Common Vulnerabilities and Exposures (CVE)

CVE-2026-24314

Feb 24, 2026 05:23:52 UTC

Under certain conditions SAP S/4HANA (Manage Payment Media) allows an authenticated attacker to access information which would otherwise be restricted. This could cause low impact on confidentiality of the application while integrity and av...

CVE-2020-35612

Feb 24, 2026 05:04:02 UTC

An issue was discovered in Joomla! 2.5.0 through 3.9.22. The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.

CVE-2020-35614

Feb 24, 2026 05:03:55 UTC

An issue was discovered in Joomla! 3.9.0 through 3.9.22. Improper handling of the username leads to a user enumeration attack vector in the backend login page.

CVE-2020-35611

Feb 24, 2026 05:03:39 UTC

An issue was discovered in Joomla! 2.5.0 through 3.9.22. The globlal configuration page does not remove secrets from the HTML output, disclosing the current values.

CVE-2020-35615

Feb 24, 2026 05:03:35 UTC

An issue was discovered in Joomla! 2.5.0 through 3.9.22. A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.

CVE-2020-35613

Feb 24, 2026 05:03:35 UTC

An issue was discovered in Joomla! 3.0.0 through 3.9.22. Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list.

CVE-2020-35616

Feb 24, 2026 05:03:22 UTC

An issue was discovered in Joomla! 1.7.0 through 3.9.22. Lack of input validation while handling ACL rulesets can cause write ACL violations.

CVE-2020-35610

Feb 24, 2026 05:03:16 UTC

An issue was discovered in Joomla! 2.5.0 through 3.9.22. The autosuggestion feature of com_finder did not respect the access level of the corresponding terms.

CVE-2026-25108

Feb 24, 2026 04:56:38 UTC

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

CVE-2026-2697

Feb 24, 2026 04:56:36 UTC

An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.

CVE-2026-21420

Feb 24, 2026 04:56:35 UTC

Dell Repository Manager (DRM), versions prior to 3.4.8, contains an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code executio...

CVE-2026-26046

Feb 24, 2026 04:56:33 UTC

A vulnerability was found in a Moodle TeX filter administrative setting where insufficient sanitization of configuration input could allow command injection. On sites where the TeX filter is enabled and ImageMagick is installed, a malicious...

CVE-2026-26045

Feb 24, 2026 04:56:31 UTC

A flaw was identified in Moodle’s backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side ...

CVE-2026-25747

Feb 24, 2026 04:56:30 UTC

Deserialization of Untrusted Data vulnerability in Apache Camel LevelDB component. The Camel-LevelDB DefaultLevelDBSerializer class deserializes data read from the LevelDB aggregation repository using java.io.ObjectInputStream without appl...

CVE-2026-1367

Feb 24, 2026 04:56:28 UTC

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.