CVE Database

Comprehensive vulnerability intelligence with advanced analytics

7.8

A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking Virtual Intranet Access (VIA) client. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details

A lack of data validation vulnerability in the HTML export feature in Quill in allows Cross-Site Scripting (XSS). This issue affects Quill: 2.0.3.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.05%
View Details
8.2

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middleware allowed the algorithm specified in the JWT header to influence signature verification when the selected JWK did not explicitly define an algorithm. This could…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.02%
View Details
8.2

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.11.4, there is a flaw in Hono’s JWK/JWKS JWT verification middleware allowed the JWT header’s alg value to influence signature verification when the selected JWK did not explicitly specify an algorithm. This could enable JWT…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.02%
View Details

@adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior to 21.8.2 and 22.0.0-next.6, there is a Mass Assignment vulnerability in AdonisJS Lucid which may allow a remote attacker who can influence data that is passed into Lucid model assignments to overwrite the internal ORM state. This…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.07%
View Details
4.4

tarteaucitron.js is a compliant and accessible cookie banner. Prior to 1.29.0, a Regular Expression Denial of Service (ReDoS) vulnerability was identified in tarteaucitron.js in the handling of the issuu_id parameter. This vulnerability is fixed in 1.29.0.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.01%
View Details
5.5

Substance3D - Designer versions 15.0.3 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: adobe substance_3d_designer
EPSS: 0.02%
View Details
7.8

Substance3D - Designer versions 15.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: adobe substance_3d_designer
EPSS: 0.03%
View Details
7.8

Substance3D - Sampler versions 5.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.8

Substance3D - Painter versions 11.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.8

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, AES/CBC/PKCS5Padding lacks authentication, making it vulnerable to padding oracle attacks and ciphertext manipulation. This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the code doesn't validate that the JWT header specifies "alg":"RS256". This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, the salt is derived from sha256Sum(passphrase). Two encryption operations with the same password will have the same derived key. This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.02%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses padLeft(32, '0') when it should use padLeft(64, '0') because SHA-256 produces 32 bytes which equates to 64 hex characters. This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses deterministic AES IV derivation from a passphrase. This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details

Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses PKCS1Encoding which is vulnerable to Bleichenbacher padding oracle attacks. Modern systems should use OAEP (Optimal Asymmetric Encryption Padding). This vulnerability is fixed in 2.2.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.02%
View Details
5.3

Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
5.3

Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
6.5

An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.06%
View Details
6.5

A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.13%
View Details
7.2

Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.05%
View Details
7.2

Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details