Vulnerabilities
Vulnerable Software
Security Vulnerabilities
Out-of-bounds write vulnerability in the DFX module. Impact: Successful exploitation of this vulnerability may affect availability.
CVSS Score
6.0
EPSS Score
0.0
Published
2026-02-06
Address read vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.
CVSS Score
4.8
EPSS Score
0.0
Published
2026-02-06
Buffer overflow vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability may affect availability.
CVSS Score
6.9
EPSS Score
0.0
Published
2026-02-06
Permission control vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVSS Score
6.3
EPSS Score
0.0
Published
2026-02-06
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
CVSS Score
9.8
EPSS Score
0.002
Published
2026-02-06
Type confusion vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.
CVSS Score
4.0
EPSS Score
0.0
Published
2026-02-06
Out-of-bounds read issue in the media subsystem. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.
CVSS Score
6.2
EPSS Score
0.0
Published
2026-02-06
Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
CVSS Score
5.9
EPSS Score
0.0
Published
2026-02-06
UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability.
CVSS Score
6.5
EPSS Score
0.0
Published
2026-02-06
A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue.
CVSS Score
4.2
EPSS Score
0.0
Published
2026-02-06


Contact Us

Shodan ® - All rights reserved