CVE Database

Comprehensive vulnerability intelligence with advanced analytics

4.3

An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.04%
View Details
4.3

An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.03%
View Details
4.3

An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.02%
View Details
4.3

Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive data.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.05%
View Details
4.3

Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.07%
View Details
5.3

Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.05%
View Details
7.5

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.04%
View Details
7.5

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.05%
View Details
9.1

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.15%
View Details
9.9

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.06%
View Details
6.8

The built-in XY Chart plugin is vulnerable to a DOM XSS vulnerability. A user with Editor permissions is able to modify such a panel in order to make it execute arbitrary JavaScript.

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.04%
View Details
3.7

A flaw was found in Keycloak. This improper input validation vulnerability occurs because Keycloak accepts RFC-compliant matrix parameters in URL path segments, while common reverse proxy configurations may ignore or mishandle them. A remote attacker can craft requests to mask path segments, potentially bypassing proxy-level path filtering. This could expose…

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.03%
View Details
8.3

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view all dashboards/folders regardless of permissions - Editors can view/edit/delete all dashboards/folders regardless of permissions - Editors can create dashboards in…

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.03%
View Details
7.6

An open redirect vulnerability has been identified in Grafana OSS that can be exploited to achieve XSS attacks. The vulnerability was introduced in Grafana v11.5.0. The open redirect can be chained with path traversal vulnerabilities to achieve XSS. Fixed in versions 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01 and 11.3.8+security-01

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.04%
View Details
3.7

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing ownership check in the dnd_codedropz_upload_delete() function in all versions up to, and including, 1.3.9.2. This makes it possible for unauthenticated attackers to delete arbitrary uploaded…

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.04%
View Details
5.4

The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Multiple Checkbox and Multiple Select user profile fields in all versions up to, and including, 3.5.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and…

Published: Jan 15, 2026
Modified: Jan 16, 2026
EPSS: 0.03%
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details

Rejected reason: Not used

Published: Jan 15, 2026
View Details