CVE Datenbank
Durchsuchbare Datenbank mit Sicherheitslücken. Filtere nach Hersteller, Schweregrad oder Zeitraum.
🔴 Top 10 Gefährlichste Sicherheitslücken
CVE-2025-68121 - During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs field
CVE-2025-59818 - This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying sy
CVE-2026-1633 - The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface wit
CVE-2025-10878 - A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 be
CVE-2025-70841 - Dokans Multi-Tenancy Based eCommerce Platform SaaS 3.9.2 allows unauthenticated remote attackers to
CVE-2026-25142 - SandboxJS is a JavaScript sandboxing library. Prior to 0.8.27, SanboxJS does not properly restrict _
CVE-2026-1699 - In the Eclipse Theia Website repository, the GitHub Actions workflow .github/workflows/preview.yml u
CVE-2026-24054 - Kata Containers is an open source project focusing on a standard implementation of lightweight Virtu
CVE-2026-24897 - Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticat
CVE-2025-57792 - Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficien
🏢 CVE nach Hersteller
Empfohlene Sicherheitstools
Unterstütze uns durch einen Kauf - wir erhalten eine kleine Provision.