Логотип exploitDog
source:"nvd"
Консоль
Логотип exploitDog

exploitDog

source:"nvd"

Количество 331 614

Количество 331 614

nvd логотип

CVE-2026-22638

25 дней назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
nvd логотип

CVE-2026-22637

25 дней назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
nvd логотип

CVE-2026-22636

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22635

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22634

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22633

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22632

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22631

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22630

около 1 месяца назад

Rejected reason: Not used

EPSS: Низкий
nvd логотип

CVE-2026-22626

10 дней назад

Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can cause abnormal device behavior by crafting specific messages.

CVSS3: 4.9
EPSS: Низкий
nvd логотип

CVE-2026-22625

10 дней назад

Improper handling of filenames in certain HIKSEMI NAS products may lead to the exposure of sensitive system files.

CVSS3: 4.6
EPSS: Низкий
nvd логотип

CVE-2026-22624

10 дней назад

Due to inadequate access control, authenticated users of certain HIKSEMI NAS products can manipulate other users' file resources without proper authorization.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2026-22623

10 дней назад

Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can execute arbitrary commands on the device by crafting specific messages.

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2026-22612

около 1 месяца назад

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, Fickling is vulnerable to detection bypass due to "builtins" blindness. This issue has been patched in version 0.1.7.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2026-22611

около 1 месяца назад

AWS SDK for .NET works with Amazon Web Services to help build scalable solutions with Amazon S3, Amazon DynamoDB, Amazon Glacier, and more. From versions 4.0.0 to before 4.0.3.3, Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value. This issue has been patched in version 4.0.3.3.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2026-22610

около 1 месяца назад

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.18, 20.3.16, 21.0.7, and 21.1.0-rc.0, a cross-site scripting (XSS) vulnerability has been identified in the Angular Template Compiler. The vulnerability exists because Angular’s internal sanitization schema fails to recognize the href and xlink:href attributes of SVG <script> elements as a Resource URL context. This issue has been patched in versions 19.2.18, 20.3.16, 21.0.7, and 21.1.0-rc.0.

EPSS: Низкий
nvd логотип

CVE-2026-22609

около 1 месяца назад

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2026-22608

около 1 месяца назад

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, both ctypes and pydoc modules aren't explicitly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still reports the file as LIKELY_SAFE. This issue has been patched in version 0.1.7.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2026-22607

около 1 месяца назад

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python's cProfile module as unsafe. Because of this, a malicious pickle that uses cProfile.run() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling's output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in version 0.1.7.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2026-22606

около 1 месяца назад

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in version 0.1.7.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-22638

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

25 дней назад
nvd логотип
CVE-2026-22637

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

25 дней назад
nvd логотип
CVE-2026-22636

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22635

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22634

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22633

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22632

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22631

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22630

Rejected reason: Not used

около 1 месяца назад
nvd логотип
CVE-2026-22626

Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can cause abnormal device behavior by crafting specific messages.

CVSS3: 4.9
0%
Низкий
10 дней назад
nvd логотип
CVE-2026-22625

Improper handling of filenames in certain HIKSEMI NAS products may lead to the exposure of sensitive system files.

CVSS3: 4.6
0%
Низкий
10 дней назад
nvd логотип
CVE-2026-22624

Due to inadequate access control, authenticated users of certain HIKSEMI NAS products can manipulate other users' file resources without proper authorization.

CVSS3: 4.3
0%
Низкий
10 дней назад
nvd логотип
CVE-2026-22623

Due to insufficient input parameter validation on the interface, authenticated users of certain HIKSEMI NAS products can execute arbitrary commands on the device by crafting specific messages.

CVSS3: 7.2
0%
Низкий
10 дней назад
nvd логотип
CVE-2026-22612

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, Fickling is vulnerable to detection bypass due to "builtins" blindness. This issue has been patched in version 0.1.7.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-22611

AWS SDK for .NET works with Amazon Web Services to help build scalable solutions with Amazon S3, Amazon DynamoDB, Amazon Glacier, and more. From versions 4.0.0 to before 4.0.3.3, Customer applications could be configured to improperly route AWS API calls to non-existent or non-AWS hosts. This notification is related to the use of specific values for the region input field when calling AWS services. An actor with access to the environment in which the SDK is used could set the region input field to an invalid value. This issue has been patched in version 4.0.3.3.

CVSS3: 3.7
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-22610

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.18, 20.3.16, 21.0.7, and 21.1.0-rc.0, a cross-site scripting (XSS) vulnerability has been identified in the Angular Template Compiler. The vulnerability exists because Angular’s internal sanitization schema fails to recognize the href and xlink:href attributes of SVG <script> elements as a Resource URL context. This issue has been patched in versions 19.2.18, 20.3.16, 21.0.7, and 21.1.0-rc.0.

0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-22609

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-22608

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, both ctypes and pydoc modules aren't explicitly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still reports the file as LIKELY_SAFE. This issue has been patched in version 0.1.7.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-22607

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python's cProfile module as unsafe. Because of this, a malicious pickle that uses cProfile.run() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling's output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in version 0.1.7.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-22606

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in version 0.1.7.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу