Affected Products : keycloak- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Authentication
-
8.6
HIGHCVE-2026-27776
IM-LogicDesigner module of intra-mart Accel Platform contains insecure deserialization issue. This can be exploited only when IM-LogicDesigner is deployed on the system. Arbitrary code may be executed when some crafted file is imported by a user with the ... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Injection
-
8.3
HIGHCVE-2026-0980
A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for ... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Injection
-
4.9
MEDIUMCVE-2026-0871
A flaw was found in Keycloak. An administrator with `manage-users` permission can bypass the "Only administrators can view" setting for unmanaged attributes, allowing them to modify these attributes. This improper access control can lead to unauthorized c... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Authorization
-
6.7
MEDIUMCVE-2025-9909
A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially en... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Path Traversal
-
6.7
MEDIUMCVE-2025-9908
A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and ... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Information Disclosure
-
6.7
MEDIUMCVE-2025-9907
A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Stream API. This vulnerability allows exposure of sensitive client credentials and internal infrastructure headers via the test_headers field when an event strea... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Information Disclosure
-
5.0
MEDIUMCVE-2025-9572
n authorization flaw in Foreman's GraphQL API allows low-privileged users to access metadata beyond their assigned permissions. Unlike the REST API, which correctly enforces access controls, the GraphQL endpoint does not apply proper filtering, leading to... Read more
Affected Products : satellite- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Authorization
-
6.3
MEDIUMCVE-2025-13327
A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interactio... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Supply Chain
-
6.1
MEDIUMCVE-2026-3302
A weakness has been identified in SourceCodester Doctor Appointment System 1.0. Affected by this issue is some unknown functionality of the file /register.php of the component Sign Up Page. Executing a manipulation of the argument Email can lead to cross ... Read more
Affected Products : doctor_appointment_system- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Cross-Site Scripting
-
5.1
MEDIUMCVE-2025-15567
Insufficient protection mechanisms in the Health Module may lead to partial information disclosure.... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Information Disclosure
-
7.1
HIGHCVE-2025-15509
The SmartRemote module has insufficient restrictions on loading URLs, which may lead to some information leakage.... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Information Disclosure
-
6.4
MEDIUMCVE-2025-14149
The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Scroller widget box link attribute in all versions up to, and including, 1.4.24 due to insufficient input sanitization an... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Cross-Site Scripting
-
6.4
MEDIUMCVE-2025-14040
The Automotive Car Dealership Business WordPress Theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Call to Action' custom fields in all versions up to, and including, 13.4. This is due to insufficient input sanitization and output ... Read more
Affected Products :- Published: Feb. 27, 2026
- Modified: Feb. 27, 2026
- Vuln Type: Cross-Site Scripting