13946 results (0.051 seconds)

CVSS: 9.4EPSS: %CPEs: 1EXPL: 0

22 Jan 2026 — An attack can result in sensitive data exposure, execution of edit‑mode queries and APIs, development data access, and the ability to trigger side effect behavior. • https://github.com/appsmithorg/appsmith/security/advisories/GHSA-j9qq-4fj9-9883 • CWE-862: Missing Authorization •

CVSS: 5.3EPSS: %CPEs: 1EXPL: 0

21 Jan 2026 — This can result in privilege escalation, data exposure, and/or information disclosure. • https://github.com/controlplaneio-fluxcd/flux-operator/commit/084540424f6de8ba5d88fb1fd1e8472ba29afd7e • CWE-269: Improper Privilege Management CWE-862: Missing Authorization •

CVSS: 8.8EPSS: %CPEs: 2EXPL: 0

21 Jan 2026 — A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control. • https://access.redhat.com/security/cve/CVE-2025-14083 • CWE-284: Improper Access Control •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

20 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33231 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

20 Jan 2026 — A successful exploit of this vulnerability might lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33230 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

20 Jan 2026 — A successful exploit of this vulnerability may lead to escalation of privileges, code execution, data tampering, denial of service, and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33229 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

20 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33228 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

20 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering. • https://nvd.nist.gov/vuln/detail/CVE-2025-33233 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.8EPSS: 0%CPEs: -EXPL: 0

20 Jan 2026 — As a result, attackers can probe internal services and cloud metadata endpoints, creating an information disclosure and reconnaissance risk. • https://access.redhat.com/security/cve/CVE-2026-1180 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 3.1EPSS: 0%CPEs: -EXPL: 1

20 Jan 2026 — Performing a manipulation of the argument ID results in information disclosure. • https://github.com/SourByte05/MineAdmin-Vulnerability/issues/2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •